This document provides instructions for setting up a network. It begins by explaining what the learning module is about and who it is for. Specifically, it aims to teach students how to install a Network Interface Card, crimp cables, and configure and test a network. Some prior knowledge of computer networks is necessary to understand the material. The document then details the necessary hardware, provides diagrams to identify cable wiring schematics, and gives step-by-step instructions for installing a NIC, crimping straight and crossover cables, and configuring the network using the IP address, subnet mask and other settings.
data recovery training course online offline INTERSOFT Abdullah Khan
data recovery training course with logical data recovery , physical data recovery training, hard disk circuit repairing advance course full day training for 3 days
Khung gầm chắc chắn, trọng lượng nhẹ
Hiệu năng ấn tượng so với đối thủ cùng phân khúc
Màn hình có độ sáng và sắc nét cao
Thời lượng pin cao (trên phiên bản FullHD)
Âm thanh tốt, loa và bass ấn tượng
Nguồn: https://laptops.vn/san-pham/hp-envy-13-2021/
data recovery training course online offline INTERSOFT Abdullah Khan
data recovery training course with logical data recovery , physical data recovery training, hard disk circuit repairing advance course full day training for 3 days
Khung gầm chắc chắn, trọng lượng nhẹ
Hiệu năng ấn tượng so với đối thủ cùng phân khúc
Màn hình có độ sáng và sắc nét cao
Thời lượng pin cao (trên phiên bản FullHD)
Âm thanh tốt, loa và bass ấn tượng
Nguồn: https://laptops.vn/san-pham/hp-envy-13-2021/
NETWORKING SYSTEMS 1
NETWORKING SYSTEMS 5
Networking System
Sarju Thapa
Dr. Stephen Gardner
East Central University
Abstract
In this report, the planning to design the network will be discussed and demonstrated in detail. The planning to design the network layout will be made according to the scenario given in the requirements. The plan will be implemented by the evaluation of the aspects that are important to design the network and other necessary things to design and implement the network. After implementing the network, the network will be tested by secure communication, WAN communication Channel, Wireless network, and PAN network. The troubleshooting of the network will also be discussed and elaborated in detail. The protocols used in this network will also be taken into consideration.
Introduction
Designing a network is not a simple task for someone. There are different phases to design the network. Each phase has a very important role to design the network. The first phase is to collect all the requirements to design the network. The second phase is to evaluate the requirements to make sure that either requirement is enough to design the network or not. After evaluating the requirements, the third phase is to implement all the aspects that are gathered in requirements. The fourth and last phase after implementing the network design is to optimize the network by performance.
Network Layout
The physical arrangement of the network is called network layout. The network layout of the given is scenario is shown below:
Diagram created using CISCO PACKET TRACER 7.3.0
Demonstration
This network consists of two different places one place is headquarter which is the main point of this network and another place is Therall which is the working point of this network.
Headquarter
In headquarter, the Executive office, R&D, Reception, Guest office, and accounting office’s host are connected with one switch. Twisted pair cable is used in this part of the network. Each device directly connected with the headquarter switch. 8P8C (Actually, RJ-45 is the more common term) jack is used in this part of the network and it is located in the reception area. Bus topology is used in this part of the network. (I think that what you have in your diagram is a bus-star hybrid. The switch is the bus, the individual cables to the hosts are the star)
Thrall
In Thrall Remote, the Engineering area, production area, and reception area’s host are connected with the switch. Twisted pair cable is used in this part of the network. Each device directly connected with the headquarter switch. 8P8C jack is used in this part of the network and it is located in the reception area. Bus topology is used in this part of the network.
For bot.
NETWORKING SYSTEMS 1
NETWORKING SYSTEMS 5
Networking System
Sarju Thapa
Dr. Stephen Gardner
East Central University
Abstract
In this report, the planning to design the network will be discussed and demonstrated in detail. The planning to design the network layout will be made according to the scenario given in the requirements. The plan will be implemented by the evaluation of the aspects that are important to design the network and other necessary things to design and implement the network. After implementing the network, the network will be tested by secure communication, WAN communication Channel, Wireless network, and PAN network. The troubleshooting of the network will also be discussed and elaborated in detail. The protocols used in this network will also be taken into consideration.
