Professional Documents
Culture Documents
COLLEGE OF TECHNOLOGY
ICT Department
Compiled by:
Jose Maria S. Garcia II
Gerry Ritz R. Densing
Introduction
This shop module is intended to be used for the course ICTP 226 in the
Bachelor of Science in Information and Communications Technology (BSICT)
program of the College of Technology, Cebu Technological University Main Campus
during the 2nd semester of the second year level.
The course deals with the study of communication system relevant to the use
of computers and data processing on computers, interconnection or networks
through transmission of data between distant sites. The study relied on digital and
information systems as basic foundation. This course also covers network
technology which has become a very important method of improving data
communication. Networking focused on LAN concepts and fundamentals, designs,
and topologies, network installation and configuration, systems models and network
management.
Table of Contents
Title Page
Introduction
2
Table of Contents
3
VMGO
4
Worksheets
1
RJ 45 Crimping Tool
13
18
Data Codes
23
27
32
36
38
10
Peer-to-peer Networking
40
11
44
12
Ad hoc Networking
46
13
52
14
56
15
60
Summary of Grades
63
4
References
65
Annexes
67
OBJECTIVE
of the Program
Equip students with equitable ICT skills and proficiencies required by industry with
integrated research and extension capabilities in addressing the ever changing demands
in their individual lifetime opportunities and possibilities in local and global workforce.
CEBU TECHNOLOGICAL UNIVERSITY
Corner M.J Cuenco Avenue and R. Palma Street
Cebu City, Philippines 6000
http://www.ctu.edu.ph
Email: information@ctu.edu.ph
There is a lot of equipment in computer labs that could short circuit itself or cause
electric shocks, so one needs to be very careful.
Rules for Protecting Equipment
Worksheet 1
Preparation and Presentation of Assigned Topic
Student Names:
A. Objectives:
Date Performed:
11/15/16 11/19/16
B. Materials/Tools:
Title
Objectives
Outline
Body or Content (Report Proper)
Summary
Evaluation
Acknowledgment
Colored
Long size bond paper (8 x 13)
6 to 8 slides per page
Compiled in a folder
Submit the softcopy and hardcopy (print-out) of the presentation for grading.
Task 3: Present the assigned topic on the assigned scheduled.
Prepare minutes of the presentation, rubrics (self-rate) and documentations.
D. Grading:
Accomplishments
Task 1 Power Point soft copies
Weights
25%
Rating
Equivalent
7
25%
50%
Grade:
Worksheet No. 2
RJ 45 Crimping Tool
Student Name:
A. Objectives:
1.
2.
Date Performed:
Given the materials and tools, upon completion of the activity, the student
must be able to:
B. Materials/Tools:
RJ 45 modular plug/connector
Category 5e unshielded twisted pair (UTP)
RJ 45 Crimper
C. Background:
While terminating networking cables for creating computer networks such as LANs (Local
Area Networks) one has to be very careful and precise. One has to use a variety of wire
connector assembly and installation tools to assemble and install such connectors to each
other. These tools include a variety of cable tie guns, crimping tool, cutters, pliers, punch
down tools, screwdrivers, splicers, strippers, and cable pulling grips.
Crimp Tool - These are used to crimp
and cut the wires of an RJ-45 connector.
Some crimper will also work on RJ-11
connectors as well. This tool consists of a
built in cable stripper and a wire cutter.
Thus, it cuts the wire in one go. Apart
from being one of the computer
networking tools, these network cable
crimping tools have various applications
in different industries such as electronics,
data, voice, video and signal industries.
When network engineers and cable
runners make network cables, they use a
crimper to fasten the RJ-45 connector in
its place.
Crimper is held open by a spring and keep in mind that the sharp cutting blades will be
exposed. So consider storing your crimper in the original packaging, put a rubber band
8
around the handles when not in use, or get yourself a nice carrying case of some sort, that
you can keep the crimper in its closed position.
