73
EMT443 Melinda Hicks 11416723 Assignment 3 EMT443 Curriculum Method 1: Information Technology Lecturer: Andrejs Kristovskis Due: 11 th October 2010 Melinda Hicks 11416723 1

HICKSM11416723_884689_1

Embed Size (px)

DESCRIPTION

AA

Citation preview

Page 1: HICKSM11416723_884689_1

EMT443 Melinda Hicks 11416723

Assignment 3

EMT443

Curriculum Method 1: Information Technology

Lecturer: Andrejs Kristovskis

Due: 11th October 2010

Melinda Hicks

11416723

1

Page 2: HICKSM11416723_884689_1

EMT443 Melinda Hicks 11416723

Option Topic 6: Networking Systems

Class – Year 10 Information & Software Design

Teacher – Miss Hicks

Start Date – dd/mm/yy Finish – dd/mm/yy(third term)

Indicative Hours – 24 hours

Lesson Length – 40 mins

Time Taken (Wks) – 9 wks – (4 × 40min lessons per wk)

Context:

This option introduces the nature of networking systems. File management, users and groups for any operating system are investigated. Students gain hands-on experience with setting up servers and protocols in a network environment.

Module Focus:

This module will be a project-based unit of study, where students learn about Networking System features and design, as well as sections of the core topics. The continual assignment throughout the duration of study will encourage students to learn and give them a real life scenario in which to interact with.

Target Outcomes:

Core Outcomes

5.1.1 Selects and justifies the application of appropriate software programs to a range of tasks

5.1.2 Selects, maintains and appropriately uses hardware for a range of tasks

5.3.2 Acquires and manipulates data and information in an ethical manner

5.4.1 Analyses the effects of past, current and emerging information and software technologies on the individual and society

5.5.1 Applies Collaborative work practices to complete tasks

5.5.2 Communicates ideas, processes and solutions to a target audience

Option Outcomes

5.2.1 Describes and Applies problem-solving processes when creating solutions

5.2.2 Designs, produces and evaluates appropriate solutions to a range of challenging problems

5.2.3 Critically analyses decision-making processes in a range of information and software solutions

2

Page 3: HICKSM11416723_884689_1

EMT443 Melinda Hicks 11416723

Resources List:

Number Resource Source/Materials1 Worksheet- “Past, Current and Emerging

Technologies”(See Appendix 1)

2 Worksheet- “Issues” (See Appendix 2)

3 Access to Computer and Internet Facilities -

4 Game- “Definition Restriction” (See Appendix 3)

5 YouTube Video- “Ring Topology” http://www.youtube.com/watch?v=U6TX4Zbu2ao&feature=related

6 YouTube Video- “Network Topology” http://www.youtube.com/watch?v=oVOeNcJJYos&feature=related

7 YouTube Video- “Star Topology” http://www.youtube.com/watch?v=aNxxrawNu48&feature=related

8 Worksheet- “Types of Networks” (See Appendix 4)

9 Materials- Basic computer Network Components

-

10 Worksheet- “Data Transmission Media” (See Appendix 5)

11 YouTube Video- “Half Duplex and Full Duplex” http://www.youtube.com/watch?v=sYOXtIl_lO0

12 YouTube Video- “Wired vs Wireless” http://www.youtube.com/watch?v=ykuRokSgRIU&feature=related

13 YouTube Video- “How to pick the right Network Cables for your Home Network”

http://www.youtube.com/watch?v=C2Ovabby7zw

14 Reading- “Factors Influencing Media Transmission”

(See Appendix 6)

15 Worksheet- “Media Transmission Revision” (See Appendix 7)

16 YouTube Video- “TCP/IP animation” http://www.youtube.com/watch?v=RbY8Hb6abbg&feature=related

17 Website- “Tech Tutorials” http://www.youtube.com/watch?v=Wc1dOw4j3J8

18 Worksheet- “Protocol Revision” (See Appendix 8)

19 YouTube Video- “Security” http://www.youtube.com/watch?v=Wc1dOw4j3J8

20 Worksheet- “Security Case Study” (See Appendix 9)

21 YouTube Video- “Security Case Study” http://www.youtube.com/watch?v=_E4DO4ADCqw&feature=related

22 Worksheet- “Data Handling” (See Appendix 10)

23 YouTube Video- “Basic Networking Revision” http://www.youtube.com/watch?v=CKOZMfFE1cI

24 YouTube Video- “Components of Networks Revision”

http://www.youtube.com/watch?v=BZ6WCqRb_us&NR=1

25 Worksheet- “Components of Networks Crossword”

(See Appendix 11)

3

Page 4: HICKSM11416723_884689_1

EMT443 Melinda Hicks 11416723

26 Reading- “Networking Operating Systems” (See Appendix 12)

27 Worksheet- “Creating a peer to peer network” (See Appendix 13)

28 Worksheet- “Internet Case Study” (See Appendix 14)

29 YouTube Video- “All Online Data Lost After Internet Crash!”

http://www.youtube.com/watch?v=z4vDClhnJjs

30 YouTube Video- “The Internet is the Corporate Network”

http://www.youtube.com/watch?v=nH4GoXEoiSc

31 Quiz- “Team Quiz Questions” (See Appendix 15)

Other Resources that may prove useful:

Textbook: Exploring Computer Studies 2nd ed P 189-214Textbook: Information and Software Technology Stage 5 P 287-312Textbook: Computing Studies An Introductory Course P167-189Textbook: IST: Information and Software Technology 7-10 P 147-177Computers Don’t Byte! Student Activities for Understanding ComputersMore Creative Ideas for Teaching Computing StudiesInformation and Software Technology A Project-Based Approach Chapter 13

4

Page 5: HICKSM11416723_884689_1

EMT443 Melinda Hicks 11416723

SYMBOL

INFORMATION AND SOFTWARE TECHNOLOGY

Task Number 7

Year 9

Assignment Topic: Networking Systems

Assignment Due Date: ?

Assignment Weighting: ?

Outcomes:

5.2.1 Describes and Applies problem-solving processes when creating solutions

5.2.2 Designs, produces and evaluates appropriate solutions to a range of challenging problems

5.2.3 Critically analyses decision-making processes in a range of information and software solutions

5.3.2 Acquires and manipulates data and information in an ethical manner

Rubric:

In your answer you will be assessed on how well you:

Recognise different modes of transmission

Examine the range of media for data transmission

Critically analyse a given network topology for a particular situation

Assess the impact of factors influencing the choice of transmission media

Identify the network connectivity devices

Task:

Working as an individual outside class time and during, you are required to write a report to the business owner, based on the following scenario, suggesting a network to use in order to fix the businesses networking issues. As part of your report you are required to state why you chose the network topology, components, and transmission media and mode.

