Republic of the Philippines
Department of Education
Regional Office IX, Zamboanga Peninsula
10
9/11 Zest for Progress
Z Peal of artnership
TLE
Computer Systems Servicing
Quarter 4 - Module 3
Tasks and Procedures in
Maintaining Network Systems
Name of Learner: ________________________
Grade & Section: ________________________
Name of School : ________________________
1
TLE-ICT Computer Systems Servicing
Alternative Delivery Mode
Quarter 4 – Module 3 – Tasks and Procedures in Maintaining Network Systems
First Edition, 2020
Republic Act 8293, section 176 states that: No copyright shall subsist
in any work of the Government of the Philippines. However, prior approval of
the government agency or office wherein the work is created shall be
necessary for exploitation of such work for profit. Such agency or office may,
among other things, impose as a condition the payment of royalties.
Borrowed materials (i.e., songs, stories, poems, pictures, photos, brand
names, trademarks, etc.) included in this module are owned by their
respective copyright holders. Every effort has been exerted to locate and seek
permission to use these materials from their respective copyright owners. The
publisher and authors do not represent nor claim ownership over them.
Published by the Department of Education
Secretary: Leonor Magtolis Briones
Undersecretary: Diosdado M. San Antonio
Development Team of the Module
Writer: Hazel P. Bacasmo
Reviewer’s Name: Evelyn C. Labad EdD, Nilda Y. Galaura EdD
Editor: James L. Colaljo MAEM
Illustrators: Vincent Hersel E. Murcia
Joevic R. Pasilan
Layout Artists: Vincent Hersel E. Murcia
Joevic R. Pasilan
Management Team: SDS: Ma. Liza R. Tabilon EdD, CESO V
ASDS: Judith V. Romaguera EdD
OIC-ASDS: Ma. Judelyn J. Ramos EdD
OIC-ASDS: Armando P. Gumapon EdD
CID Chief: Lilia E. Abello EdD
LR : Evelyn C. Labad EdD
PSDS: Ma. Theresa M. Imperial EdD
Principal: Nilda Y. Galaura EdD
Printed in the Philippines by ________________________________
Department of Education – Region IX
Office Address: ____________________________________________
____________________________________________
Telefax: ____________________________________________
E-mail Address: ____________________________________________
2
TLE 10 – Computer Systems Servicing
Quarter 4, Summative Test 1
Name: __________________________________________ Grade & Section: __________________
Test I – True or False
Directions: Read each statement below carefully. Write True on your paper if the statement is
TRUE and False if it is FALSE. Write your answers on another sheet of paper.
______1. First aid kit should be available in case of fire or injury.
______2. Never touch the ends of any type of cable to bare skin.
______3. To avoid personal injury or equipment damage, disconnect the attached power cords.
______4. Connect all power when working near power supplies.
______5. Follow fire safety guidelines to protect lives, structures, and equipment.
______6. To avoid an electrical shock, turn off computer before beginning a repair.
______7. When handling cable, always wear eye protection.
______8. Maintaining computer system saves you from hassles.
______9. It is essential to make maintenance plans in maintaining computer system.
______10. Follow the basic safety guidelines to prevent electrical shock.
Test II - Multiple Choice
Direction: Write the letter that corresponds your answer on the space provided before the
number.
_______ 1. Check the firmware on your Switches and Firewall, raid controller and check
if the date and time are still set correctly.
a. Annually b. Daily c. Every 6 Months d. Quarterly
_______ 2. Update network diagrams.
a. Annually b. Daily c. Every 6 Months d. Quarterly
_______ 3. Physical check-up of equipment.
a. Annually b. Daily c. Every 6 Months d. Quarterly
_______ 4. Check the warranties and support contracts for the business critical hardware
and software.
a. Annually b. Daily c. Every 6 Months d. Quarterly
_______ 5. Check and delete temporary files.
a. Annually b. Daily c. Every 6 Months d. Monthly
_______ 6. Audit and reset service account passwords.
a. Annually b. Daily c. Every 6 Months d. Quarterly
1
_______ 7. Check the backups and replications.
a. Annually b. Daily c. Every 6 Months d. Quarterly
_______ 8. Check backup retention.
a. Annually b. Daily c. Every 6 Months d. Quarterly
_______ 9. Check your UPS.
a. Annually b. Daily c. Every 6 Months d. Monthly
_______ 10. Test DR procedures and documentation.
a. Annually b. Daily c. Every 6 Months d. Quarterly
Good Luck!!!
Sir Lance…..
