You are on page 1of 72

Republic of the Philippines

CEBU TECHNOLOGICAL UNIVERSITY


Main Campus

Corner M. J. Cuenco Avenue and R. Palma St., Cebu City

COLLEGE OF TECHNOLOGY
ICT Department

SHOP MODULE FOR


ICTP 226
Data Communication and Network Management

Compiled by:
Jose Maria S. Garcia II
Gerry Ritz R. Densing

THIS IS FOR INSTRUCTIONAL PURPOSES ONLY NOT FOR SALE

Introduction
This shop module is intended to be used for the course ICTP 226 in the
Bachelor of Science in Information and Communications Technology (BSICT)
program of the College of Technology, Cebu Technological University Main Campus
during the 2nd semester of the second year level.

The course deals with the study of communication system relevant to the use
of computers and data processing on computers, interconnection or networks
through transmission of data between distant sites. The study relied on digital and
information systems as basic foundation. This course also covers network
technology which has become a very important method of improving data
communication. Networking focused on LAN concepts and fundamentals, designs,
and topologies, network installation and configuration, systems models and network
management.

CEBU TECHNOLOGICAL UNIVERSITY


Corner M.J Cuenco Avenue and R. Palma Street
Cebu City, Philippines 6000
http://www.ctu.edu.ph
Email: information@ctu.edu.ph

Jose Maria S. Garcia II


Associate Professor V

Table of Contents
Title Page

Introduction
2

Table of Contents
3

VMGO
4

Shop Rules for Safety

Worksheets
1

Preparation and Presentation of Assigned Topic

RJ 45 Crimping Tool

Cable Testing and Wire Mapping

13

Digital Encoding Scheme

18

Data Codes

23

Data and Signal Conversion

27

EIA/TIA 568A and 568B Standards

32

Straight Through Cable Construction

36

Crossover Cable Construction

38

10

Peer-to-peer Networking

40

11

Peer-to-peer Networking Using CISCO Packet Tracer

44

12

Ad hoc Networking

46

13

Switch Based Networking with File Sharing

52

14

Switch Based Networking with Print Server

56

15

Router Based Network

60

Summary of Grades
63

CEBU TECHNOLOGICAL UNIVERSITY


Corner M.J Cuenco Avenue and R. Palma Street
Cebu City, Philippines 6000
http://www.ctu.edu.ph
Email: information@ctu.edu.ph

Jose Maria S. Garcia II


Associate Professor V

4
References
65

Annexes

67

VISION of the University


A premier multidisciplinary-technological university

MISSION of the University


The University shall primarily provide advanced professional and technical instruction for
special purposes, advanced studies in industrial trade, agriculture, fishery, forestry,
aeronautics and land-based programs, arts and sciences, health sciences, information
technology and other relevant fields of study. It shall also undertake research and
extension services and provide progressive leadership in its areas of specialization
(Sec.2 of RA 9744).

GOALS of the College


1. Outcomes-based and quality-oriented technological instruction delivered to studentcustomers;
2. Technology market kept more satisfied;
3. Holistic development of faculty members and students enhanced and fulfilled.

OBJECTIVE

of the Program

Equip students with equitable ICT skills and proficiencies required by industry with
integrated research and extension capabilities in addressing the ever changing demands
in their individual lifetime opportunities and possibilities in local and global workforce.
CEBU TECHNOLOGICAL UNIVERSITY
Corner M.J Cuenco Avenue and R. Palma Street
Cebu City, Philippines 6000
http://www.ctu.edu.ph
Email: information@ctu.edu.ph

Jose Maria S. Garcia II


Associate Professor V

Shop Rules for Safety


Rules for Protecting Yourself

Do not run inside the computer lab.


Take a note of all the exits in the room, and also take note of the location of
fire extinguishers in the room for the sake of fire safety.
Keep bags and other things in the designated area, as they can cause people
to trip if they are simply lying around the room.
Try not to type continuously for extremely long periods.
Look away from the screen once in a while to give your eyes a rest.
Do not touch any exposed wires or sockets.
Avoid making loud noises and speaking loudly.
Do not attempt to open any machines, and do not touch the backs of
machines when they are switched on.
Do not spill water or any other liquid on the machine, in order to maintain
electrical safety.

There is a lot of equipment in computer labs that could short circuit itself or cause
electric shocks, so one needs to be very careful.
Rules for Protecting Equipment

Do not bring any food or drinks near the machine.


Turn off the machine you were using, when you are done using it.
Do not access external devices without scanning them for computer viruses.
Ensure that the temperature in the room stays cool, since there are a lot of
machines inside a lab, and these can overheat easily. This is one of the many
ways of ensuring computer safety.
Try not to touch any of the circuit boards and power sockets when something
is connected to them and switched on.
Always maintain an extra copy of all your important data.
Dust can affect computers adversely. Ensure that the machines are cleaned
on a regular basis.

CEBU TECHNOLOGICAL UNIVERSITY


Corner M.J Cuenco Avenue and R. Palma Street
Cebu City, Philippines 6000
http://www.ctu.edu.ph
Email: information@ctu.edu.ph

Jose Maria S. Garcia II


Associate Professor V

Worksheet 1
Preparation and Presentation of Assigned Topic
Student Names:

Mhel Heinz G. Debalucos


Evangeline C. Mier

A. Objectives:

Date Performed:
11/15/16 11/19/16

Given the assigned topic the student/s must be able to:

1. Make a PowerPoint presentation of the assigned topic.


2. Submit hardcopy and softcopy of the PowerPoint presentation.
3. Present the topic assigned as scheduled.

B. Materials/Tools:

File of the assigned topic


PC with PowerPoint application

C. Accomplish the following tasks:


Task 1: Make a PowerPoint presentation using the following format:
i.
ii.
iii.
iv.
v.
vi.
vii.

Title
Objectives
Outline
Body or Content (Report Proper)
Summary
Evaluation
Acknowledgment

Task 2: Print the presentation using outlined


i.
ii.
iii.
iv.

Colored
Long size bond paper (8 x 13)
6 to 8 slides per page
Compiled in a folder

Submit the softcopy and hardcopy (print-out) of the presentation for grading.
Task 3: Present the assigned topic on the assigned scheduled.
Prepare minutes of the presentation, rubrics (self-rate) and documentations.

D. Grading:

Worksheet will be graded according to the following weights:

Accomplishments
Task 1 Power Point soft copies

CEBU TECHNOLOGICAL UNIVERSITY


Corner M.J Cuenco Avenue and R. Palma Street
Cebu City, Philippines 6000
http://www.ctu.edu.ph
Email: information@ctu.edu.ph

Weights
25%

Rating

Equivalent

Jose Maria S. Garcia II


Associate Professor V

7
25%

Task 2 Power Point hard copies


Task 3 Presentation of assigned topic

50%
Grade:

Worksheet No. 2
RJ 45 Crimping Tool
Student Name:

A. Objectives:
1.
2.

Date Performed:

Given the materials and tools, upon completion of the activity, the student
must be able to:

Discuss the functions of a crimping tool.


Terminate a UTP cable.

B. Materials/Tools:

RJ 45 modular plug/connector
Category 5e unshielded twisted pair (UTP)
RJ 45 Crimper

C. Background:
While terminating networking cables for creating computer networks such as LANs (Local
Area Networks) one has to be very careful and precise. One has to use a variety of wire
connector assembly and installation tools to assemble and install such connectors to each
other. These tools include a variety of cable tie guns, crimping tool, cutters, pliers, punch
down tools, screwdrivers, splicers, strippers, and cable pulling grips.
Crimp Tool - These are used to crimp
and cut the wires of an RJ-45 connector.
Some crimper will also work on RJ-11
connectors as well. This tool consists of a
built in cable stripper and a wire cutter.
Thus, it cuts the wire in one go. Apart
from being one of the computer
networking tools, these network cable
crimping tools have various applications
in different industries such as electronics,
data, voice, video and signal industries.
When network engineers and cable
runners make network cables, they use a
crimper to fasten the RJ-45 connector in
its place.
Crimper is held open by a spring and keep in mind that the sharp cutting blades will be
exposed. So consider storing your crimper in the original packaging, put a rubber band

CEBU TECHNOLOGICAL UNIVERSITY


Corner M.J Cuenco Avenue and R. Palma Street
Cebu City, Philippines 6000
http://www.ctu.edu.ph
Email: information@ctu.edu.ph

Jose Maria S. Garcia II


Associate Professor V

8
around the handles when not in use, or get yourself a nice carrying case of some sort, that
you can keep the crimper in its closed position.