Introduction
Designing a network is not a simple task for someone. There are different phases to design the network. Each phase has a very important role to design the network. The first phase is to collect all the requirements to design the network. The second phase is to evaluate the requirements to make sure that either requirement is enough to design the network or not. After evaluating the requirements, the third phase is to implement all the aspects that are gathered in requirements. The fourth and last phase after implementing the network design is to optimize the network by performance.
Network Layout
The physical arrangement of the network is called network layout. The network layout of the given is scenario is shown below:
Diagram created using CISCO PACKET TRACER 7.3.0
Demonstration
This network consists of two different places one place is headquarter which is the main point of this network and another place is Therall which is the working point of this network.
Headquarter
In headquarter, the Executive office, R&D, Reception, Guest office, and accounting office’s host are connected with one switch. Twisted pair cable is used in this part of the network. Each device directly connected with the headquarter switch. 8P8C (Actually, RJ-45 is the more common term) jack is used in this part of the network and it is located in the reception area. Bus topology is used in this part of the network. (I think that what you have in your diagram is a bus-star hybrid. The switch is the bus, the individual cables to the hosts are the star)
Thrall
In Thrall Remote, the Engineering area, production area, and reception area’s host are connected with the switch. Twisted pair cable is used in this part of the network. Each device directly connected with the headquarter switch. 8P8C jack is used in this part of the network and it is located in the reception area. Bus topology is used in this part of the network.
For bot.
Now more than ever, today’s businesses require reliable network connectivity and access to corporate resources. Connections to and from business units, vendors and SOHOs are all equally important to keep the continuity when needed. Business runs all day, every day and even in off hours. Most companies run operations around the clock, seven days a week so it’s important to realize that to keep a solid business continuity strategy, redundancy technologies should be considered and/or implemented.
So, we need to keep things up and available all the time. This is sometimes referred to five nines (99.999) uptime. The small percentage of downtime is accounted for unforeseen incidents, or ‘scheduled maintenance’ and usually set to take place during times of least impact, like in the middle of the night, or on holiday weekends if planned. If this is not a part of your systems and network architecture it should be considered if you want to keep a high level of availability. Because things break and unforeseen events do take place, we need to evaluate the need for creating an architecture that is ‘highly available’, or up as much as possible, with failures foreseen ahead of time and the only downtime, is to do planned maintenance.
Dell Vostro 7570 là dòng laptop gaming được Dell thiết kế nhằm mục đích chinh phục nhóm khách hàng là game thủ nghiệp dư và chuyên nghiệp. Vì vậy, máy đặc biệt được chú trọng về yếu tố cấu hình và độ phân giải.
Nguồn: https://laptops.vn/san-pham/dell-vostro-7570/
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...Levi Shapiro
Letter from the Congress of the United States regarding Anti-Semitism sent June 3rd to MIT President Sally Kornbluth, MIT Corp Chair, Mark Gorenberg
Dear Dr. Kornbluth and Mr. Gorenberg,
The US House of Representatives is deeply concerned by ongoing and pervasive acts of antisemitic
harassment and intimidation at the Massachusetts Institute of Technology (MIT). Failing to act decisively to ensure a safe learning environment for all students would be a grave dereliction of your responsibilities as President of MIT and Chair of the MIT Corporation.
This Congress will not stand idly by and allow an environment hostile to Jewish students to persist. The House believes that your institution is in violation of Title VI of the Civil Rights Act, and the inability or
unwillingness to rectify this violation through action requires accountability.
Postsecondary education is a unique opportunity for students to learn and have their ideas and beliefs challenged. However, universities receiving hundreds of millions of federal funds annually have denied
students that opportunity and have been hijacked to become venues for the promotion of terrorism, antisemitic harassment and intimidation, unlawful encampments, and in some cases, assaults and riots.