Networking Cable (UTP or STP) - A typical computer networking cable has 8 colour coded
wires which are twisted into 4 pairs. Each pair has a common colour theme. These
combinations or pairs typically are:
Blue
and Blue
/ White
RJ-45 Connectors - An RJ-45 connector terminates each end of a network cable. These
connectors look like large phone connectors, and they use the same type of clear plastic
and clip. On the connector are eight contacts corresponding to the eight wires in the cable,
and these match the eight contacts of the RJ-45 port on your computer or network device.
While purchasing the connector one must pay attention to whether the connector is made
for braided or solid wire. When the connector is made for braided wires, it has contacts
which actually pierce the wire. When the connector is made for solid wire, it has fingers
which pierce the insulation and make a connection with the wire by grasping it from both
sides.
10
Step 2 Un-twist pairs and lay flat between your thumb and forefinger.
11
Step 4 Cut all of the wires at a perfect 90-degree angle from the cable at 1/2" from the end
of the cable jacket. This is a very critical step. If the wires are not cut straight, they may not
all make contact.
12
Step 5 Place an RJ-45 plug on the end of the cable, with the prong on the underside. Gently
push the plug onto wires until the copper ends of the wires can be seen through the end of
the plug. Make sure the end of the jacket is inside the plug. This provides for stress relief
and to ensure that all wires are in the correct order. If the jacket is not inside the plug, the
plug will not be properly gripped and will eventually cause problems.
Step 6 If everything is correct, crimp the plug hard enough to force the contacts through the
insulation on the wires, completing the conducting path. Submit your work for grading.
13
E. Accomplish the following tasks:
Task 1: Discuss the 3 functions of a crimping tool.
Function 1:
Function 2:
Function 3:
F. Grading:
Accomplishments
Task 1 Functions of the crimping tool
Task 2 Stripping
Cutting
Crimping
Weights
25%
Rating
Equivalent
25%
25%
25%
Grade:
Worksheet No. 3
Cable Testing and Wire Mapping
14
Student Name:
Date Performed:
A. Objectives: Given the materials and tools, upon completion of the activity, the
student must be able to:
1.
2.
B. Materials/Tools:
Cable Tester
Colored pencil
C. Background:
A network cable tester is a device that is designed to verify whether or not a computer
network cable is capable of successfully transferring data from "point A" to "point B." If you
want to use your network cable tester, you need only to make sure that the actual cable you
want to test is hooked up correctly.
15
Wire Map
The first condition for successful data transmission over a cabling link is ensuring the link is
properly connected at each of its connection and termination points to provide end-to-end
continuity of each wire pair in a cabling link. It is very important for twisted pair cabling links
that the wire pairing is strictly maintained from one end of the link to the other end.
A wire map allows the network technician to verify which pins on one end of the cable are
connected to which pins on the other end. With an understanding of the proper wiring
connections, you can determine when a cable is wired improperly, depending on its intended
use. You will learn how to use a cable tester to check for the proper installation of Twisted
Pair according to cabling standards in an Ethernet network. You will test a rollover cable
using all four pairs to determine some problems that can occur from incorrect cabling
installation and termination.
A test called wire map verifies that the continuity for each wire in the link under test is
achieved from one end to the other.
The wire map test will detect and report wiring failures or cabling defects such as:
a) continuity;
b) short circuits between any two or more conductors of the wires tested;
c) transposed pairs between any of the pairs tested;
d) reversed pairs;
e) split pairs among the pairs tested.
16
Below is an example of a successful test: (The wiring code used here is T568B)
The following is the most common fault and is easily detected by most wire map
testers.
1. This is known as a reversed pair
17
The wire map test goes beyond a simple continuity test that assures each connector pin
from one end of the link is connected to the corresponding pin at the far end and is not
connected to any other conductor or shield. Simple continuity between pins from one end of
the cable to the other is not sufficient for data communication. In addition, the wire map test
is an assurance that the link maintains proper pairing of conductors. Each wire in a pair
must be connected to the proper pins in connectors or cross-connect blocks to maintain
uninterrupted pairing over the total length of the link.
D. Accomplish the following tasks:
Task 1: Test the cable.
Plug one end of the roll-over cable you are trying to test into the "RJ 45 TX" input on
the network cable tester master unit.