Near the top of the crimper is the stripping tool. It


is a bit hard to use. For one, it's hard to get the
wire past the blades. Two, it's very easy to cut the
internal wires as well with any pressure.

Just below that, is where you insert your cable,


with the RJ-45 end into for crimping. The teeth
are what pushes your connectors into the wires in
your RJ-45 end. Those of course make contact
with your network card, or other network device.

CEBU TECHNOLOGICAL UNIVERSITY


Corner M.J Cuenco Avenue and R. Palma Street
Cebu City, Philippines 6000
http://www.ctu.edu.ph
Email: information@ctu.edu.ph

Jose Maria S. Garcia II


Associate Professor V

Moving lower, a handy feature is the cutter. Insert


your paired wires into that, and a squeeze on the
handles cuts all 8 of your wires with ease.

Networking Cable (UTP or STP) - A typical computer networking cable has 8 colour coded
wires which are twisted into 4 pairs. Each pair has a common colour theme. These
combinations or pairs typically are:

Blue

and Blue

/ White

Brown and Brown / White


Green

and Green / White

Orange and Orange / White

RJ-45 Connectors - An RJ-45 connector terminates each end of a network cable. These
connectors look like large phone connectors, and they use the same type of clear plastic
and clip. On the connector are eight contacts corresponding to the eight wires in the cable,
and these match the eight contacts of the RJ-45 port on your computer or network device.
While purchasing the connector one must pay attention to whether the connector is made
for braided or solid wire. When the connector is made for braided wires, it has contacts
which actually pierce the wire. When the connector is made for solid wire, it has fingers
which pierce the insulation and make a connection with the wire by grasping it from both
sides.

CEBU TECHNOLOGICAL UNIVERSITY


Corner M.J Cuenco Avenue and R. Palma Street
Cebu City, Philippines 6000
http://www.ctu.edu.ph
Email: information@ctu.edu.ph

Jose Maria S. Garcia II


Associate Professor V

10

D. Steps in terminating a cable:


Step 1 Strip at least 1 inch of jacket off on any end of the cable.

Step 2 Un-twist pairs and lay flat between your thumb and forefinger.

CEBU TECHNOLOGICAL UNIVERSITY


Corner M.J Cuenco Avenue and R. Palma Street
Cebu City, Philippines 6000
http://www.ctu.edu.ph
Email: information@ctu.edu.ph

Jose Maria S. Garcia II


Associate Professor V

11

Step 3 Rearrange cable pairs to correct colour sequence.

Step 4 Cut all of the wires at a perfect 90-degree angle from the cable at 1/2" from the end
of the cable jacket. This is a very critical step. If the wires are not cut straight, they may not
all make contact.

CEBU TECHNOLOGICAL UNIVERSITY


Corner M.J Cuenco Avenue and R. Palma Street
Cebu City, Philippines 6000
http://www.ctu.edu.ph
Email: information@ctu.edu.ph

Jose Maria S. Garcia II


Associate Professor V

12

Step 5 Place an RJ-45 plug on the end of the cable, with the prong on the underside. Gently
push the plug onto wires until the copper ends of the wires can be seen through the end of
the plug. Make sure the end of the jacket is inside the plug. This provides for stress relief
and to ensure that all wires are in the correct order. If the jacket is not inside the plug, the
plug will not be properly gripped and will eventually cause problems.

Step 6 If everything is correct, crimp the plug hard enough to force the contacts through the
insulation on the wires, completing the conducting path. Submit your work for grading.

CEBU TECHNOLOGICAL UNIVERSITY


Corner M.J Cuenco Avenue and R. Palma Street
Cebu City, Philippines 6000
http://www.ctu.edu.ph
Email: information@ctu.edu.ph

Jose Maria S. Garcia II


Associate Professor V

13
E. Accomplish the following tasks:
Task 1: Discuss the 3 functions of a crimping tool.
Function 1:

Function 2:

Function 3:

Task 2: Terminate the UTP cable by following Steps 1 6.

F. Grading:

Worksheet will be graded according to the following weights:

Accomplishments
Task 1 Functions of the crimping tool
Task 2 Stripping
Cutting
Crimping

Weights
25%

Rating

Equivalent

25%
25%
25%

Grade:

Worksheet No. 3
Cable Testing and Wire Mapping

CEBU TECHNOLOGICAL UNIVERSITY


Corner M.J Cuenco Avenue and R. Palma Street
Cebu City, Philippines 6000
http://www.ctu.edu.ph
Email: information@ctu.edu.ph

Jose Maria S. Garcia II


Associate Professor V

14
Student Name:

Date Performed:

A. Objectives: Given the materials and tools, upon completion of the activity, the
student must be able to:
1.
2.

Test and detect wiring failures or cable defects.


Draw wire map based on the result of the testing

B. Materials/Tools:

Cable Tester

Rollover Cable (constructed from previous activity)

Colored pencil
C. Background:
A network cable tester is a device that is designed to verify whether or not a computer
network cable is capable of successfully transferring data from "point A" to "point B." If you
want to use your network cable tester, you need only to make sure that the actual cable you
want to test is hooked up correctly.

CEBU TECHNOLOGICAL UNIVERSITY


Corner M.J Cuenco Avenue and R. Palma Street
Cebu City, Philippines 6000
http://www.ctu.edu.ph
Email: information@ctu.edu.ph

Jose Maria S. Garcia II


Associate Professor V

15

Wire Map
The first condition for successful data transmission over a cabling link is ensuring the link is
properly connected at each of its connection and termination points to provide end-to-end
continuity of each wire pair in a cabling link. It is very important for twisted pair cabling links
that the wire pairing is strictly maintained from one end of the link to the other end.
A wire map allows the network technician to verify which pins on one end of the cable are
connected to which pins on the other end. With an understanding of the proper wiring
connections, you can determine when a cable is wired improperly, depending on its intended
use. You will learn how to use a cable tester to check for the proper installation of Twisted
Pair according to cabling standards in an Ethernet network. You will test a rollover cable
using all four pairs to determine some problems that can occur from incorrect cabling
installation and termination.
A test called wire map verifies that the continuity for each wire in the link under test is
achieved from one end to the other.
The wire map test will detect and report wiring failures or cabling defects such as:
a) continuity;
b) short circuits between any two or more conductors of the wires tested;
c) transposed pairs between any of the pairs tested;
d) reversed pairs;
e) split pairs among the pairs tested.

CEBU TECHNOLOGICAL UNIVERSITY


Corner M.J Cuenco Avenue and R. Palma Street
Cebu City, Philippines 6000
http://www.ctu.edu.ph
Email: information@ctu.edu.ph

Jose Maria S. Garcia II


Associate Professor V

16
Below is an example of a successful test: (The wiring code used here is T568B)

The following is the most common fault and is easily detected by most wire map
testers.
1. This is known as a reversed pair

2. This is known as a transposed pair

CEBU TECHNOLOGICAL UNIVERSITY


Corner M.J Cuenco Avenue and R. Palma Street
Cebu City, Philippines 6000
http://www.ctu.edu.ph
Email: information@ctu.edu.ph

Jose Maria S. Garcia II


Associate Professor V

17

3. This is known as a split pair

The wire map test goes beyond a simple continuity test that assures each connector pin
from one end of the link is connected to the corresponding pin at the far end and is not
connected to any other conductor or shield. Simple continuity between pins from one end of
the cable to the other is not sufficient for data communication. In addition, the wire map test
is an assurance that the link maintains proper pairing of conductors. Each wire in a pair
must be connected to the proper pins in connectors or cross-connect blocks to maintain
uninterrupted pairing over the total length of the link.
D. Accomplish the following tasks:
Task 1: Test the cable.

Plug one end of the roll-over cable you are trying to test into the "RJ 45 TX" input on
the network cable tester master unit.

Plug the other end of your cable you are trying to test into the "RJ 45 RX" input on
the network cable tester remote unit.

Turn-on your network cable tester.

Test the cable. The network cable tester will send a signal across the cable. If the
signal gets from one end of the cable to the other, a green light will appear on the
device, letting you know that the test was successful. If the signal does not get from
one end of the cable to the desired end, the cable is bad.