The House of Representatives will not countenance the use of federal funds to indoctrinate students into hateful, antisemitic, anti-American supporters of terrorism. Investigations into campus antisemitism by the Committee on Education and the Workforce and the Committee on Ways and Means have been expanded into a Congress-wide probe across all relevant jurisdictions to address this national crisis. The undersigned Committees will conduct oversight into the use of federal funds at MIT and its learning environment under authorities granted to each Committee.
• The Committee on Education and the Workforce has been investigating your institution since December 7, 2023. The Committee has broad jurisdiction over postsecondary education, including its compliance with Title VI of the Civil Rights Act, campus safety concerns over disruptions to the learning environment, and the awarding of federal student aid under the Higher Education Act.
• The Committee on Oversight and Accountability is investigating the sources of funding and other support flowing to groups espousing pro-Hamas propaganda and engaged in antisemitic harassment and intimidation of students. The Committee on Oversight and Accountability is the principal oversight committee of the US House of Representatives and has broad authority to investigate “any matter” at “any time” under House Rule X.
• The Committee on Ways and Means has been investigating several universities since November 15, 2023, when the Committee held a hearing entitled From Ivory Towers to Dark Corners: Investigating the Nexus Between Antisemitism, Tax-Exempt Universities, and Terror Financing. The Committee followed the hearing with letters to those institutions on January 10, 202
A Strategic Approach: GenAI in EducationPeter Windle
Artificial Intelligence (AI) technologies such as Generative AI, Image Generators and Large Language Models have had a dramatic impact on teaching, learning and assessment over the past 18 months. The most immediate threat AI posed was to Academic Integrity with Higher Education Institutes (HEIs) focusing their efforts on combating the use of GenAI in assessment. Guidelines were developed for staff and students, policies put in place too. Innovative educators have forged paths in the use of Generative AI for teaching, learning and assessments leading to pockets of transformation springing up across HEIs, often with little or no top-down guidance, support or direction.
This Gasta posits a strategic approach to integrating AI into HEIs to prepare staff, students and the curriculum for an evolving world and workplace. We will highlight the advantages of working with these technologies beyond the realm of teaching, learning and assessment by considering prompt engineering skills, industry impact, curriculum changes, and the need for staff upskilling. In contrast, not engaging strategically with Generative AI poses risks, including falling behind peers, missed opportunities and failing to ensure our graduates remain employable. The rapid evolution of AI technologies necessitates a proactive and strategic approach if we are to remain relevant.
Embracing GenAI - A Strategic ImperativePeter Windle
Artificial Intelligence (AI) technologies such as Generative AI, Image Generators and Large Language Models have had a dramatic impact on teaching, learning and assessment over the past 18 months. The most immediate threat AI posed was to Academic Integrity with Higher Education Institutes (HEIs) focusing their efforts on combating the use of GenAI in assessment. Guidelines were developed for staff and students, policies put in place too. Innovative educators have forged paths in the use of Generative AI for teaching, learning and assessments leading to pockets of transformation springing up across HEIs, often with little or no top-down guidance, support or direction.
This Gasta posits a strategic approach to integrating AI into HEIs to prepare staff, students and the curriculum for an evolving world and workplace. We will highlight the advantages of working with these technologies beyond the realm of teaching, learning and assessment by considering prompt engineering skills, industry impact, curriculum changes, and the need for staff upskilling. In contrast, not engaging strategically with Generative AI poses risks, including falling behind peers, missed opportunities and failing to ensure our graduates remain employable. The rapid evolution of AI technologies necessitates a proactive and strategic approach if we are to remain relevant.
How to Make a Field invisible in Odoo 17Celine George
It is possible to hide or invisible some fields in odoo. Commonly using “invisible” attribute in the field definition to invisible the fields. This slide will show how to make a field invisible in odoo 17.
Honest Reviews of Tim Han LMA Course Program.pptxtimhan337
Personal development courses are widely available today, with each one promising life-changing outcomes. Tim Han’s Life Mastery Achievers (LMA) Course has drawn a lot of interest. In addition to offering my frank assessment of Success Insider’s LMA Course, this piece examines the course’s effects via a variety of Tim Han LMA course reviews and Success Insider comments.