Plug the other end of your cable you are trying to test into the "RJ 45 RX" input on
the network cable tester remote unit.
Test the cable. The network cable tester will send a signal across the cable. If the
signal gets from one end of the cable to the other, a green light will appear on the
device, letting you know that the test was successful. If the signal does not get from
one end of the cable to the desired end, the cable is bad.
18
Did you find any fault on the cable?
If YES, what is it? __________________________________________________
Describe the procedure in testing a cable.
Task 2: Draw the wire map using coloured pencil to establish the condition of the cable.
E. Grading:
Accomplishments
Task 1 Testing the cable
Task 2 Drawing the wire map
Weights
50%
50%
Rating
Equivalent
Grade:
Worksheet No. 4
Digital Encoding Schemes
19
Student Name:
Date Performed:
A. Objectives : Given the materials, upon completion of the activity, the student must be
able to:
1. Digitally encode a given data using NRZ-L, NRZI, Manchester,
Differential Manchester, Bipolar-AMI and 4B/5B schemes.
2.
B. Materials/Tools:
Pencil
Ruler
C. Background:
To transmit digital data using digital signals, the 1s and 0s of the digital data must be
converted to the proper physical form that can be transmitted over a wire or airwave. Digital
encoding schemes are used to convert the 0s and 1s of digital data into the appropriate
transmission form as follows:
1. Nonreturn to Zero-Level (NRZ-L) The NRZ-L digital encoding scheme transmit 1s
as zero voltages and 0s as positive voltages. The NRZ-L encoding scheme is simple
to generate and inexpensive to implement in hardware.
2. Nonreturn to Zero Inverted (NRZI) This encoding scheme has a voltage change
at the beginning of a 1 and no voltage change at the beginning of a 0.
3. Manchester The Manchester class of digital schemes ensures that each bit has
some type of signal change, and thus solves the synchronization problem.
20
The Manchester encoding scheme has the following properties: to transmit a 1, the
signal change form low to high in the middle of the interval; to transmit a 0, the signal
change form high to low in the middle of the interval.
Note that the transition is always in the middle, a 1 is a low-to-high transition, and a 0
is a high-to-low transition, Thus, if the signal is currently low and the next bit to
transmit is a 0, the signal has to move from low to high as the beginning of the
interval so that it can do the high-to-low transition in the middle.
4. Differential Manchester is similar to the Manchester scheme in that there is
always a transition in the middle of the interval. But unlike the Manchester code, the
direction of this transition in the middle does not differentiate between a 0 or a 1.
Instead, if there is a transition at the beginning of the interval, then a 0 is being
transmitted. If there is no transition at the beginning of the interval, then a 1 is being
transmitted.
5.
Bipolar AMI is unique among all encoding schemes because it uses three voltage
levels. When a device transmits a binary 0, a zero voltage is transmitted. When the
device transmit a binary 1, either a positive voltage or a negative voltage is
transmitted. Which of these is transmitted depends on the binary 1 value that was
last transmitted. For example, if the last binary 1 transmitted a positive voltage, then
the next binary 1 will transmit a negative voltage.
6. 4B/5B takes 4 bits of data, converts the bits into a unique 5-bit sequence, and
encodes the 5-bits using NRZI.
21
22
Schemes
NRZ-L
NRZ-I
Manchest
er
Differenti
al
Manchest
er
Bipolar
AMI
Task 2: Show the equivalent 4B/5B code of the given bit string.
4B
5B
1000
1010
1101
1001
0001
0011
4B/5
B
23
2. What digital encoding scheme is used in most LAN for transmitting digital data over a
LAN cable?
3. What is the similarity between the NRZI and the Differential Manchester digital
encoding schemes?
E. Grading:
Accomplishments
Task 1 Encoding digital data to digital signals
Task 2 4B to 5B Coding
Task 3 Review Questions
Weights
40%
40%
20%
Rating
Equivalent
Grade:
Worksheet No. 5
24
Data Codes
Student Name:
A. Objectives :
1.
2.