SENARIO: A business owner has purchased another building on the second floor across the road from his current ground floor office. He wants to network both the offices in the cheapest and most effective way possible. In the ground floor office he has 5 employees and in the second story office across the road he has 4 employees. The business makes use of telephones and fax machines along with printing, scanning and photocopying devices and relies heavily on the internet.

Teacher Setting Assignment: Miss Hicks

Assignment Marking Criteria

5

Page 6: HICKSM11416723_884689_1

EMT443 Melinda Hicks 11416723

Criteria Marks Clear well written suggestion as to which network topology to use. Clear well written suggestion as to which network components to use. Clear well written suggestion as to which transmission media and mode to use for network. Reasons clearly states as to why network topology, components, and transmission media

and mode are chosen for the business. Information clearly relates to the main topic. It includes several supporting details and/or

examples. All sources (information and graphics) are accurately documented in the desired format. Information is very organized with well –constructed paragraphs and subheadings Shows a full understanding of topic No grammatical, spelling or punctuation errors. Report is clearly targeted at business owner.

61 - 80

Well written suggestion as to which network topology to use. Well written suggestion as to which network components to use Well written suggestion as to which transmission media and mode to use for network. Reasons stated as to why network topology, components, and transmission media and

mode are chosen for the business. Information clearly relates to the main topic. It provides 1-2 supporting details and/or

examples. All sources (information and graphics) are accurately documented, but a few are not in the

desired format. Information is organized with well-constructed paragraphs. Shows a good understanding of topic. Almost no grammatical, spelling or punctuation errors. Report is mainly targeted at business owner.

41 - 60

Network topology to use for network suggested. Network components suggested. Transmission media and mode suggested. An attempt to state reasons as to why network topology, components, and transmission

media and mode are chosen for the business. Information relates to the main topic. All sources are documented, not in the desired format and the information is disorganised. Shows a good understanding of parts of the topic, with a few grammatical, spelling or

punctuation errors. Report attempts to be targeted at business owner.

21 - 40

Network topology and components to use are poorly or not suggested, with poor or no reason for choice stated.

Transmission media and mode to use for network are poorly or not suggested. Information has little or nothing to do with the main topic. Sources are not well documented and information is not well organised. Little understanding of the topic, with many grammatical, spelling or punctuation errors. Little or no attempt to be targeted at business owner.

0 - 20

6

Page 7: HICKSM11416723_884689_1

EMT443 Melinda Hicks 11416723

Lesson Number Content Skills Teaching & Learning Strategies ResourcesLesson 1- Introduction to Communications Networks

Students learn about:- Nature and role of a

communications network- The impact of past, current and

emerging technologies on the individual and society

Students learn to:- Describe the nature and role of a

communications network

- As a class, mind map the ideas as to what a network is and how it is used on the board to copy into their books. Gets students thinking about what they already know.

- On the board create a class social network, showing transmission mode (phone internet, mail) and Components (people), enable a students to write on the board there ideas. Enables students to think about how networks effect their everyday life and relates the topic to them.

- Give students Past, Current and Emerging Technologies Worksheet to work through individually. Enables students to engage in a different style of learning and have a hard copy of what they have learnt.

- Review worksheet and go over answers with students. Reinforces class work for students, and makes sure they have the correct understanding.

1

7

Page 8: HICKSM11416723_884689_1

EMT443 Melinda Hicks 11416723

Lesson Number Content Skills Teaching & Learning Strategies ResourcesLesson 2- Communications Networks

Students learn about:- Advantages and disadvantages of

a communication network such as- Sharing of peripheral

devices- Application programs- Data- Security of information- Access to databases

Students learn to:- Discuss the advantages and

disadvantages of establishing a network

- With student help revise what was covered in the previous lesson. Reinforces learning, and enables students who missed the previous lesson to have a basic understanding of class work.

- Play a game of chinese whispers, as an example of an issue that could occur in networks.

- Draw table on board discussing with the class the advantages and disadvantages of networks and establishing a network, to be copied into work books. Engages students in self learning and is a visual que for students to see the positives and negatives of networks.

- Give students Issues Worksheet to work through individually. Engages students in a different type of learning, gives them a hard copy of their learning to review.

- Review worksheet and go over answers with students. Ensures students have the right idea.

- Hand out Assignment Sheet and Marking Criteria and have an explanation on it.

Assignment

2

8

Page 9: HICKSM11416723_884689_1

EMT443 Melinda Hicks 11416723

Lesson Number Content Skills Teaching & Learning Strategies ResourcesLesson 3- Client server and peer-peer networks

Students learn about:- Client server and peer-peer

networks

Students learn to:- Compare a client/server network

with a peer-peer network

- Discuss, Compare and Contrast client server and peer-peer networks with students using, allow students to make notes in work books. Engages students to think for themselves and self learn, whilst learning from others.

Cooperative learning- students work in pairs to

investigate the school network, and make a diagram. Allows students to examine a real life situation and relate to networking in their individual world.

Lesson 4- Components of Networks

Students learn about:- Components of Networks such as

- Servers-file sharing servers- Print servers- Mail servers- Workstations- Hubs- Switches- Routers- Gateways- Repeaters- Bridges- Network interface card

Students learn to:- Describe and compare servers for

a particular network- Download and upload files to a

host- Describe the purpose of network

connectivity devices

- Go through definitions of components and other key course words with students allowing them to take notes in work books. Gives students a definite understanding of key networking terminology.

Cooperative learning- Split students into pairs, giving

each student in the pair half the list of glossary words, to research online the purpose of the devices and email results to partner. Allows students to examine and understand terminology for themselves.

- Ask students to learn glossary terms for Definition Restriction Game in the following lesson.

3

9

Page 10: HICKSM11416723_884689_1

EMT443 Melinda Hicks 11416723

Lesson Number Content Skills Teaching & Learning Strategies ResourcesLesson 5- Components of Networks

Students learn about:- Components of Networks such as

- Servers-file sharing servers- Print servers- Mail servers- Workstations- Hubs- Switches- Routers- Gateways- Repeaters- Bridges- Network interface card

Students learn to:- Describe and compare servers for

a particular network- Download and upload files to a

host- Describe the purpose of network

connectivity devices

- Play Definition Restriction Game using glossary from the previous lesson. Reinforces terminology for students in a fun way.

Cooperative Learning - Split students into groups, chose a

network for each group and ask them to make a poster comparing servers for that network, using online research. (To be completed in the following lesson) Allows students to engage in their learning and take control.