The French Revolution, which began in 1789, was a period of radical social and political upheaval in France. It marked the decline of absolute monarchies, the rise of secular and democratic republics, and the eventual rise of Napoleon Bonaparte. This revolutionary period is crucial in understanding the transition from feudalism to modernity in Europe.
For more information, visit-www.vavaclasses.com
Francesca Gottschalk - How can education support child empowerment.pptxEduSkills OECD
Francesca Gottschalk from the OECD’s Centre for Educational Research and Innovation presents at the Ask an Expert Webinar: How can education support child empowerment?
Francesca Gottschalk - How can education support child empowerment.pptx
Learning area 3 computer networks and communications
1.
2. 1. What is it?
This is a learning module for a specific Learning Outcome as stipulated in the
Curriculum Specifications that is :
€ 3.4 Setting Network Facilities
2. Who is it for?
This module is for students who are taking the ICT subject as their elective
and for those who are interested in ICT.
3. What can be achieved?
Upon completion of this module, you will be able to :
€ install Network Interface Card (NIC).
€ crimp and test straight cable and crossed cable.
€ configure and test network.
€ communicate and share data through network.
4. Is previous knowledge necessary?
Yes. Before using this module, you should have learnt about basic concept of
a computer network, hardware requirements and software requirements.
3. Learning Module: Computer Networks
www.ppk.kpm.my < 1 >
TOPIC: 3.4 SETTING NETWORK FACILITIES
DURATION: 12 periods
REFERENCES
A. Books:
Gary B. Shelly, Thomas J. Cashman, Misty E. Vermaat (2006), “Discovering
Computers 2006: A Gateway To Information”, Thomson Course Technology
Tamara Dean (2006), “Network + Guide to Networks”, Thomson Course Technology
B. Website addresses:
http://myschoolnet.ppk.kpm.my
http://www.lanshack.com
http://www.homenethelp.com
http://www.crossover.asp
http://www.microsoft.com/technet/prodtechnol/winxppro/maintain/filesharing.mspx
4. Learning Module: Computer Networks
www.ppk.kpm.my < 2 >
THINGS YOU NEED TO KNOW
Table 1: 568B Wiring Schematic
Table 2: 568A Wiring Schematic
Pair Wire Pin Diagrams
White/Blue 5
White/Blue
Blue 4
White/Orange 1
White/Orange
Orange 2
White/Green 3
White/Green
Green 6
White/Brown 7
White/Brown
Brown 8
Pair Wire Pin Diagrams
White/Blue 5
White/Blue
Blue 4
White/ Green 1
White/Green
Green 2
White/Orange 3
White/Orange
Orange 6
White/Brown 7
White/Brown
Brown 8
1
2
3 4 5 6
7
8
1
2
3 4 5 6
7
8
1
2 3 4 5 6
7
8
1
2
3 4 5 6
7
8
Notes:
1. For patch cables, 568B wiring is the most common schematic.
2. There is no difference in connectivity between 568B and 568A cables. Both
wiring should work fine on any system.
3. For straight through cable, both ends use the same wiring schematics
(568B wiring schematic is recommended).
4. For a crossover cable, both ends use different wiring schematics.
5. Learning Module: Computer Networks
www.ppk.kpm.my < 3 >
THINGS YOU NEED TO HAVE
HARDWARE
Requirements Sample
1 Network Interface Card (NIC)
2 NIC driver
3 Switch / Hub
4 CAT5E cable (UTP cable)
5 RJ45 connectors
7. Learning Module: Computer Networks
www.ppk.kpm.my < 5 >
INSTALLATION OF NETWORK INTERFACE CARDS (NIC)
LEARNING OUTCOME: 3.4.1.1 Insert Network Interface Cards (NIC)
3.4.1.2 Install drivers for the NIC
DURATION: 2 periods
REQUIREMENTS: Network Interface Card (NIC)
NIC driver
Screwdriver
In this module you will learn how to install Peripheral Component Interconnect
(PCI) Network Interface Card into a personal computer (PC) and install the
driver for the card.