Date Performed:
B. Materials/Tools:
Chapter 2 Notes
Pencil
C. Background:
One of the most common forms of data transmitted between a transmitter and a receiver is
textual data. Data codes are necessary to transmit the letters, numbers, symbols, and
control characters found in text data. Three important data codes are ASCII, EBCDIC, and
Unicode.
Extended Binary Coded Decimal Interchange Code (EBCDIC) is an 8-bit code allowing
256 possible combinations of textual symbols. All the EBCDIC characters are shown in the
figure below.
25
Example:
C
t
U
8
?
1100
1010
1110
1111
0110
0011
0011
0100
1000
1111
26
Example:
C
t
U
8
?
1000011
1110100
1010101
0111000
0111111
Unicode is an encoding technique that provide a unique coding value for every character
in every language, no matter what platform. Currently, Unicode supports more than 110
different code charts (language and symbols sets.). You can view the Unicode Web site at
www.unicode.org
ASCII
H
e
l
l
o
W
o
CEBU TECHNOLOGICAL UNIVERSITY
Corner M.J Cuenco Avenue and R. Palma Street
Cebu City, Philippines 6000
http://www.ctu.edu.ph
Email: information@ctu.edu.ph
27
r
l
d
6
9
!
!
!
Task 2: Given the encoded binary string using EBCDIC, find the message.
1100
1100
1110
1100
0100
1100
1001
1001
1101
1010
1001
1000
1000
1000
1010
1000
1101
1101
0100
0001
0011
0001
0000
0011
0110
0100
0100
0100
0101
1001
0011
0001
0011
1001
0110
0101
D
A
T
A
C
o
m
M
u
n
i
c
a
t
i
O
N
Task 3: Given the encoded binary string using ASCII, find the message.
1000011
1101111
1101101
1110000
1110101
1110100
1100101
1110010
0100000
1001110
1000101
1010100
1010111
1001111
1010010
CEBU TECHNOLOGICAL UNIVERSITY
Corner M.J Cuenco Avenue and R. Palma Street
Cebu City, Philippines 6000
http://www.ctu.edu.ph
Email: information@ctu.edu.ph
C
o
m
p
u
t
e
r
N
E
T
W
O
R
Jose Maria S. Garcia II
Associate Professor V
28
1001011
0100101
K
%
2. Explain the major problems with both EBCDIC and ASCII character set.
E. Grading:
Accomplishments
Task 1 EBCDIC and ASCII Coding
Task 2 Binary to EBCDIC Coding
Task 3 Binary to ASCII Coding
Task 4 Review Questions
Weights
40%
25%
25%
10%
Rating
Equivalent
Grade:
Worksheet No. 6
Data and Signal Conversion
Student Name:
Date Performed:
29
A. Objectives :
1.
2.
3.
B. Materials/Tools:
Chapter 2 Notes
Pencil
C. Background
:
Let us examine two typical business application in which a variety of data and signal
conversions are performed to see how analog and digital data, analog and digital signals,
and data codes work together. First consider a person at work who wants to send an e-mail
to a colleague, asking about the time for the next meeting.
Let us assume the message says Sam, what time is the meeting? and that it is being
sent from a personal computer connected to a LAN, which in turn, is connected to the
Internet. The connection to the Internet is over a DSL modem.
The e-mail program prepares the e-mail message, which contain the word Sam...?.
Because this e-mail uses ASCII, the text is converted to the following:
30
The Differential Manchester Encoding scheme of the message travels over the LAN and
arrives at another computer, which in turn connected to a modem. This computer converts
the message back to an ASCII string, and then transmit the ASCII string to the modem. The
modem prepares the message for transmission over the Internet, using frequency
modulation (FM).
The FM signal travels over the telephone lines and arrives at the appropriate Internet
gateway (or ISP), which demodulates the signal into an ASCII string. The ASCII string
representing the original message moves out to the Internet and finally arrives at the
intended receivers computer.
Note: More code conversion over the Internet are involved but are not discussed in this
example.