CEBU TECHNOLOGICAL UNIVERSITY


Corner M.J Cuenco Avenue and R. Palma Street
Cebu City, Philippines 6000
http://www.ctu.edu.ph
Email: information@ctu.edu.ph

Jose Maria S. Garcia II


Associate Professor V

18
Did you find any fault on the cable?
If YES, what is it? __________________________________________________
Describe the procedure in testing a cable.

Task 2: Draw the wire map using coloured pencil to establish the condition of the cable.

E. Grading:

Worksheet will be graded according to the following weights:

Accomplishments
Task 1 Testing the cable
Task 2 Drawing the wire map

Weights
50%
50%

Rating

Equivalent

Grade:

Worksheet No. 4
Digital Encoding Schemes

CEBU TECHNOLOGICAL UNIVERSITY


Corner M.J Cuenco Avenue and R. Palma Street
Cebu City, Philippines 6000
http://www.ctu.edu.ph
Email: information@ctu.edu.ph

Jose Maria S. Garcia II


Associate Professor V

19
Student Name:

Date Performed:

A. Objectives : Given the materials, upon completion of the activity, the student must be
able to:
1. Digitally encode a given data using NRZ-L, NRZI, Manchester,
Differential Manchester, Bipolar-AMI and 4B/5B schemes.
2.

Convert digital data to digital signals for transmission.

B. Materials/Tools:

Pencil

Ruler
C. Background:
To transmit digital data using digital signals, the 1s and 0s of the digital data must be
converted to the proper physical form that can be transmitted over a wire or airwave. Digital
encoding schemes are used to convert the 0s and 1s of digital data into the appropriate
transmission form as follows:
1. Nonreturn to Zero-Level (NRZ-L) The NRZ-L digital encoding scheme transmit 1s
as zero voltages and 0s as positive voltages. The NRZ-L encoding scheme is simple
to generate and inexpensive to implement in hardware.

2. Nonreturn to Zero Inverted (NRZI) This encoding scheme has a voltage change
at the beginning of a 1 and no voltage change at the beginning of a 0.

3. Manchester The Manchester class of digital schemes ensures that each bit has
some type of signal change, and thus solves the synchronization problem.

CEBU TECHNOLOGICAL UNIVERSITY


Corner M.J Cuenco Avenue and R. Palma Street
Cebu City, Philippines 6000
http://www.ctu.edu.ph
Email: information@ctu.edu.ph

Jose Maria S. Garcia II


Associate Professor V

20
The Manchester encoding scheme has the following properties: to transmit a 1, the
signal change form low to high in the middle of the interval; to transmit a 0, the signal
change form high to low in the middle of the interval.

Note that the transition is always in the middle, a 1 is a low-to-high transition, and a 0
is a high-to-low transition, Thus, if the signal is currently low and the next bit to
transmit is a 0, the signal has to move from low to high as the beginning of the
interval so that it can do the high-to-low transition in the middle.
4. Differential Manchester is similar to the Manchester scheme in that there is
always a transition in the middle of the interval. But unlike the Manchester code, the
direction of this transition in the middle does not differentiate between a 0 or a 1.
Instead, if there is a transition at the beginning of the interval, then a 0 is being
transmitted. If there is no transition at the beginning of the interval, then a 1 is being
transmitted.

5.

Bipolar AMI is unique among all encoding schemes because it uses three voltage
levels. When a device transmits a binary 0, a zero voltage is transmitted. When the
device transmit a binary 1, either a positive voltage or a negative voltage is
transmitted. Which of these is transmitted depends on the binary 1 value that was
last transmitted. For example, if the last binary 1 transmitted a positive voltage, then
the next binary 1 will transmit a negative voltage.

6. 4B/5B takes 4 bits of data, converts the bits into a unique 5-bit sequence, and
encodes the 5-bits using NRZI.

CEBU TECHNOLOGICAL UNIVERSITY


Corner M.J Cuenco Avenue and R. Palma Street
Cebu City, Philippines 6000
http://www.ctu.edu.ph
Email: information@ctu.edu.ph

Jose Maria S. Garcia II


Associate Professor V

21

D. Accomplish the following tasks:


Task 1: Digitally encode the given digital data into digital signals using the
different encoding schemes.

CEBU TECHNOLOGICAL UNIVERSITY


Corner M.J Cuenco Avenue and R. Palma Street
Cebu City, Philippines 6000
http://www.ctu.edu.ph
Email: information@ctu.edu.ph

Jose Maria S. Garcia II


Associate Professor V

22
Schemes

NRZ-L

NRZ-I

Manchest
er

Differenti
al
Manchest
er

Bipolar
AMI

Task 2: Show the equivalent 4B/5B code of the given bit string.
4B
5B

1000

1010

1101

1001

0001

0011

4B/5
B

Task 3: Answer the following:


1. What inherent problem occurs with NRZ-L and NRZI digital encoding schemes?

CEBU TECHNOLOGICAL UNIVERSITY


Corner M.J Cuenco Avenue and R. Palma Street
Cebu City, Philippines 6000
http://www.ctu.edu.ph
Email: information@ctu.edu.ph

Jose Maria S. Garcia II


Associate Professor V

23

2. What digital encoding scheme is used in most LAN for transmitting digital data over a
LAN cable?

3. What is the similarity between the NRZI and the Differential Manchester digital
encoding schemes?

4. Why is the Manchester encoding scheme inefficient?

E. Grading:

Worksheet will be graded according to the following weights:

Accomplishments
Task 1 Encoding digital data to digital signals
Task 2 4B to 5B Coding
Task 3 Review Questions

Weights
40%
40%
20%

Rating

Equivalent

Grade:

Worksheet No. 5

CEBU TECHNOLOGICAL UNIVERSITY


Corner M.J Cuenco Avenue and R. Palma Street
Cebu City, Philippines 6000
http://www.ctu.edu.ph
Email: information@ctu.edu.ph

Jose Maria S. Garcia II


Associate Professor V

24

Data Codes

Student Name:

A. Objectives :
1.
2.

Date Performed:

Given the materials, upon completion of the activity, the


student must be able to:

Convert a given message into code string using EBCDIC and


ASCII and vice-versa.
Value the use of codes in data communication.

B. Materials/Tools:

Chapter 2 Notes

Pencil
C. Background:
One of the most common forms of data transmitted between a transmitter and a receiver is
textual data. Data codes are necessary to transmit the letters, numbers, symbols, and
control characters found in text data. Three important data codes are ASCII, EBCDIC, and
Unicode.
Extended Binary Coded Decimal Interchange Code (EBCDIC) is an 8-bit code allowing
256 possible combinations of textual symbols. All the EBCDIC characters are shown in the
figure below.

CEBU TECHNOLOGICAL UNIVERSITY


Corner M.J Cuenco Avenue and R. Palma Street
Cebu City, Philippines 6000
http://www.ctu.edu.ph
Email: information@ctu.edu.ph

Jose Maria S. Garcia II


Associate Professor V

25

Example:
C
t
U
8
?

1100
1010
1110
1111
0110

0011
0011
0100
1000
1111

American Standard Code for Information Interchange (ASCII) is a government


standard in the United States and is one of the most widely used data codes in the world.
The ASCII character set exists in a few different forms, including a 7-bit version that allows
for 128 possible combinations of textual symbols. Because the byte, which consists of 8bits, is a common unit of data, the 7-bit version of ASCII characters usually includes an eight
bit. This eight bit can be used to detect transmission errors. Below is a figure showing all
ASCII character set.

CEBU TECHNOLOGICAL UNIVERSITY


Corner M.J Cuenco Avenue and R. Palma Street
Cebu City, Philippines 6000
http://www.ctu.edu.ph
Email: information@ctu.edu.ph

Jose Maria S. Garcia II


Associate Professor V

26

Example:
C
t
U
8
?