TLE 10 – Computer Systems Servicing
Quarter 4, Performance Task 1
Instruction: Do this performance task in a long size bond paper. Do not forget to write you name, Year
and Section, TLE Specialization, Quarter number and Performance Task number.
1. Enumerate the functions and uses of Personal Protective Equipment.
2. Enumerate the information needed for network documentation.
RUBRICS IN ASSESSING YOUR OUTPUT
Performace Level (Points)
Criteria
5 points 3 points 1 point
Less than 9
Enumeration of the 9 personal protective Less than 5 personal
personal protective
personal protective equipment functions protective equipment
equipment functions
equipment function and and uses of were functions and uses
and uses of were
uses enumerated of were enumerated
enumerated
Less than 8 Less than 5
8 information
Enumeration of the information needed information needed
needed for network
information needed for for network for network
documentation were
network documentation documentation were documentation were
enumerated
enumerated enumerated
Readable but
Output is very neat Readable but has
Neatness of work contains some
and readable many erasures
erasures
Output submitted on Output submitted
Output submitted
Timeliness or before June 11, beyond June 18,
after June 11, 2021
2021 2021
2
What I Know
Before starting with this module, let us measure what you already know about
Tasks and Procedures in Maintaining Network Systems.
Instruction: Read the statements carefully. Write the letter that corresponds your
answer on the space provided before the number.
_______ 1. It is an important component in managing your computer network.
a. Network Maintenance b. Documentation
c. Network Security d. Proactive Maintenance
_______ 2. What is referred to an item that is taken in different forms by different
organizations?
a. Network Maintenance b. Documentation
c. Network Security d. Proactive Maintenance
_______ 3. What is referred to an integral component of network operation and
maintenance?
a. Network Maintenance b. Documentation
c. Network Security d. Proactive Maintenance
_______ 4. What is referred to one of the core facilitators of an effective network
maintenance solution or strategy?
a. Network Maintenance b. Documentation
c. Network Security d. Proactive Maintenance
_______ 5. What is used to define maintenance tasks required on the network,
prioritized and organize those tasks?
a. Network Configuration b. Network Maintenance
c. Network Monitoring d. Network Troubleshooting
_______ 6. It requires an organized and logical approach when handling computer and
components.
a. Configuration b. Maintenance c. Monitoring d. Troubleshooting
_______ 7. It is the copy of data on a computer or hard drive that is saved to an
external media.
a. Copy b. Store c. Backup d. Save
_______ 8. Which of the following statements are examples of network maintenance
task?
a. Documenting the network
b. Installing, configuring hardware and software
c. Troubleshooting network problems
d. All of the above mention
_______ 9. Which of the following procedures are commonly performed for network
system maintenance?
a. Configuration Changes b. Replacement of hardware
c. Sofware Updates d. All of the above mention
_______ 10. Which of the following items are examples of an external media?
a. CD/DVD b. External Drive
c. Flash Drive d. All of the above mention
1
What’s New
Lesson
1 Tasks in Maintaining Network
Maintaining network system in other words network maintenance is an
important component in managing your computer network. It is all about the tasks
and systems in place to monitor updates and run the organization's computer
network before the problems arise. It helps the computers to be in good condition
and smoothly running. It is not just about repair and upgrading computer network.
It also includes corrective and preventive measures, which allow boost of network
performance.
The following are some of the network maintenance tasks:
1. Documenting the network
2. Installing, configuring hardware and software
3. Troubleshooting network problems
4. Monitoring and improving network performance
5. Securing the network from both internal and external threats
6. Planning for future network growth
Documenting the Network and Maintaining Network Documentation
As discussed in the previous module, documenting network maintenance is a
critical component of network maintenance along with troubleshooting and other
support. Documentation is taken in different forms by different organizations. This
is recording everything within the network, issues that arise and how it was being
solved.
Securing the Network from Both Internal and External Threats
Network security is an integral component of network operation and
maintenance. It is also very important to consider in dealing with both internal and
external threats. It is preventive in structure. Yet, most organizations have a
dedicated security team, monitoring and using structured maintenance approach to
discover vulnerabilities or potential security threats. This will be discussed in a
separate lesson together with monitoring network.
Monitoring, Tuning and Optimizing the Network
This is also called proactive monitoring, which is one of the core facilitators of
an effective network maintenance solution or strategy. It allows potential problems
to be detected and remedied before they cause an outage or affect operation. It
includes the following activities:
1. Verify the performance of the network and all internet work devices in the
network.
2. Baseline the performance of the network itself.
3. Understand the amount of direction and traffic flows in the network.
4. Identify and troubleshoot potential network issues.
2
Planning for Network Upgrades, Expansions, or Enhancements
Using network monitoring, you can plan for possible network upgrades or
expansions. It is used to define the maintenance tasks required on the network,
prioritize and organize those tasks.