8. Learning Module: Computer Networks
www.ppk.kpm.my < 6 >
ACTIVITIES:
A ) INSERT NETWORK INTERFACE CARDS (NIC)
1. Turn off the PC and unplug the power cable. It is to
neutralize any static electric in PC.
2. Remove the casing of the PC.
3. Locate an empty PCI bus expansion slot in the
motherboard.
4. Remove a back panel plate that corresponds to the
expansion slot.
Back panel
plate
PCI bus expansion
slot
9. Learning Module: Computer Networks
www.ppk.kpm.my < 7 >
5. Insert the NIC into the empty PCI bus expansion slot.
Make sure the NIC is inserted properly and levelled.
6. Screw the NIC to back panel.
7. Reaffix the casing of the PC.
B) INSTALL DRIVERS FOR THE NIC
PART 1 : Check for installed NIC
1. Click Start, then go to Settings. Click Control Panel (Figure 1).
Figure 1
Windows XP will automatically detect and install most network interface card
drivers, so your drivers are already installed. You can check whether the driver
has been installed or not, using the method below.
11. Learning Module: Computer Networks
www.ppk.kpm.my < 9 >
4. Highlight Local Area Connection icon. Go to File menu. Click Properties.
(Figure 4).
Figure 4
5. Your NIC should be listed under Connect Using. Figure 5 showing a NIC is
already installed.
Figure 5
12. Learning Module: Computer Networks
www.ppk.kpm.my < 10 >
6. If the driver is already installed, skip Part 2 and you are ready for the assessment.
7. If there is no network card listed, click Cancel and start Part 2 to install the driver
manually.
PART 2 : Install Drivers For Windows XP
1. Click Start, then go to Settings. Click Control Panel (Figure 1).
Figure 1
14. Learning Module: Computer Networks
www.ppk.kpm.my < 12 >
4. Click Next to start the installation of the NIC driver (Figure 4).
Figure 4
5. A window searching for new hardware will appear (Figure 5).
Figure 5
15. Learning Module: Computer Networks
www.ppk.kpm.my < 13 >
6. Check Yes, I have already connected the hardware and click Next
(Figure 6).
Figure 6
7. Scroll down and highlight Add a new hardware device. Click Next (Figure 7).
Figure 7
16. Learning Module: Computer Networks
www.ppk.kpm.my < 14 >
8. Check Install the hardware that I manually select from a list (Advanced) and
click Next (Figure 8).
Figure 8
9. Scroll down and highlight Network adapters. Click Next. (Figure 9).
Figure 9
17. Learning Module: Computer Networks
www.ppk.kpm.my < 15 >
10. Insert the floppy disk or CD-ROM which contains the driver and click Have
Disk (Figure 10).
Figure 10
11. Click Browse (Figure 11).
Figure 11
18. Learning Module: Computer Networks
www.ppk.kpm.my < 16 >
12. A Locate File window appears (Figure 12).
Figure 12
13. In Look in pull down menu, choose a device contains the driver and click it.
Figure 13 showing CD Drive(E:) as an example.
Figure 13
19. Learning Module: Computer Networks
www.ppk.kpm.my < 17 >
14. Highlight corresponding file and click Open. Figure 14 shows winxp as an
example.
Figure 14
15. Click Next (Figure 15).
Figure 15
20. Learning Module: Computer Networks
www.ppk.kpm.my < 18 >
16. Click Finish (Figure 16).
Figure 16
17. Click Yes to restart your computer and to complete your driver installation
(Figure 17).
Figure 17
21. Learning Module: Computer Networks
www.ppk.kpm.my < 19 >
ASSESSMENT:
1. Why do we need to turn off the PC and unplug the power cable before we start
installing the network card?
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
2. Mark T for True statements and F for False statements.
_________ - a. NIC driver is only available in CD.
_________ - b. A back panel plate that corresponds to the expansion slot has to be
removed before inserting the NIC in your PC.
_________ - c. The common protocol used in Network that supports Internet is
TCP/IP.
_________ - d. The NIC driver should be preinstalled before inserting NIC in your
PC.