1000011
1110100
1010101
0111000
0111111

Unicode is an encoding technique that provide a unique coding value for every character
in every language, no matter what platform. Currently, Unicode supports more than 110
different code charts (language and symbols sets.). You can view the Unicode Web site at
www.unicode.org

D. Accomplish the following tasks:


Task 1: Using the EBCDIC and ASCII character code set, what is the binary
encoding of the message Hello World 69!!!?
EBCDIC

ASCII

H
e
l
l
o
W
o
CEBU TECHNOLOGICAL UNIVERSITY
Corner M.J Cuenco Avenue and R. Palma Street
Cebu City, Philippines 6000
http://www.ctu.edu.ph
Email: information@ctu.edu.ph

Jose Maria S. Garcia II


Associate Professor V

27
r
l
d
6
9
!
!
!
Task 2: Given the encoded binary string using EBCDIC, find the message.
1100
1100
1110
1100
0100
1100
1001
1001
1101
1010
1001
1000
1000
1000
1010
1000
1101
1101

0100
0001
0011
0001
0000
0011
0110
0100
0100
0100
0101
1001
0011
0001
0011
1001
0110
0101

D
A
T
A
C
o
m
M
u
n
i
c
a
t
i
O
N

Task 3: Given the encoded binary string using ASCII, find the message.
1000011
1101111
1101101
1110000
1110101
1110100
1100101
1110010
0100000
1001110
1000101
1010100
1010111
1001111
1010010
CEBU TECHNOLOGICAL UNIVERSITY
Corner M.J Cuenco Avenue and R. Palma Street
Cebu City, Philippines 6000
http://www.ctu.edu.ph
Email: information@ctu.edu.ph

C
o
m
p
u
t
e
r
N
E
T
W
O
R
Jose Maria S. Garcia II
Associate Professor V

28
1001011
0100101

K
%

Task 4: Answer the following:


1. Who are the major users of the EBCDIC character set?

2. Explain the major problems with both EBCDIC and ASCII character set.

E. Grading:

Worksheet will be graded according to the following weights:

Accomplishments
Task 1 EBCDIC and ASCII Coding
Task 2 Binary to EBCDIC Coding
Task 3 Binary to ASCII Coding
Task 4 Review Questions

Weights
40%
25%
25%
10%

Rating

Equivalent

Grade:

Worksheet No. 6
Data and Signal Conversion

Student Name:

CEBU TECHNOLOGICAL UNIVERSITY


Corner M.J Cuenco Avenue and R. Palma Street
Cebu City, Philippines 6000
http://www.ctu.edu.ph
Email: information@ctu.edu.ph

Date Performed:

Jose Maria S. Garcia II


Associate Professor V

29
A. Objectives :
1.
2.
3.

Given the materials, upon completion of the activity, the


student must be able to:

Encode message using Differential Manchester.


Convert encoded data to signal using Frequency Modulation.
Interact knowledgeably with others on the fundamental concepts
of data and signal conversion as a firm foundation of computer
networking.

B. Materials/Tools:

Chapter 2 Notes

Pencil
C. Background
:
Let us examine two typical business application in which a variety of data and signal
conversions are performed to see how analog and digital data, analog and digital signals,
and data codes work together. First consider a person at work who wants to send an e-mail
to a colleague, asking about the time for the next meeting.
Let us assume the message says Sam, what time is the meeting? and that it is being
sent from a personal computer connected to a LAN, which in turn, is connected to the
Internet. The connection to the Internet is over a DSL modem.

The e-mail program prepares the e-mail message, which contain the word Sam...?.
Because this e-mail uses ASCII, the text is converted to the following:

CEBU TECHNOLOGICAL UNIVERSITY


Corner M.J Cuenco Avenue and R. Palma Street
Cebu City, Philippines 6000
http://www.ctu.edu.ph
Email: information@ctu.edu.ph

Jose Maria S. Garcia II


Associate Professor V

30
The Differential Manchester Encoding scheme of the message travels over the LAN and
arrives at another computer, which in turn connected to a modem. This computer converts
the message back to an ASCII string, and then transmit the ASCII string to the modem. The
modem prepares the message for transmission over the Internet, using frequency
modulation (FM).

The FM signal travels over the telephone lines and arrives at the appropriate Internet
gateway (or ISP), which demodulates the signal into an ASCII string. The ASCII string
representing the original message moves out to the Internet and finally arrives at the
intended receivers computer.
Note: More code conversion over the Internet are involved but are not discussed in this
example.

D. Accomplish the following tasks:


Task 1: Use Differential Manchester Encoding scheme to encode the
message CTU 143.

CEBU TECHNOLOGICAL UNIVERSITY


Corner M.J Cuenco Avenue and R. Palma Street
Cebu City, Philippines 6000
http://www.ctu.edu.ph
Email: information@ctu.edu.ph

Jose Maria S. Garcia II


Associate Professor V

31

Task 2: Use FM to convert the encoded data to signal


C

CEBU TECHNOLOGICAL UNIVERSITY


Corner M.J Cuenco Avenue and R. Palma Street
Cebu City, Philippines 6000
http://www.ctu.edu.ph
Email: information@ctu.edu.ph

Jose Maria S. Garcia II


Associate Professor V

32

3
CEBU TECHNOLOGICAL UNIVERSITY
Corner M.J Cuenco Avenue and R. Palma Street
Cebu City, Philippines 6000
http://www.ctu.edu.ph
Email: information@ctu.edu.ph

Jose Maria S. Garcia II


Associate Professor V

33

Task 3: Answer the question. What are the different encoding or conversion
technique, common device/s and common system/s used in converting the following:
(present answer in table format)
a.
b.
c.
d.

analog data to analog signal


digital data to digital signal
digital data to analog signal
analog data to digital signal

E. Grading:

Worksheet will be graded according to the following weights:

Accomplishments
Task 1 Differential Manchester
Encoding
Task 2 Frequency Modulation
Task 3 Review Questions

Weights

Rating

Equivalent

40%
40%
20%
Grade:

CEBU TECHNOLOGICAL UNIVERSITY


Corner M.J Cuenco Avenue and R. Palma Street
Cebu City, Philippines 6000
http://www.ctu.edu.ph
Email: information@ctu.edu.ph

Jose Maria S. Garcia II


Associate Professor V

34

Worksheet No. 7
EIA/TIA 568A and 568B STANDARDS

Student Name:

Date Performed:

A. Objectives : Given the materials, upon completion of the activity, the


student must be able to:
1.
2.
3.

Colour and familiarize pin and wire assignment of 568A standard.


Colour and familiarize pin and wire assignment of 568B standard.
Identify use of 568A and 568B standards.

B. Materials/Tools:

Colouring pens

Chapter 2 Notes
C. Background:
In 1985, the Computer Communications Industry Association requested that the Electronic
Industries Alliance (EIA) to develop standards for the cabling used in telecommunications
applications.
In the world of structured cabling systems, the cryptic number 568 refers to the order in
which the individual wires inside a CAT 5 cable are terminated. The termination could come
at either the users end socket, the patch panel or termination frame or even the individual
leads that connect a computer to the wall socket. There are currently two different
specifications with respect to the order these cables should be terminated contained in the
international standards document (ISO/IEC 11801:1995) as previously mentioned there is no
indication as to which of these standards is preferred.
Although many aspects of networking structure and performance are addressed in these
standards, the most visible and often misunderstood component is the definition of the
wiring assignments in the RJ45 plug. A coloured wire must be placed in a specific pin
location in the plug in order for the cable to meet the standard. It is these wiring assignments
that differ between the T568A and T568B standard.
The pins on the RJ45 plug are numbered 1 to 8. If you are holding a CAT 5 patch cable in
your hand, as if inserting into a jack, with the contacts facing in the up position, pin 1 will be
on the far left. Pin 8 will be the pin on the far right. This is the orientation we will use when
we define the wiring assignments in the RJ45 plug and making understanding this easy.
CAT 5 Cable has four twisted pairs within the sheath. Each pair has a specific colour code,
and is to place into deliberate pin location within the RJ45 plug. Each pair has two strands of
CEBU TECHNOLOGICAL UNIVERSITY
Corner M.J Cuenco Avenue and R. Palma Street
Cebu City, Philippines 6000
http://www.ctu.edu.ph
Email: information@ctu.edu.ph

Jose Maria S. Garcia II


Associate Professor V

35
conductors known as the Tip and the Ring. According to the colour scheme, each pair has a
wire of solid colour and a wire with white stripe. The Tip Wire has the stripe, the Ring solid
coloration.

CEBU TECHNOLOGICAL UNIVERSITY


Corner M.J Cuenco Avenue and R. Palma Street
Cebu City, Philippines 6000
http://www.ctu.edu.ph
Email: information@ctu.edu.ph

Jose Maria S. Garcia II


Associate Professor V

36

D. Accomplish the following tasks:


Task 1: Colour the figure below according to Tip and Ring assignment of the 568
standard.

