02 instructor's guide

35
J0065 Networking Fundamentals *Property of STI Page 1 of 35 TOPIC TITLE: NETWORKING FUNDAMENTALS SPECIFIC OBJECTIVES: At the end of the topic session, the students should be able to: 1. discuss how computer networks evolved and outline the significant changes of computer networks over the years, 2. identify the different network devices, 3. explain network topology, 4. explain the different types of network topologies, 5. explain standard, 6. identify the global and regional standards organizations on telecommunications, 7. identify the organizations and forums that oversees data communication standards, 8. explain the different classifications of a network, 9. explain what a network architecture is, 10. explain the different types of network architecture, 11. identify the advantages and disadvantages of the different types of network architecture, 12. explain the role of the OSI model in a data transmission network, 13. explain OSI Reference Model, and 14. explain the function of OSI layers. MATERIALS/EQUIPMENT: o Computer with speakers o LCD/OHP projector o File/s (02 Networking Fundamentals) 02 LCD Slides 1 02 OHP Slides 1 02 LCD Slide Handout 1 02 OHP Slide Handout 1 02 Laboratory Exercise 1 02 Laboratory Exercise 1 Answer Key 02 Laboratory Exercise 2 02 Quiz 1 02 Quiz 1 Answer Key o Software requirements MS PowerPoint TOPIC PREPARATION: o Prepare handouts needed for the topic presentation and have them photocopied.

Upload: ahr

Post on 02-Feb-2016

23 views

Category:

Documents


1 download

DESCRIPTION

neunets

TRANSCRIPT

Page 1: 02 Instructor's Guide

J0065

Networking Fundamentals *Property of STI Page 1 of 35

TOPIC TITLE: NETWORKING FUNDAMENTALS

SPECIFIC OBJECTIVES:

At the end of the topic session, the students should be able to:

1. discuss how computer networks evolved and outline the significant changes of computer networks over the years,

2. identify the different network devices, 3. explain network topology, 4. explain the different types of network topologies, 5. explain standard, 6. identify the global and regional standards organizations on

telecommunications, 7. identify the organizations and forums that oversees data

communication standards, 8. explain the different classifications of a network, 9. explain what a network architecture is, 10. explain the different types of network architecture, 11. identify the advantages and disadvantages of the different types

of network architecture, 12. explain the role of the OSI model in a data transmission

network, 13. explain OSI Reference Model, and 14. explain the function of OSI layers.

MATERIALS/EQUIPMENT:

o Computer with speakers o LCD/OHP projector o File/s (02 Networking Fundamentals)

• 02 LCD Slides 1 • 02 OHP Slides 1 • 02 LCD Slide Handout 1 • 02 OHP Slide Handout 1 • 02 Laboratory Exercise 1 • 02 Laboratory Exercise 1 Answer Key • 02 Laboratory Exercise 2 • 02 Quiz 1 • 02 Quiz 1 Answer Key

o Software requirements • MS PowerPoint

TOPIC PREPARATION:

o Prepare handouts needed for the topic presentation and have them photocopied.

Page 2: 02 Instructor's Guide

J0065

Networking Fundamentals *Property of STI Page 2 of 35

o Set up computer and LCD/OHP projector. This will be used to show slides presentation in class.

o It is imperative for the instructor to study the lecture materials and read other materials related to the topic to be able to fuse different sorts of teaching strategies depending on the needs of the students. Note: Instructor’s input as academy expert and/or industry professional will be the best foundation in teaching the course effectively.

o Anticipate possible questions that students might raise during the discussion.

PRESENTATION OVERVIEW:

A. Introduction 5 min B. Instructional Input

Evolution: Brief History of Computer Networking 45 min a. Discuss how computer networks evolved Network Connectivity Devices 50 min a. Define network devices b. Discuss NIC c. Discuss repeater d. Discuss hub e. Discuss bridge f. Discuss switch g. Discuss router h. Discuss cloud Network Topology 50 min a. Discuss network topology b. Discuss the different types of network topology c. Discuss the advantages and disadvantages of the different

types of network topology Standardization and its Benefits 50 min a. Identify the global and regional standards organizations on

telecommunications, b. Identify the organizations and forums that oversees data

communication standards, Network Classifications and Architecture 50 min a. Discuss the different classifications of network b. Discuss what a network architecture is c. Discuss the different types of network architecture d. Discuss the advantages and disadvantages of the different

types of network architecture The OSI – 7 Layer Reference Model 50 min a. Discuss the role of the OSI model in a data transmission

network b. Discuss what an OSI Reference Model is c. Discuss the function of each layer of the OSI model

Page 3: 02 Instructor's Guide

J0065

Networking Fundamentals *Property of STI Page 3 of 35

C. Generalization 60 min D. Application 360 min

Total duration 720 min

TOPIC PRESENTATION:

A. Introduction

1. Start the session with a recap of what the students have learned from the previous topic discussed.

B. Instructional Input

Evolution: Brief History of Computer Networking

1. Show Slide 1 of 02 LCD Slides 1. Present the topic coverage to the class.

2. Show Slides 2 to 6. Discuss how computer networks evolved.

The earliest phase of electronic networking for the purpose of message transfer was the local telephone exchange, which has evolved to become a carrier network providing transport services for both voice and data traffic on a worldwide scale.

Data networks designed exclusively for computing environments followed the introduction of business computing in the 1950s. Prior to that time, computers were used mostly for research and national defense purposes.

Milestones in the history of data networking include:

• 1960s – The first large-scale commercial computer network is created for an airline reservation application. Also, the Advanced Research Projects Agency Network (ARPANET) successfully links computers developed by different manufacturers, forming what is later described as the origin of today’s Internet.

Slide 2

*Property of STI J0065

Evolution: Brief History of Computer Networking

Milestones in the history of data networking

1960s

The first large-scale commercial computer network is created for anairline reservation application

The ARPANET successfully links computers developed by differentmanufacturers, forming what is later described as the origin of today’sInternet

Slide 1

Networking Fundamentals Evolution: Brief History of Computer

Networking Network Connectivity Devices Network Topology Standardization and its Benefits Network Classifications and Architecture The OSI – 7 Layer Reference Model

Page 4: 02 Instructor's Guide

J0065

Networking Fundamentals *Property of STI Page 4 of 35

• 1970s – A networking technology for minicomputers called Ethernet is developed.

When the 70’s came, computers became smaller in physical size. Mainframes, as the central computer, were replaced by a smaller computer called the minicomputer, which (from a networking perspective) functioned in the same manner as mainframes, but on a smaller scale.

Terminals are linked to a centralized processing and storage unit using cables or telecommunications circuits, as shown in Figure 3.1 below.

