You are on page 1of 55

EMT443

Melinda Hicks

11416723

Assignment 3
EMT443
Curriculum Method 1: Information Technology
Lecturer: Andrejs Kristovskis
Due: 11th October 2010

Melinda Hicks
11416723

EMT443

Melinda Hicks

11416723

Option Topic 6: Networking Systems


Class Year 10 Information & Software
Design

Indicative Hours 24 hours


Lesson Length 40 mins

Teacher Miss Hicks


Start Date dd/mm/yy Finish
dd/mm/yy
(third term)

Time Taken (Wks) 9 wks


(4 40min lessons
per wk)

Context:
This option introduces the nature of networking systems. File management, users and
groups for any operating system are investigated. Students gain hands-on experience with
setting up servers and protocols in a network environment.

Module Focus:
This module will be a project-based unit of study, where students learn about Networking
System features and design, as well as sections of the core topics. The continual
assignment throughout the duration of study will encourage students to learn and give
them a real life scenario in which to interact with.

Target Outcomes:
Core Outcomes
5.1.1 Selects and justifies the application of appropriate software programs to a range of
tasks
5.1.2 Selects, maintains and appropriately uses hardware for a range of tasks
5.3.2 Acquires and manipulates data and information in an ethical manner
5.4.1 Analyses the effects of past, current and emerging information and software
technologies on the individual and society
5.5.1 Applies Collaborative work practices to complete tasks
5.5.2 Communicates ideas, processes and solutions to a target audience

Option Outcomes
5.2.1 Describes and Applies problem-solving processes when creating solutions
5.2.2 Designs, produces and evaluates appropriate solutions to a range of challenging
problems
5.2.3 Critically analyses decision-making processes in a range of information and software
solutions
2

EMT443

Melinda Hicks

11416723

Resources List:
Numbe
r
1

Resource

Source/Materials

Worksheet- Past, Current and


Emerging Technologies
Worksheet- Issues

(See Appendix 1)

Access to Computer and Internet


Facilities
Game- Definition Restriction

YouTube Video- Ring Topology

YouTube Video- Network Topology

YouTube Video- Star Topology

Worksheet- Types of Networks

http://www.youtube.com/watch?
v=U6TX4Zbu2ao&feature=related
http://www.youtube.com/watch?
v=oVOeNcJJYos&feature=related
http://www.youtube.com/watch?
v=aNxxrawNu48&feature=related
(See Appendix 4)

Materials- Basic computer Network


Components
Worksheet- Data Transmission Media

YouTube Video- Half Duplex and Full


Duplex
YouTube Video- Wired vs Wireless

http://www.youtube.com/watch?
v=sYOXtIl_lO0
http://www.youtube.com/watch?
v=ykuRokSgRIU&feature=related
http://www.youtube.com/watch?
v=C2Ovabby7zw

2
3

10
11
12
13

16

YouTube Video- How to pick the right


Network Cables for your Home
Network
Reading- Factors Influencing Media
Transmission
Worksheet- Media Transmission
Revision
YouTube Video- TCP/IP animation

17

Website- Tech Tutorials

18

Worksheet- Protocol Revision

19

YouTube Video- Security

20

Worksheet- Security Case Study

21

YouTube Video- Security Case Study

22

Worksheet- Data Handling

14
15

(See Appendix 2)

(See Appendix 3)

(See Appendix 5)

(See Appendix 6)
(See Appendix 7)
http://www.youtube.com/watch?
v=RbY8Hb6abbg&feature=related
http://www.youtube.com/watch?
v=Wc1dOw4j3J8
(See Appendix 8)
http://www.youtube.com/watch?
v=Wc1dOw4j3J8
(See Appendix 9)
http://www.youtube.com/watch?
v=_E4DO4ADCqw&feature=related
(See Appendix 10)

EMT443
23
24
25
26
27
28
29
30
31

Melinda Hicks

11416723

YouTube Video- Basic Networking


Revision
YouTube Video- Components of
Networks Revision
Worksheet- Components of Networks
Crossword
Reading- Networking Operating
Systems
Worksheet- Creating a peer to peer
network
Worksheet- Internet Case Study

http://www.youtube.com/watch?
v=CKOZMfFE1cI
http://www.youtube.com/watch?
v=BZ6WCqRb_us&NR=1
(See Appendix 11)