2. Explain briefly the steps to install the NIC driver in your PC.
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
22. Learning Module: Computer Networks
www.ppk.kpm.my < 20 >
CABLE CRIMPING AND TESTING – STRAIGHT CABLE
LEARNING OUTCOME: 3.4.2.1 Crimp and test Untwisted Pair (UTP) cable using
straight cable technique
3.4.2.2 Exercise care and caution when crimping a cable
DURATION: 2 periods
REQUIREMENTS: CAT5E cable (3 meters)
RJ45 connectors (2 units)
Crimp tool
Cable stripper
Wire cutter
LAN cable tester
NOTE :
A cable is needed to connect a computer to a wired local area network (LAN).
There are two types of cables. The first is the “straight cable” which is used to
connect computers through a hub. The second type is the “crossed cable” for
a direct connection between two computers without using a hub. Connecting
these cables is called cable crimping. This module shows how to crimp a
straight cable using Untwisted Pair cable and RJ45 connectors.
23. Learning Module: Computer Networks
www.ppk.kpm.my < 21 >
ACTIVITIES:
1. Skin off the cable jacket approximately 3cm by using a
cable stripper.
2. Untwist each pair, and straighten each wire between
fingers.
3. Place the wires in the order of 568B schematic (refer
to Table 1 on page 3). Connect all the wires together.
4. At this point, recheck the wiring sequence with the
diagram.
5. Optional: Mark a distance of 1.5cm from the end of the
cable jacket on the wires.
6. Hold the set and sorted wires together tightly, between
the thumb, and the pointer finger.
7. Cut all the wires at 90o
angle from the cable at 1.5cm
from the end of the cable jacket by using a wire cutter.
This is a very critical step. If the wires are not cut
straight, they may not make contact with the connector
pins.
8. Conductors should be at a 90o
angle, and be 1.5cm
long, prior to insertion into the connector.
9. Insert the wires into the RJ45 connector with the pins
facing up.
24. Learning Module: Computer Networks
www.ppk.kpm.my < 22 >
10.Push moderately to assure that all wires have
reached the end of the connector. Be sure that the
cable jacket goes into the back of the connector at
0.3cm.
11.Place the connector into a crimp tool, and squeeze
hard so that the handle reaches its full swing.
12.Repeat step 1 to 11 for the other end of the cable.
13.Use a cable tester to test for proper continuity.
25. Learning Module: Computer Networks
www.ppk.kpm.my < 23 >
Assessment:
1. Table below is 568B wiring schematic for a Local Area Network.
Identify the pin numbers of W, X, Y and Z.
W X Y Z
A 1 5 2 7
B 5 1 2 7
C 2 7 1 5
D 5 1 7 2
Pair Wire Pin
White/Blue W
White/Blue
Blue 4
White/Orange X
White/Orange
Orange Y
White/Green 3
White/Green
Green 6
White/Brown Z
White/Brown
Brown 8
26. Learning Module: Computer Networks
www.ppk.kpm.my < 24 >
CABLE CRIMPING AND TESTING – CROSSED CABLE
LEARNING OUTCOME: 3.4.2.1 Crimp and test Untwisted Pair (UTP) cable using
crossed cable technique
3.4.2.2 Exercise care and caution when crimping a cable
DURATION: 2 periods
REQUIREMENTS: CAT5E cable (3 meters)
RJ45 connectors (2 units)
Crimp tool
Cable stripper
Wire cutter
LAN cable tester
NOTE :
27. Learning Module: Computer Networks
www.ppk.kpm.my < 25 >
ACTIVITIES:
1. Skin off the cable jacket approximately 3cm by using a
cable stripper.
2. Untwist each pair, and straighten each wire between
fingers.
3. Place the wires in the order of 568A schematic (refer
to Table 2 on page3). Connect all the wires together.
4. At this point, recheck the wiring sequence with the
diagram.
5. Optional: Mark a distance of 1.5cm from the end of the
cable jacket on the wires.
6. Hold the set and sorted wires together tightly, between
the thumb, and the pointer finger.