34

Lesson 6- Components of Networks

Students learn about:- Components of Networks such as

- Servers-file sharing servers- Print servers- Mail servers- Workstations- Hubs- Switches- Routers- Gateways- Repeaters- Bridges- Network interface card

Students learn to:- Describe and compare servers for

a particular network- Download and upload files to a

host

- Students continue to make posters comparing servers for particular networks. (to be completed this lesson and presented the following lesson to the class)

3

10

Page 11: HICKSM11416723_884689_1

EMT443 Melinda Hicks 11416723

Lesson Number Content Skills Teaching & Learning Strategies ResourcesLesson 7- Components of Networks

Students learn about:- Components of Networks such as

- Servers-file sharing servers- Print servers- Mail servers- Workstations- Hubs- Switches- Routers- Gateways- Repeaters- Bridges- Network interface card

Students learn to:- Describe and compare servers for

a particular network- Download and upload files to a

host- Describe the purpose of network

connectivity devices

- Students present their posters in groups, comparing servers for particular networks. Students engage in each others learning and increase in self motivation when learning about all components of a network.

- Revision: Play Definition Restriction Game using glossary from lesson 4. Reinforcing previous learning.

4

Lesson 8- Network Topology

Student learn about:- Network topologies including

- Star- Ring- Bus

Students learn to:- Graphically illustrate network

topologies- Critically analyse a given network

topology

- Watch “Ring Topology” introductory video. Visually shows students ring topology.

- Discuss ring topology, identifying the advantages and disadvantages, allowing students to take notes in work books, and clear up any misunderstandings.

- Watch “Network Topology” introductory video. Visually shows students bus topology in a similar way to ring topology.

- Discuss bus topology, identifying the advantages and disadvantages, allowing students to take notes in work books, and clear up any misunderstandings.

- Watch “Star Topology”

567

11

Page 12: HICKSM11416723_884689_1

EMT443 Melinda Hicks 11416723

introductory video, which visually shows star topology in the same way as the previous topologies.

- Discuss star topology, identifying the advantages and disadvantages, allowing students to take notes in work books, and clear up any misunderstandings.

- Get students to graphically illustrate in their work books each network topology. Reinforces learning and gives students a hard copy of their learning.

- Remind students to bring their assignments to the following class to work on. (preparation for following lesson)

Lesson 9- Assignment Development

Students learn about:- Project Development processes

and techniques

Students learn to:- Design, produce and evaluate a

simple project for a real world application

Scaffolded instruction- Revision: Play Definition Restriction

Game using glossary from lesson 4 and other key terms learnt in the previous 8 lessons, to reinforce knowledge in a fun and familiar way.

- Allow students to work on their assignments. Students integrate their learning so far into their assignments. It enables students to talk to teacher.

43

12

Page 13: HICKSM11416723_884689_1

EMT443 Melinda Hicks 11416723

Lesson Number Content Skills Teaching & Learning Strategies ResourcesLesson 10- Types of Networks

Students learn about:- Types of Networks such as

- Local Area Network (LAN)- Wide Area Network (WAN)- Virtual Private Network

(VPN)

Students learn to:- Graphically represent a LAN or

WAN using ICT such as graphics software

Scaffolded Instruction- Discuss with the class on the board

the types of networks, including the use of diagrams. Allow students to take notes in work books.

- Give students Types of Networks Worksheet to work through. Reinforces learning for the students and gives them a hard copy of what they have learnt in the lesson.

- Using graphics software available by the school get students individually to graphically represent both a LAN and WAN, allows students to integrate core knowledge into the topic and enables the students to visually see different networks.

- Remind students at the end of the lesson to continue thinking about there assignment, and that they should have enough information to start work on it.

38

13

Page 14: HICKSM11416723_884689_1

EMT443 Melinda Hicks 11416723

Lesson Number Content Skills Teaching & Learning Strategies ResourcesLesson 11- Types of Networks

Students learn about:- Types of Networks such as

- Local Area Network (LAN)- Wide Area Network (WAN)- Virtual Private Network

(VPN)

Students learn to:- Design a small network of at least

two work stations to allow for file sharing.

- Explain the school communications link to the outside world.

Scaffolded Instruction- Using the diagrams of the schools

network system from lesson 3, enable the students to discuss and explain the school communications link to the outside world, relates the topic to the students real world.

- As a class enable the students to design and set up a small network for file sharing. Allows students to explore the networking system structure, in a way that is self motivated.

9

Lesson 12- Data Transmission Modes

Students learn about:- Data Transmission Modes

- Simplex- Half Duplex- Full Duplex

Students learn to:- Recognise different modes of

transmission

- Give students Data Transmission Media Worksheet to work through, discussing the ‘fill in the gaps’ section as a class. Introduces the topic in a new way.

- Discuss as a class the modes of data transmission. Allowing students to explore the topic for themselves as a class.

- Watch “Half Duplex and Full Duplex” video, explains to students the difference between transmission modes.

- Create a table on the board for the class to identify under what circumstances to use each mode of data transmission, an interactive and visual form of learning for students.

1011

14

Page 15: HICKSM11416723_884689_1

EMT443 Melinda Hicks 11416723

Lesson Number Content Skills Teaching & Learning Strategies ResourcesLesson 13- Data Transmission Media

Students learn about:- Data Transmission Media

- Wire- Wireless

Students learn to:- Examine the range of media for

data transmission

Scaffolded Instruction- Lead a class discussion as to what is

wireless and wired transmission, enabling students to explore their own previous knowledge.

- Enable class to make a list on the board of different transmission types known to them enabling them to explore their knowledge.

- Watch “Wired vs Wireless” video, allowing students to take notes in work books. The video explains the differences between transmission.

- Discuss aspects of the video as a class, reinforcing their learning, whilst allowing the students to maintain control of what they learn.

- Watch “How to pick the right Network Cables for your Home Network” video, which explains different CAT cables.

- Discuss aspects of the video as a class, reinforcing their learning, allowing the students to maintain control of what they learn.

- Allow class to add to their list of transmission media used, and discuss types addressed by students and add to transmission media addressed if need be.

1213

15

Page 16: HICKSM11416723_884689_1

EMT443 Melinda Hicks 11416723

Lesson Number Content Skills Teaching & Learning Strategies ResourcesLesson 14- Data Transmission Rates

Students learn about:- Data Transmission rates:

- Baud rates- Bits per second

Students learn to:- Discuss and compare the

methods used to measure transmission rates

- Draw a mind map on the board of the students’ knowledge of transmission rates, as a visual way of allowing students to see their own knowledge.

Cooperative Learning- Split class into two groups, have

one group research baud rates and the other group research bits per second. With the objective to have a class debate/discussion in the following class. Allowing students to be self motivated to learn and in control of their learning.

3

Lesson 15- Data Transmission Rates

Students learn about:- Data Transmission rates:

- Baud rates- Bits per second

Students learn to:- Discuss and compare the

methods used to measure transmission rates

Cooperative Learning & Scaffolded Instruction- Have the two groups of students,

from the previous class, sit at different sides of the room, allowing the students to control and lead their own class debate/discussion to compare both methods of data transmission rates.