YouTube Video- All Online Data Lost


After Internet Crash!
YouTube Video- The Internet is the
Corporate Network
Quiz- Team Quiz Questions

http://www.youtube.com/watch?
v=z4vDClhnJjs
http://www.youtube.com/watch?
v=nH4GoXEoiSc
(See Appendix 15)

(See Appendix 12)


(See Appendix 13)
(See Appendix 14)

Other Resources that may prove useful:


Textbook: Exploring Computer Studies 2nd ed
Textbook: Information and Software Technology Stage 5
Textbook: Computing Studies An Introductory Course
Textbook: IST: Information and Software Technology 7-10
Computers Dont Byte! Student Activities for
Understanding Computers
More Creative Ideas for Teaching Computing Studies
Information and Software Technology A Project-Based
Approach

P 189-214
P 287-312
P167-189
P 147-177

Chapter 13

EMT443

Melinda Hicks

11416723

SYMBOL

INFORMATION AND SOFTWARE TECHNOLOGY


Task Number 7
Year 9
Assignment Topic: Networking Systems
Assignment Due Date: ?
Assignment Weighting: ?
Outcomes:
5.2.1 Describes and Applies problem-solving processes when creating solutions
5.2.2 Designs, produces and evaluates appropriate solutions to a range of challenging
problems
5.2.3 Critically analyses decision-making processes in a range of information and software
solutions
5.3.2 Acquires and manipulates data and information in an ethical manner
Rubric:
In your answer you will be assessed on how well you:
Recognise different modes of transmission
Examine the range of media for data transmission
Critically analyse a given network topology for a particular situation
Assess the impact of factors influencing the choice of transmission media
Identify the network connectivity devices
Task:
Working as an individual outside class time and during, you are required to write a report
to the business owner, based on the following scenario, suggesting a network to use in
order to fix the businesses networking issues. As part of your report you are required to
state why you chose the network topology, components, and transmission media and
mode.

SENARIO: A business owner has purchased another building on the second floor across
the road from his current ground floor office. He wants to network both the offices in the
cheapest and most effective way possible. In the ground floor office he has 5 employees
and in the second story office across the road he has 4 employees. The business makes
use of telephones and fax machines along with printing, scanning and photocopying
devices and relies heavily on the internet.
Teacher Setting Assignment: Miss Hicks

EMT443

Melinda Hicks

11416723

Assignment Marking Criteria


Criteria

Clear well written suggestion as to which network topology to use.


Clear well written suggestion as to which network components to use.
Clear well written suggestion as to which transmission media and mode
to use for network.
Reasons clearly states as to why network topology, components, and
transmission media and mode are chosen for the business.
Information clearly relates to the main topic. It includes several
supporting details and/or examples.
All sources (information and graphics) are accurately documented in the
desired format.
Information is very organized with well constructed paragraphs and
subheadings
Shows a full understanding of topic
No grammatical, spelling or punctuation errors.
Report is clearly targeted at business owner.
Well written suggestion as to which network topology to use.
Well written suggestion as to which network components to use
Well written suggestion as to which transmission media and mode to use
for network.
Reasons stated as to why network topology, components, and
transmission media and mode are chosen for the business.
Information clearly relates to the main topic. It provides 1-2 supporting
details and/or examples.
All sources (information and graphics) are accurately documented, but a
few are not in the desired format.
Information is organized with well-constructed paragraphs.
Shows a good understanding of topic.
Almost no grammatical, spelling or punctuation errors.
Report is mainly targeted at business owner.
Network topology to use for network suggested.
Network components suggested.
Transmission media and mode suggested.
An attempt to state reasons as to why network topology, components,
and transmission media and mode are chosen for the business.
Information relates to the main topic.
All sources are documented, not in the desired format and the
information is disorganised.
Shows a good understanding of parts of the topic, with a few
grammatical, spelling or punctuation errors.
Report attempts to be targeted at business owner.
Network topology and components to use are poorly or not suggested,
with poor or no reason for choice stated.
Transmission media and mode to use for network are poorly or not
suggested.
Information has little or nothing to do with the main topic.
Sources are not well documented and information is not well organised.
Little understanding of the topic, with many grammatical, spelling or
punctuation errors.
Little or no attempt to be targeted at business owner.