Figure 3.1 Minicomputer Environment

Compared with mainframes, fewer simultaneous terminal connections (also called sessions) are possible, due to the relatively limited performance and storage capabilities of minicomputers.

• 1980s – The increase in the number of stand-alone desktop microcomputers within organizations encourages widespread adoption of local area networks (LANs).

Due to their low cost and the availability of all types of software, personal computers (PCs) have been acquired in large volumes by organizations since the 1980s. At the time of their introduction, PCs provided a great deal of flexibility to users accustomed to requesting mainframe or minicomputer services from data processing departments.

Slide 3

*Property of STI J0065

Evolution: Brief History of Computer Networking

1970s

A networking technology for minicomputers called Ethernet is developed

Minicomputer Environment

Slide 4

*Property of STI J0065

Evolution: Brief History of Computer Networking

1980s

The increase in the number of stand-alone desktop microcomputerswithin organizations encourages widespread adoption of LANs

Personal Computing Devices

Page 5: 02 Instructor's Guide

J0065

Networking Fundamentals *Property of STI Page 5 of 35

The PC made it possible for any individual or group to choose, purchase, install, and operate a computer without the involvement of programmers or other computing specialists. With the introduction of terminal emulation software, PCs could also access data on mainframes and minicomputers, eliminating the need for terminals.

Note: Terminal emulation software enables a PC to assume the operating characteristics of various types of terminals.

The progress in computing and manufacturing technologies has made it possible to incorporate the processing and storage capabilities of desktop computers into portable computing devices (e.g., laptops, tablets, personal digital assistants [PDAs] shown in Figure 3.2 below).

Figure 3.2 Personal Computing Devices

Similarly, current desktop and mobile telephones are capable of connecting to the same data networks as computing devices, making them similar in capability to traditional PCs.

• 1990s – Web-based Internet resources are introduced on a global scale.

LANs were like ‘islands’ of information systems that were isolated from one another in the 80’s, but when the 90’s came, the different vendors started to interconnect these different isolated LANs - this idea is more known today as an internetwork, which refers to a collection of individual networks, connected by intermediate networking devices, that

Slide 5

*Property of STI J0065

Evolution: Brief History of Computer Networking

1990s

Web-based Internet resources are introduced on a global scale

Different Network Technologies That Can Be Connected to Create an Internetwork

Page 6: 02 Instructor's Guide

J0065

Networking Fundamentals *Property of STI Page 6 of 35

function as a single large network. The figure 3.3 below illustrates some different kinds of network technologies that can be interconnected by routers and other networking devices to create an internetwork.

Figure 3.3 Different Network Technologies That Can Be Connected to Create an Internetwork

• 2000s (The New Millennium) – Improved mobile/wireless devices and networks provide the means to connect to an organizational network from nearly any location in the world.

As years went on, the advances in computing and communications technologies, and the decline in costs, have made it possible to provide each user with multiple fixed or mobile processing devices (e.g., desktop, laptop, handheld, and home computers). Each of these devices is independently capable of storing data and connecting to an organizational network, a home network, or the Internet. This is in contrast to earlier times, when all users had to share the processing and storage capabilities of a single centralized computer using desktop terminals.

The evolution in computing can therefore be described as a migration from centralized to decentralized or distributed (shown in Figure 3.4), with networks used to interconnect various types of computing and storage devices.

Slide 6

*Property of STI J0065

Evolution: Brief History of Computer Networking

2000s (The New Millennium)

Improved mobile/wireless devices and networks provide the means toconnect to an organizational network from nearly any location in theworld

Page 7: 02 Instructor's Guide

J0065

Networking Fundamentals *Property of STI Page 7 of 35

Figure 3.4 Centralized and Decentralized Computing

Network Connectivity Devices

1. Show Slides 7 to 15. Explain the different connectivity devices as well as how and when to use them.

Network connectivity devices include any type of hardware that is capable of transmitting data, instructions, and information between the end-user devices (e. g. computers, scanner, printer and etc.)

These hardware are the following:

• Repeater – This is used to regenerate the signal through taking in an incoming weak signal then amplifies/boost its strength before it is sent to the rest of the connected devices.

• Hub – This functions similarly as a repeater by means of a process known as concentration. Unlike a repeater, however, a hub can have multiple ports to connect to a number of network devices, which is why this device is also known as a multi-port repeater.

Bridge – This convert network transmission data formats as well as perform basic data transmission management through filtering traffic on a LAN and keeping local traffic local, yet the connectivity to other parts (segments) of the LAN for traffic that has been directed there is allowed. In lieu of this, you may wonder, then, how the bridge knows which traffic is local and which is not. The answer is the same one that the postal service uses when

Slide 7

*Property of STI J0065

Network Connectivity Devices

Network Connectivity Devices

These include any type of hardware that is capable of transmittingdata, instructions, and information between the end-user devices

Repeater Hub Bridge Switch Router Cloud

Slide 8

*Property of STI J0065

Network Connectivity Devices

Repeater

This is used to regenerate the signal

Slide 9

*Property of STI J0065

Network Connectivity Devices

Hub

This functions similarly as a repeater by means of a process known asconcentration

Slide 10

*Property of STI J0065

Network Connectivity Devices

Bridge

This converts network transmission data formats as well as perform basic data transmission management

Page 8: 02 Instructor's Guide

J0065

Networking Fundamentals *Property of STI Page 8 of 35

asked how it knows which mail is local. It looks at the local address. Every networking device has a unique MAC address on the NIC, the bridge keeps track of which MAC addresses are on each side of the bridge and makes its decisions based on this MAC address list.

• Switch – This functions similarly as a bridge in terms of connecting LAN segments, using a table of MAC addresses to determine the segment to which data is to be sent, and reduce network traffic. In fact it is called a multi-port bridge, just like a hub is called a multi-port repeater. The difference between the hub and switch is that switches make decisions based on MAC addresses and hubs don't make decisions at all. Because of the decisions that switches make, they adds more intelligence to data transfer management. They do this by "switching" data only out the port to which the proper host is connected. In contrast, a hub will send the data out all of its ports so that all of the hosts have to see and process (accept or reject) all of the data.

• Router – This connects multiple computers or other routers together through examining the incoming data packets, choosing the best path for them through the network, and then switch them to its correct destination on a network.

Slide 11

*Property of STI J0065

Network Connectivity Devices

Switch

This adds more intelligence to data transfer management

Slide 12

*Property of STI J0065

Network Connectivity Devices

Router

Slide 13

*Property of STI J0065

Network Connectivity Devices

Router

This examines the incoming data packets, choose the best path forthem through the network, and then switch them to the properoutgoing port

Page 9: 02 Instructor's Guide

J0065

Networking Fundamentals *Property of STI Page 9 of 35

• Cloud – This is not really a single device, but a collection of collection/group of integrated and networked hardware, software and Internet infrastructure (called a platform) that represent processes and equipment that would be involved in making a connection.