CEBU TECHNOLOGICAL UNIVERSITY


Corner M.J Cuenco Avenue and R. Palma Street
Cebu City, Philippines 6000
http://www.ctu.edu.ph
Email: information@ctu.edu.ph

Jose Maria S. Garcia II


Associate Professor V

37

Task 2: Colour the figure below according to wire assignment of the 568 standard.

Task 3: Answer the following:


1. What is the difference between 568A and 568B standard?

CEBU TECHNOLOGICAL UNIVERSITY


Corner M.J Cuenco Avenue and R. Palma Street
Cebu City, Philippines 6000
http://www.ctu.edu.ph
Email: information@ctu.edu.ph

Jose Maria S. Garcia II


Associate Professor V

38
The difference between the TIA-568A & TIA-568B wiring standard is that the Orange
and Green pairs trade places.

2. What is the intended use of 568A standard?


The TIA-568A is considered as a standard use for Residential wiring projects.

3. What is the intended use of 568B standard?


TIA-568B is used for the Commercial wiring projects.

E. Grading:

Worksheet will be graded according to the following weights: .

Accomplishments
Task 1 Tip and Ring Assignment
Task 2 568 Standard Color Assignment
Task 3 Review Questions

Weights
40%
40%
20%

Rating

Equivalent

Grade:

Worksheet No. 8
Straight Through Cable Construction

Student Name:

Date Performed:

A. Objectives : Given the resources, upon completion of the activity, the


student must be able to:
1.
2.
3.

Make a straight through patch cable using 568 standards.


Test the cable using a cable tester
Draw the wire map.

B. Materials/Tools:

2 pcs.
RJ 45

2 m. Category 5 or 5e UTP

Crimper

Cable Tester

CEBU TECHNOLOGICAL UNIVERSITY


Corner M.J Cuenco Avenue and R. Palma Street
Cebu City, Philippines 6000
http://www.ctu.edu.ph
Email: information@ctu.edu.ph

Jose Maria S. Garcia II


Associate Professor V

39
C. Background:
Straight-through cable is a type of twisted pair copper wire cable for local area network
(LAN) use for which the RJ-45 connectors at each end have the same pinout. In other words
Pin 1 connector A goes to Pin 1 on connector B, Pin 2 to Pin 2 etc.
It is identical to crossover cable, except that in the latter the wires on the cable are crossed
over so that the receive signal pins on the connector on one end are connected to the
transmit signal pins on the connector on the other end.
Straight-through cable is used to connect computers and other end-user devices (e.g.,
printers) to networking devices such as hubs and switches. It can also be used to directly
connect like devices (e.g., two hubs or two switches) if the cable is plugged into an uplink
port on one (but not both) of the devices. Crossover cable is used to connect two like
devices without the use of an uplink port.

Example of a straight through using 568B Standard


D. Accomplish the following tasks:
Task 1: Using the 568 standards, make a straight-through cable.

Task 2: Test the finished cable. Draw the wire map result of the testing. Have the
instructor check the finished cable.
1

CEBU TECHNOLOGICAL UNIVERSITY


Corner M.J Cuenco Avenue and R. Palma Street
Cebu City, Philippines 6000
http://www.ctu.edu.ph
Email: information@ctu.edu.ph

Jose Maria S. Garcia II


Associate Professor V

40
2

Task 3: Answer the following questions:


1. How to construct a straight through cable?
The difference between the TIA-568A & TIA-568B wiring standard is that the

2. Enumerate 3 uses of a straight through cable in computer networks.

Grading:

Worksheet will be graded according to the following weights:

Accomplishments
Task 1 Straight through Cable Construction
Task 2 Wire Mapping
Task 3 Review Questions

Weights
50%
30%
20%

Rating

Equivalent

Grade:

Worksheet No. 9
Crossover Cable Construction
Student Name:

A. Objectives:
1.
2.
3.

Date Performed:

Given the materials, upon completion of the activity, the


student must be able to:

Make crossover patch cable using 568 standards.


Test the cable using a cable tester
Draw the wire map.

B. Materials/Tools:

2 pcs.
RJ 45

1 m. Category 5 or 5e UTP
C. Background

This will be a 4-pair "crossover" cable. A crossover cable means that the second and third
pairs on one end of the cable will be reversed on the other end. The pin-outs will be T568A
CEBU TECHNOLOGICAL UNIVERSITY
Corner M.J Cuenco Avenue and R. Palma Street
Cebu City, Philippines 6000
http://www.ctu.edu.ph
Email: information@ctu.edu.ph

Jose Maria S. Garcia II


Associate Professor V

41
on one end and T568B on the other end. All 8 conductors (wires) should be terminated with
RJ-45 modular connectors. This patch cable will conform to the structured cabling
standards. If the patch cable is used between hubs or switches, it is considered to be part of
the "vertical" cabling. Vertical cabling is also called backbone cabling. A crossover cable can
be used as a backbone cable to connect two or more hubs or switches in a LAN, or to
connect two isolated workstations to create a mini-LAN. This will allow the connection of two
workstations or a server and a workstation without the need for a hub between them. This
can be very helpful for training and testing. To connect more than two workstations, a hub or
a switch will be needed.

D.

Accomplish the following tasks:


Task 1: Using the 568 standards, make a crossover cable.

Task 2: Test the finished cable. Draw the wire map result of the testing. Have the
instructor check the finished cable.
1

CEBU TECHNOLOGICAL UNIVERSITY


Corner M.J Cuenco Avenue and R. Palma Street
Cebu City, Philippines 6000
http://www.ctu.edu.ph
Email: information@ctu.edu.ph

Jose Maria S. Garcia II


Associate Professor V

42
2

Task 3: Answer the following questions:


1. How to construct a crossover cable?
The
between the TIA-568A & TIA-568B wiring standard is that the Orang

2. Enumerate 3 uses of a crossover cable in computer networks.


The TIA-568A is considered as a standard use for Residential wiring projects.

E. Grading:

Worksheet will be graded according to the following weights:

Accomplishments
Task 1 Crossover Cable Construction
Task 2 Wire Mapping
Task 3 Review Questions

Weights
50%
30%
20%

Rating

Equivalent

Grade:

Worksheet No. 10
Peer to Peer Networking

Student Name:

A. Objectives:

Date Performed:
Given the materials and equipment, upon completion of the activity, the
student must be able to:
1.
2.
3.
4.

Identify the proper cable used to connect two PCs


Configure workstation IP address information.
Verify IP address information using "ipconfig" command
Test connectivity using the "ping" command.

B. Equipment and Materials:

CEBU TECHNOLOGICAL UNIVERSITY


Corner M.J Cuenco Avenue and R. Palma Street
Cebu City, Philippines 6000
http://www.ctu.edu.ph
Email: information@ctu.edu.ph

Jose Maria S. Garcia II


Associate Professor V

43
The following resources will be required:
Two workstations with an Ethernet 10/100 NIC installed
Crossover Ethernet cable for connecting the two workstations
C. Background
This lab focuses on the ability to connect two PCs to create a simple peer-to-peer Ethernet
LAN between two workstations. The workstations will be directly connected to each other
without using a hub or switch. In addition to the Layer 1 physical and Layer 2 data link
connections, the computers must also be configured with the correct IP network settings,
which is Layer 3, so that they can communicate. A basic Category 5/5e UTP crossover cable
is all that is needed. A crossover cable is the same type that would be used as backbone or
vertical cabling to connect switches together. Connecting the PCs in this manner can be
very useful for transferring files at high speed and for troubleshooting interconnecting
devices between PCs. If the two PCs can be connected with a single cable and are able to
communicate, then any networking problems are not with the PCs themselves.
D. Accomplish the following tasks:
Task 1: Identify the proper Ethernet cable and connect the two PCs
The connection between the two PCs will be
accomplished using a Category 5 or 5e
crossover cable. Locate a cable that is long
enough to reach from one PC to the other, and
attach one end to the NIC in each of the PCs.
Be sure to examine the cable ends carefully
and select only a crossover cable.

1. What kind of cable is required to connect from NIC to NIC? ____________________


2. What is the category rating of the cable?
3. What is the AWG wire size designation of the cable?

_________________
_______________________

4. With the cable plug-in and the computers turned on. Verify the computer connections,
insure that the link lights on both NICs are lit. Are both link lights lit? _____________

Task 2: Configure TCP/IP settings for the two PCs


Computer Name

IP Address Assigned

Subnet Mask

Class

First:

CEBU TECHNOLOGICAL UNIVERSITY


Corner M.J Cuenco Avenue and R. Palma Street
Cebu City, Philippines 6000
http://www.ctu.edu.ph
Email: information@ctu.edu.ph

Jose Maria S. Garcia II


Associate Professor V

44

Second:

Note: Be sure to write down the existing IP settings, so that they can be restored at the end
of the lab. These include IP address, subnet mask, default gateway, and DNS servers. If the
workstation is a DHCP client, it is not necessary to record this information.