Scheduling Backups and Restoring Services or the Network from Backups
It is important to have up-to-date backups of devices to help the network easily
recover from serious or critical hardware or software failures, or even data
(configuration) loss.
Troubleshooting Network Problems
Although troubleshooting varies and can be modified depending on the case
and experience, it requires an organized and logical approach when handling
computers and components. Doing so will ensure that the process is in systematic
order. Make sure to ask the right questions, test the right hardware, and examine
the correct data to detect the issues and resolve them.
Troubleshooting is honed over time. Every time an issue is resolved, skills on
troubleshooting are also improved. Through troubleshooting experience, one will be
able to know the steps needed to resolve an issue quickly. The following is a simple
process guideline which can also be modified depending on the situation:
1. Explain the purpose of data protection.
2. Identify the root of the problem.
3. List probable causes of the issue.
4. Test the theory to determine the exact cause.
5. Plan the course of action to resolve the issue.
6. Implement the solution.
7. Check the system functionality.
8. If applicable, implement preventive measures.
9. Create documentation of findings, action, and outcomes.
What’s More
Directions: Complete the paragraph below by filling with the missing words. By
choosing from the words displayed below. Write your answers on the
activity notebook.
Maintaining network is (1)________ in keeping your network up and running
smoothly. This includes a number of duties such as (2)_________ and configuring
hardware and software, (3)_________ network problems, monitoring and (4)_________
network performance, planning for future work (5)_________ and (6)_________ the
network from inside and outside threats. Basically, these procedures can be
categorized into two: (7)_________ and (8)_________ maintenance. Network
maintenance is also done to ensure network integrity and (9)_________ to the
intended users.
corrective troubleshooting installing
availability important preventive
improving securing growth
3
Lesson
2 Routine Network Procedures
Common Routine Procedures in Maintaining Network Systems
This lesson will discuss about routine maintenance procedure. Whatever
network maintenance model you decide to use, there are always several routine
maintenance tasks that have listed procedures. Below are some procedures
commonly performed for network system maintenance.
Procedures in Maintaining Network Systems
1. Configuration Changes
Sometimes changes to the network must be made to allow access for guest
users and normal users moving from one office to another. Changes of the users also
mean facilitating changes in the network as well. Each time configuration on devices
change, they should not only be documented, but should be saved both on the device
and to an alternate backup location, e.g. an FTP or TFTP server (if one is available).
2. Replacement of Hardware
Older hardware must be replaced with more modern equipment and it is also
possible that the production hardware fails so, this has to be replaced immediately.
3. Backups
To recover from network problems such as failing switches or routers, make
sure that you have recent backups of configurations. Normally, the scheduled
backups are used so, you will save the running-configuration each day, week, month
or whatever you like.
4. Software Updates
Keep the network devices and operating systems up to date. Bugs are fixed
but make sure you do not have devices that are running older software that has
security vulnerabilities.
5. Monitoring
Collect and understand traffic statistics and bandwidth utilization so that you
can spot network problems and can plan for future network growth.
Create System State Backup in Windows Server 2008 (R2)
Backup is the copy of data on a computer or hard drive that is saved to an
external media such as a DVD, CD, or flash drive. In an organization, back-ups are
routinely done - either daily, weekly, or on a monthly basis. This is to ensure that
the organization’s data are protected and are readily available. If unsure whether a
backup has been done, do not conduct troubleshooting activities on a client’s
computer. Make sure to verify the following with the customer first:
➢ Date of last backup
➢ Content of backup
➢ Data integrity of the backup - Data integrity is the maintenance of the
accuracy and consistency of the data. It is making sure that the data
can be properly retrieved or restored in its optimum quality.
4
➢ Availability of backup media for data restoration
Step 1. Launch Windows Server Backup using All Programs menu. Click either
Backup Schedule or Backup Once, depending on the case. Use the Backup
Schedule as an example.
Step 2. On the Select Backup Configuration, step click Custom and proceed.
Step 3. Click Add Items and select System State in the new window. You can also
include additional files or folders in the same backup.
Step 4. The Specify Backup Time step allows you to configure the backup schedule.
Create a System State backup every day to minimize RPO - this backup
type will not last.
5
Step 5. Choose the backup destination on the next step - either use the entire hard
drive, dedicated volume, or network share. If choosing the network share,
you need to create a few backup jobs to keep the last N backups, since
Windows Server Backup will overwrite backup files every time.
Use the local volume as “the first line of defense”, since you need to recover
the system when the network is not available - for example, if faced with NIC driver-
related issues.