- Bring the class back together and come to a conclusion as to both of the discussed data transmission, using two mind maps, one for each transmission rate, to reinforce their learning.

3

16

Page 17: HICKSM11416723_884689_1

EMT443 Melinda Hicks 11416723

Lesson Number Content Skills Teaching & Learning Strategies ResourcesLesson 16- Factors influencing media Transmission

Students learn about:- Factors influencing media

transmission such as:- Cost- Distance- Extension limitations such

as the number of nodes and sustainability

Students learn to:- Assess the impact of factors

influencing the choice of transmission media

- Discuss with students what are factors that they think could influence media transmission.

- As a class read through “Factors Influencing Media Transmission”, as a different form of learning for the students.

- Handout “Media Transmission Revision” Worksheet, to be completed, reinforcing learning and giving students a hard copy of their work.

- Go over as a class answers to the worksheet, to reinforce learning and ensure students have the correct idea.

- Encourage students to continue working on their assignments and to think about what type of media transmissions they might use.

- Remind students to bring their assignments to the following class. (preparation for following class)

1415

Lesson 17- Assignment Developments

Students learn about:- Project Development processes

and techniques

Students learn to:- Design, produce and evaluate a

simple project for a real world application

- Propose industry links with networking organisations

- Students integrate their learning so far into their assignments. Enables students to talk to teacher about struggles and for the teacher to gain an understanding as to where the students are up to in their individual learning and development in the networking environment.

3

17

Page 18: HICKSM11416723_884689_1

EMT443 Melinda Hicks 11416723

Lesson Number Content Skills Teaching & Learning Strategies ResourcesLesson 18- Protocols Students learn about:

- Protocols such as:- TCP/IP- IPX/SPX- Netbui- appletalk

Students learn to:- Define and describe the purpose

of a protocol

- Identify and describe types of protocols

Scaffolded Instruction- Discuss with class what a protocol

is, enabling students to teach each other.

- Watch “TCP/IP animation”, allowing students to take notes, the video explains mainly TCP/IP and other protocols

- Have a class discussion on video, to reinforce learning.

- Allow students to search online in “Tech Tutorials” to write notes on each protocol, for reference for their assignment.

3 1617

Lesson 19- Protocols Students learn about:- Protocols such as:

- TCP/IP- IPX/SPX- Netbui- appletalk

Students learn to:- Define and describe the purpose

of a protocol

- Identify and describe types of protocols

- Students are split into groups to design a role play, that uses or explains a protocol, to reinforce their learning and present the knowledge in a new way.

Lesson 20- Protocols Students learn about:- Protocols such as:

- TCP/IP- IPX/SPX- Netbui- appletalk

Students learn to:- Define and describe the purpose

of a protocol

- Identify and describe types of protocols

- Students in their groups perform their protocol role play.

- Handout “Protocol Revision” Worksheet, to revise what has been covered throughout the protocol lessons

- Go over answers with students, to worksheet, making sure students have the right idea.

18

18

Page 19: HICKSM11416723_884689_1

EMT443 Melinda Hicks 11416723

Lesson Number Content Skills Teaching & Learning Strategies ResourcesLesson 21- Security of Information

Students learn about:- Security of Information

- Storage- Backup- security

Students learn to:- Describe the appropriateness of

different storage media including backup requirements

- Discuss the implications of storage and backup techniques

- Investigate a range of security techniques that apply to networks

- Watch “Security” video allowing students to take notes in work books, expalins what security involves.

- Discuss video and hand out “ Security case study” work sheet

- Watch “Security Case Study” and allow students to answer case study work sheet in work books, enables students to think for themselves, about a real world situation.

192021

Lesson 22- Security of information

Students learn about:- Security of Information

- Storage- Backup- security

Students learn to:- Describe the appropriateness of

different storage media including backup requirements

- Discuss the implications of storage and backup techniques

- Investigate a range of security techniques that apply to networks

- Handout “Data Handling” worksheet to be completed, revises data security and how it sits along side data transmission.

- Ask students to visit three online sites, such as ebay, intunes or facebook, and investigate how these companies ensure safe transaction. Students are to comment on security used for each and compare and contrast. Allows students to investigate security in the real world, using sites they visit individually.

- Remind students to remember to bring their assignments to the following class. (preparation for following lesson)

322

19

Page 20: HICKSM11416723_884689_1

EMT443 Melinda Hicks 11416723

Lesson Number Content Skills Teaching & Learning Strategies ResourcesLesson 23- Assignment Developments

Students learn about:- Project Development processes

and techniques

Students learn to:- Design, produce and evaluate a

simple project for a real world application

- Propose industry links with networking organisations

- Students integrate their learning into their assignments. It enables students to talk to teacher about struggles and for the teacher to gain an understanding as to where the students are up to in their learning and development in the networking environment.

Lesson 24- Revision Students learn about:- Components of Networks such as

- Servers-file sharing servers- Print servers- Mail servers- Workstations- Hubs- Switches- Routers- Gateways- Repeaters- Bridges- Network interface card

- Client server and peer-peer networks

- Network topologies including- Star- Ring- Bus

- Types of Networks such as- Local Area Network (LAN)- Wide Area Network (WAN)- Virtual Private Network

(VPN)

Students learn to:- Describe and compare servers for

a particular network

- Compare a client/server network with a peer-peer network

- Critically analyse a given network topology

- Watch “Basic Networking Revision” video, reinforcing basic networking.

- Play “Definition Revision” Game using terms covered in the previous 22 classes, to reinforce the meanings of the terms.

- Watch “Components of Networks Revision” video, to reinforce the components of networks.

- Handout “Components of Networks Crossword” worksheet, reinforcing network components knowledge.

4232425

Lesson Number Content Skills Teaching & Learning Strategies Resources

20

Page 21: HICKSM11416723_884689_1

EMT443 Melinda Hicks 11416723

Lesson 25- Network Operating Systems

Students learn about:- Network operating systems

- Purpose- Management such as

establishing users and groups users and groups, security permissions and policies and profiles, use of compression technology

Students learn to:- Recognise the purpose of a

network operating system software

- Discuss effective network management strategies

Scaffolded Instruction- Lead a class discussion on what a

network operating system is, and identify class know operating systems.

- Read “Networking Operating Systems” as a class, and discuss. Allowing students to learn in a different way as a class.

- Discuss as a class why it is important to keep passwords to yourself. Relates learning to a real world issue.