31
32
3
CEBU TECHNOLOGICAL UNIVERSITY
Corner M.J Cuenco Avenue and R. Palma Street
Cebu City, Philippines 6000
http://www.ctu.edu.ph
Email: information@ctu.edu.ph
33
Task 3: Answer the question. What are the different encoding or conversion
technique, common device/s and common system/s used in converting the following:
(present answer in table format)
a.
b.
c.
d.
E. Grading:
Accomplishments
Task 1 Differential Manchester
Encoding
Task 2 Frequency Modulation
Task 3 Review Questions
Weights
Rating
Equivalent
40%
40%
20%
Grade:
34
Worksheet No. 7
EIA/TIA 568A and 568B STANDARDS
Student Name:
Date Performed:
B. Materials/Tools:
Colouring pens
Chapter 2 Notes
C. Background:
In 1985, the Computer Communications Industry Association requested that the Electronic
Industries Alliance (EIA) to develop standards for the cabling used in telecommunications
applications.
In the world of structured cabling systems, the cryptic number 568 refers to the order in
which the individual wires inside a CAT 5 cable are terminated. The termination could come
at either the users end socket, the patch panel or termination frame or even the individual
leads that connect a computer to the wall socket. There are currently two different
specifications with respect to the order these cables should be terminated contained in the
international standards document (ISO/IEC 11801:1995) as previously mentioned there is no
indication as to which of these standards is preferred.
Although many aspects of networking structure and performance are addressed in these
standards, the most visible and often misunderstood component is the definition of the
wiring assignments in the RJ45 plug. A coloured wire must be placed in a specific pin
location in the plug in order for the cable to meet the standard. It is these wiring assignments
that differ between the T568A and T568B standard.
The pins on the RJ45 plug are numbered 1 to 8. If you are holding a CAT 5 patch cable in
your hand, as if inserting into a jack, with the contacts facing in the up position, pin 1 will be
on the far left. Pin 8 will be the pin on the far right. This is the orientation we will use when
we define the wiring assignments in the RJ45 plug and making understanding this easy.
CAT 5 Cable has four twisted pairs within the sheath. Each pair has a specific colour code,
and is to place into deliberate pin location within the RJ45 plug. Each pair has two strands of
CEBU TECHNOLOGICAL UNIVERSITY
Corner M.J Cuenco Avenue and R. Palma Street
Cebu City, Philippines 6000
http://www.ctu.edu.ph
Email: information@ctu.edu.ph
35
conductors known as the Tip and the Ring. According to the colour scheme, each pair has a
wire of solid colour and a wire with white stripe. The Tip Wire has the stripe, the Ring solid
coloration.
36
37
Task 2: Colour the figure below according to wire assignment of the 568 standard.
38
The difference between the TIA-568A & TIA-568B wiring standard is that the Orange
and Green pairs trade places.
E. Grading:
Accomplishments
Task 1 Tip and Ring Assignment
Task 2 568 Standard Color Assignment
Task 3 Review Questions
Weights
40%
40%
20%
Rating
Equivalent
Grade:
Worksheet No. 8
Straight Through Cable Construction
Student Name:
Date Performed:
B. Materials/Tools:
2 pcs.
RJ 45
2 m. Category 5 or 5e UTP
Crimper
Cable Tester
39
C. Background:
Straight-through cable is a type of twisted pair copper wire cable for local area network
(LAN) use for which the RJ-45 connectors at each end have the same pinout. In other words
Pin 1 connector A goes to Pin 1 on connector B, Pin 2 to Pin 2 etc.
It is identical to crossover cable, except that in the latter the wires on the cable are crossed
over so that the receive signal pins on the connector on one end are connected to the
transmit signal pins on the connector on the other end.
Straight-through cable is used to connect computers and other end-user devices (e.g.,
printers) to networking devices such as hubs and switches. It can also be used to directly
connect like devices (e.g., two hubs or two switches) if the cable is plugged into an uplink
port on one (but not both) of the devices. Crossover cable is used to connect two like
devices without the use of an uplink port.
Task 2: Test the finished cable. Draw the wire map result of the testing. Have the
instructor check the finished cable.