Marks

61 - 80

41 - 60

21 - 40

0 - 20

EMT443
Lesson Number
Lesson 1Introduction to
Communications
Networks

Melinda Hicks
Content
Students learn about:
- Nature and role of a
communications network
- The impact of past, current
and emerging technologies
on the individual and
society

11416723
Skills
Students learn to:
- Describe the nature and
role of a communications
network

Teac
-

As a cl
ideas a
and ho
board
books.
about
know.

On the
social
transm
interne
Compo
a stud
board
studen
networ
everyd
topic t

Give st
and Em
Worksh
individ
to eng
of lear
copy o
learnt.

Review
over a
Reinfo
studen
they h
unders

EMT443
Lesson Number
Lesson 2Communications
Networks

Melinda Hicks
Content
Students learn about:
- Advantages and
disadvantages of a
communication network
such as
- Sharing of peripheral
devices
- Application programs
- Data
- Security of
information
- Access to databases

Lesson Number

Content

Lesson 3- Client
server and peer-peer
networks

Students learn about:


- Client server and peer-peer
networks

11416723
Skills
Students learn to:
- Discuss the advantages
and disadvantages of
establishing a network

Teac
-

With s
what w
previo
learnin
studen
previo
basic u
work.

Play a
whispe
an issu
networ

Draw t
discus
advant
disadv
and es
to be c
books.
self lea
que fo
positiv
networ

Give st
Worksh
individ
studen
of lear
hard c
to revi

Review
over a
Ensure
right id

Hand o
and Ma
have a

Skills
Students learn to:
- Compare a client/server
network with a peer-peer
network

Teac
-

Discus
Contra
peer-p
studen
studen

EMT443

Melinda Hicks

11416723

work b
studen
thems
whilst

Lesson 4Components of
Networks

Lesson Number
Lesson 5Components of
Networks

Students learn about:


- Components of Networks
such as
- Servers-file sharing
servers
- Print servers
- Mail servers
- Workstations
- Hubs
- Switches
- Routers
- Gateways
- Repeaters
- Bridges
- Network interface
card

Content
Students learn about:
- Components of Networks
such as
- Servers-file sharing
servers
- Print servers
- Mail servers
- Workstations
- Hubs
- Switches
- Routers
- Gateways
- Repeaters
- Bridges

Students learn to:


- Describe and compare
servers for a particular
network
- Download and upload files
to a host
- Describe the purpose of
network connectivity
devices

Cooperati
- studen
investi
networ
diagra
examin
and re
their in
- Go thr
compo
course
allowin
in work
studen
unders
networ

Cooperati
- Split st
giving
pair ha
words,
the pu
and em
Allows
and un
for the
-

Ask stu
glossa
Restric
followi
Teac

Play D
Game
the pre
Reinfo
studen

Skills
Students learn to:
- Describe and compare
servers for a particular
network
- Download and upload files
to a host
- Describe the purpose of
network connectivity
devices

Cooperati
- Split st
chose
group
a poste
for tha
9

EMT443

Melinda Hicks
-

Lesson 6Components of
Networks

11416723

Network interface
card

Students learn about:


- Components of Networks
such as
- Servers-file sharing
servers
- Print servers
- Mail servers
- Workstations
- Hubs
- Switches
- Routers
- Gateways
- Repeaters
- Bridges
- Network interface
card

Students learn to:


- Describe and compare
servers for a particular
network
- Download and upload files
to a host

10

online
comple
lesson
engag
take co
Studen
poster
for par
be com
and pr
lesson

EMT443
Lesson Number
Lesson 7Components of
Networks

Lesson 8- Network
Topology

Melinda Hicks
Content

11416723
Skills

Students learn about:


- Components of Networks
such as
- Servers-file sharing
servers
- Print servers
- Mail servers
- Workstations
- Hubs
- Switches
- Routers
- Gateways
- Repeaters
- Bridges
- Network interface
card

Students learn to:


- Describe and compare
servers for a particular
network
- Download and upload files
to a host
- Describe the purpose of
network connectivity
devices

Student learn about:


- Network topologies
including
- Star
- Ring
- Bus

Students learn to:


- Graphically illustrate
network topologies
- Critically analyse a given
network topology

Teac
-

Studen
poster
compa
particu
Studen
others
in self
learnin
compo

Revisio
Restric
glossa
Reinfo
learnin

Watch
introdu
shows
topolo

Discus
identif
and di
studen
work b
any m

Watch
introdu
shows
topolo
ring to

Discus
identif
and di
studen
work b
any m

Watch
introdu
visuall
in the
previo

Discus
identif
and di

11

EMT443

Melinda Hicks

11416723

studen
work b
any m
-

Get stu
illustra
each n
Reinfo
gives s
of thei

Lesson 9Assignment
Development

Students learn about:


- Project Development
processes and techniques

Students learn to:


- Design, produce and
evaluate a simple project
for a real world application

Remin
their a
followi
(prepa
lesson
Scaffolded
- Revisio
Restric
glossa
other k
previo
reinfor
and fa
-

12

Allow s
their a
integra
far into
enable
teache

EMT443
Lesson Number
Lesson 10- Types of
Networks

Melinda Hicks
Content
Students learn about:
- Types of Networks such as
- Local Area Network
(LAN)
- Wide Area Network
(WAN)
- Virtual Private
Network (VPN)

11416723
Skills
Students learn to:
- Graphically represent a
LAN or WAN using ICT such
as graphics software

Teac

Scaffolded
Discus
the bo
networ
of diag
to take
-

Give st
Netwo
throug
for the
them a
they h
lesson

Using
availab
studen
graphi
LAN an
studen
knowle
and en
visuall
networ

Remin
of the
thinkin
assign
should
inform
it.

13

EMT443
Lesson Number
Lesson 11- Types of
Networks

Melinda Hicks
Content
Students learn about:
- Types of Networks such as
- Local Area Network
(LAN)
- Wide Area Network
(WAN)
- Virtual Private
Network (VPN)

11416723
Skills
Students learn to:
- Design a small network of
at least two work stations
to allow for file sharing.
- Explain the school
communications link to the
outside world.

Teac

Scaffolded
- Using
school
from le
studen
explain
comm
outside
topic t
world.
-

Lesson 12- Data


Transmission Modes

Lesson Number
Lesson 13- Data
Transmission Media

Students learn about:


- Data Transmission Modes
- Simplex
- Half Duplex
- Full Duplex

Content
Students learn about:
- Data Transmission Media
- Wire
- Wireless

Students learn to:


- Recognise different modes
of transmission

Discus
modes
Allowin
the top
a class

Watch
Duplex
studen
betwee
modes

Create
for the
under
to use
transm
and vis
for stu
Teac

Skills
Students learn to:
- Examine the range of
media for data
transmission

As a cl
studen
up a sm
sharing
explore
system
that is
Give st
Transm
Worksh
discus
gaps s
Introdu
new w

Scaffolded
- Lead a
what is
transm
14

EMT443

Melinda Hicks

11416723

studen
own pr

Lesson Number
Lesson 14- Data
Transmission Rates

Content
Students learn about:
- Data Transmission rates:
- Baud rates
- Bits per second

Enable
on the
transm
them e
explore

Watch
video,
take n
The vid
differe
transm

Discus
as a cl
learnin
studen
of wha

Watch
Netwo
Home
which
cables

Discus
as a cl
learnin
studen
of wha

Allow c
list of t
used, a
addres
add to
addres
Teac

Draw a
board
knowle
rates,
allowin
their o

Skills
Students learn to:
- Discuss and compare the
methods used to measure
transmission rates

Cooperati
- Split cl
have o
baud r
group
second
15

EMT443

Lesson 15- Data


Transmission Rates

Melinda Hicks

Students learn about:


- Data Transmission rates:
- Baud rates
- Bits per second

11416723

Students learn to:


- Discuss and compare the
methods used to measure
transmission rates

to hav
debate
followi
studen
motiva
contro
Cooperati
Scaffolded
- Have t
studen
class,
the roo
studen
their o
debate
compa
data tr
-

16

Bring t
togeth
conclu
discus
transm
mind m
transm
reinfor

EMT443
Lesson Number
Lesson 16- Factors
influencing media
Transmission

Lesson 17Assignment
Developments

Melinda Hicks

11416723

Content
Students learn about:
- Factors influencing media
transmission such as:
- Cost
- Distance
- Extension limitations
such as the number
of nodes and
sustainability