26

Lesson 26- Network Operation Systems

Students learn about:- Network operating systems

- Purpose- Management such as

establishing users and groups users and groups, security permissions and policies and profiles, use of compression technology

Students learn to:- Recognise the purpose of a

network operating system software

- Examine and describe the network operating system in a given situation

- Discuss effective network management strategies

Cooperative Learning- Split students into small groups to

research one NOS, and do a power point presentation to class with the results of their findings. (to continue research in the following lesson)

3

Lesson 27- Networking Systems

Students learn about:- Network operating systems

- Purpose- Management such as

establishing users and groups users and groups, security permissions and policies and profiles, use of compression technology

Students learn to:- Recognise the purpose of a

network operating system software

- Examine and describe the network operating system in a given situation

- Discuss effective network management strategies

Cooperative Learning- Students continue on their NOS

research and power point presentation in small groups ( to be presented the following class)

3

Lesson Number Content Skills Teaching & Learning Strategies Resources

21

Page 22: HICKSM11416723_884689_1

EMT443 Melinda Hicks 11416723

Lesson 28- Networking Systems

Students learn about:- Network operating systems

- Purpose- Management such as

establishing users and groups users and groups, security permissions and policies and profiles, use of compression technology

Students learn to:- Recognise the purpose of a

network operating system software

- Examine and describe the network operating system in a given situation

- Discuss effective network management strategies

- Students in their small groups present their power point presentations to the class.

Scaffolded Learning- Discuss as a class effective network

management strategies. You may refer back to the “Security” Case study (lesson 20), reinforcing previous knowledge, whilst integrating learning.

- Remind students to bring assignments to work on the following lesson. (preparation for the following lesson)

3

Lesson 29- Assignment Developments

Students learn about:- Project Development processes

and techniques

Students learn to:- Design, produce and evaluate a

simple project for a real world application

- Propose industry links with networking organisations

- Students integrate their learning into their assignments. It enables students to talk to teacher about struggles in the networking environment.

3

Lesson 30- Peer to peer network

Students learn about:- Peer to Peer Network

Students learn to:- Assemble a simple peer-peer

communication system

Scaffolded Learning- Discuss with students knowledge

learnt in lesson 3, about peer-peer networks, reinforcing previous learning.

- Handout “Creating a peer to peer network” sheets, allow students to follow steps and integrate problem solving skills to assemble a peer-peer network. To be used in creating a class LAN (continued into the following lesson)

327

Lesson Number Content Skills Teaching & Learning Strategies Resources

22

Page 23: HICKSM11416723_884689_1

EMT443 Melinda Hicks 11416723

Lesson 31- Peer to peer network

Students learn about:- Peer to Peer Network

- Setting up a LAN

Students learn to:- Assemble a simple peer-peer

communication system

Scaffolded Instruction- Students finish peer to peer

network from previous class

- Discuss with students how they would maintain security in the class LAN, and what operating system would they use. This reinforces previous content knowledge and relates it to peer to peer networking.

- Using “Creating a peer to peer network” sheets as a basis evaluate the network and compare it to the schools current network.

- Remind students to bring their assignments to the following class. (preparation for the following lesson)

3

Lesson 32- Assignment Development

Students learn about:- Project Development processes

and techniques

Students learn to:- Design, produce and evaluate a

simple project for a real world application

- Propose industry links with networking organisations

- Students integrate their learning into their assignments. It enables students to talk to teacher about struggles in the networking environment. Students should be nearly finishing their assignments as it is the second last lesson they have to work on their assignment.

3

23

Page 24: HICKSM11416723_884689_1

EMT443 Melinda Hicks 11416723

Lesson Number Content Skills Teaching & Learning Strategies ResourcesLesson 33- Internet Case Study

Students learn about:- A Communications Network

- Security of information- Storage - Backup- Security

Students learn to:- Propose industry links with

networking organisations

- Describe the appropriateness of different storage media including backup requirements

- Discuss the implications of storage and backup techniques

- Handout “Internet Case Study” worksheet to be completed during class, to integrate previous knowledge into a proposed real world situation.

- Watch “All Online Data Lost After Internet Crash!” videos, a preposed real world situation as to what would happen if the internet crashed.

- Watch “The Internet is the Corporate Network” video, relating subject knowledge to the real world.

- Allow students to fill out worksheet and as a class discuss videos.

282930

Lesson 34- Library Network Case Study

Students learn about:- A communications network

- Nature and role

- Components of networks

- Security of Information- Storage- Backup- Security

- Network Operating Systems

Students learn to:- Evaluate the performance of a

given network in terms of bandwidth, speed of device and cables

- Describe and Compare servers for a particular network

- Examine and Describe the purpose of a network operating system

- Identify and Describe types of protocols

- Examine the range of media for data transmission

- If a double period is available make part of the lesson into a field trip to the local town library to research the library network system. Otherwise using the internet investigate a know libraries network and discuss as a class the different aspects of the network, ie: topology, components etc

- Remind students to bring assignments to following class to work on. (previous lesson preparation)

3

Lesson Number Content Skills Teaching & Learning Strategies Resources

24

Page 25: HICKSM11416723_884689_1

EMT443 Melinda Hicks 11416723

Lesson 35- Assignment Development

Students learn about:- Project Development processes

and techniques

Students learn to:- Design, produce and evaluate a

simple project for a real world application

- Propose industry links with networking organisations

- Students integrate their learning into their assignments. It enables students to talk to teacher about struggles in the networking environment. Students should be nearly finishing their assignments to be handed in the following lesson.

3

Lesson 36- Revision Students learn about:- Protocols- Data Transmission modes- Data Transmission Rates- Data Transmission Media- Types of Networks- Client Server and peer-peer

Networks- Components of Networks- Security of Information- Network Operating Systems- Factors influencing media

transmission

Students learn to:- Define and describe the purpose

of a protocol- Discuss and compare the

methods used to measure transmission rates

- Examine the range of media for data transmission

- Compare a client/server network with a peer-peer network

- Describe and compare servers for a particular network

- Describe the purpose of network connectivity devices

- Recognise the purpose of a network operating system software

- Students hand in their assignments.

- Enable students to discuss as a class what parts of networking they struggle with or don’t understand, attempt to help students and answer their questions.

- Play “Definition Restriction” game, using Networking System terms, allowing for recognition and reinforcement of the topic terms.

Cooperative Learning- Split students into teams or four

and have a team quiz, using “Team Quiz Questions”, reinforcing knowledge and drawing on students’ team work and cooperation.