Select the Local Area Network Connection and click on Change settings of this
connection.

Select the TCP/IP protocol icon that is associated with the NIC in this PC.

Click on Properties, and click on Use the following IP address.

a. Set the IP address information for each PC according to the information in the table.
b. Note that the default gateway IP address is not required, since these computers are
directly connected. The default gateway is only required on local area networks that
are connected to a router.

Task 3: Confirm the TCP/IP network settings


Use the Start menu to open the Command Prompt (MS-DOS-like) window. Type the
ipconfig/all command from the Command Prompt. Record the results:
ipconfig result of the first computer

CEBU TECHNOLOGICAL UNIVERSITY


Corner M.J Cuenco Avenue and R. Palma Street
Cebu City, Philippines 6000
http://www.ctu.edu.ph
Email: information@ctu.edu.ph

ipconfig result of the second computer

Jose Maria S. Garcia II


Associate Professor V

45

Task 4: Verify that the PCs can communicate


a. Test connectivity from one PC to the other by pinging the IP address of the opposite
computer. For example: C:>ping 192.168.1.1 (or 192.168.1.2)
b. Look for results. If not, check the PC connections and TCP/IP settings for both PCs.
Record the ping result on the table?
ping result of the first computer

CEBU TECHNOLOGICAL UNIVERSITY


Corner M.J Cuenco Avenue and R. Palma Street
Cebu City, Philippines 6000
http://www.ctu.edu.ph
Email: information@ctu.edu.ph

ping result of the second computer

Jose Maria S. Garcia II


Associate Professor V

46

Restore the PCs to their original IP settings, disconnect the equipment, and store the cables.
E. Grading:

Worksheet will be graded according to the following weights:

Accomplishments
Task 1 Review Questions
Task 2 TCP/IP Settings
Task 3 Ipconfig
Task 4 Ping

Weights
10%
30%
30%
30%

Rating

Equivalent

Grade:

Worksheet No. 11
Peer to Peer Networking Using CISCO Packet Tracer
Student Name:

A. Objectives:

Date Performed:

Given the materials and equipment, upon completion of the activity, the
student must be able to:
1. Create a simple peer-to-peer using CISCO Packet Tracer
2. Simulate the ipconfig and ping command.

B. Equipment and Materials:


The following resources will be required:
PCs with CISCO Packet Tracer
C. Background
Cisco Packet Tracer is a powerful network simulation program that allows students to
experiment with network behaviour and ask what if questions. Packet Tracer provides

CEBU TECHNOLOGICAL UNIVERSITY


Corner M.J Cuenco Avenue and R. Palma Street
Cebu City, Philippines 6000
http://www.ctu.edu.ph
Email: information@ctu.edu.ph

Jose Maria S. Garcia II


Associate Professor V

47
simulation, visualization, authoring, assessment, and collaboration capabilities and
facilitates the teaching and learning of complex technology concepts.
Packet Tracer supplements physical equipment in the classroom by allowing students to
create a network with an almost unlimited number of devices, encouraging practice,
discovery, and troubleshooting. The simulation-based learning environment helps students
develop 21st century skills such as decision making, creative and critical thinking, and
problem solving.
Task 1: Design the peer-to-peer network on using the Packet Tracer and copy-paste the
below:

Task 2: Simulate the network and copy-paste the ipconfig and ping results below:
Computer Name:
IP Address:
ipconfig /all result:

CEBU TECHNOLOGICAL UNIVERSITY


Corner M.J Cuenco Avenue and R. Palma Street
Cebu City, Philippines 6000
http://www.ctu.edu.ph
Email: information@ctu.edu.ph

Computer Name
IP Address:
ipconfig /all result:

Jose Maria S. Garcia II


Associate Professor V

48

ping result:

Grading:

ping result:

Worksheet will be graded according to the following weights:

Accomplishments
Task 1 Network Design
Task 2 Network Simulation

Weights
40%
60%

Rating

Equivalent

Grade:

Worksheet No. 12
Ad hoc Networking

Student Name:

A. Objectives:

Date Performed:
Given the materials and equipment, upon completion of the activity, the
student must be able to:
1. Setup an ad hoc network.
2. Verify configurations and test for connectivity.

B. Equipment and Materials:


The following resources will be required:
CEBU TECHNOLOGICAL UNIVERSITY
Corner M.J Cuenco Avenue and R. Palma Street
Cebu City, Philippines 6000
http://www.ctu.edu.ph
Email: information@ctu.edu.ph

Jose Maria S. Garcia II


Associate Professor V

49

Two PCs with wireless capability

C. Background:
In Windows 7, under "Set up a new connection or network" you can create an ad hoc
wireless connection via the "Set up a wireless ad hoc" option.
Unfortunately Microsoft has
made it one of several
features removed in
Windows 8.1 so it is no
longer available through
the GUI (Graphical user
interface).
To share internet
connection in Windows 8
now you need to use a
third-party utility such
as Virtual Router
or Connectify
Hotspot to turn your PC
into a Wi-Fi hotspot as
introduced in this post.
For those who do not want
to install third-party software there is still a solution to set up a Wireless Ad Hoc through
the netsh command, but its a little bit tough.
In this tutorial, Ill step by step show you a valuable tip to create a wireless ad hoc
connection in Windows 8.1.

D. Accomplish the following tasks:


Task 1: Setup ad hoc network
1. Open the Command Prompt (CMD) as an Administrator.
(Press Windows key + X + A)
2. Type in the following command to ensure that your network interface
supports Hosted Network feature:
netsh wlan show drivers

CEBU TECHNOLOGICAL UNIVERSITY


Corner M.J Cuenco Avenue and R. Palma Street
Cebu City, Philippines 6000
http://www.ctu.edu.ph
Email: information@ctu.edu.ph

Jose Maria S. Garcia II


Associate Professor V

50

If Hosted network supported shows Yes, thats great.


If it says No, you can try to update your wireless driver. If the updated driver still
does not help, then you need to upgrade your hardware.
3. Now, we need to configure Ad Hoc Wireless connection. Type in CMD this
command:
netsh wlan set hostednetwork mode=allow ssid=<your desired network
name> key=<your password>

CEBU TECHNOLOGICAL UNIVERSITY


Corner M.J Cuenco Avenue and R. Palma Street
Cebu City, Philippines 6000
http://www.ctu.edu.ph
Email: information@ctu.edu.ph

Jose Maria S. Garcia II


Associate Professor V

51

4. Next, you need to start it. Type in CMD the command below:
netsh wlan start hostednetwork

Make sure your wireless network connection is enabled.

CEBU TECHNOLOGICAL UNIVERSITY


Corner M.J Cuenco Avenue and R. Palma Street
Cebu City, Philippines 6000
http://www.ctu.edu.ph
Email: information@ctu.edu.ph

Jose Maria S. Garcia II


Associate Professor V

52
5. Navigate to Control Panel > Network and Sharing Center. Click on
Change adapter settings

Right-click on Wi-Fi adapter > select Properties

Head to Sharing tab > check the box Allow other network users to connect through
this computer's Internet connection > finally click on OK button.

CEBU TECHNOLOGICAL UNIVERSITY


Corner M.J Cuenco Avenue and R. Palma Street
Cebu City, Philippines 6000
http://www.ctu.edu.ph
Email: information@ctu.edu.ph

Jose Maria S. Garcia II


Associate Professor V

53

Now you can connect your Wi-Fi devices such as iPhone, Android smartphone, iPad, laptop
to this ad hoc wireless network and enjoy internet connection sharing.