Students learn about:


- Project Development
processes and techniques

Skills
Students learn to:
- Assess the impact of
factors influencing the
choice of transmission
media

Students learn to:


- Design, produce and
evaluate a simple project
for a real world application
-

Lesson Number
Lesson 18- Protocols

Content
Students learn about:
- Protocols such as:
- TCP/IP
- IPX/SPX

Teac
-

Discus
are fac
could i
transm

As a cl
Facto
Transm
form o
studen

Hando
Transm
Worksh
reinfor
giving
of thei

Go ove
to the
reinfor
ensure
correc

Encour
continu
assign
about
transm
use.

Remin
their a
followi
for foll
Studen
learnin
assign
studen
about
teache
unders
the stu
their in
develo
networ
Teac

Propose industry links with


networking organisations

Skills
Students learn to:
- Define and describe the
purpose of a protocol

Scaffolded
- Discus
protoc
studen
17

EMT443

Melinda Hicks
-

Lesson 19- Protocols

Lesson 20- Protocols

Netbui
appletalk

11416723
-

Identify and describe types


of protocols

other.
-

Watch
allowin
notes,
mainly
protoc

Have a
video,

Allow s
online
write n
protoc
their a
Studen
groups
that us
protoc
learnin
knowle
Studen
perform
play.

Students learn about:


- Protocols such as:
- TCP/IP
- IPX/SPX
- Netbui
- appletalk

Students learn to:


- Define and describe the
purpose of a protocol

Students learn about:


- Protocols such as:
- TCP/IP
- IPX/SPX
- Netbui
- appletalk

Students learn to:


- Define and describe the
purpose of a protocol

Hando
Worksh
has be
throug
lesson

Go ove
studen
making
the rig

Identify and describe types


of protocols

Identify and describe types


of protocols

18

EMT443
Lesson Number
Lesson 21- Security
of Information

Lesson 22- Security


of information

Melinda Hicks

11416723

Content
Students learn about:
- Security of Information
- Storage
- Backup
- security

Students learn about:


- Security of Information
- Storage
- Backup
- security

Skills
Students learn to:
- Describe the
appropriateness of
different storage media
including backup
requirements
-

Discuss the implications of


storage and backup
techniques

Investigate a range of
security techniques that
apply to networks

Students learn to:


- Describe the
appropriateness of
different storage media
including backup
requirements
-

Discuss the implications of


storage and backup
techniques

Investigate a range of
security techniques that
apply to networks

Teac
-

Watch
allowin
notes i
expalin
involve

Discus
Secu
sheet

Watch
Study
to answ
sheet i
enable
thems
world s
Hando
worksh
revises
how it
transm

Ask stu
online
intune
investi
compa
transa
comm
for eac
contra
investi
real wo
visit in

Remin
remem
assign
class.
followi

19

EMT443

Melinda Hicks

Lesson Number
Lesson 23Assignment
Developments

11416723

Content
Students learn about:
- Project Development
processes and techniques

Skills
Students learn to:
- Design, produce and
evaluate a simple project
for a real world application
-

Lesson 24- Revision

Lesson Number
Lesson 25- Network
Operating Systems

Students learn about:


- Components of Networks
such as
- Servers-file sharing
servers
- Print servers
- Mail servers
- Workstations
- Hubs
- Switches
- Routers
- Gateways
- Repeaters
- Bridges
- Network interface
card
-

Client server and peer-peer


networks

Network topologies
including
- Star
- Ring
- Bus

Types of Networks such as


- Local Area Network
(LAN)
- Wide Area Network
(WAN)
- Virtual Private
Network (VPN)
Content

Students learn about:


- Network operating systems
- Purpose
- Management such as
establishing users
and groups users and

Teac
-

Propose industry links with


networking organisations

Students learn to:


- Describe and compare
servers for a particular
network
-

Compare a client/server
network with a peer-peer
network

Critically analyse a given


network topology

Play D
Game
in the
to rein
the ter

Watch
Netwo
reinfor
networ

Hando
Netwo
worksh
networ
knowle

Skills
Students learn to:
- Recognise the purpose of a
network operating system
software
-