Network Topology

1. Show Slides 16 to 17. Discuss what a network topology is.

As previously discussed (Topic 1 – Introduction to Computer Networking), computers must be connected to each other to be able for them to share resources or perform other communication tasks. However, this connection is not as simple as just plugging a computer into a certain medium to connect to the other computers. It takes planning in order to work properly and to determine, for example, the type of cable to use and how the cabling will runs through floors, ceilings, and walls.

What do we meant by network topology? Network topology refers to the structure of a network which includes the physical layout, design, diagram or map of computers, cables, and other components on the network. In choosing an appropriate topology for your network, the following must be considered:

• Cost of network management

• Cable length

• Growth of the network

The term topology refers to the way a network is laid out, either physically, which refers to the arrangement of the cable, network devices, and end systems (PCs and servers) or logically, which is the path that the data signals take through the physical topology. A topology can be

Slide 14

*Property of STI J0065

Network Connectivity Devices

Cloud

Slide 15

*Property of STI J0065

Network Connectivity Devices

Cloud

This is not really a single device, but a collection of collection/group ofintegrated and networked hardware, software and Internetinfrastructure that represent processes and equipment that would beinvolved in making a connection

Slide 16

*Property of STI J0065

Network Topology

Network Topology

It refers to the structure of a network, including the physical layout,design, diagram or map of computers, cables, and other componentson the network

Two (2) parts of network topology

Physical topology

Logical topology

Slide 17

*Property of STI J0065

Network Topology

Considerations When Choosing a Topology

Cost of network management

Cable length

Growth of the network

Page 10: 02 Instructor's Guide

J0065

Networking Fundamentals *Property of STI Page 10 of 35

considered as the network's shape. It is the geometric representation of the relationship of all the links.

2. Show Slides 18 to 26. Discuss the different types of physical topologies.

Under the physical topology include: bus, ring, star, extended star, hierarchical, tree and mesh.

Bus Topology: It is a network topology, in which any of its devices is attached to a single communication line that carries messages in both directions (shown in Figure 3.5).

Figure 3.5 Bus Topology

Ring Topology: It is a network topology, in which the devices are connected in a closed loop on which messages are receive by one data unit from the previous device, regenerates it, and forwards it to the next device (shown in Figure 3.6).

Figure 3.6 Ring Topology

The two types of ring topology includes:

• Single Ring Topology (shown in Figure 3.7) – The devices of this type of ring topology share a single cable, and the data travels in one direction only.

Slide 18

*Property of STI J0065

Network Topology

Physical Topology Types

Bus Topology

Ring Topology

Star Topology

Extended Star Topology

Tree Topology

Hierarchical Topology

Mesh Topology

Slide 19

*Property of STI J0065

Network Topology

Bus Topology

Slide 20

*Property of STI J0065

Network Topology

Ring Topology

Single – Ring Topology Dual – Ring Topology

Page 11: 02 Instructor's Guide

J0065

Networking Fundamentals *Property of STI Page 11 of 35

Each device waits its turn to send data over the network. The single ring, however, is susceptible to a single failure, stopping the entire ring from functioning.

Figure 3.7 Single Ring Topology

• Dual Ring Topology (shown in Figure 3.8) – The data on this type of ring topology is allowed to be sent in both directions.

Figure 3.8 Dual Ring Topology

Star Topology: It is a network topology, in which all of the devices are attached to a central device known as the hub (shown in Figure 3.9).

Figure 3.9 Star Topology

Slide 21

*Property of STI J0065

Network Topology

Star Topology

Page 12: 02 Instructor's Guide

J0065

Networking Fundamentals *Property of STI Page 12 of 35

Extended Star Topology: It refers to network topology that uses the star topology to connect the individual stars together (shown in Figure 3.10) through linking the hubs/switches. This extends the length and the size of the network.

Figure 3.10 Extended Star Topology

Hierarchical Topology (shown in Figure 3.11): It refers to network topology that is similar to an extended star topology, except of linking the hubs/switches together, each secondary (subordinate) system is linked to a primary computer that controls the traffic on the topology.

Figure 3.11 Hierarchical Topology

Tree Topology: It is a network topology, which has the characteristic of both bus and star topologies since it consists of groups of star-configured workstations connected to a bus backbone cable (shown in Figure 3.12).

Slide 22

*Property of STI J0065

Network Topology

Extended Star Topology

Slide 23

*Property of STI J0065

Network Topology

Hierarchical Topology

Server

Slide 24

*Property of STI J0065

Network Topology

Tree Topology

Page 13: 02 Instructor's Guide

J0065

Networking Fundamentals *Property of STI Page 13 of 35

Figure 3.12 Tree Topology

Mesh Topology: It is a network topology that connects all devices (nodes) for continuous connections and reconfiguration around broken or blocked paths by “hopping” from node to node until the destination is reached. It is used in WANs to interconnect LANs and for mission critical networks like those used by banks and financial institutions.

The two types of ring topology include:

• Full – Mesh Topology (shown in Figure 3.13) – Each device (node) on this type of mesh topology is connected directly to each of the others.

Figure 3.13 Full – Mesh Topology

• Partial – Mesh Topology (shown in Figure 3.14) – Some nodes of this type of mesh topology are connected to all the others, but some of them are only connected to nodes with which they exchange the most data.

Slide 25

*Property of STI J0065

Network Topology

Mesh Topology

Full – Mesh Topology

Slide 26

*Property of STI J0065

Network Topology

Mesh Topology

Partial – Mesh Topology

Page 14: 02 Instructor's Guide

J0065

Networking Fundamentals *Property of STI Page 14 of 35

Figure 3.14 Partial – Mesh Topology

3. Show Slides 27 to 28. Discuss the advantages and disadvantages of each physical network topologies shown in Table 3.1.

Topology Advantages Disadvantages

Bus

Easy to set up and to maintain. NIC (coax)

Problems are difficult to isolate if the entire

network shuts down.

BNC connector

coax Inexpensive in terms of

cable use since it requires less cable length than a star

topology.

Entire network shuts down if there is a break in the main cable. With these, many users are

affected.

Easy to extend. The network slows down in heavy traffic.

Ring

The system offers equal access and even

performance despite of its many users. This is due to the absence of collisions which makes all data to travel in the

same direction.

Failure of one computer and network

reconfiguration disrupts operation which

impacts the rest of the network.

Topology Advantages Disadvantages

Star

Easy to modify system due to centralized

monitoring and management.