6. Setup IP address and record network configurations below:


SSID:
Computer Name

CEBU TECHNOLOGICAL UNIVERSITY


Corner M.J Cuenco Avenue and R. Palma Street
Cebu City, Philippines 6000
http://www.ctu.edu.ph
Email: information@ctu.edu.ph

IP Address

Passkey:
Subnet Mask

Class

Jose Maria S. Garcia II


Associate Professor V

54
Task 2: Network Testing.
ipconfig /all result:

ipconfig /all result:

ping result:

ping result:

D. Grading:

Worksheet will be graded according to the following weights:

Accomplishments
Task 1 Ad-hoc Network Setup
Task 2 Network Testing

CEBU TECHNOLOGICAL UNIVERSITY


Corner M.J Cuenco Avenue and R. Palma Street
Cebu City, Philippines 6000
http://www.ctu.edu.ph
Email: information@ctu.edu.ph

Weights

Rating

Equivalent

50%
50%

Jose Maria S. Garcia II


Associate Professor V

55

Grade:

Worksheet No.13
Switch Based Networking with File Sharing

Student Name:

A. Objectives:

Date Performed:

Given the materials and equipment, upon completion of the activity, the
student must be able to:
1. Implement a switch based network between 5 PCs.
2. Verify IP address information and test connectivity.
3. Configure File Sharing.

B. Equipment and Materials:


The following resources will be required:
Five workstations with an Ethernet 10/100 NIC installed
Straight through Ethernet cable for connecting the workstations
A switch at least 8 ports.
C. Background
This lab activity focuses on the ability to connect PCs to create a file sharing network using
Ethernet LAN. The workstations will be connected to each using a hub or switch. In addition
to the Layer 1 physical and Layer 2 data link connections, the computers must also be
configured with the correct IP network settings, which is Layer 3, so that they can
communicate. A basic Category 5/5e UTP straight through cable is all that is needed.
Connecting the PCs in this manner can be very useful for transferring files at high speed
and for troubleshooting interconnecting devices between PCs.
The following resources will be required:

CEBU TECHNOLOGICAL UNIVERSITY


Corner M.J Cuenco Avenue and R. Palma Street
Cebu City, Philippines 6000
http://www.ctu.edu.ph
Email: information@ctu.edu.ph

Jose Maria S. Garcia II


Associate Professor V

56

Private IPv4 address spaces


The Internet Engineering Task Force (IETF) has directed the Internet Assigned Numbers
Authority (IANA) to reserve the following IPv4 address ranges for private networks, as
published in RFC 1918[1]:
RFC1918
24-bit block
20-bit block
16-bit block

IP address range
10.0.0.0
- 10.255.255.255
172.16.0.0 - 172.31.255.255
192.168.0.0 - 192.168.255.255

number of
addresses
16,777,216
1,048,576
65,536

D. Accomplish the following tasks:


Task 1. The Network Design. Create the design using IP packet tracer and paste a
screen shot on the next page.
Switch-based Network Design:

CEBU TECHNOLOGICAL UNIVERSITY


Corner M.J Cuenco Avenue and R. Palma Street
Cebu City, Philippines 6000
http://www.ctu.edu.ph
Email: information@ctu.edu.ph

Jose Maria S. Garcia II


Associate Professor V

57

Task 2. Address Information. Make a table below to show network configurations.


Computer
Name

MAC Address

Task 3. Design Implementation.


network:

CEBU TECHNOLOGICAL UNIVERSITY


Corner M.J Cuenco Avenue and R. Palma Street
Cebu City, Philippines 6000
http://www.ctu.edu.ph
Email: information@ctu.edu.ph

IP Address

Subnet Mask
or / format

Clas
s

Write step by step procedure taken to set-up the

Jose Maria S. Garcia II


Associate Professor V

58

Task 4: Network Testing. Record sample results on the table:


ipconfig /all result:

ipconfig /all result:

ping result:

ping result:

Task 5. File Sharing


1. Configure a file sharing
2. Share the file to all PC in the network
3. Write steps taken to configure a file sharing.

CEBU TECHNOLOGICAL UNIVERSITY


Corner M.J Cuenco Avenue and R. Palma Street
Cebu City, Philippines 6000
http://www.ctu.edu.ph
Email: information@ctu.edu.ph

Jose Maria S. Garcia II


Associate Professor V

59
E. Grading:

Worksheet will be graded according to the following weights:

Accomplishments
Task 1 Network Design
Task 2 Address Information
Task 3 Design Implementation
Task 4 Network Testing
Task 5 File Sharing

Weights
15%
15%
20%
20%
30%

Rating

Equivalent

Grade:

Worksheet No.14
Switch Based Networking with Print Server
Student Name:

A. Objectives:

Date Performed:
Given the materials and equipment, upon completion of the activity, the
student must be able to:
1. Implement a switch based network between 5 PCs.
2. Verify IP address information and test connectivity.
3. Configure Print Server.

B. Equipment and Materials:


The following resources will be required:
Five workstations with an Ethernet 10/100 NIC installed
Straight through Ethernet cable for connecting the workstations
A switch at least 8 ports.
Printer
C. Background
This lab activity focuses on the ability to connect PCs to create a printer sharing network
using Ethernet LAN. The workstations will be connected to each using a hub or switch. In
addition to the Layer 1 physical and Layer 2 data link connections, the computers must also
be configured with the correct IP network settings, which is Layer 3, so that they can
communicate. A basic Category 5/5e UTP straight through cable is all that is needed.
Connecting the PCs in this manner can be very useful for transferring files at high speed
and for troubleshooting interconnecting devices between PCs.
The following resources will be required:

CEBU TECHNOLOGICAL UNIVERSITY


Corner M.J Cuenco Avenue and R. Palma Street
Cebu City, Philippines 6000
http://www.ctu.edu.ph
Email: information@ctu.edu.ph

Jose Maria S. Garcia II


Associate Professor V

60

Task 1: Implement switch-based network


1. The Network Design. Create the design using IP packet tracer and paste a screen
shot on the next page.
Switch-based Network Design:

CEBU TECHNOLOGICAL UNIVERSITY


Corner M.J Cuenco Avenue and R. Palma Street
Cebu City, Philippines 6000
http://www.ctu.edu.ph
Email: information@ctu.edu.ph

Jose Maria S. Garcia II


Associate Professor V

61

Task 2. Address Information. Make a table below to show network configurations.


Computer
Name

MAC Address

IP Address

Subnet Mask
or / format

Clas
s

Task 3. Design Implementation. Write step by step procedure taken to set-up the
network:

CEBU TECHNOLOGICAL UNIVERSITY


Corner M.J Cuenco Avenue and R. Palma Street
Cebu City, Philippines 6000
http://www.ctu.edu.ph
Email: information@ctu.edu.ph

Jose Maria S. Garcia II


Associate Professor V

62

Task 4: Network Testing. Record sample results on the table:


ipconfig /all result:

ipconfig /all result:

ping result:

ping result:

Task 5. Printer Sharing


1. Configure a Print Server
2. Share the network printer to all PCs.
3. Write steps taken to configure a print server.

CEBU TECHNOLOGICAL UNIVERSITY


Corner M.J Cuenco Avenue and R. Palma Street
Cebu City, Philippines 6000
http://www.ctu.edu.ph
Email: information@ctu.edu.ph

Jose Maria S. Garcia II


Associate Professor V

63

E. Grading:

Worksheet will be graded according to the following weights:

Accomplishments
Task 1 Network Design
Task 2 Address Information
Task 3 Design Implementation
Task 4 Network Testing
Task 5 Printer Sharing

Weights
15%
15%
20%
20%
30%

Rating

Equivalent

Grade:

Worksheet No. 15
Router-Based Network
Student Name:

A. Objectives:

Date Performed:

Given the materials and equipment, upon completion of the activity, the
student must be able to:
1. Implement a router based network.
2. Verify IP address information and test connectivity.
3. Configure a network application.

B. Equipment and Materials:


The following resources will be required:
PCs or Laptops with wireless capable
A printer, video cam, etc.
Router and switch
UTP cables
C. Background:
Building wireless network have variety of choices including the wireless routers, the wireless
access points, and the wireless networking adapters. Hence, building wireless network
allows you select the best choices according to your need.

CEBU TECHNOLOGICAL UNIVERSITY


Corner M.J Cuenco Avenue and R. Palma Street
Cebu City, Philippines 6000
http://www.ctu.edu.ph
Email: information@ctu.edu.ph

Jose Maria S. Garcia II


Associate Professor V

64

Typically, the main reason you build a wireless network is

to share the Internet connection,

share the printer,

the files,

play on line games wirelessly

etc

Not just that, if you have a Wi-Fi phone, you can make some internet phone calls (aka
Skype) wirelessly without you need to turn on the computer. With a router you can actualize
them easily and securely. Building router-based network, firstly you need to know what you
need. Whether you build a wireless network just to share the Internet only, or you need to
streams High definition video, or you need to extend the network wirelessly, or you need to
extend the network to the next building, or else. By knowing what you need, you can choose
the best products for your requirements.
The wireless router lets you access the Internet via a wireless connection or through one of
its four switched ports. You can also use the Router to share resources, such as computers.
A variety of security features help to protect your data and your privacy while online. Security
features include WPA2 security, a Stateful Packet Inspection (SPI) firewall and NAT
technology. Configuring the Router is easy using the provided browser-based utility. For
more details see the attached pdf file.