Discuss effective network

Studen
learnin
assign
studen
about
teache
unders
the stu
their le
develo
networ
Watch
Revisio
basic n

Teac

Scaffolded
- Lead a
what a
system
know o
20

EMT443

Melinda Hicks

11416723

groups, security
permissions and
policies and profiles,
use of compression
technology

management strategies

Read
System
discus
to lear
a class

Lesson 26- Network


Operation Systems

Lesson 27Networking Systems

Lesson Number
Lesson 28Networking Systems

Discus
import
passw
Relate
world i
Cooperati
- Split st
groups
and do
presen
the res
(to con
followi

Students learn about:


- Network operating systems
- Purpose
- Management such as
establishing users
and groups users and
groups, security
permissions and
policies and profiles,
use of compression
technology
Students learn about:
- Network operating systems
- Purpose
- Management such as
establishing users
and groups users and
groups, security
permissions and
policies and profiles,
use of compression
technology
Content

Students learn to:


- Recognise the purpose of a
network operating system
software

Students learn about:


- Network operating systems
- Purpose
- Management such as
establishing users
and groups users and
groups, security
permissions and
policies and profiles,
use of compression
technology

Students learn to:


- Recognise the purpose of a
network operating system
software

Examine and describe the


network operating system
in a given situation

Discuss effective network


management strategies

Scaffolded
- Discus
networ
strateg
back to
study (
reinfor
knowle
integra

Examine and describe the


network operating system
in a given situation

Discuss effective network


management strategies

Students learn to:


- Recognise the purpose of a
network operating system
software
-

Examine and describe the


network operating system
in a given situation

Discuss effective network


management strategies

Cooperati
- Studen
NOS re
point p
groups
followi

Skills

Teac

21

Studen
groups
point p
class.

Remin
assign

EMT443

Lesson 29Assignment
Developments

Melinda Hicks

Students learn about:


- Project Development
processes and techniques

11416723

Students learn to:


- Design, produce and
evaluate a simple project
for a real world application
-

Lesson 30- Peer to


peer network

Students learn about:


- Peer to Peer Network

Propose industry links with


networking organisations
Students learn to:
- Assemble a simple peerpeer communication
system

Scaffolded
- Discus
knowle
3, abo
networ
previo
-

Lesson Number
Lesson 31- Peer to
peer network

Content
Students learn about:
- Peer to Peer Network
-

Lesson 32-

Setting up a LAN

Students learn about:

Skills
Students learn to:
- Assemble a simple peerpeer communication
system

Students learn to:

followi
(prepa
followi
Studen
learnin
assign
studen
about
networ

Hando
peer n
studen
integra
skills t
peer n
creatin
(contin
lesson
Teac

Scaffolded
- Studen
networ
-

Discus
they w
securit
and wh
would
reinfor
knowle
peer to

Using
peer n
basis e
and co
school

Remin
their a
followi
for the
Studen

22

EMT443
Assignment
Development

Melinda Hicks
-

Project Development
processes and techniques

11416723
-

Design, produce and


evaluate a simple project
for a real world application

Propose industry links with


networking organisations

learnin
assign
studen
about
networ
Studen
finishin
as it is
lesson
their a

23

EMT443

Melinda Hicks

Lesson Number
Lesson 33- Internet
Case Study

11416723

Content

Skills

Students learn about:


- A Communications Network

Students learn to:


- Propose industry links with
networking organisations

Security of information
- Storage
- Backup
- Security

Lesson 34- Library


Network Case Study

Lesson Number
Lesson 35Assignment
Development

Students learn about:


- A communications network
- Nature and role
-

Components of networks

Security of Information
- Storage
- Backup
- Security

Network Operating Systems

Describe and Compare


servers for a particular
network

Examine and Describe the


purpose of a network
operating system

Identify and Describe types


of protocols

Examine the range of


media for data
transmission
Skills

Students learn to:


- Design, produce and
evaluate a simple project
for a real world application
-

Hando
Study
comple
integra
knowle
real wo

Watch
After In
videos
world s
would
crashe

Watch
Corpor
relatin
to the

Allow s
worksh
discus
If a do
availab
lesson
local to
resear
system
interne
librarie
discus
differe
networ
compo

