Вы находитесь на странице: 1из 39

Central Philippine Adventist College -Academy

Alegria, Murcia, Negros Occidental


Contact nos. 704-1800 (126)
E -mail Add: info@cpac.edu.ph

Promoting Excellence in Service, Faith gand Learnin

G11| Q1

Computer System Service

Prepared by: Cesar Ryan Cose


1
Table of Content
Title Page

Unit I Introduction to Computer System Servicing

2
Course Description
This course is designed to develop knowledge, skills, and attitudes of a Computer Service Technician in
accordance with industry standards. It covers basic and common competencies such as installing,
maintaining, configuring, and diagnosing computer systems and networks.

In this computer science course, you will learn advanced concepts underpinning the design of today’s
multicore-based computers. Additionally, you will learn how design decisions affect energy efficiency
and performance.

objective of the

identified from
The role and

information
sources of
available
team is

organizational
objective with
Integrate
personal

goal
opportunities
Training and
career
using computer
information
Access
equipment and
computer
Maintain

system

3
Learning Design
This module follows the PANEL design. Each lesson has the elements of the PANEL
design.

Perceive God’s Word

P Reading of Devotional and to reflect from it’s message.

Acquire knowledge (Explore)


In this section it contains thecompetencies, objectives, focus

A questions andmotivationof the lesson.

Nourish you skills (firm-Up)


N This is an assessment as to your level of knowledge to the subject
matter at hand, meant specifically to gauge prior related knowledge. An
introduction of the new lesson through various activities, before it will
be presented to you. These are discussions of the activities as a way to
deepen your discovery and understanding of the concept.

Express your thoughts (Deepen)

E Activities designed to process what you have learned from the


lesson. These are follow-up activities that are in- tended for you to
practice further in order to master the competencies.

Layout your skills (Transfer)


L These are tasks that are designed to show- case your skills and
knowledge gained, and applied into real-life concerns and
situations.

4
Week 1
LESSON 1: CSS in the Electronics Industry

Perceive God’s Word

Devotional

“I possess a device, in my pocket that is capable of accessing the entirety of information


known to man.”

Mark 9:14-32

Reference: v.23 “‘If you can’?” said Jesus. “Everything is possible for one who believes.”
(TNIV Bible)

Explore: The other day I saw a question posed on an internet site.

“If someone from the 1950s suddenly appeared today, what would be the most difficult thing
to explain to them about life today?”

Before reading any responses I stopped to think about this question. The microwave certainly
revolutionized homes and it is hard to explain how you place food into a box and one minute
later it’s hot enough to burn your mouth.

Clearly the internet, our modern cars, and sunscreen would be baffling to anyone from the
1950s. However, there was a response left on this site that was clever and confronting.

What is something about today that would be difficult to explain to someone from the 1950s?

“I possess a device, in my pocket that is capable of accessing the entirety of information


known to man.
I use it to look at pictures of cats and get in arguments with strangers.”

Hahaha, a very witty response, but also confronting because it’s so true. We hold a wealth of
knowledge in our hands every time we pick up our phone or open our computer, and yet, what
do we do with it?

Application: I think this is also true when we believe in Christ. We connect ourselves into the
Creator of the Universe. He has created seasons, divided the sea, healed the blind, walked on
water, and risen from the dead. There is no power greater than He.

And what do we do with this power? We worry about what tomorrow is going to be like, we
quarrel over what types of worship songs we should sing, and we separate ourselves from a
world that just seems too dark and bad.

We have the greatest power this world has ever experienced and He’s not just in our pockets,
He’s in our hearts. What are you going to do with this great and mighty power?

Prayer: Lord, forgive us when we reduce You to our size. Amen.

5
What are you going to do with this great and mighty power?

1950s, Creator, hands, Mark, phone, power, technology

Reflection:
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________

Prayer:
__________________________________________________________________
________________________________________________

Competency
At the end of this lesson, you are expected to:

• Identify appropriate hand tools according to task requirements


• Determine the importance of CSS in the workplace.
• Observe at all times and appropriate personal equipment
• Maintenance of Computer

Mini-Task:
• Building a virtual PC

How can student use the understanding of skills and attitude on the safe use, handling
maintenance tools?

What I know What I want to know What I learned

Think about the question. Answer the What I know column. You will go back to this later

6
Lesson 1: Use Hand Tools & Disassembling and assembling
Introduction 

You might be wondering why the lesson starts


with disassembly and not assembly itself? Simply because we
want to learn how to disassemble so we can assemble it again
from how we took out the parts. 

It is because in the industry, you will be


performing disassembly especially in servicing, compared to building a
new computer and repairing and maintaining the computers in the
workplace. You will have to be familiar especially first with the system
unit. We want you to learn how to assemble what you've taken out (disassembled).

It is important that you have taken and reviewed the prerequisite module (Intro to CSS) before going
into this hands-on course.