431

25

Page 26: HICKSM11416723_884689_1

EMT443 Melinda Hicks 11416723

References(n.d.). Retrieved October 6, 2010, from Tech Tutorials: http://www.youtube.com/watch?v=Wc1dOw4j3J8

All Online Data Lost After Internet Crash! (2007, July 11). Retrieved October 10, 2010, from YouTube: http://www.youtube.com/watch?v=z4vDClhnJjs

ApFaqTech. (2010, February 28). How to pick the right Network Cables for your Home Network. Retrieved October 2, 2010, from YouTube: http://www.youtube.com/watch?v=C2Ovabby7zw

Computers, E. (2008, April 28). Explaining Computer Security. Retrieved October 6, 2010, from YouTube: http://www.youtube.com/watch?v=Wc1dOw4j3J8

darkwinglh. (2007, January 1). Computer Security 101. Retrieved October 6, 2010, from YouTube: http://www.youtube.com/watch?v=_E4DO4ADCqw&feature=related

Grover, D. (1999). More Creative Ideas for Teaching Computer Studies. Sydney: David Grover.

Grover, D., Range, J., Knights, H., Gormley, E., & Perri, S. (2005). Information and Software Technology A Project-Based Approach. Melbourne: Pearson Education Australia.

Internet Basics : How Does a Wireless Network Internet Connection Work? (2010, March 23). Retrieved October 10, 2010, from YouTube: http://www.youtube.com/watch?v=gi1QkmGVf5E

lacvietthusinh. (2006, November 24). Network Topology. Retrieved September 30, 2010, from YouTube: http://www.youtube.com/watch?v=oVOeNcJJYos&feature=related

lacvietthusinh. (2006, November 24). Ring Topology. Retrieved September 30, 2010, from YouTube: http://www.youtube.com/watch?v=U6TX4Zbu2ao&feature=related

lacvietthusinh. (2006, November 24). Star Topology. Retrieved September 30, 2010, from YouTube: http://www.youtube.com/watch?v=aNxxrawNu48&feature=related

Pereira, L. (1997). Computers Don't Byte. Australia: Hawker Brownlow Education.

Powers, G. (1996). Computing Studies An Introductory Course. Port Melbourne: Heinemann.

Powers, G. (2010). Information and Software Technology stage 5. Port Melbourne: Heinemann.

Studies, B. o. (3003). Information and Software Technology Elective Course Year 7-10 Syllabus. Sydney: Board of Studies NSW.

Tanvir, K. (2009, November 13). Half Duplex Full Duplex . Retrieved October 2, 2010, from YouTube: http://www.youtube.com/watch?v=sYOXtIl_lO0

Ware, P., Cooke, P., Opfer, D., & Wall, J. (2005). IST: Information and Software Technology 7-10. Milton: John Wiley & Sons Australia.

Wilson, C. (2001). Exploring Computing Studies (2nd ed.). New York: Cambridge University Press.

Wired vs Wireless. (2008, February 6). Retrieved October 2, 2010, from YouTUbe: http://www.youtube.com/watch?v=ykuRokSgRIU&feature=related

26

Page 27: HICKSM11416723_884689_1

EMT443 Melinda Hicks 11416723youfiberlink. (2008, April 9). The Internet as a Corporate Network. Retrieved October 10, 2010, from YouTube: http://www.youtube.com/watch?v=nH4GoXEoiSc

Appendices

Appendix 1: Past, Current and Emerging Technologies Worksheet

Name________________________________________________Date____________Class____________

Past, current and emerging technologies Past, current and emerging technologies Select the missing word from the list:

better, broadband, cable, cause, data, Defence, devices, development, distance, easier, hackers, hardware, home, manufacturers, modems, network, networks, offer, predict, radio, secure, signals, standard, transfer, unit

Networking has been the _______________ of many changes in computer technology. Connectivity

eventually led to the _______________ of the Internet when the US Department of _______________

wanted to share files between computers in the 1960s. Newer and _______________ means of

connecting computers, both in terms of _______________ and software, are continually occurring.

In more recent times, _______________ computers now have an alternative to _______________ as a

means of connecting to the wider world. ADSL, _______________ and satellite connections (the three

types of _______________) have improved the data _______________ speeds possible at home.

Many peripheral _______________ no longer need to be physically cabled to the system

_______________, instead transferring data by infra-red _______________. Laptop computers can use

_______________ transmitters to connect to _______________ provided that they are within a certain

physical _______________.

Operating systems are starting to _______________ networking components as part of the

_______________ installations. It has become _______________ for the average person to build a

home _______________.

27

Page 28: HICKSM11416723_884689_1

EMT443 Melinda Hicks 11416723It is hard to _______________ the shape of future networking systems. Designers and

_______________ are working towards faster _______________ transfer methods. Unfortunately,

_______________ are also pushing them to develop more _______________ systems.

28

Page 29: HICKSM11416723_884689_1

EMT443 Melinda Hicks 11416723

Appendix 2: Issues Worksheet

Name________________________________________________Date____________Class____________

Issues Issues Rhyming words have been swapped for the bold words shown. Work out the word that should be used.

Software licences can be accidentally breached when networks are used. Program licences should be

carefully bed before programs are installed on network computers to ensure that licensing conditions

are being pet. Large whines can be issued to people who make the copyright involved in software

licences.

Hacking refers to unauthorised access to piles. Networks should be carefully banned to reduce the

chance of hacking. User games and passwords can be used to restrict access to either the whole network

or hearts of the network. Firewalls can rock access to machines that are outside the immediate network.

Networks have caused many ranges in the workplace. Virtual offices allow people to connect to

networks from remote locations much as when they are travelling or working from roam

(‘telecommuting’). The easy transfer of files from employee to employee has reduced the speed for

printouts—some offices are slowly becoming ‘paperless’. However, the downside has been that many

people have been forced to burn computer skills in order to sleep their jobs.

29

Page 30: HICKSM11416723_884689_1

EMT443 Melinda Hicks 11416723

Appendix 3: Definition Restriction Game

30

Page 31: HICKSM11416723_884689_1

EMT443 Melinda Hicks 11416723

31

Page 32: HICKSM11416723_884689_1

EMT443 Melinda Hicks 11416723

32

Page 33: HICKSM11416723_884689_1

EMT443 Melinda Hicks 11416723

33

Page 34: HICKSM11416723_884689_1

EMT443 Melinda Hicks 11416723

34

Page 35: HICKSM11416723_884689_1

EMT443 Melinda Hicks 11416723

Appendix 4: Types of Networks Worksheet

Exercise 13.31 What am I?

a A private network carrying encrypted data across the Internet.

b A controlling computer in a network that stores the programs

and data shared by users.

c A link between two different types of networks.

d A network with no central server but each computer is both a

server and a client.

2 Copy and complete the following sentences:

a A _______ is a network on one site such as within a building or

group of buildings.

b A workstation is a _______ on a network.

c A _______ is a very intelligent hub that directs data packets to

and from other networks.

d A NIC is an _______ that allows a device to be connected to a

network.