Discuss the implications of


storage and backup
techniques

Students learn to:


- Evaluate the performance
of a given network in terms
of bandwidth, speed of
device and cables

Content
Students learn about:
- Project Development
processes and techniques

Describe the
appropriateness of
different storage media
including backup
requirements

Teac

Remin
assign
class t
lesson

Teac
-

Propose industry links with


networking organisations

24

Studen
learnin
assign
studen
about
networ
Studen
finishin

EMT443

Lesson 36- Revision

Melinda Hicks

Students learn about:


- Protocols
- Data Transmission modes
- Data Transmission Rates
- Data Transmission Media
- Types of Networks
- Client Server and peer-peer
Networks
- Components of Networks
- Security of Information
- Network Operating Systems
- Factors influencing media
transmission

11416723

Students learn to:


- Define and describe the
purpose of a protocol
- Discuss and compare the
methods used to measure
transmission rates
- Examine the range of
media for data
transmission
- Compare a client/server
network with a peer-peer
network
- Describe and compare
servers for a particular
network
- Describe the purpose of
network connectivity
devices
- Recognise the purpose of a
network operating system
software

to be h
followi
Studen
assign

Enable
as a cl
networ
with or
attemp
and an

Play D
game,
System
recogn
reinfor
terms.

Cooperati
- Split st
four an
using
Questi
knowle
studen
cooper

25

EMT443

Melinda Hicks

11416723

References
(n.d.). Retrieved October 6, 2010, from Tech Tutorials: http://www.youtube.com/watch?
v=Wc1dOw4j3J8
All Online Data Lost After Internet Crash! (2007, July 11). Retrieved October 10, 2010, from
YouTube: http://www.youtube.com/watch?v=z4vDClhnJjs
ApFaqTech. (2010, February 28). How to pick the right Network Cables for your Home
Network. Retrieved October 2, 2010, from YouTube: http://www.youtube.com/watch?
v=C2Ovabby7zw
Computers, E. (2008, April 28). Explaining Computer Security. Retrieved October 6, 2010,
from YouTube: http://www.youtube.com/watch?v=Wc1dOw4j3J8
darkwinglh. (2007, January 1). Computer Security 101. Retrieved October 6, 2010, from
YouTube: http://www.youtube.com/watch?v=_E4DO4ADCqw&feature=related
Grover, D. (1999). More Creative Ideas for Teaching Computer Studies. Sydney: David Grover.
Grover, D., Range, J., Knights, H., Gormley, E., & Perri, S. (2005). Information and Software
Technology A Project-Based Approach. Melbourne: Pearson Education Australia.
Internet Basics : How Does a Wireless Network Internet Connection Work? (2010, March 23).
Retrieved October 10, 2010, from YouTube: http://www.youtube.com/watch?v=gi1QkmGVf5E
lacvietthusinh. (2006, November 24). Network Topology. Retrieved September 30, 2010, from
YouTube: http://www.youtube.com/watch?v=oVOeNcJJYos&feature=related
lacvietthusinh. (2006, November 24). Ring Topology. Retrieved September 30, 2010, from
YouTube: http://www.youtube.com/watch?v=U6TX4Zbu2ao&feature=related
lacvietthusinh. (2006, November 24). Star Topology. Retrieved September 30, 2010, from
YouTube: http://www.youtube.com/watch?v=aNxxrawNu48&feature=related
Pereira, L. (1997). Computers Don't Byte. Australia: Hawker Brownlow Education.
Powers, G. (1996). Computing Studies An Introductory Course. Port Melbourne: Heinemann.
Powers, G. (2010). Information and Software Technology stage 5. Port Melbourne: Heinemann.
Studies, B. o. (3003). Information and Software Technology Elective Course Year 7-10
Syllabus. Sydney: Board of Studies NSW.
Tanvir, K. (2009, November 13). Half Duplex Full Duplex . Retrieved October 2, 2010, from
YouTube: http://www.youtube.com/watch?v=sYOXtIl_lO0
Ware, P., Cooke, P., Opfer, D., & Wall, J. (2005). IST: Information and Software Technology 7-10.
Milton: John Wiley & Sons Australia.
Wilson, C. (2001). Exploring Computing Studies (2nd ed.). New York: Cambridge University
Press.
Wired vs Wireless. (2008, February 6). Retrieved October 2, 2010, from YouTUbe:
http://www.youtube.com/watch?v=ykuRokSgRIU&feature=related
26