1
40
2
Grading:
Accomplishments
Task 1 Straight through Cable Construction
Task 2 Wire Mapping
Task 3 Review Questions
Weights
50%
30%
20%
Rating
Equivalent
Grade:
Worksheet No. 9
Crossover Cable Construction
Student Name:
A. Objectives:
1.
2.
3.
Date Performed:
B. Materials/Tools:
2 pcs.
RJ 45
1 m. Category 5 or 5e UTP
C. Background
This will be a 4-pair "crossover" cable. A crossover cable means that the second and third
pairs on one end of the cable will be reversed on the other end. The pin-outs will be T568A
CEBU TECHNOLOGICAL UNIVERSITY
Corner M.J Cuenco Avenue and R. Palma Street
Cebu City, Philippines 6000
http://www.ctu.edu.ph
Email: information@ctu.edu.ph
41
on one end and T568B on the other end. All 8 conductors (wires) should be terminated with
RJ-45 modular connectors. This patch cable will conform to the structured cabling
standards. If the patch cable is used between hubs or switches, it is considered to be part of
the "vertical" cabling. Vertical cabling is also called backbone cabling. A crossover cable can
be used as a backbone cable to connect two or more hubs or switches in a LAN, or to
connect two isolated workstations to create a mini-LAN. This will allow the connection of two
workstations or a server and a workstation without the need for a hub between them. This
can be very helpful for training and testing. To connect more than two workstations, a hub or
a switch will be needed.
D.
Task 2: Test the finished cable. Draw the wire map result of the testing. Have the
instructor check the finished cable.
1
42
2
E. Grading:
Accomplishments
Task 1 Crossover Cable Construction
Task 2 Wire Mapping
Task 3 Review Questions
Weights
50%
30%
20%
Rating
Equivalent
Grade:
Worksheet No. 10
Peer to Peer Networking
Student Name:
A. Objectives:
Date Performed:
Given the materials and equipment, upon completion of the activity, the
student must be able to:
1.
2.
3.
4.
43
The following resources will be required:
Two workstations with an Ethernet 10/100 NIC installed
Crossover Ethernet cable for connecting the two workstations
C. Background
This lab focuses on the ability to connect two PCs to create a simple peer-to-peer Ethernet
LAN between two workstations. The workstations will be directly connected to each other
without using a hub or switch. In addition to the Layer 1 physical and Layer 2 data link
connections, the computers must also be configured with the correct IP network settings,
which is Layer 3, so that they can communicate. A basic Category 5/5e UTP crossover cable
is all that is needed. A crossover cable is the same type that would be used as backbone or
vertical cabling to connect switches together. Connecting the PCs in this manner can be
very useful for transferring files at high speed and for troubleshooting interconnecting
devices between PCs. If the two PCs can be connected with a single cable and are able to
communicate, then any networking problems are not with the PCs themselves.
D. Accomplish the following tasks:
Task 1: Identify the proper Ethernet cable and connect the two PCs
The connection between the two PCs will be
accomplished using a Category 5 or 5e
crossover cable. Locate a cable that is long
enough to reach from one PC to the other, and
attach one end to the NIC in each of the PCs.
Be sure to examine the cable ends carefully
and select only a crossover cable.
_________________
_______________________
4. With the cable plug-in and the computers turned on. Verify the computer connections,
insure that the link lights on both NICs are lit. Are both link lights lit? _____________
IP Address Assigned
Subnet Mask
Class
First:
44
Second:
Note: Be sure to write down the existing IP settings, so that they can be restored at the end
of the lab. These include IP address, subnet mask, default gateway, and DNS servers. If the
workstation is a DHCP client, it is not necessary to record this information.
Select the Local Area Network Connection and click on Change settings of this
connection.
Select the TCP/IP protocol icon that is associated with the NIC in this PC.
a. Set the IP address information for each PC according to the information in the table.
b. Note that the default gateway IP address is not required, since these computers are
directly connected. The default gateway is only required on local area networks that
are connected to a router.
45
46
Restore the PCs to their original IP settings, disconnect the equipment, and store the cables.