TOPIC 1: Preparing for Disassembly


H5P Activity 1: Arrange the following
sequence
Write a number to arrange the images in
the correct sequence on the box below
the image on your left side

KWL Table

How can student use the understanding of skills and attitude on the safe use, handling
maintenance tools?

What I know What I want to know What I learned

Think about the question. Answer the What I want to know column. You will go back to this
later

Video: Computer Disassembly Proper. This vide will teach you how to handle proper tool and step by
step process of disassembling your PC. https://youtu.be/edWS_IJTyd8

7
Preparing for Disassembly
Performance Checklist
If you tried disassembling a computer
on your own, this checklist might be
able to help you if you've done the job
correctly.

Check the following if you've met the criteria:

Assembling a Computer

Now that you've learned how to disassemble a PC, we are now


going to proceed to assembling what we just disassembled. Ideally,
as seen in the last part of the disassembly video, you need to
document the specifications/status of the components before
putting back the system unit together again.

A helpful tip is since you worked your way part by part in disassembly,
now you are just going to retrace your steps in assembling it.

Activity 1: Identification. Identify the different processors if it’s an AMD or an Intel.


Write AMD or Intel on the space provided.

______1. Atom _______5. Athlon 10. Ryzen


______2. Coffee Lake _______6. Sempron
______3. Pentium _______7. FX
______4. Celeron _______9. Zen
8
VIDEO: Assembly Proper
Watch the demonstration video on Computer Assembly below:

https://www.youtube.com/watch?v=VnSMN398R_s&feature=youtu.be How can student use


the understanding of skills and attitude on the safe use, handling maintenance tools?

What I know What I want to know What I learned

Performance Checklist
If you tried assembling a computer on your own, this checklist might be able to help you if you've done
the job correctly.
Check the following if you've met the criteria:

9
Performance Task. Virtual PC – you will have to search from the inter net and build a PC
You will have to choose one of the following processors.
Ryzen 3 and Intel Core i3 – You will have to choose 1 processor then you will have to provide
what kind of motherboard, Ram and etc. would be applicable for either one of these
processors.
10
Item Brand Description

Rubric
Manual Poor Fair Good

Student could not find Student correctly found Student correctly found
the correct diagram of the manual for the both the manual for the
the Motherboard or the Computer Computer and the
Manual for the diagram of the
Computer Motherboard

Power Supply Install Student could not Student correctly Student correctly
correctly install CPU followed most of the installed CPU and the
and the heat sink/fan steps in CPU and the heat sink/fan assembly
assembly on the heat sink/fan assembly on the motherboard.
motherboard. on the motherboard.

External cables Student could not Student correctly


correctly install followed most of the Student correctly
external cables and side steps in installing the installed external
case panels. external cables and side cables and side case
case panels. panels.
Safety Student does not Student practices safety
practice safety procedures or protects Student practices safety
procedures or protect the computer from procedures and protects
the computer from ESD. the computer from
ESD. ESD.

11
LESSON 2: Configuring the BIOS
Week 2

Perceive God’s Word

Devotional

You’re Value
Are not two sparrows sold for a penny? Yet not one of them will fall to the ground apart
from the will of your Father. Matthew 10:29
Of the more than 9,000 varieties of birds in the world, none is more common than the sparrow.
The adjective "common" well describes this little bird that is found throughout much of the
world, from the extreme reaches of the north to the southern hemisphere. Geese have been
seen over the Himalayas in Asia at a height of more than 29,000 feet, where jet airplanes fly.
But not the little sparrow that hovers quite close to the ground. While an African ostrich may
stand 8 feet tall and weigh 300 pounds, the little sparrow can rest in your hand. Some birds,
such as the peacock, have brilliant plumage, but sparrows are pretty basic and plain little birds
mostly brown in color, with an occasional touch of white or black, or a suggestion of red.
Some scientists say that crows are the most intelligent of all birds because of their cunning.
But the closest that sparrows get to the great universities of our day is in the trees that abound
on their campuses. Some birds, such as thrushes and meadowlarks, have beautiful songs, but
the little sparrow chirps in his rather ordinary voice.
While some exotic birds demand great prices in pet and specialty stores, sparrows are
practically worthless, something that has been true for a long, long time.
In reality, sparrows are pretty insignificant in the kingdom of feathered friends, yet it is
amazing how prominently sparrows fit into the language of the Bible. Jesus often spoke of
sparrows, trying to help people understand that God takes note of them, and that people are of
far greater value than the sparrows of the heavens.
He said, "Are not two sparrows sold for a penny? Yet not one of them will fall to the ground
apart from the will of your Father. And even the very hairs of your head are all numbered. So
don't be afraid; you are worth more than many sparrows" (Matthew 10:29-31).
Just this morning a little sparrow was perched outside my window, and I began thinking of
what I have just shared with you. A lot of us can relate to the sparrows. We live with turkeys
instead of soaring with eagles. In life we haven't climbed the Everests of success; we spent our
lives down in the valley, going from one paycheck to the next, grubbing out an existence. We
flit from one task to the next, doing the best we can with what we've got.
How beautiful that Jesus used the sparrow as an object lesson, which teaches us that we may
not soar with the eagles or strut with the peacocks, but we are important to our Heavenly
Father. One of the greatest concerns of people today is how God really views our lives. Does
He really care? Are you one of the billions of faceless people in His sight? Or does He take
note of the ruffled feathers in your life?
There's good news, friend! It's a settled issued. He does take notice, and He cares. May I
suggest that you make a note of Matthew 6 in your Bible and remind yourself of what you
probably already know in your heart. Jesus put it like this: "Look at the birds of the air; they
do not sow or reap or store away in barns, and yet your heavenly father feeds them. Are you
not much more valuable than they? Who of you by worrying can add a single hour to his
life?" (Matthew 6:26-27).
12
The next time you hear the chirp of a little sparrow, or see one hopping from limb to limb
outside your window, remind yourself than, the most common of birds is important to our
Heavenly Father, and so are you, friend. It's a truth that brings encouragement and hope.