6
Step 6. Add the desired volume on the next step and click Finish. The backup is now
configured.
Note:
You cannot store a backup in the local folder of your choice. The backup tool
only uses the whole drive, dedicated volume, or network share.
What’s More
Activity 2
Directions: Enumerate some of the network maintenance task
1. _____________________________________________________
2. _____________________________________________________
3. _____________________________________________________
4. _____________________________________________________
5. _____________________________________________________
6. _____________________________________________________
7
Assessment
Multiple Choice
Instruction: Read the statements carefully. Write the letter that corresponds your
answer on the space provided before the number.
_______ 1. It is an important component in managing your computer network.
a. Network Maintenance b. Documentation
c. Network Security d. Proactive Maintenance
_______ 2. What is referred to an item that is taken in different forms by different
organizations?
a. Network Maintenance b. Documentation
c. Network Security d. Proactive Maintenance
_______ 3. What is referred to an integral component of network operation and
maintenance?
a. Network Maintenance b. Documentation
c. Network Security d. Proactive Maintenance
_______ 4. What is referred to one of the core facilitators of an effective network
maintenance solution or strategy?
a. Network Maintenance b. Documentation
c. Network Security d. Proactive Maintenance
_______ 5. What is used to define maintenance tasks required on the network,
prioritized and organize those tasks?
a. Network Configuration b. Network Maintenance
c. Network Monitoring d. Network Troubleshooting
_______ 6. It requires an organized and logical approach when handling computer and
components.
a. Configuration b. Maintenance c. Monitoring d. Troubleshooting
_______ 7. It is the copy of data on a computer or hard drive that is saved to an
external media.
a. Copy b. Store c. Backup d. Save
_______ 8. Which of the following statements are examples of network maintenance
task?
a. Documenting the network
b. Installing, configuring hardware and software
c. Troubleshooting network problems
d. All of the above mention
_______ 9. Which of the following procedures are commonly performed for network
system maintenance?
b. Configuration Changes b. Replacement of hardware
d. Sofware Updates d. All of the above mention
_______ 10. Which of the following items are examples of an external media?
b. CD/DVD b. External Drive
c. Flash Drive d. All of the above mention
8
9
Assessment What’s More What I know
1. A 1. Important 1. A
2. B 2. Installing 2. B
3. C 3. Troubleshooting 3. C
4. D 4. Improving 4. D
5. C 5. Growth 5. C
6. D 6. Securing 6. D
7. C 7. Corrective 7. C
8. D 8. Preventive 8. D
9. D 9. Availability 9. D
10.D 10.D
Answer Key
Region IX: Zamboanga Peninsula Hymn – Our Eden Land
Here the trees and flowers bloom Gallant men And Ladies fair Cebuanos, Ilocanos, Subanons, Boholanos, Ilongos,
Here the breezes gently Blow, Linger with love and care All of them are proud and true
Here the birds sing Merrily, Golden beams of sunrise and sunset Region IX our Eden Land
The liberty forever Stays, Are visions you’ll never forget
Oh! That’s Region IX Region IX
Our..
Here the Badjaos roam the seas Hardworking people Abound, Eden...
Here the Samals live in peace Every valleys and Dale Land...
Here the Tausogs thrive so free Zamboangueños, Tagalogs, Bicolanos,
With the Yakans in unity
My Final Farewell
Farewell, dear Fatherland, clime of the sun caress'd Let the sun draw the vapors up to the sky,
Pearl of the Orient seas, our Eden lost!, And heavenward in purity bear my tardy protest
Gladly now I go to give thee this faded life's best, Let some kind soul o 'er my untimely fate sigh,
And were it brighter, fresher, or more blest And in the still evening a prayer be lifted on high
Still would I give it thee, nor count the cost. From thee, 0 my country, that in God I may rest.
On the field of battle, 'mid the frenzy of fight, Pray for all those that hapless have died,
Others have given their lives, without doubt or heed; For all who have suffered the unmeasur'd pain;
The place matters not-cypress or laurel or lily white, For our mothers that bitterly their woes have cried,
Scaffold or open plain, combat or martyrdom's plight, For widows and orphans, for captives by torture tried
T is ever the same, to serve our home and country's need. And then for thyself that redemption thou mayst gain
I die just when I see the dawn break, And whe n the d ark nig ht wr ap s the gr ave y ar d ar ound
Through the gloom of night, to herald the day; With only the d e ad in the ir v ig il to s e e
And if color is lacking my blood thou shalt take, B re ak not m y re p os e or the m ys tery p r of ound
Pour'd out at need for thy dear sake And pe rc hanc e thou m ays t he ar a s ad hym n re s ound
To dye with its crimson the waking ray. ' T is I, O my c ountry, r aising a s ong unto the e .