The network fails if centralized point fails.

Failure of one computer does not affect the rest

of the network.

Computers attached are disabled if hub, switch, or concentrator fails.

Tree Individual segments use point-to-point wiring.

If the backbone line breaks, the entire

segment goes down.

Mesh The system provides increased redundancy

The system is expensive to install because it

Slide 27

*Property of STI J0065

Network Topology

Topology Advantages Disadvantages

Bus

Easy to set up and to maintain.Problems are difficult to isolate if

the entire network shuts down.

Inexpensive in terms of cable

use

Entire network shuts down if

there is a break in the main

cable.

Easy to extend.Network slows down in heavy

traffic.

Ring

System provides equal access

and even performance despite of

its many users.

Failure of one computer and

network reconfiguration disrupts

operation.

Easy to modify systemNetwork fails if centralized point

fails.

Slide 28

*Property of STI J0065

Network Topology

Topology Advantages Disadvantages

StarFailure of one computer does not

affect the rest of the network.

Computers attached are

disabled if hub, switch, or

concentrator fails.

TreeIndividual segments use point-

to-point wiring.

If the backbone line breaks, the

entire segment goes down.

Mesh System provides increased

redundancy and reliability as well

as ease of troubleshooting.

System is expensive to install

because it uses a lot of cabling.

Page 15: 02 Instructor's Guide

J0065

Networking Fundamentals *Property of STI Page 15 of 35

and reliability as well as ease of

troubleshooting.

employs a lot of cabling.

Table 3.1 Topology Advantages and Disadvantages

4. Show Slide 29. Discuss the different types of logical topologies.

Under the logical topology include: broadcast and token passing.

Broadcast Topology: It is a network topology that works on a “first-come, first-serve” basis (the first in line gets to be the first to be sent). Each host on the LAN sends/broadcasts its data to every other host. Ethernet, which is a network standard that uses CSMA/CD access method, is an example of this type.

• Carrier sense multiple access with collision detection (CSMA/CD): It refers to an access method in which stations transmit if there’s an available transmission medium and retransmit in the occurrence of collision.

Token Passing Topology: It is a network topology that controls the access through an electronic token. Possession of the token gives the host the right to pass data to its destination. Token Ring (specifies that computers and devices on the network share or pass a special signal (token)) and the Fiber distributed data interface (FDDI) are the examples of this type.

• Fiber distributed data interface (FDDI): This refers to a 100-Mbps LAN, defined by ANSI that uses fiber optics, dual ring topology, and the token-passing access method. Today an FDDI network is also used as a MAN.

5. Show Slides 30 to 33. Present the characteristics of the following network topology.

Tables 3.2 to 3.4 shows a summary chart of the characteristics of the different network topology. Note: The cable type (networking media) and designation will be discussed further in the next topic – 04 Networking Media.

Slide 29

*Property of STI J0065

Network Topology

Logical Topology Types

Broadcast Topology

Token Passing Topology

Slide 30

*Property of STI J0065

Network Topology

Characteristics of Bus Topology

Characteristics of Ring Topology

Topology Network Connectivity Device/Connector Networking Media Designation

Maximum Segment Length/ Transfer Speed

Bus Terminator/BNC connector

Coaxial 10Base-5 500 m/10 Mbps

Thin Coaxial (RG-58 A/U) 10Base-2 185 m/10

MbpsBus (often only point-to-point)

Coaxial (RG-58 A/U CATV type) 10Broad-36 3600 m/10

Mbps

Topology Network Connectivity Device/Connector Networking Media Designation

Maximum Segment Length/ Transfer Speed

Double Ring Fiber-optic 100 Mbps

Page 16: 02 Instructor's Guide

J0065

Networking Fundamentals *Property of STI Page 16 of 35

Topology Network

Connectivity Device/Connector

Networking Media Designation

Maximum Segment Length/

Transfer Speed

Bus Terminator/BNC

connector

Coaxial 10Base-5 500 m/10 Mbps

Thin Coaxial (RG-58 A/U) 10Base-2 185 m/10

Mbps Bus (often only point-to-point)

Coaxial (RG-58 A/U CATV type)

10Broad-36

3600 m/10 Mbps

Table 3.2 Bus Topology

Topology Network

Connectivity Device/Connector

Networking Media Designation

Maximum Segment

Length/Transfer Speed

Double Ring Fiber-optic 100 Mbps

Table 3.3 Ring Topology

Topology Network Connectivity Device/Connector

Networking Media Designation

Maximum Segment

Length/Transfer Speed

Star

Repeater hubs or Ethernet switches/RJ-

45 (Registered Jack modular connector

(8P8C))

Category 3 or above

unshielded twisted-pair

(UTP)

10Base-T 100 m/10 Mbps

Star Repeater hubs Category 3

UTP, or above

1Base-5 100 m/1 Mbps

Star (often only point-to-point)

ST (Straight Tip fiber optic connector)

Fiber-optic - two strands

of multimode 62.5/125

fiber

10Base-FL 2000 m (full-duplex)/ 10

Mbps

Star

Repeater hubs or Ethernet switches/ RJ-45 (Registered

Jack modular connector (8P8C))

Category 5 UTP 100Base-TX 100 m/100

Mbps

Star (often only point-to-point)

SC (Subscriber/Square

Connector)

Buffered

Fiber-optic - two strands

of multimode 62.5/125

fiber

100Base-FX

412 meters (Half-

Duplex)/ 100 Mbps

2000 m (full-

Slide 31

*Property of STI J0065

Network Topology

Characteristics of Star Topology

Topology Network Connectivity Device/Connector

Networking Media Designation

Maximum Segment

Length/Transfer Speed

Star

Repeater hubs or Ethernet switches/RJ-45

(Registered Jack modular connector

(8P8C))

Category 3 or above

unshielded twisted-pair

(UTP)

10Base-T 100 m/10 Mbps

Star Repeater hubs Category 3 UTP, or above 1Base-5 100 m/1 Mbps

Star (often only point-to-

point)ST (Straight Tip fiber

optic connector)

Fiber-optic - two strands of multimode

62.5/125 fiber

10Base-FL 2000 m (full-duplex)/ 10 Mbps

Slide 32

*Property of STI J0065

Network Topology

Characteristics of Star Topology

Star

Repeater hubs or Ethernet switches/ RJ-45

(Registered Jack modular connector

(8P8C))

Category 5 UTP 100Base-TX 100 m/100 Mbps

Star (often only point-to-

point)SC (Subscriber/Square

Connector)

Fiber-optic - two strands of multimode

62.5/125 fiber

100Base-FX

412 meters (Half-Duplex)/ 100 Mbps

2000 m (full-duplex)/ (200 Mb/s full-duplex mode)

Star Buffered distributor hub (or point-to-point)

1000Base-SX 260 m/1 GbpsFiber-optic - two

strands of multimode

62.5/125 fiber or monomode

fiber

1000Base-LX

440 m (multimode) 5000 m

(singlemode)/ 1 Gbps

Page 17: 02 Instructor's Guide

J0065

Networking Fundamentals *Property of STI Page 17 of 35

distributor hub (or point-to-point)

duplex)/ (200 Mb/s full-duplex

mode)

Star 1000Base-SX

260 m/1 Gbps

Table 3.4 Star Topology

Topology Network Connectivity Device

Networking Media Designation

Maximum Segment

Length/Transfer Speed

Mesh (often only point-to-

point)

Routers

Table 3.5 Mesh Topology

Standardization and its Benefits

1. Show Slides 34 to 38. Discuss the different networking standards organizations. Start off with explaining what a standard is.