3 True or false?

a A WAN is often made up of a collection of LANs.

b Each node is connected directly to a hub.

c A bridge is used to rebuild a fading signal to its original

strength and shape before transmitting it onwards.

d Most networks use a peer-to-peer network for their LAN.

35

Page 36: HICKSM11416723_884689_1

EMT443 Melinda Hicks 11416723

Appendix 5: Data Transmission Media Worksheet

Humans and other _______________ have been _______________ for millions of years. Most of our

conversational communications have used either: sound and other forms of _______________ of the

air, solids and the _______________ that surrounds us; or visual cues, requiring the movement of

reflected light from one life-form to the visual _______________ of another life-form. Humans

developed sophisticated languages to _______________ data, and invented new media to

_______________ this data. The invention of _______________ and printing enabled the very largescale

transfer of data in the form of _______________ and _______________. During the 19th

century, the invention and use of the _______________ led to widespread use of the

_______________ transmission of messages by signals. In the 21st _______________, most of our

data transmission is via the wires that make up telephone and _______________ networks.

Network computers are _______________ to each other using:

• a wire-based medium, such as _______________ wire

• wireless adaptors and wireless access _______________over a wireless medium

36

Page 37: HICKSM11416723_884689_1

EMT443 Melinda Hicks 11416723• a _______________ of _______________ infrastructure and _______________ media

37

Page 38: HICKSM11416723_884689_1

EMT443 Melinda Hicks 11416723

Appendix 6: Factors Influencing Media Transmission Reading

Factors influencing media transmissionWhen creating a network, you need to consider a number of factors that influence media transmission. These include set-up cost, the number of nodes and the distance between them, and the ease with which the network can be maintained and expanded.

CostOne of the major influencing factors in building a network is cost. When building a network, there is always a trade-off between what is desired and what is affordable; nearly all network development projects are constrained by the available funds or budget. The budget willinfluence all decisions including the type and brand of hubs, switches and cabling. For example, optical fibre cabling is faster and can carry data for greater distances than UTP but it is also more expensive. Building a suitable network with a limited budget is a difficult task.

DistanceDistance is an important factor to consider when deciding what type of cabling to use. Different types of cable have maximum effective length limits. For example, the maximum length for UTP is 100 metres in total between nodes. Data transmission signals degrade over distance so you will need to determine how many repeaters are required to ensure there is no data loss. Over large distances, you may need to decide between using optical fibre cable and microwave; cost will then be an important factor.

The number of nodes In a network, nodes are the devices at the end of a cable, such as workstations and printers. The size and shape of your network will be determined in part by the number of nodes in it; a network with two nodes will be very different from a network with 1000 or more nodes. The number of nodes in your network will also influence the transfer rate of data through your network. The more nodes you have, the greater the demand for individual frequencies (bandwidth) for datatransmission. The number of nodes may also influence whether you choose hubs or switches. Hubs share their bandwidth between the number of users, so a 100-Mbps hub with 10 users will give each user 10 Mbps. However, switches give each user the full bandwidth, so a 100-Mbps switch with 10 users will give each user 100 Mbps.

Sustainability and expansion (scaling)When designing a network, you need to consider how it will be maintained and you need to design it so that it can expand easily. For example, it is easier and cheaper to add nodes to a star network than to a ring network.

38

Page 39: HICKSM11416723_884689_1

EMT443 Melinda Hicks 11416723Appendix 7: Media Transmission Revision Worksheet

Data Transmission

Remember1. Define the term ‘data transmission’.

2. Describe three types of data transmission.

3. Give three advantages of optical fibres over copper wire cable for data transmission and give one disadvantage.

4. Describe one disadvantage of using radio waves to transmit data.

5. Describe three influences on data transmission.

Think1. Explain the differences between optical fibre and UTP cables

2. Explain the difference between baud rate and bps.

39

Page 40: HICKSM11416723_884689_1

EMT443 Melinda Hicks 11416723Appendix 8: Protocol Revision Worksheet   

Protocols

Remember1. Define the term ‘protocol’.

2. Explain what each of the following protcol names stand for, and describe the main features of each protocol.

- TCP/IP- IPX/SPX- Netbui- Appletalk

Think1. Discus why there are so many protocols.

40

Page 41: HICKSM11416723_884689_1

EMT443 Melinda Hicks 11416723Appendix 9: Security Case Study (Worksheet)

Case Study- Department of Justice

What issues can arise by not protecting information?

What should have happened to the information on the Attorney Office Computer information?

What is sensitive information at the department of justice?

How can data integrity be threatened?

What is risk management?

What is the individuals’ role in computer security at the Department of Justice?

What threats can occur when using unauthorised software?

What are some signs of data security breeches?

What are the three main points in data security at the Department of Justice?

41

Page 42: HICKSM11416723_884689_1

EMT443 Melinda Hicks 11416723

Appendix 10: Data Handling Worksheet

Name________________________________________________Date____________Class____________

Data handling Data handling Common two- and three-letter words have been substituted with symbols. Decode the information.

Networking systems designed transfer • data. Files may stored a central server, access

them may rely network place. Most networks transfer data with serial transmission. Data

sent one bit after another along connecting channels, usually packets • data. Packets contain data

front indicating destination • packet.

Broadband systems transfer data a similar fashion parallel data transfer. Multiple packets • data

can sent once through connecting cabling. Optic fibres utilise broadband transmission.

speed • a network measured how many bits can transferred per second. main parts • larger

networks usually have transmission rates measured gigabits per second.

Data security becomes an issue with computer networks because • large volumes • data being

transferred through network. Encryption technology ‘scrambles’ data before it sent, it

decrypted when it arrives its destination. receiving computer must possess correct ‘key’ able

decode data correctly. Insecure network sections often involve wireless data transmission—infra-

red signals radio transmitters (short distance), microwave signals (mid-distance), satellites (long

distance).

42

Page 43: HICKSM11416723_884689_1

EMT443 Melinda Hicks 11416723

Appendix 11: Components of Networks Crossword Worksheet

43

Page 44: HICKSM11416723_884689_1

EMT443 Melinda Hicks 11416723

Appendix 12: Network Operating Systems Reading

Network operating systemsUntil a computer's operating system is loaded, it is just a collection of hardware. It is the operating system that makes the computer usable. This also applies to networks. A network requires cables, workstations, hubs and switches but it is the network operating system (NOS) that enables data to be transferred between these components. The network operating system is a set of programs that ensures reliable data transfer. It also provides tools so that the network administrator can manage various functions of the network.