My dreams, when life first opened to me, And ev e n my g rav e is r em em be re d no m ore
My dreams, when the hopes of youth beat high, Unm ark 'd by ne ve r a c r os s nor a stone
Were to see thy lov'd face, O gem of the Orient sea Le t the plow s we ep thr oug h it, the sp ade tur n it o' er
From gloom and grief, from care and sorrow free; That m y as hes m ay c arp e t e ar thly f loor,
No blush on thy brow, no tear in thine eye. B ef ore into nothing nes s at las t the y are b lown.
Dream of my life, my living and burning desire, The n will ob liv ion br ing to me no c ar e
All hail ! cries the soul that is now to take flight; As ove r thy v ale s and p lains I s we e p;
All hail ! And sweet it is for thee to expire ; Thr ob b ing and c le anse d in thy s p ace and air
To die for thy sake, that thou mayst aspire; With c olor and lig ht, with s ong and lame nt I f are ,
And sleep in thy bosom eternity's long night. Ev e r re p e ating the f aith that I k ee p .
If over my grave some day thou seest grow, M y F athe rland ad or' d, that s ad ne ss to my sor r ow le nd s
In the grassy sod, a humble flower, B e lov ed F ilip inas, he ar now m y las t g ood -b y!
Draw it to thy lips and kiss my soul so, I g ive the e all: p are nts and k indr ed and f r iend s
While I may feel on my brow in the cold tomb below F or I g o wher e no s lav e be f or e the op pr es s or b e nds ,
The touch of thy tenderness, thy breath's warm power. Whe r e f aith c an ne ve r kill, and God r e ig ns e ' er on hig h!
Let the moon beam over me soft and serene, F are well to y ou all, f r om m y s oul tor n away,
Let the dawn shed over me its radiant flashes, F rie nds of m y c hild hood in the home disp oss e ss ed !
Let the wind with sad lament over me keen ; Giv e thanks that I re s t fr om the we ar is om e d ay !
And if on my cross a bird should be seen, F are well to the e, too, s we e t f rie nd that lig hte ne d m y way;
Let it trill there its hymn of peace to my ashes. B e lov ed cre ature s all, f are well! I n d e ath ther e is re s t!
I Am a Filipino, by Carlos P. Romulo
I am a Filipino–inheritor of a glorious past, hostage to the uncertain I am a Filipino, child of the marriage of the East and the West. The
future. As such I must prove equal to a two-fold task–the task of East, with its languor and mysticism, its passivity and endurance,
meeting my responsibility to the past, and the task of performing my was my mother, and my sire was the West that came thundering
obligation to the future. across the seas with the Cross and Sword and the Machine. I am of
I sprung from a hardy race, child many generations removed of the East, an eager participant in its spirit, and in its struggles for
ancient Malayan pioneers. Across the centuries the memory comes liberation from the imperialist yoke. But I also know that the East
rushing back to me: of brown-skinned men putting out to sea in must awake from its centuried sleep, shake off the lethargy that has
ships that were as frail as their hearts were stout. Over the sea I see bound his limbs, and start moving where destiny awaits.
them come, borne upon the billowing wave and the whistling wind, I am a Filipino, and this is my inheritance. What pledge shall I give
carried upon the mighty swell of hope–hope in the free abundance of that I may prove worthy of my inheritance? I shall give the pledge that
new land that was to be their home and their children’s forever. has come ringing down the corridors of the centuries, and it shall be
I am a Filipino. In my blood runs the immortal seed of heroes–seed compounded of the joyous cries of my Malayan forebears when first
that flowered down the centuries in deeds of courage and defiance. they saw the contours of this land loom before their eyes, of the battle
In my veins yet pulses the same hot blood that sent Lapulapu to cries that have resounded in every field of combat from Mactan to
battle against the first invader of this land, that nerved Lakandula in Tirad Pass, of the voices of my people when they sing:
the combat against the alien foe, that drove Diego Silang and “I am a Filipino born to freedom, and I shall not rest until freedom
Dagohoy into rebellion against the foreign oppressor. shall have been added unto my inheritance—for myself and my
The seed I bear within me is an immortal seed. It is the mark of my children and my children’s children—forever.”
manhood, the symbol of dignity as a human being. Like the seeds
that were once buried in the tomb of Tutankhamen many thousand
years ago, it shall grow and flower and bear fruit again. It is the
insignia of my race, and my generation is but a stage in the
unending search of my people for freedom and happiness. 10