Due to the fast growth of computer industry out of several technical discipline, many different organizations evolved to oversee its standards. Standards are documented agreements containing technical specifications or other precise criteria that stipulate how a particular product or service should be designed or performed. Without it, it would be very difficult to design a network because one could not be certain that the software or hardware from different manufacturers would work together. Below are the following groups that set networking standards and the critical aspects of standards required by one’s network.

The IEEE (read as “Eye-triple-E”), which stands for the Institute of Electrical and Electronics Engineers (shown in Figure 3.15), is an international society composed of engineering professionals. Its goals are to promote development and education in the electrical engineering and computer science fields. Aside from that, it also maintains a standard board that establishes its own standards for the electronics and computer industries and contributes to the work of standards-setting bodies, such as ANSI.

Slide 33

*Property of STI J0065

Network Topology

Characteristics of Mesh Topology

Topology Network Connectivity Device

Networking Media Designation

Maximum Segment

Length/Transfer Speed

Mesh (often only point-to-

point)Routers

Slide 34

*Property of STI J0065

Standardization and its Benefits

Standard

It refers to documentedagreements containingtechnical specifications orother precise criteria thatstipulate how a particularproduct or service should bedesigned or performed

Slide 35

*Property of STI J0065

Standardization and its Benefits

Institute of Electrical and Electronics Engineers (IEEE)

This is best known for thestandardization of LANtechnologies

American NationalStandards Institute (ANSI)

This is known for publishedstandards such as the ASCIIand SCSI

Page 18: 02 Instructor's Guide

J0065

Networking Fundamentals *Property of STI Page 18 of 35

Figure 3.15 IEEE Logo

In Data Communications, the IEEE is probably best known for the standardization of the LAN technologies. IEEE’s Project 802 aided in the standardization of Ethernet (802.3), Token-Ring (802.5) and Wireless LAN’s (802.11). Project 802 further divided OSI’s Data-Link Layer into sub-layers – the LLC (Logical Link Control) Sub-layer and the MAC (Media Access Control) Sub-layer.

American National Standards Institute (ANSI) (shown in Figure 3.16) is an organization composed of more than thousand representatives from industry and government who together to determine standards for electronics, industry and other fields, such as chemical and nuclear engineering, health and safety, and construction.

Figure 3.16 ANSI Logo

This organization is known for published standards such as American Standard for Code Information Interchange (ASCII) and Small Computer System Interface (SCSI).

Electronic Industries Alliance (EIA) is a trade organization composed of representatives from electronics manufacturing firms across the United States.

This organization do not only sets standards for its members, but also write ANSI standards and lobbies for legislation favorable to the growth of the computer and electronics industries.

Telecommunications Industry Association (TIA) (shown in Figure 3.17) focuses on standards for information technology, wireless, satellite, fiber optics, and telephone equipment.

Slide 36

*Property of STI J0065

Standardization and its Benefits

Electronic IndustriesAlliance (EIA)

This writes ANSI standardsand lobbies for legislationfavorable to the growth ofthe computer and electronicsindustries

TelecommunicationsIndustry Association (TIA)

This focuses on standards forinformation technology,wireless, satellite, fiberoptics, and telephoneequipment

Page 19: 02 Instructor's Guide

J0065

Networking Fundamentals *Property of STI Page 19 of 35

Figure 3.17 TIA Logo

Note: The best known standards to come from the TIA/EIA alliance are its guidelines for how network cable should be installed in commercial buildings, known as the “TIA/EIA 568 – B Series.”

International Organization for Standardization (ISO), (shown in Figure 3.18) headquartered in Geneva, Switzerland and was established in 1947, is a collection of standards organizations representing 165 member countries. Its goal is to establish international standards to facilitate global exchange information and barrier-free trade. Its authority is not limited to the information-processing and communications industries (which solely for the benefit of engineers), but also applies to the fields of textiles, packaging, distribution of goods, energy production and utilization, shipbuilding, and banking and financial services (which results in economic and social influences that benefit the society as a whole).

Figure 3.18 ISO Logo

Note: Given the organization’s full name (which is the International Organization for Standardization), it is expected to be called IOS, but ISO is not meant to be an acronym. In fact, ISO is derived from the Greek “isos”, meaning equal. Founders decided to give it the short form ISO, because 'International Organization for Standardization' would have different acronyms in different languages (IOS in English, OIN in French for Organisation internationale de normalisation). Using the term ISO conveys the organization’s dedication to standards.

In the area of data communications, ISO defined the seven-layer OSI Reference Model, which is the basis for several proprietary and non-proprietary models. The development of most Internet standards can be traced to the OSI Model.

Slide 37

*Property of STI J0065

Standardization and its Benefits

International Organization for Standardization (ISO)

This defines the seven-layer OSI Reference Model

Internet Engineering Task Force (IETF)

This is responsible for theoverall development of theinternet and thestandardization ofinternetworking technologies

Page 20: 02 Instructor's Guide

J0065

Networking Fundamentals *Property of STI Page 20 of 35

Communication standards and protocols have evolved through the years through the OSI Reference Model.

Internet Engineering Task Force (IETF) (shown in Figure 3.19) is an organization that is responsible for the overall development of the internet and the standardization of internetworking technologies. In short, the IETF is the one who sets standards for how systems communicate over the Internet – in particular, how protocols operate and interact.

Figure 3.19 IETF Logo

The IETF hierarchy consists of the following major groups below:

• Internet Society (ISOC) – This oversees the overall development on the Internet.

• Internet Engineering Steering Group (IESG) – This oversees the activities of IETF and manages the process used to introduce or update Internet standards.

• Internet Architecture Board (IAB) – This serves as the technology advisory group to the Internet Society and is responsible for the overall development of the protocols and architecture (design and management) associated with the internet.