Reflection:
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________

Prayer:
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________

Competency
At the end of this lesson, you are expected to:
• Understand the Bios
• Configure the Bios
Performance Task:
Creating a bootable device using media creation tool.

Acquire knowledge (Explore)

Assessing Quality

Activity 1: IRF Table


Direction: Read the essential question below. Write your initial answer in the first column of the
IRF table.

Essential question. Why is Bios important?


Initial Revised Final

13
The BIOS (pronounced as "bay-os") or the basic input/output system of
the computer, is responsible in making sure that all the other chips, hard
drives, ports, and the CPU function together. 

The BIOS basically sets up your computer -- it loads your drivers and
boots the operating system.

TOPIC 1: Understanding the BIOS

The BIOS is a software usually built onto the motherboard that shows the


major hardware components of your computer with the operating system. 

It is usually stored on a Flash memory chip on the motherboard, but sometimes the chip is
another type of ROM.

When you turn on your computer, the BIOS does several things. The sequence is as
follows:
1.  Check the CMOS Setup for custom settings
2.  Load the interrupt handlers and device drivers
3.  Initialize registers and power management
4.  Perform the power-on self-test (POST)
5.  Display system settings
6.  Determine which devices are bootable
7.   Initiate the bootstrap sequence

14
Click the link or search the title on youtube.
https://www.youtube.com/watch?v=zIYkol851dU “BIOS and UEFI as Fast as Possible”
By default, the first boot of the newly installed computer is on the hard disk--may it be on a laptop or a
desktop computer. When installing an operating system, the BIOS should be configured to set the
system to boot on the operating system to be installed. It should boot first on the USB installer.

Running the BIOS 


Upon turning the computer on, press the keys that would run Setup. On most computers, it would be
keys: ESC, DEL, F1, F2, F12, Ctrl-Esc, or Ctrl-Alt-Esc to enter setup. There is usually a line of text at
the bottom of the display that tells you "Press ___ to Enter Setup."

BIOS setup would depend on the motherboard manufacturer. However, these are the common, standard
options you may see in the BIOS setup:

1. If you would like to boot from a certain device, say a USB Flash Drive to install an Operating
System (which we will demonstrate later), click advanced set-up and look for the first, second,
and third boot device.

2. Select first boot device. By default, it would be the hard drive on the installed computer.

3. Make sure to choose "Save Changes" when you are changing settings in the BIOS. Afterwards,
this will restart the computer so the new settings take effect.       

 System Time/Date - Set the system time and date

 Boot Sequence - The order that BIOS will try to load the operating system

 Plug and Play - A standard for auto-detecting connected devices; should be set to "Yes" if your
computer and operating system both support it

 Mouse/Keyboard - "Enable Num Lock," "Enable the Keyboard," "Auto-Detect Mouse"...

 Drive Configuration - Configure hard drives, CD-ROM and floppy drives

 Memory - Direct the BIOS to shadow to a specific memory address

 Security - Set a password for accessing the computer

 <p Power Management - Select whether to use power management, as well as set the amount
of time for standby and suspend </p

 Exit - Save your changes, discard your changes or restore default settings

15
TOPIC 3: Creating a Bootable Device

WHY IS BOOTING REQUIRED?

o Hardware doesn’t know where the operating system resides and how to load it.
o Need a special program to do this job – Bootstrap loader.

(e.g. BIOS – Boot Input Output System)

o Bootstrap loader locates the kernel, loads it into main memory and starts its execution.
o In some systems, a simple bootstrap loader fetches a more complex boot program from
disk, which in turn loads the kernel.

TOPIC 3: Creating a Bootable Device


Activity 2: Find the words!
Find the words from the grid

16
Creating a Bootable Device
Bootable Devices
1. Booting is a startup sequence that launches the operating system of a computer when it is turned
on. 
2. A boot sequence is the initial set of operations that the computer performs when it is switched
on. Every computer has a boot sequence.
3. A boot device is any device or drive that has the required boot files that allows the computer to
start.