7. Cut all the wires at 90o
angle from the cable at 1.5cm
from the end of the cable jacket by using a wire cutter.
This is a very critical step. If the wires are not cut
straight, they may not make contact with the connector
pins.
8. Conductors should be at a 90o
angle, and be 1.5cm
long, prior to insertion into the connector.
9. Insert the wires into the RJ45 connector with the pins
facing up.
28. Learning Module: Computer Networks
www.ppk.kpm.my < 26 >
10.Push moderately to assure that all wires have reached
the end of the connector. Be sure that the cable jacket
goes into the back of the connector at 0.3cm.
11.Place the connector into a crimp tool, and squeeze
hard so that the handle reaches its full swing.
12.Repeat step 1 to 11 for the other end of the cable by
placing wires in the order of 568B schematic.
13.Use a cable tester to test for proper continuity.
29. Learning Module: Computer Networks
www.ppk.kpm.my < 27 >
ASSESSMENT:
1. Choose the correct pair of cabling that is used for direct connection from PC to PC.
A B C
2. What type of cable is used to connect two computers?
_________________________________________________________________
_________________________________________________________________
3. What is the requirement needed to crimp a crossed cable?
_________________________________________________________________
_________________________________________________________________
_________________________________________________________________
_________________________________________________________________
1
2
3 4 5 6
7
8
1
2
3 4 5 6
7
8 1
2
3 4 5 6
7
8
1
2
3 4 5 6
7
8 1
2
3 4 5 6
7
8
1
2
3 4 5 6
7
8
30. Learning Module: Computer Networks
www.ppk.kpm.my < 28 >
3.4.3 CONFIGURATION AND TESTING OF NETWORK
LEARNING OUTCOME: 3.4.3.1 Configure the workstation to join a Local Area
Network
€ Internet Protocol (IP) Address
€ Subnet Mask
€ Server name
3.4.3.2 Test the network connection.
DURATION: 4 periods
REQUIREMENTS: -
31. Learning Module: Computer Networks
www.ppk.kpm.my < 29 >
ACTIVITIES:
1. Click Start, then go to Settings. Click Control Panel (Figure 1).
Figure 1
2. Click Network and Internet Connections (Figure 2).
Figure 2
32. Learning Module: Computer Networks
www.ppk.kpm.my < 30 >
3. Click Network Connections (Figure 3).
Figure 3
4. Highlight Local Area Connection icon. Go to File menu. Click Properties.
(Figure 4).
Figure 4
34. Learning Module: Computer Networks
www.ppk.kpm.my < 32 >
7. Check ‘Use the following IP address’. Fill in the network information for:
i. IP address
ii. Subnet Mask
iii. Default Gateway (only if available)
iv. Preferred DNS server (only if available)
Use the network information given by your teacher. Figure 7 is an example of IP
address. Click OK.
Figure 7
8. Close all windows. You must restart your computer before the settings take effect.
Given by
teacher
35. Learning Module: Computer Networks
www.ppk.kpm.my < 33 >
ASSESSMENT:
1. IP is an acronym for
______________________________________________________________
______________________________________________________________
2. If your IP is 192.168.1.28, then the default setting for the subnet mask is
______. 255. ______. ______.
3. If your network is not working, list out the possible problems.
______________________________________________________________
______________________________________________________________
______________________________________________________________
______________________________________________________________
36. Learning Module: Computer Networks
www.ppk.kpm.my < 34 >
3.4.4 Communicating and Data Sharing
LEARNING OUTCOME: 3.4.4.1 Create a shared folder
DURATION: 2 periods
REQUIREMENTS: -
37. Learning Module: Computer Networks
www.ppk.kpm.my < 35 >
ACTIVITIES:
A ) SETTING PROPERTIES FOR DATA SHARING
1. Click Start, then go to Settings. Click Control Panel (Figure 1).
Figure 1
2. Click Network and Internet Connections (Figure 2).
Figure 2
38. Learning Module: Computer Networks
www.ppk.kpm.my < 36 >
3. Click Network Connections (Figure 3).
Figure 3
4. Highlight Local Area Connection icon. Go to File menu. Click Properties.
(Figure 4).