• Internet Assigned Numbers Authority (IANA) – This oversees Internet naming and addressing; they are the one who’s in charge of all "unique parameters" on the Internet, including IP (Internet Protocol) addresses. Each domain name is associated with a unique IP address, a numerical name consisting of four blocks of up to three digits each, e.g. 204.146.46.8, which systems use to direct information through the network.

Slide 38

*Property of STI J0065

Standardization and its Benefits

Major Groups of IETF

Internet Society (ISOC)

Internet Engineering Steering Group (IESG)

Internet Architecture Board (IAB)

Internet Assigned Numbers Authority (IANA)

Page 21: 02 Instructor's Guide

J0065

Networking Fundamentals *Property of STI Page 21 of 35

Network Classifications and Architecture

1. Show Slides 39. Discuss the different classifications of network.

Computer networks are classified according to the following dimensions below:

• Geographic Scale:

o Personal Area Network (PAN)

o Local Area Network (LAN)

o Campus Area Network (CAN)

o Metropolitan area network (MAN)

o Wide area network (WAN)

• Transmission technology:

o Point-to-point networks

o Broadcast/Multipoint networks.

2. Show Slides 40 to 51. Discuss classification of network according to geographic scale.

Personal Area Network (PAN): It refers to a computer network that provides communication among computing and communicating devices (like PC, personal digital assistants (PDAs), telephone, mobile phone and printer) within the range of an individual person, typically within a range of 10 meters. It can be wired or wireless.

• Wired PAN – This uses a typical USB (universal serial bus) like network adapter (shown in figure 3.20) and FireWire (a. k. a. IEEE 1394 standard). The USB network adapter uses the cell phone network to connect to the Internet. FireWire, on the other hand, allows one to send data to high-bandwidth digital devices such as digital camcorders; it's faster than USB.

Slide 39

*Property of STI J0065

Geographic Scale

Personal Area Network

Local Area Network

Campus Area Network

Metropolitan Area Network

Wide Area Network

Storage Area Network

Virtual Private Network

Transmission technology

Point-to-point networks

Broadcast networks

Network Classifications and Architecture

Slide 40

*Property of STI J0065

Network Classifications and Architecture

Personal Area Network (PAN)

Page 22: 02 Instructor's Guide

J0065

Networking Fundamentals *Property of STI Page 22 of 35

Figure 3.20 USB network adapter inserted in notebook computer

• Wireless PAN – This uses Bluetooth and IrDA (Infrared Data Association shown in Figure 3.21) technologies. The Bluetooth technology IrDA technology transmits data wirelessly via infrared (IR) light waves.

Figure 3.21 A smart phone communicating with a notebook computer using an IrDA port

Local Area Network (LAN): It refers to a computer network (shown in Figure 3.22) that connects devices in a relatively small geographical area (usually within a square mile or less) such as an office, school or building.

Slide 41

*Property of STI J0065

Network Classifications and Architecture

Local Area Network (LAN)

Single Building LAN

Page 23: 02 Instructor's Guide

J0065

Networking Fundamentals *Property of STI Page 23 of 35

Figure 3.22 Single building and Multiple building LAN

It uses client/server architecture in which one computer is designated as the server, which stores all the software that controls the network and the software that can be shared by the client computers (also called as workstations) attached to it.

Note: The computer network architecture specifies how the physical and logical components of a computer network are assembled and connected with each other to facilitate information exchange and resource sharing.

• Client/Server Architecture: This setup (shown in Figure 3.23) is composed of a dedicated and centralized powerful host computer known as server and a user's individual workstation known as client.

Slide 42

*Property of STI J0065

Network Classifications and Architecture

Local Area Network (LAN)

Multiple Building LAN

Slide 43

*Property of STI J0065

Network Classifications and Architecture

Network Architecture

It specifies how the physical and logical components of a computernetwork are assembled and connected with each other to facilitateinformation exchange and resource sharing

Slide 44

*Property of STI J0065

Network Classifications and Architecture

Network Architecture Types Client/Server Architecture Peer-to-Peer (P2P)

Architecture

Page 24: 02 Instructor's Guide

J0065

Networking Fundamentals *Property of STI Page 24 of 35

Figure 3.23 Client/Server Architecture

Server computer provides service requests to network users while client computers access to the services (file sharing, resource sharing etc.) provided by a server.

• Peer-to-Peer (P2P) Architecture: In contrast to client/server architecture, this setup (shown in Figure 3.24) has no dedicated servers, and is equal among the computers. Each computer functions as both “clients” and “servers” and all have the same abilities to use the resources available on the network that is why they are known as peers.

Figure 3.24 P2P Architecture

Page 25: 02 Instructor's Guide

J0065

Networking Fundamentals *Property of STI Page 25 of 35

Shown in Table 3.2 are the associated advantages and disadvantages that form a part of distinction between client/server and P2P architecture.

Consideration Client/server architecture

P2P architecture

Administration

It requires at least one full-time and

knowledgeable administrator for proper

installation and will ensure the efficient

operation of the network.

Individual users are the ones that are

responsible for their own administration.

Security

It has an extensive and consistent security since

resources and data security are controlled

through the server.

All nodes are independent of each

other that is why security is established

by the user of each computer.

Dependence

When server goes down, it affects

functioning of the entire network since nodes are

dependent to it.

Failure that occurs in one node does not

affect the functioning of other nodes in the

network.

Table 3.6 Comparison of Network Architecture

Campus Area Network (CAN): As the name implies, this computer network, links the LANs located in two or more buildings (such as a college campus, enterprise campus, office buildings, military base, industrial complex) that are in close proximity to each other, as shown in Figure 3.25. Connections between the buildings can be made using cabling or wireless technologies.

Figure 3.25 Campus Area Network (CAN)

Slide 45

*Property of STI J0065

Network Classifications and Architecture

Comparison of Network Architecture

Consideration Client/server architecture

P2P architecture

AdministrationIt requires at least one full-time

and knowledgeable administrator

Individual users are the ones that are responsible for their own

administration.

SecurityIt has an extensive and

consistent securityAll nodes are independent of

each other

Dependence

When server goes down, it affects functioning of the entire

network since nodes are dependent to it.

Failure that occurs in one node does not affect the functioning of

other nodes in the network.

Slide 46

*Property of STI J0065

Network Classifications and Architecture

Campus Area Network (CAN)

Page 26: 02 Instructor's Guide

J0065

Networking Fundamentals *Property of STI Page 26 of 35

Note: The term campus LAN is also used to describe a CAN. It is one of the type of MAN (Metropolitan Area Network) on the area smaller than MAN.