In this case, if we are building a PC from scratch, usually there is still no operating system.
With this, an operating system can be booted or installed from a boot device.

A boot drive commonly used is the hard drive. Usually, an operating system like Microsoft
Windows is installed in a hard drive to load Windows.

TOPIC 3: Creating a Bootable Device


H5P: Creating Bootable USB Device
Using a third party application (Rufus), scroll the demonstration slides below to see the step-by-step
process on creating a bootable USB device.

Installing Operating Systems

When you open a computer, usually this will either be a Windows PC or a Macintosh computer. They
will have different user interfaces or applications that may be specific to that computer. The Windows or
the Mac are called operating systems.

The Operating System (OS) is a layer of software which is used to manage computer resources. It also
provides an interface, so that users can utilize computer resources. It configures and manages hardware
to connect the components and the applications.

Different Operating Systems

The three most popular operating systems are Windows, MAC, and Linux. 

17
 Windows is the dominant over the other two. 90% of computer users use Windows operating
system. 
 Windows and MAC are expensive operating systems however, MAC OS requires the users to
buy the MAC systems (Macbook, Mac) built by Apple. 
 On the other hand, Linux is a free operating system.
 Windows and MAC have similar file structures while Linux has a different code base (single file
tree compared to Windows and MAC's many directories)
 Windows interface has a Start menu, Taskbar, System Tray, and the Windows Explore while
Linux has easy to switch interfaces.
 Linux is most preferred by programmers, MAC is preferred by graphic artists, and Windows is
perferred by gamers.

Click the link below or search on YouTube “How to install Windows 10(Step by Step)

https://www.youtube.com/watch?v=_zQ_-Oov-Cw

Common Operating Systems

The following are common operating systems being used today:

18
Lesson 3: Installing Device Drivers

This is an essential step that you need to be aware of after


installing an operating system. Basically, the device drivers
tell your operating system how to use the components like the
motherboard, graphics card, network interface cards, sound
cards, and other devices. 

Most of the time, Windows would be able to recognize a


device and will install drivers automatically. Some cases
would require to install generic drivers.

Drivers – small software programs that help the operating system use the device. When a device is
malfunctioning, one should ask whether the right driver has been installed.

Installing Device Drivers


There are several ways to install device drivers for your newly installed components:

19
1. Manufacturer’s DVD Installer – Provided upon buying a
computer, laptop, device

2. Driverpack Solution – A free tool which automatically


finds proper drivers for a computer, then downloads and
installs it without wizards or installation prompts.

3. Device Manager (Driver Update) – Can be


accessed by clicking Start > Computer > Manage
> Device Manager. From here, each component
can have the option to install a driver through a
CD or through searching automatically online.

20
4. Download Online – Look for unit’s Model Name and Number

Checking Device Driver Installation

After installation, you would want to see if you've installed the correct device drivers to avoid any issues
that may hinder the component from running in its full performance. 

In this simple procedure, we are looking if there drivers are already installed. If the device driver is
installed, updating it through the device manager
would prompt to say that the drivers are
installed.

1. Open the Control Panel.


2. Select System and Security.
3. Click System and select Device Manager from
the left side.

4. Click “Monitor” and you will see


that a genetic monitor is installed.

Installing Software
Software is basically the instructions and programs that tells
the computer to run different tasks.
It can be categorized into system or OS, application,
and programming.

 System/Operating System - tells the CPU what to do. The



most common types of operating systems are MS DOS
Windows, MAC OS, and Corel Linux.
  Application - assigned to perform specific functions / tasks
on the computer.
  Programming - it is development of various sets of instructions for a computer to do a task.
Different programming languages can be used to carry out a certain task and to let the computer
operate smoothly.

21
Establishing Installation Procedure

Installer - computer program that installs files, such as applications,


drivers, software onto a computer.

 Installation (setup) of a computer program is making a program ready


for execution or user access. This process may varyd depending on the
program, type of computer, computer operating system, etc.

Common Windows Installer File Extension:

1. Executable - .exe
2. Microsoft Windows Installation - .msi
3. Compressed Zip File - .zip
4. ISO image - .iso

Types of Software

Also known as Operating System. It tells the CPU what to do.


Most common examples include Windows, MAC OS, MS-DOS and Linux.

Application Software

It accomplishes specific tasks intended for personal, business, or scientific purposes. Example tasks
include inventory management, payroll processing, human resource management, etc.

Common Application Software:

 Word Processor
 Spreadsheets
 Database Programs
 Presentation Software
 Desktop Publishing Software
 Reference Software
 Graphics Programs
 Educational Software
 Computer Games
 Network Software
 Language Software

 Programming Software

Used to make computer programs. Programming language is used to create computer programs.

 Eclipse
 Coda
 Notepad ++
 Sublime Text

File System Types/Formatting

File System – A program used by the operating system to organize data or application files. The type
of file system is used to determine how data and programs will be accessed. In addition to that, it can
also control what data or programs will be available to users.