E. Grading:
Accomplishments
Task 1 Review Questions
Task 2 TCP/IP Settings
Task 3 Ipconfig
Task 4 Ping
Weights
10%
30%
30%
30%
Rating
Equivalent
Grade:
Worksheet No. 11
Peer to Peer Networking Using CISCO Packet Tracer
Student Name:
A. Objectives:
Date Performed:
Given the materials and equipment, upon completion of the activity, the
student must be able to:
1. Create a simple peer-to-peer using CISCO Packet Tracer
2. Simulate the ipconfig and ping command.
47
simulation, visualization, authoring, assessment, and collaboration capabilities and
facilitates the teaching and learning of complex technology concepts.
Packet Tracer supplements physical equipment in the classroom by allowing students to
create a network with an almost unlimited number of devices, encouraging practice,
discovery, and troubleshooting. The simulation-based learning environment helps students
develop 21st century skills such as decision making, creative and critical thinking, and
problem solving.
Task 1: Design the peer-to-peer network on using the Packet Tracer and copy-paste the
below:
Task 2: Simulate the network and copy-paste the ipconfig and ping results below:
Computer Name:
IP Address:
ipconfig /all result:
Computer Name
IP Address:
ipconfig /all result:
48
ping result:
Grading:
ping result:
Accomplishments
Task 1 Network Design
Task 2 Network Simulation
Weights
40%
60%
Rating
Equivalent
Grade:
Worksheet No. 12
Ad hoc Networking
Student Name:
A. Objectives:
Date Performed:
Given the materials and equipment, upon completion of the activity, the
student must be able to:
1. Setup an ad hoc network.
2. Verify configurations and test for connectivity.
49
C. Background:
In Windows 7, under "Set up a new connection or network" you can create an ad hoc
wireless connection via the "Set up a wireless ad hoc" option.
Unfortunately Microsoft has
made it one of several
features removed in
Windows 8.1 so it is no
longer available through
the GUI (Graphical user
interface).
To share internet
connection in Windows 8
now you need to use a
third-party utility such
as Virtual Router
or Connectify
Hotspot to turn your PC
into a Wi-Fi hotspot as
introduced in this post.
For those who do not want
to install third-party software there is still a solution to set up a Wireless Ad Hoc through
the netsh command, but its a little bit tough.
In this tutorial, Ill step by step show you a valuable tip to create a wireless ad hoc
connection in Windows 8.1.
50
51
4. Next, you need to start it. Type in CMD the command below:
netsh wlan start hostednetwork
52
5. Navigate to Control Panel > Network and Sharing Center. Click on
Change adapter settings
Head to Sharing tab > check the box Allow other network users to connect through
this computer's Internet connection > finally click on OK button.
53
Now you can connect your Wi-Fi devices such as iPhone, Android smartphone, iPad, laptop
to this ad hoc wireless network and enjoy internet connection sharing.
IP Address
Passkey:
Subnet Mask
Class
54
Task 2: Network Testing.
ipconfig /all result:
ping result:
ping result:
D. Grading:
Accomplishments
Task 1 Ad-hoc Network Setup
Task 2 Network Testing
Weights
Rating
Equivalent
50%
50%
55
Grade:
Worksheet No.13
Switch Based Networking with File Sharing
Student Name:
A. Objectives:
Date Performed:
Given the materials and equipment, upon completion of the activity, the
student must be able to:
1. Implement a switch based network between 5 PCs.
2. Verify IP address information and test connectivity.
3. Configure File Sharing.
56
IP address range
10.0.0.0
- 10.255.255.255
172.16.0.0 - 172.31.255.255
192.168.0.0 - 192.168.255.255
number of
addresses
16,777,216
1,048,576
65,536
57
MAC Address
IP Address
Subnet Mask
or / format
Clas
s
58
ping result:
ping result:
59
E. Grading:
Accomplishments
Task 1 Network Design
Task 2 Address Information
Task 3 Design Implementation
Task 4 Network Testing
Task 5 File Sharing
Weights
15%
15%
20%
20%
30%
Rating
Equivalent
Grade:
Worksheet No.14
Switch Based Networking with Print Server
Student Name:
A. Objectives:
Date Performed:
Given the materials and equipment, upon completion of the activity, the
student must be able to:
1. Implement a switch based network between 5 PCs.
2. Verify IP address information and test connectivity.
3. Configure Print Server.
60
61
MAC Address
IP Address
Subnet Mask
or / format
Clas
s
Task 3. Design Implementation. Write step by step procedure taken to set-up the
network:
62
ping result:
ping result:
63
E. Grading:
Accomplishments
Task 1 Network Design
Task 2 Address Information
Task 3 Design Implementation
Task 4 Network Testing
Task 5 Printer Sharing
Weights
15%
15%
20%
20%
30%
Rating
Equivalent
Grade:
Worksheet No. 15
Router-Based Network
Student Name:
A. Objectives:
Date Performed:
Given the materials and equipment, upon completion of the activity, the
student must be able to:
1. Implement a router based network.
2. Verify IP address information and test connectivity.
3. Configure a network application.
64
the files,
etc
Not just that, if you have a Wi-Fi phone, you can make some internet phone calls (aka
Skype) wirelessly without you need to turn on the computer. With a router you can actualize
them easily and securely. Building router-based network, firstly you need to know what you
need. Whether you build a wireless network just to share the Internet only, or you need to
streams High definition video, or you need to extend the network wirelessly, or you need to
extend the network to the next building, or else. By knowing what you need, you can choose
the best products for your requirements.
The wireless router lets you access the Internet via a wireless connection or through one of
its four switched ports. You can also use the Router to share resources, such as computers.
A variety of security features help to protect your data and your privacy while online. Security
features include WPA2 security, a Stateful Packet Inspection (SPI) firewall and NAT
technology. Configuring the Router is easy using the provided browser-based utility. For
more details see the attached pdf file.
65
66
Task 4: Network Testing. Write procedure taken to check the network configurations
and testing the connections.
Task 5: Network Applications. Demonstrate any SOHO application you desire.
For example:
1.
2.
3.
4.
5.
E. Grading:
Accomplishments
Task 1 Network Design
Task 2 Address Information
Task 3 Design Implementation
Task 4 Network Testing
Task 5 Printer Sharing
Weights
15%
15%
20%
20%
30%
Rating
Equivalent
Grade:
SUMMARY OF GRADES
Name
:
A. Performance (60%)
Activity
No.
Date
Accomplishe
d
Title
RJ 45 Crimping Tool
Data Codes
10
11
Rating
Peer-to-peer Networking
Peer-to-peer Networking Using CISCO Packet
Tracer
67
12
Ad hoc Networking
13
14
15
B. Quizzes (25%)
Topic No.
1
Date Taken
Title
Introduction to Computer Networks and
Data Communications
Fundamentals of Data and Signals
Making Connections
5
6
9
10
11
12
Network Security
13
Rating
68
Exam
Type
Midterm
Date Taken
Topics Covered
Rating
Final Term
D. Final Grade
Term
Mid
60%
25%
15%
Grade
7 pt.
Final
Remarks
Final
REFERENCES
Books:
Adsuara, Marvin J., Computer Network Fundamentals, Mutya Publishing House, 2000
Buchanan, William, Distributed Systems and Networks, McGraw Hill Publishing Company,
2000
Cisco Networking Academy Program, CCNA 1 and 2 Companion Guide, Cisco Press
Forouzan, Behrouz A., Data Communications and Networking, McGraw-Hill Companies
Inc., 4th Ed., 2007.
Miller, Michael A., Data and Network Communication
Stallings, William, Data and Computer Communications, Prentice Hall, 1997
Tomasi, Wayne, Data Communications and Networking, Pearson Prentice Hall, 2005
White, Curt M. Data Communications and Computer Networks: A Business Users
Approach 7TH Ed., Course Technology-Thompson Learning, 2001
eBooks:
White, Curt M. Data Communications and Computer Networks: A Business Users
Approach 6th Ed., Course Technology-Thompson Learning, 2001
69
PowerPoint Presentations:
ppt file by White, C. (Chapter 1 13)
ANNEXES
70
71
ANNEX A
72
ANNEX B
This is issued for the purpose of giving due credit to the author of this
instructional material.