Figure 4
39. Learning Module: Computer Networks
www.ppk.kpm.my < 37 >
5. Check Client for Microsoft Networks and File and Printer Sharing for
Microsoft Networks. These items are checked by default (Figure 5). Click
Close.
Figure 5
6. Click Start, then go to All Programs. Next, click Accessories. Click Windows
Explorer (Figure 6).
Figure 6
40. Learning Module: Computer Networks
www.ppk.kpm.my < 38 >
7. My Documents window appears. Highlight My Pictures folder. Go to File menu.
Click Sharing and Security (Figure 7).
Figure 7
8. Click Network Setup Wizard (Figure 8).
Figure 8
42. Learning Module: Computer Networks
www.ppk.kpm.my < 40 >
11. If the PC is not connected to a network, windows shown in Figure 11 will pop-
up. Check Ignore disconnected network hardware and click Next.
Figure 11
12. Check ‘This computer connects to the Internet through another computer
on my network or through a residential gateway’ and click Next (Figure 12).
Figure 12
43. Learning Module: Computer Networks
www.ppk.kpm.my < 41 >
13. Check ‘Determine the appropriate connections for me (Recommended)’ and
click Next (Figure 13).
Figure 13
14. Fill in:
i. Computer description
ii. Computer Name
Use the information given by your teacher. Figure 14 is an example windows and
click Next
Figure 14
Given by
teacher
45. Learning Module: Computer Networks
www.ppk.kpm.my < 43 >
17. A window configures your computer for networking will appear (Figure 17).
Figure 17
18. Check Just finish the wizard; I don’t need to run the wizard on other
computers and click Next (Figure 18).
Figure 18
47. Learning Module: Computer Networks
www.ppk.kpm.my < 45 >
B ) CREATING SHARED DRIVE
1. Click Start, then go to All Programs. Next, click Accessories. Click Windows
Explorer (Figure 1).
Figure 1
2. My Documents window appears (Figure 2).
Figure 2
48. Learning Module: Computer Networks
www.ppk.kpm.my < 46 >
3. Click My Computer (Figure 3).
Figure 3
4. Highlight Local Disk (C:) icon. Go to File menu. Click Sharing and Security
(Figure 4).
Figure 4
49. Learning Module: Computer Networks
www.ppk.kpm.my < 47 >
5. Click If you understand the risk but still want to share the root of the drive,
click here (Figure 5).
Figure 5
6. Check Share this folder on the network and click Apply (Figure 6).
Figure 6
50. Learning Module: Computer Networks
www.ppk.kpm.my < 48 >
7. Figure 7 shows an example of a shared drive.
Figure 7
C ) ACCESSING SHARED DRIVE
1. Click Start, then go to All Programs. Next, click Accessories. Click Windows
Explorer (Figure 1).
Figure 1
51. Learning Module: Computer Networks
www.ppk.kpm.my < 49 >
2. Click My Network Places then Entire Network. Next, click Microsoft Windows
Network and finally Mshome (Figure 2). All the computers connected to the
network are shown on the right side of the window.
Figure 2
3. Click any computers listed. Figure 3 shows School Computer Lab (Pc01)
selected. Now you can access drive C: of Pc01.
Figure 3
Computers connected to
the network
52. Learning Module: Computer Networks
www.ppk.kpm.my < 50 >
ASSESSMENT:
1. Read the statement below, tick (•) if TRUE and cross (x) if FALSE.
No Statement (€) or (x)
1.
The user cannot set password protection on their shared files
or folders.
2.
We can enable file sharing and disable printer sharing at the
same time.
3.
We can allow or deny a user access to our shared files
whenever we want.
4.
To change access permissions you must be the owner, or
have been granted permission to do so by the owner.
CONGRATULATIONS !!
YOU HAVE SUCCESSFULLY COMPLETED THIS MODULE. YOU ARE NOW
ABLE TO SET NETWORK FACILITIES AND COMMUNICATE AND SHARE DATA
THROUGH THE NETWORK.