22
Types of File System

1. FAT File System


File Allocation Table Type allows the operating system to look for files on a disk.
2.  FAT32 File System
More advanced version of the FAT File System. It can partition size as well as access speed. Because of
this, FAT32 allows users to have better disk space utilization.
3. ExFAT
Stands for Extended File Allocation Table. A file system type that can be used for memory sticks and
SD cards.
4. NTFS File System
New Technology File System. Compared to FAT and FAT32, NTFS has a much bigger partition and
file size. It is a highly reliable file system type because it is recoverable. It also has fault tolerance which
means that logged transactions can be used to recover data.

Types of File System

1. FAT File System


File Allocation Table Type allows the operating system to look for files on a
disk.

2.  FAT32 File System


More advanced version of the FAT File System. It can partition size as well
as access speed. Because of this, FAT32 allows users to have better disk
space utilization.

3. ExFAT
Stands for Extended File Allocation Table. A file system type that can be used for memory sticks and
SD cards.

4. NTFS File System


New Technology File System. Compared to FAT and FAT32, NTFS has a much bigger partition and
file size. It is a highly reliable file system type because it is recoverable. It also has fault tolerance which
means that logged transactions can be used to recover data.

Follow the guidelines to format the file system in a storage.

1.     By default, formatting is set to FAT.


– If you try to format an internal hard disk that is smaller than 32 GB, you will see the options for
NTFS, FAT and FAT32.
– If you try to format an internal hard disk that is larger than 32 GB, you will only see the option for
NTFS.
– If you try to format an external USB device smaller than 32 GB, you will see all the options.
– If you try to format and external USB device larger than 32 GB, you will only see NTFS and exFAT.
2.     Devices smaller than 32 GB should be formatted in FAT or FAT32 for more reliability and less
disk space wastage.
3.     Files larger than 32GB should be formatted in exFAT for latest operating systems.
4.     For other compatible devices and other operating systems, files larger than 32 GB should be
formatted using NFTS.
TOPIC 3: File System Types/Formatting

Common File Formats


The following are the most common file formats that you will encounter when working in a
computer.

File type File extension


Text                    .doc .docx .asc .rtf .msg .txt .wpd .wps               
Image .jpg .gif .png .bmp .eps  .pict  .psd .tif
23
Sound .mp3.aac .au .mid  .ra .snd .wma .wav
Video .mp4.avi  .mpg .mov .wmv
Program  .exe  .bat .com 
Compresse
 .arj .gz .hqx .rar .sit .tar .z .zip .arc
d

Activity 3. Search my meaning. Search every meaning of the given file extensions. Write it on another
clean sheet of paper.

Installing Applications

This is the basic procedure that is most common when


you are installing applications.

1. Find the installer folder.


2. Right click Setup.exe.
3. Follow the on-screen instruction.

Click through the step-by-step presentation below in installing


a web browser

Lesson 4: Conducting Tests

After installing hardware and software, it is important that we make sure that
the computer runs perfectly.

Testing the computer through stress tests is a good example to check if there are
remaining issues in the computer. There are procedures such as gathering test
information, validating and responding to these may help in making sure that
everything runs smoothly.

Make sure that you have reviewed the use of diagnostic tools before proceeding to this lesson.

Software Tools/Disk Management Tools

The following are different disk management tools and procedures that can optimize a PC to its
full performance as well as check errors/issues along the way.
fDisk 

A command-line tool that creates and deletes partitions on a hard drive. It is available from Windows
2002 onwards. For newer units (from Windows XP onwards) the disk management tool is used.

24
Disk Management Tool 
This is used to manage disks and drives (like internal and external hard drives), create partitions, and
format devices. This is used on newer versions of Microsoft Windows.

 Format 
It is the process of preparing a data storage device (i.e. hard drive, USB drive, solid-state drive) to store
information.

ScanDisk or CHKDSK 
Used to check integrity of files and folders in your
unit. This can also be used to check the disk surface
for physical errors.

Defrag 
It optimizes space on hard drive and allow faster
access to programs and data.

System File Checker (SFC) 


A tool in Microsoft Windows that allows users to scan
and restore corrupt Windows system files. This is
available in Windows 98 and later.

Testing Procedures

This is the basic testing procedure you will follow throughout.

1. Gathering test information. 


2. Validating test information.
3. Responding to rest information. 
4. Checking specification.

Observing the Boot Routine

1. If you have turned off the computer, power it on inclduing all


peripherals and devices
2. Examine the power supply fan.
Is the fan running normally?
> If YES, proceed to Step 3.
> If NOT, troubleshoot the system power.
3. Watch the NUM LOCK, CAPS LOCK, and SCROLL LOCK keys
light in the keyboard.

Testing Procedures

Internal Visual Inspection


Before performing Internal Visual Inspection, make sure that all open files were saved and
running application programs were closed.