Metropolitan Area Network (MAN): It refers to a computer network (shown in Figure 3.26) that spans the distance of a “metropolitan” area such as a city and its suburbs through bridging their LANs with a series of backbones which makes one large network for the entire city.

Figure 3.26 Metropolitan Area Network (MAN)

It uses high-speed connections like fiber optics to achieve higher speeds.

Wide Area Network (WAN): It refers to a computer network (shown in Figure 3.27) that uses a long-range communication technologies (e. g. telephone lines, satellite links etc.) that can span a large geographical distance such as cities, states, countries or even the whole world.

Figure 3.27 Wide Area Network (WAN)

Slide 47

*Property of STI J0065

Network Classifications and Architecture

Metropolitan Area Network (MAN)

Slide 48

*Property of STI J0065

Network Classifications and Architecture

Wide Area Network (WAN)

Page 27: 02 Instructor's Guide

J0065

Networking Fundamentals *Property of STI Page 27 of 35

Internet is the largest WAN in existence.

Storage Area Network (SAN): It refers to a dedicated, high-performance computer network that allows high-speed server-to-storage (shown in Figure 3.28), storage-to-storage, or server-to-server connectivity.

Figure 3.28 Storage Area Network (SAN)

Virtual Private Network (VPN): It refers to a computer network that uses a shared public network infrastructure (such as the Internet) (shown in Figure 3.29) but maintains the security and reliability of private networks (e. g. Frame Relay, Asynchronous Transfer Mode (ATM), and Multiprotocol Label Switching (MPLS) – this will be discussed further in the next topic).

Figure 3.29 Virtual Private Network

Slide 49

*Property of STI J0065

Network Classifications and Architecture

Storage Area Network (SAN)

Slide 50

*Property of STI J0065

Network Classifications and Architecture

Virtual Private Network (VPN)

Page 28: 02 Instructor's Guide

J0065

Networking Fundamentals *Property of STI Page 28 of 35

Note: For further understanding of the VPN, let’s discuss the terms one by one below:

• Virtual. Virtual means not real or in a different state of being. In a VPN, private communication between two or more devices is achieved through a public network the Internet. Therefore, the communication is virtually but not physically there.

• Private. Private means to keep something a secret from the general public. Although those two devices are communicating with each other in a public environment, there is no third party who can interrupt this communication or receive any data that is exchanged between them.

• Network. A network consists of two or more devices that can freely and electronically communicate with each other via cables and wire. A VPN is a network. It can transmit information over long distances effectively and efficiently.

Figure 3.30 Types of VPN

• Remote access VPNs – This enables a mobile worker and small office/home office (SOHO) to establish a connection to the headquarters and/or organization server by using the infrastructure provided by an ISP (Internet Services Provider).

• Intranet VPNs – This links regional and remote offices to the headquarters of the internal network through virtual circuits (which is built using the Internet, service provider IP, Frame Relay, or ATM networks) between organization offices.

Slide 51

*Property of STI J0065

Network Classifications and Architecture

Types of VPN

Page 29: 02 Instructor's Guide

J0065

Networking Fundamentals *Property of STI Page 29 of 35

• Extranet VPNs – This link business partners (e. g. customers, suppliers, or different organizations) to the headquarters of the network.

3. Show Slides 52 to 53. Discuss classification of network according to transmission technology.

In order for two or more devices to communicate with each other, it must be connected using a link which refers to a physical path communication pathway that transfers data between two or more devices. The two possible types of connections between two or more devices include:

• Point-to-Point Networks: This network (shown in Figure 3.31) has a dedicated transmission link (established with either cable or wire or satellite or microwave links) that is totally reserved for the transmission of two exclusive devices. An example of this connection is the connection between the television and the remote control.

Figure 3.31 Point - to - Point Connection

• Broadcast/Multipoint networks: This network (shown in Figure 3.32) has a single link that is shared by three or more devices. It is subdivided into two which are:

o Spatially shared connection – Shared link in this multipoint connection can be utilized by many devices simultaneously.

o Time shared connection – Devices in this multipoint connection need to take turns to utilize the link.

Slide 52

*Property of STI J0065

Network Classifications and Architecture

Point – to – point networks

Slide 53

*Property of STI J0065

Network Classifications and Architecture

Broadcast/Multipoint networks

Page 30: 02 Instructor's Guide

J0065

Networking Fundamentals *Property of STI Page 30 of 35

Figure 3.32 Multipoint Connection

The OSI – 7 Layer Reference Model

1. Show Slides 54 to 55. Discuss the role of the OSI model in a data transmission network. Start off by using two scenarios that explains reasons why division of complex task of communication into several layers is necessary.

Figure 3.33 Scenario 1

Figure 3.33 shows a face to face communication scenario which happens in one layer. Here, the neighbors, Gary and Randy have a lot of common ideas. However, Gary speaks only Chinese language, while Randy speaks only in Filipino language. Since both of them have learned sign language in their childhood, they exchange ideas through the use of signs and also use bilingual dictionary occasionally.

Slide 54

*Property of STI J0065

The OSI – 7 Layer Reference Model

Scenario 1:

Layer 1 Layer 1

Signs

Page 31: 02 Instructor's Guide

J0065

Networking Fundamentals *Property of STI Page 31 of 35

Figure 3.34 Scenario 2

Figure 3.34 show that the two friends (Gary and Randy) can still communicate using the secret code. Due to call of duty, Randy has to move to another town. But before leaving, the two (Randy and Gary) meet for the last time. Although sad, Gary surprises Randy with a packet that contains two small machines. The first machine can scan and transform a letter in Filipino to a secret code or vice versa. The other machine can scan and translate a letter in Chinese to the same secret code or vice versa. Randy takes the first machine; Gary keeps the second one.

2. Show Slide 56. Discuss what an OSI reference model is.

Open Systems Interconnection (OSI) Reference Model refers to a seven-layer conceptual layout for data communication that was defined by International Organization for Standardization (ISO) in the year 1984. It is now considered as the primary Architectural model for inter-computer communications which ensures greater compatibility and interoperability between various types of network technologies through breaking the complexity of networked communications (from application to hardware) into a series of interconnected tasks and activities which creates a method to solve big problem by deconstructing them into a series of smaller problems that can then be solved individually.