PurposeThe network operating system manages the flow of data across the network. It enables clients (workstations) attached to the network to access network resources, such as files and printers, that are shared by the network servers. Usually, many clients are attached to a LAN so clients may request access to one or more network services simultaneously. The NOS must be able to handle several requests at once; this is called `multitasking'. In addition, the client operating system must be able to multitask because it needs to handle incoming network traffic, such as email, without demanding the user's attention. This allows the user to perform other tasks on the workstation without interruption. The NOS typically comprises two parts: the client software that is installed on each workstation and the server software that is installed on the server only. Together, the client software and the server software provide a secure method for clients to access resources on the server. When users log in, their identity is authenticated by the server. This means that the client software sends the user name and password to the server. The server software then searches its database for that username. If the user exists and the password is correct, the user will be logged in to the system. If the user does not exist or the password is incorrect, the user will not be logged in to the system and an error message will be displayed. For a network to function efficiently, the network server running the NOS must meet the minimum required specifications. The table on the right shows the minimum hardware requirements of some popular network operating systems.

ManagementA network operating system provides the network administrator with the tools to manage the network. The network administrator uses these tools to perform a huge range of tasks including: establishing users and groups. The network administrator adds and removes users

and groups from the system. Users and groups are allocated access to the resources they need to do their work. Groups contain users who have similar tasks to perform and who require access to the same resources. Establishing groups allows the network administrator to give file and resource permissions to a group instead of individual users. When users are added to a group, they acquire the permissions of that group.

security permissions. Security is an integral part of any network. When users are created, they are given access only to the files and resources that they will need to perform their work. These security permissions are usually applied when the user logs in to the network.

policies and profiles. Policies and profiles are used to customise the client's desktop. Policies can be `open' (users have rights to use everything on the client machine) or `locked down' to restrict what a user can do on a client machine. Profiles can be used in conjunction with policies. Profiles generally give the user a

44

Page 45: HICKSM11416723_884689_1

EMT443 Melinda Hicks 11416723uniform working environment regardless of which workstation they use on the network.

use of compression technologies. No matter how new or expensive a network is, it seems that it never has enough storage space and it never has high enough data transfer rates. Compression technologies go some way to solving these two problems. Data that are used infrequently can be tagged for compression, thus taking up less disk space while not in use. Equally, there are a number of data compression technologies that compress data to be transferred so that they will require less bandwidth.

45

Page 46: HICKSM11416723_884689_1

EMT443 Melinda Hicks 11416723

Appendix 13: Creating a Peer to Peer Network Worksheet

46

Page 47: HICKSM11416723_884689_1

EMT443 Melinda Hicks 11416723

47

Page 48: HICKSM11416723_884689_1

EMT443 Melinda Hicks 11416723

48

Page 49: HICKSM11416723_884689_1

EMT443 Melinda Hicks 11416723

49

Page 50: HICKSM11416723_884689_1

EMT443 Melinda Hicks 11416723

50

Page 51: HICKSM11416723_884689_1

EMT443 Melinda Hicks 11416723

51

Page 52: HICKSM11416723_884689_1

EMT443 Melinda Hicks 11416723

Appendix 14: Internet Case Study Worksheet

Internet Case Study

Getting Started

1. Define each of the following terms: Internet, website, network, intranet, global decentralisation, virus?

2. Explain the use of abbreviations such as .edu, .com, .org… in internet addresses?

All Data Lost After Internet Crash

1. Outline the basic input/output devices most probably used to send the ‘fatal error’ message?

2. How many windows did Mr Timpden have open on his computer? Name 10 of them and classify the programs?

3. What caused the global shut down and how?4. What is the problem with not having a back up of network data? How is this a

network security risk?

The Internet is the Corporate Network

1. What is causing a change to mobile networks?2. What is the percentage of businesses considered mobile?3. What does SAS stand for?4. In your own words describe ‘the mobile blind spot’?5. What is Fiberlink Extend 360 Platinum?6. What security issues can arise with a mobile network? What applications does

Fiberlink have to maintain network security?

Think

How is network security and management important in a growing global network and in what way can individuals safely and securely use the internet?

52

Page 53: HICKSM11416723_884689_1

EMT443 Melinda Hicks 11416723

Appendix 15: Team Quiz Worksheets

Team Quiz Questions

Students are to write answers down in groups and the group with the most correct answers wins.

1. A permission on a network resourceA. allows all users to access the resource equallyB. prevents all users from accessing the resourceC. defines which user(s) can use the resource and what they can do with itD. is only used for administrators to access network resources

2. A protocol isA. a device to connect computers to communications networksB. an agreed method of communication between two communicating devicesC. always defined by the Internet Engineering Task ForceD. visible to the internet

3. Simplex communication allows signals between devicesA. in both directionsB. in neither directionC. in one directionD. only if the communications are simple

6 A printer is advertised as a network printer, as it is fitted with a network interface card. This tells usthat the printerA. can be used as a fileserverB. requires an email server to work properlyC. can be connected to the network without the use of a print-serverD. will cost more to run than printers without a network interface card

7 Which one of the following is a valid IP addressA. 257.129.45.8B. 258.258.258.1C. 192.172.168.290D. 192.75.45.1

8 A network operating system is usedA. on every computer on the networkB. on server computersC. only by Internet Service ProvidersD. only on print servers

9 Which network topology does wireless most closely resemble?A. ringB. meshC. starD. bus

10 A network device used to receive a signal, amplify it, then retransmit the amplified signal is called aA. repeaterB. gateway

53

Page 54: HICKSM11416723_884689_1

EMT443 Melinda Hicks 11416723C. bridgeD. network interface card

True of False

1. Duplex data could be sent along a single wire which allowed data transmission in only one direction?

2. A Bus is a network topology where all the nodes are attached in the shape of a closed loop?

3. An operating system to support computers connected on a LAN is a NOS?

4. The baud rate is the number of bits transferred per second?

5. A computer that provides resources to other computers on the network is called a server?

Answer the following Questions

1. What are the different types of topologies?

2. What does TCP/IP stand for?

3. What is a node?

4. What does VPN stand for?

5. State two types of wireless transmission?

6. State two major factors influencing transmission media?

7. What is the name of the device that links two similar networks?

8. State two types of wired transmission?

9. A set of rules that governs the transfer of data between computers is?

10. What is the purpose of a network operating system?

54

Page 55: HICKSM11416723_884689_1

EMT443 Melinda Hicks 11416723Team Quiz Answers

1. C2. B3. C4. C5. D6. B7. B8. A

True/False

1. T2. F3. T4. F5. T

Word Answers

1. Star, Bus and Ring2. Transmission Control Protocol/ Internet Protocol3. Each device on a network4. Virtual Private Network5. Radio waves, Bluetooth, etc6. Cost, distance, extension limitations7. Bridge8. Twisted-pair cable, Coaxial Cable, Optical Fibre, etc9. Protocol10. To support computers connected on a LAN, they control the flow of data

between devices on a network.

55