1. Like in conducting external visual inspection, make sure that you have turned off the computer
including its devices and peripherals. Disconnect all power cables and electrical outlets.
25
2. Remove the computer’s right-side cover.
3. Examine whether all chips, expansion cards, and SEC cartridge and heat sink assembly or
assemblies are fully seated in their sockets or connectors.
4. To ensure that chips are fully seated in their sockets, press firmly on the top of each chip.
5. Check whether all jumpers are set correctly.
6. Check whether all cable connectors inside the computer to verify that they are firmly attached to its
right connection.
7. Reinstall the computer cover.
Reconnect the computer and any attached peripherals to their power sources, and turn them on.

Conducting Stress Test

Stress testing is a form of software testing that determines a system’s stability, availability, and
reliability. 
It is used to determine the speed and effectiveness of a computer, network, software, or device.
Performance testing is checking the software whether it can cope up with the current system
performance.

You can conduct stress test by monitoring your computer performance through the Task Manager (Just
press CTRL + ALT + DEL keys to launch the Task Manager).
1. Close all open programs and launch the Task Manager.
2. Select "Performance" from the tabs.
3. Open as many applications as you can or perform many tasks.
4. Observe the computer's CPU Usage and Memory.
The more RAM you have, the smoother it is to access programs.

Lesson 4. Understanding network Devices

We aim to understand how computers are connected to each other that is


why it is essential that we should be familiar with the different devices
found in the workplace to perform network connectivity.

It is important to understand that each workplace has a unique


plan/map of how the organization distributes information and who has
access.
26
This lesson's goal is to simply familiarize ourselves with the different network devices which we'll get
to connecting later.

Network Devices

Router 
A device that forwards data packets along networks. A router is
connected to at least two networks, commonly
two LANs or WANs or a LAN and its ISP's network. Routers are
located at gateways, the places where two or more networks
connect.

Switch 
A device that filters and forwards packets between LAN segments.
Switches operate at the data link layer (layer 2) and sometimes the network layer (layer 3) of the OSI
Reference Model and therefore support any packet protocol. LANs that use switches to
join segments are called switched LANs or, in the case of Ethernet networks, switched Ethernet LANs. 

Hub
A common connection point for devices in a network. Hubs are commonly used to connect segments of
a LAN. A hub contains multiple ports. When a packet arrives at one port, it is copied to the other ports
so that all segments of the LAN can see all packets.

Hubs and switches serve as a central connection for all of


your network equipment and handles a data type known
as frames. Frames carry your data. When a frame is
received, it is amplified and then transmitted on to the
port of the destination PC. 

Repeater 
A network device used to regenerate or replicate a signal.
Repeaters are used in transmission systems to regenerate
analog or digital signals distorted by transmission loss. Analog
repeaters frequently can only amplify the signal while digital
repeaters can reconstruct a signal to near its original quality.
Bridge 
A device that connects two local-area networks (LANs), or two
segments of the same LAN that use the same protocol, such as
Ethernet or Token-Ring.
Local Area Network

Basically, a local area network, called as LAN, is a group of computers and connected devices that
share a common communication line (or may be wireless) to a server. 
A LAN is where computers and mobile devices may share resources like printers, scanners, storage, etc.
Local Area Connection Properties

27
To make sure that your LAN works properly, make sure that the following items are installed and
enabled in the Local Area Connection Properties:

Clients For Microsoft Networks


Allow your computer to share files and printers in Microsoft Network

Internet Protocol Version 4 (TCP/IPv4)


The protocol that enables the computer to communicate with other computers in the network. This can
be set automatically or manually specified along with other network information to work properly.
Make sure however that each device has a unique IP.

LAN Settings
These are specific IP settings for the LAN interface.
The default IP Address is 192.168.0.1.
The default Subnet Mask is 255.255.255.0.

DHCP Server
Stands for Dynamic Host Control Protocol. This gives the IP Addresses when a device starts and
requests an IP address from the network. It can be set to obtain IP address automatically.
Different Network Location Types

Home Network

This type is ideal for home networks where you trust all the people and the devices using the network.
By default, network discovery is turned on, allowing you to see other computers and devices, and others
can see you as well.

Work Network

This type is used in small office or other workplace networks. By default, network discovery is enabled
allowing other computers on a network. However, you cannot join or create a homegroup.

Public Network

This type is the safest. This is designed to keep your computer from being visible to others and helps
protect your computer from malicious software from the Internet. However, network discovery is turned
off and homegroup is not available on this network.

Domain Network

This is used for domains and at enterprise networks. This is controlled by the network administrator.

Wide Area Network


Also known as WAN. This is a collection of computers and networks connected via a network just like
the LAN. However, in WAN, it is connected over a large geographic area.