CEBU TECHNOLOGICAL UNIVERSITY


Corner M.J Cuenco Avenue and R. Palma Street
Cebu City, Philippines 6000
http://www.ctu.edu.ph
Email: information@ctu.edu.ph

Jose Maria S. Garcia II


Associate Professor V

65

D. Accomplish the following tasks:


Task 1: Implement the router-based network:
The Network Design. Create the design using IP packet tracer and paste a
screen shot using the following conditions:

PCs connected to one switch


PCs wirelessly connected to the router
Router is connected to the switch
Printer is connected to one PC

Task 2. IP Address Information. Make a table to show network configurations.


Task 3. Design Implementation. Write step by step procedure taken to set-up the
network.

CEBU TECHNOLOGICAL UNIVERSITY


Corner M.J Cuenco Avenue and R. Palma Street
Cebu City, Philippines 6000
http://www.ctu.edu.ph
Email: information@ctu.edu.ph

Jose Maria S. Garcia II


Associate Professor V

66
Task 4: Network Testing. Write procedure taken to check the network configurations
and testing the connections.
Task 5: Network Applications. Demonstrate any SOHO application you desire.
For example:
1.
2.
3.
4.
5.

E. Grading:

Internet Cafe with Attendants Sofware


Computer Laboratory with Management Software
Video Conferencing
Multiplayer Games
Internet LAN and Wifi Connections

Worksheet will be graded according to the following weights:

Accomplishments
Task 1 Network Design
Task 2 Address Information
Task 3 Design Implementation
Task 4 Network Testing
Task 5 Printer Sharing

Weights
15%
15%
20%
20%
30%

Rating

Equivalent

Grade:

SUMMARY OF GRADES
Name
:

Course, Yr. & Sec.

A. Performance (60%)
Activity
No.

Date
Accomplishe
d

Title

Preparation and Presentation of Assigned Topic

RJ 45 Crimping Tool

Cable Testing and Wire Mapping

Digital Encoding Scheme

Data Codes

Data and Signal Conversion

EIA/TIA 568A and 568B Standards

Straight Through Cable Construction

Crossover Cable Construction

10
11

Rating

Peer-to-peer Networking
Peer-to-peer Networking Using CISCO Packet
Tracer

CEBU TECHNOLOGICAL UNIVERSITY


Corner M.J Cuenco Avenue and R. Palma Street
Cebu City, Philippines 6000
http://www.ctu.edu.ph
Email: information@ctu.edu.ph

Jose Maria S. Garcia II


Associate Professor V

67

12

Ad hoc Networking

13

Switch Based Networking with File Sharing

14

Switch Based Networking with Print Server

15

Router Based Network

B. Quizzes (25%)
Topic No.
1

Date Taken

Title
Introduction to Computer Networks and
Data Communications
Fundamentals of Data and Signals

Conducted and Wireless Media

Making Connections

5
6

Making Connections Efficient: Multiplexing


and Compression
Errors, Error Detection, and Error Control

Local Area Networks: Part 1

Local Area Networks: Part 2

9
10

Introduction to Metropolitan Area Networks


and Wide Area Networks
The Internet

11

Voice and Data Delivery Networks

12

Network Security

13

Network Design and Management

Rating

C. Periodic Examination (15%)

CEBU TECHNOLOGICAL UNIVERSITY


Corner M.J Cuenco Avenue and R. Palma Street
Cebu City, Philippines 6000
http://www.ctu.edu.ph
Email: information@ctu.edu.ph

Jose Maria S. Garcia II


Associate Professor V

68
Exam
Type
Midterm

Date Taken

Topics Covered

Rating

Final Term

D. Final Grade
Term
Mid

60%

25%

15%

Grade

7 pt.

Final

Remarks

Final

REFERENCES
Books:
Adsuara, Marvin J., Computer Network Fundamentals, Mutya Publishing House, 2000
Buchanan, William, Distributed Systems and Networks, McGraw Hill Publishing Company,
2000
Cisco Networking Academy Program, CCNA 1 and 2 Companion Guide, Cisco Press
Forouzan, Behrouz A., Data Communications and Networking, McGraw-Hill Companies
Inc., 4th Ed., 2007.
Miller, Michael A., Data and Network Communication
Stallings, William, Data and Computer Communications, Prentice Hall, 1997
Tomasi, Wayne, Data Communications and Networking, Pearson Prentice Hall, 2005
White, Curt M. Data Communications and Computer Networks: A Business Users
Approach 7TH Ed., Course Technology-Thompson Learning, 2001

eBooks:
White, Curt M. Data Communications and Computer Networks: A Business Users
Approach 6th Ed., Course Technology-Thompson Learning, 2001

CEBU TECHNOLOGICAL UNIVERSITY


Corner M.J Cuenco Avenue and R. Palma Street
Cebu City, Philippines 6000
http://www.ctu.edu.ph
Email: information@ctu.edu.ph

Jose Maria S. Garcia II


Associate Professor V

69
PowerPoint Presentations:
ppt file by White, C. (Chapter 1 13)

ANNEXES

CEBU TECHNOLOGICAL UNIVERSITY


Corner M.J Cuenco Avenue and R. Palma Street
Cebu City, Philippines 6000
http://www.ctu.edu.ph
Email: information@ctu.edu.ph

Jose Maria S. Garcia II


Associate Professor V

70

CEBU TECHNOLOGICAL UNIVERSITY


Corner M.J Cuenco Avenue and R. Palma Street
Cebu City, Philippines 6000
http://www.ctu.edu.ph
Email: information@ctu.edu.ph

Jose Maria S. Garcia II


Associate Professor V

71

ANNEX A

RECOMMENDATION OF THE INSTRUCTIONAL


MANUAL COMMITTEE
November 4, 2015
Per thorough review of the Instructional Manual/Module entitled Shop
Module for ICTP 226-Data Communication and Network Management
by Jose Maria S.

Garcia II which is intended for use in the College of

Technology, the committee has come up with the following findings:


1. That the Instructional Manual/Module is comprehensive enough to cover
up the skills and information needed of the course Bachelor of Science in
Information and Communications Technology;
2. That the Instructional Manual/Module as intended for ICTP 226 - Data
Communication and Network Management in the College of Technology is
designed in such that students will be thoroughly guided and evaluated;
and
3. That the Instructional Manual/Module is recommended for use in teaching
ICTP 226-Data Communication and Network Management in the College of
Technology.
College of Technology Instructional Materials Committee:
MARIE JOY B. ALIT, MSIT
Member

JOEBERT F. MONACILLO, MPA


Member

MARIA GYPSY A. BOHOL,


Ph.D.
Member

ERNESTO L. VENCI, Ph.D.


Member

JOSE MARIA S. GARCIA II, Ph.D.


Chairman
CEBU TECHNOLOGICAL UNIVERSITY
Corner M.J Cuenco Avenue and R. Palma Street
Cebu City, Philippines 6000
http://www.ctu.edu.ph
Email: information@ctu.edu.ph

Jose Maria S. Garcia II


Associate Professor V

72

ANNEX B

CERTIFICATE OF INSTRUCTIONAL MATERIAL UTILIZATION

This is to certify that the Instructional Manual/Module entitled Shop

Module for ICTP 226-Data Communication and Network Management,


conceptualized and compiled by Jose Maria S. Garcia II will be utilized for the
instructional function of the subject for the undergraduate program of the College of
Technology of Cebu Technological University.

This is issued for the purpose of giving due credit to the author of this
instructional material.

Issued on the 9th day of November 2015.

MARDE T. PONCE, Ph.D.


Dean, College of Technology

CEBU TECHNOLOGICAL UNIVERSITY


Corner M.J Cuenco Avenue and R. Palma Street
Cebu City, Philippines 6000
http://www.ctu.edu.ph
Email: information@ctu.edu.ph

Jose Maria S. Garcia II


Associate Professor V

You might also like