3. Show Slides 57 to 61. Discuss the function of each layer of the OSI model.

The seven layers of OSI Reference Model (shown in Figure 3.35) have a particular network functions which includes:

Slide 55

*Property of STI J0065

The OSI – 7 Layer Reference Model

Scenario 2:

Layer 1

Layer 2

Layer 3

Layer 1

Layer 2

Layer 3

Secret Code

Secret Code

Chinese

Filipino

Slide 56

*Property of STI J0065

The OSI – 7 Layer Reference Model

Open Systems Interconnection (OSI) Reference Model

It refers to a seven-layer conceptual layout for data communicationthat was defined by International Organization for Standardization(ISO) in the year 1984

Page 32: 02 Instructor's Guide

J0065

Networking Fundamentals *Property of STI Page 32 of 35

Figure 3.35 An exchange using the OSI Reference Model

Note: For easy memorization, you may let your students used the following sentence below:

Please Do Not Throw Sausage Pizza Away

Application Layer: This layer both controls the sequence of activities within an application through defining the interfaces for communication and data transfer and the sequence of events between services (File transfers, E-mail, Network software services, Telnet, FTP) used by the user of software applications.

Presentation Control Layer: This layer, which is also known as the syntax layer, presents the data into a uniform format and masks the difference of data format (machine dependent data versus machine independent data) through protocol conversion, encryption, decryption and data compression.

Session Control Layer: This layer manages, establishes and releases logical connections (e. g. Full-duplex, Half-duplex, Simplex operation, Establishes check pointing, Adjournment, Termination, Restart procedures) for data transfer.

Transport Layer: This layer, which is sometimes called as an end-to-end layer, manages data transfer between end systems or hosts and also provides error checking (flow control segmentation / desegmentation, and error control) that guarantees complete, accurate (no duplication) and reliable (no error) data transfer across the network.

Slide 57

*Property of STI J0065

The OSI – 7 Layer Reference Model

Application Layer

Presentation Control Layer

Session Control Layer

Transport LayerNetwork Control Layer

Data Link LayerPhysical Control Layer

Transmit Data Received Data

Physical Link

User

Away

Pizza

Sausage

Throw

Not

Do

Please

Slide 58

*Property of STI J0065

The OSI – 7 Layer Reference Model

Application Layer

It both controls the sequence of activities within an application andthe sequence of events of services used by the user of softwareapplications

Presentation Control Layer

It is also known as the syntax layer

It presents data into a uniform format and masks the difference ofdata format through protocol conversion, encryption, decryption anddata compression

Slide 59

*Property of STI J0065

The OSI – 7 Layer Reference Model

Session Control Layer

It manages, establishes and releases logical connections for datatransfer

Transport Layer

It is sometimes called as an end-to-end layer

It manages data transfer between end systems or hosts and alsoprovides error checking that guarantees complete, accurate andreliable data transfer across the network

Page 33: 02 Instructor's Guide

J0065

Networking Fundamentals *Property of STI Page 33 of 35

Network Control Layer: This layer provides control (e. g. routing, forwarding, addressing, Internet working, error handling, congestion control and packet sequencing) and creates logical paths, known as virtual circuits, for transmitting data between two adjacent network nodes and between data terminal equipment (DTE) and the network.

Data Link Control Layer: This layer provides protocol to check if the small units of transmitted information, known as frames, are correctly exchanged across the network between two terminals and is divided into two sub layers:

• Media Access Control (MAC) sub layer: It is responsible for defining access method and access control of the different local area network or device.

• Logical Link Control (LLC) sub layer: It is responsible for error checking, flow control and frame synchronization control.

Physical Control Layer: This layer defines physical interface between data terminal equipment (DTE) and data circuit terminating equipment (DCE) and presents the electrical characteristics and signaling needed to establish, maintain, and clear the physical connection between the lines terminating equipment.

C. Generalization Step 1 Target Attribute: Effective Communicator Facet: Writing (Ability to write ideas clearly and coherently in different contexts)

Strategy: Develop students' ability to express ideas through informal writing Learning outcome/s: Students should be able to: 1. Reinforce their understanding of the topic discussed through setting

down in words their ideas lucidly and coherently

1. Advice your students to review lessons discussed and tell them to prepare for their 03 Quiz 1 that should be finished by the students in 60 minutes (1 hour). This will be done in preparation for the upcoming preliminary examination.

Slide 60

*Property of STI J0065

The OSI – 7 Layer Reference Model

Network Control Layer

It provides control and creates logical paths for transmitting databetween two adjacent network nodes and between DTE and thenetwork

Link Control Layer

It provides protocol to check if the small units of transmittedinformation are correctly exchanged across the network between twoterminals

Slide 61

*Property of STI J0065

The OSI – 7 Layer Reference Model

Two Sub Layers of Data Link Control

Media Access Control (MAC) sub layer

Logical Link Control (LLC) sub layer

Physical Control Layer

It defines physical interface between DTE and DCE and also presentselectrical characteristics and signaling needed to establish, maintain,and clear the physical connection between the line terminatingequipment

Page 34: 02 Instructor's Guide

J0065

Networking Fundamentals *Property of STI Page 34 of 35

D. Application Step 1 Target Attribute: Lifelong Learner Facet: Self-motivated (Ability to pursue a task no matter how discouraging the situation, requiring perseverance, diligence,

and endurance within a framework of love of learning) Strategy: Develop students' self-reliance Learning outcome/s: Students should be able to: 1. Perform the activity with continuous attempts, dogged

perseverance, and diligence through possibilities before acting.

1. Using 02 Laboratory Exercises 1 and 2, ask the students to individually perform the procedures in the laboratory experiment. Give them six (6) hours (two (2) sessions) to finish the exercise and ask them to submit their worksheets before the session ends. Move around the class and check their actual application. Don’t hesitate to acknowledge and assess their work.

2. Please remind the students that the straight through and cross over cables that they have created is to be used in the 02 Laboratory 2. Hence, it is a must for them to bring the cables in the following laboratory session.

GRADUATE ATTRIBUTES CHECKLIST

Creative Fluency

Flexibility

Originality

Elaboration

Conscientious Orderly Dutiful Self-disciplined

Emotionally-Mature

Self-awareness Self-management

Social Awareness

Relationship Management

Effective Communicator

Speaking

Listening

Body Language

Reading

Writing

Team Player Networking Coordinating Cooperating Collaborating

Critical Thinker Challenged Thinker Beginning Thinker

Practicing Thinker

Proactive Anticipatory

Lifelong Learner Self-motivated

Page 35: 02 Instructor's Guide

J0065

Networking Fundamentals *Property of STI Page 35 of 35

Plan - oriented Action - directed

Self-regulated Self-directed

REFERENCES:

Mueller, S. (2013). Upgrading and Repairing PC's 21st Edition. Indianapolis, Ind.: Que

Oliviero, A. (2014)., Cabling: the complete guide to copper and fiber-optic networking, 5th ed. Indianapolis, IN: John Wiley and Sons

Sosinsky, B. (2009). Networking bible. Indianapolis, IN: Wiley Pub., inc.

Tanenbaum, A. (2011). Computer Networks (5th Edition). Boston: Pearson Prentice Hall