The following are the WAN settings used to connect to the Internet Service Provider (ISP):

Dynamic IP Address
This is to obtain an IP address automatically from the ISP.
Host Name
This is optional. Usually, this is the model number of the device.
MAC Address
This is optional. MAC stands for Media Access Control. The MAC Address is set by default to the
MAC Address of the WAN interface in the device.
Primary DNS Address/ Secondary DNS Address
28
This is optional. A Domain Name Server (DNS) is entered. If left blank, the ISP provides the DNS
address.
Auto-Reconnect
This feature allows the router to reconnect to the ISP automatically if connections is disconnected.

Static IP Address
This is to set a specific IP Address that is still provided by the ISP. However, this is avoided because
this requires a lot of work and manual entry of network information.

PPPoE
Stands for Point-to-Point Protocol over Ethernet. Only used if the ISP uses this protocol. The ISP
provides the username and password.
IP Addressing
IP Address, or the Internet Protocol Address, is a numerical label assigned to a device within a
computer network that uses the Internet Protocol. It has two functions: (1) network hosting ; and (2)
location addressing.

The IPv4 is still in use today. It is a 32-bit number system.

On the other hand, a new version of Internet Protocol called the IPv6 makes use of 128 bits for its
address. (e.g. 2001:db8:0:1234:0:567:8:1)

Creating Network Cables

Cable is the medium through which information usually moves from one network device to another. 

There are several types of cables which are commonly used with LANs. In some cases, a network will
utilize only one type of cable, while other networks will use a variety of cable types. 

The type of cable chosen for a network is related to the network's topology, protocol, and size. 

Understanding the characteristics of different types of cable and how they relate to other aspects of a
network is necessary for the development of a successful network.

Network Media
The network can be connected through two types of connections: wired and wireless.

Having a wired connection is more reliable than a wireless


connection. However, wireless connections are widely used by
some devices such as cellphones and laptops for their portability.

Unshielded Twisted Pair (UTP) Cable

A popular type of cable that is


commonly used for Local Area
Networks. It has a two shielded wires
twisted around each other. 

Shielded Twisted Pair (STP) Cable

The extra covering of the STP Cable provides extra protection to


prevent electromagnetic interference.

29
Coaxial Cable

This the cable commonly used in television industries. The metal shield
surrounding the cable helps block interference from fluorescence lights, motors,
and other computers.

Fiber Optic Cable

Transmits light rather than electronic signals which reduce the


risks of electrical interference. It is ideal for environments where
electrical interference is present.

Wireless Connections

Wireless connections make use of


LANs which allow high frequency
radio signals to communicate between work stations, servers, or hubs. 

Wireless networks are ideal for allowing laptops, portable devices, and other
devices to connect to the LAN. This is also beneficial in establishments
where it may be harder to install cables.

Wireless Networking

A wireless network is any type of computer network that use wireless data connections for connecting
network nodes.

Wireless PAN
Stands for Wireless Personal Area Networks (WPANs). This connection interconnect devices within a
small area. An example would be bluetooth and infrared.

Wireless LAN
Known as WLANs. This is used to connect to local resources and the internet. It links two or more
devices over a short distance using a wireless distribution method - usually through an wireless
router/wireless access point for internet access. Wi-Fi falls under WLANs.

Wireless Mesh Networks


This is a wireless network made up of radio nodes organized in a mesh topology. It can be a
(1) Wireless MAN or Wireless Metropolitan Area Network which connects several WLANs.
(2) Wireless WAN or Wireless Wide Area Network which covers large areas such as cities/towns,
branch offices, business, public internet access system, etc.
(3) Global Area Network (GAN) for used for mobile technology such as texting, calling, etc.
(4) Space Network which is used between spacecrafts within the vicinity of earth. NASA's Space
Network makes use of this technology.

Cable Installation

It is a jack used for Ethernet networking and used for cables. Both T568A and T568B are
common wiring standards however the T568B is widely used in the Philippines.

There are two common network cabling namely the straight-through and the crossover cables.

30
A straight-through cable is also known as the patch cable or Ethernet cable. This is the most
common format for network cables. The wires have same pins from either end.  This is used
when connecting a computer to a modem, router, or switch. This is also used between
networking equipment that are not similar to each other.

A crossover cable crosses the wires from the other end differently to the other. We use these
when we connect two devices of the same type like two computers or two similar networking
devices. These wirings use two different ends, T568A and T568B.

However, if we use a device between two devices (such as a switch), all cables are straight
through.

VIDEO: Creating Network Cables


Watch the video below to learn how to create straight-through and crossover cables.
https://youtu.be/bJIB6I_Uk8w
NOTE:
Aside from the straight-through and crossover patterns shown in the video, the following may
also be commonly done.

Patch Panels

A patch panel, also known as patch bay, patch field, or jack field, is used to connect and route circuits
for monitoring, interconnecting, and testing circuits in a convenient and flexible matter.

Having an organized patch panel is important in the workplace. Although the patch panel is meant for
organization, it is still essential to minimize hazards such as hanging and open network cables.

Good patch panel cable management is important. Neat patch, for example,  is one of the most common
patch panel cable management systems. 

It allows users to store patch panels in a neat and tidy compartment. It is also compliant with industry
standards.

Patch Panel to Modular Box


In connecting a patch panel to a modular box, it is important to take note that the UTP cable at this time
is neither a straight-through or crossover. 

31
We will be installing both ends on a patch panel and a modular box.

Patch Panel

> First, strip the outer covering of the cable

> Then, arrange the wires according to its proper color coding based on the color coding you have done
on the RJ45. 

A – white blue / blue / white green / green / white orange / orange / white brown / brown

B – white blue / blue / white orange / orange / white green / green / white brown / brown

Modular Box
> Strip the outer covering of the cable

> Arrange the wires according to its proper color coding based on the color
coding you have done on the RJ45. Connect the cables just like the numbers
arranged at the figure below

VIDEO: Installing Patch Panels


Watch the video below on how to install patch panels:
https://youtu.be/gfMHNu4LaIo

Configuring the Network


A computer network is a collection of computers and other devices linked together via use
networking devices. Networking devices are also called as communicating devices. 

Computer networks are important because it ensures effective transmission and sharing
of data between different computer devices.

Setting-up computer networks at your homes does not need to be complicated. Few basic pieces
of computer hardware are needed to connect your computers and other devices to each other
and to the Internet.

Network Categories

32
Difference in Network
Categories

33
Network Topologies

Basically, network topology is how the network of


devices/computers is arranged through the connection of
various nodes through lines of connections.
Imagine a topology as a guide or a map in creating your own network.

There are different types of network topologies that we will be going


through in this topic.

Bus Topology
This is a network type in which the computers and network
devices are connected to a single cable.

This type of network can transmit data in only one direction. Each device is connected to a single
cable.

PROS
☑ Cost-effective
☑ Cable is required
☑ For small networks
☑ Easy to understand and create
☑ Easy to expand (through joining two cables)

CONS
☑ When cable fails, the whole network fails
☑ If network traffic is heavy, the performance of the network decreases
☑ Cable has limited length

☑ Slower than ring topology


Ring Topology
This network forms like a ring where a computer is connected to another computer. The last
computer is connected to the first. Each compputer has two neighbors.

34
It has a number of repeaters. The transmission is unidirectional.
The data is also transferred in a sequential manner, bit by bit.

PROS
☑ Not affected by high traffic
☑ Cheap to install and expand

CONS
☑ Hard to troubleshoot
☑ Adding or removing a computer will disturb network activity
☑ When a computer fails, the whole network is disturbed
Star Topology
This type features all computers connected through a single hub/switch through a cable. The
hub/switch is a central node and all others are connected to a central node.

35
Each node has a dedicated connection to the hub/switch. This will act as a repeater as well for data flow.
This can be done using a UTP, optical fiber, or coaxial cable.

PROS
☑ Fast performance the fewer nodes
☑ Low network traffic
☑ Switch/Hub can be easily upgraded
☑ Easy set-up and modification
☑ When a node fails, the others can work smoothly

CONS
☑ High cost
☑ Expensive to maintain
☑ When switch/hub fails, whole network stops
☑ Switch/hub capacity controls the performance
Mesh Topology

36
There are two types: (1) partial mesh topology where some of the systems are connected in the same
fashion as mesh topology but some devices are connected to two or three devices; and (2) full mesh
topology where each and every device is connected to each other.
This type features a full, robust connection. However, it is not flexible.

PROS
☑ Each connection can carry own data load
☑ Robust
☑ Easy troubleshooting
☑ Secure and private

CONS
☑ Difficult to install and configure
☑ Expensive cabling cost
☑ Bulk wiring
Tree Topology
This type has a root device and other devices are connected to form a hierarchy. Also known
as hierarchical topology. It should have at least three levels in the hierarchy.

37
This is ideal if workstations are located in groups. It is used in WANs.

PROS
☑ Can be extensions of bus and star topologies
☑ Easily expanded
☑ Easily managed and maintained
☑ Errors are easily detected

CONS
☑ Heavily cabled
☑ Expensive
☑ The more devices, the harder the maintenance
☑ If central switch/hub fails, network fails
Hybrid Topology
This type is a mixture of two or more topologies. You may have a department in the office using ring
topology while the other uses a star topology. This is called a Hybrid Topology.

38
It can combine even more than two topologies. Both the advantages and disadvantages are included
when you create a hybrid, thus, ideal for a non-conventional set-up.

PROS
☑ Reliable
☑ Easy troubleshooting
☑ Errors are easily detected
☑ Easily scalable
☑ Flexible

CONS
☑ Complex
☑ Expensive
ASSIGNMENT: Draw your own topology!

Using the network devices you've learned at the previous lesson, try
to draw your own office network. 

Imagine at least 10 workers but they are divided at far ends of a building.

You have a pool of options to create a topology that will fit them to still
have a network connection. You may use any (e.g. wireless, wired)
connections that you deem appropriate.

39

Вам также может понравиться