EMT443
Melinda Hicks
11416723
youfiberlink. (2008, April 9). The Internet as a Corporate Network. Retrieved October 10,
2010, from YouTube: http://www.youtube.com/watch?v=nH4GoXEoiSc

Appendices
Appendix 1: Past, Current and Emerging Technologies Worksheet

Name__________________________________Date_________Class________

Past, current and emerging technologies


Select the missing word from the list:
better, broadband, cable, cause, data, Defence, devices, development,
distance, easier, hackers, hardware, home, manufacturers, modems,
network, networks, offer, predict, radio, secure, signals, standard,
transfer, unit

Networking has been the _______________ of many changes in computer technology. Connectivity
eventually led to the _______________ of the Internet when the US Department of _______________
wanted to share files between computers in the 1960s. Newer and _______________ means of
connecting computers, both in terms of _______________ and software, are continually occurring.
In more recent times, _______________ computers now have an alternative to _______________ as a
means of connecting to the wider world. ADSL, _______________ and satellite connections (the three
types of _______________) have improved the data _______________ speeds possible at home.
Many peripheral _______________ no longer need to be physically cabled to the system
_______________, instead transferring data by infra-red _______________. Laptop computers can use
_______________ transmitters to connect to _______________ provided that they are within a certain
physical _______________.
Operating systems are starting to _______________ networking components as part of the
_______________ installations. It has become _______________ for the average person to build a
home _______________.
It is hard to _______________ the shape of future networking systems. Designers and
_______________ are working towards faster _______________ transfer methods. Unfortunately,
_______________ are also pushing them to develop more _______________ systems.
27

EMT443

Melinda Hicks

11416723

28

EMT443

Melinda Hicks

11416723

Appendix 2: Issues Worksheet

Name__________________________________Date_________Class________

Issues
Rhyming words have been swapped for the bold words shown. Work out the word that should be used.

Software licences can be accidentally breached when networks are used. Program licences should be
carefully bed before programs are installed on network computers to ensure that licensing conditions
are being pet. Large whines can be issued to people who make the copyright involved in software
licences.
Hacking refers to unauthorised access to piles. Networks should be carefully banned to reduce the
chance of hacking. User games and passwords can be used to restrict access to either the whole network
or hearts of the network. Firewalls can rock access to machines that are outside the immediate network.
Networks have caused many ranges in the workplace. Virtual offices allow people to connect to
networks from remote locations much as when they are travelling or working from roam
(telecommuting). The easy transfer of files from employee to employee has reduced the speed for
printoutssome offices are slowly becoming paperless. However, the downside has been that many
people have been forced to burn computer skills in order to sleep their jobs.

29

EMT443

Melinda Hicks

11416723

Appendix 3: Definition Restriction Game

30

EMT443

Melinda Hicks

11416723

31

EMT443

Melinda Hicks

11416723

32

EMT443

Melinda Hicks

11416723

33

EMT443

Melinda Hicks

11416723

34

EMT443

Melinda Hicks

11416723

Appendix 4: Types of Networks Worksheet

Exercise 13.3
1 What am I?
a A private network carrying encrypted data across the Internet.
b A controlling computer in a network that stores the programs
and data shared by users.
c A link between two different types of networks.
d A network with no central server but each computer is both a
server and a client.

2 Copy and complete the following sentences:


a A _______ is a network on one site such as within a building or
group of buildings.
b A workstation is a _______ on a network.
c A _______ is a very intelligent hub that directs data packets to
and from other networks.
d A NIC is an _______ that allows a device to be connected to a
network.

3 True or false?
a A WAN is often made up of a collection of LANs.
b Each node is connected directly to a hub.
c A bridge is used to rebuild a fading signal to its original
strength and shape before transmitting it onwards.
d Most networks use a peer-to-peer network for their LAN.

35

EMT443

Melinda Hicks

11416723

Appendix 5: Data Transmission Media Worksheet

Humans and other _______________ have been _______________ for millions of years. Most of our
conversational communications have used either: sound and other forms of _______________ of the
air, solids and the _______________ that surrounds us; or visual cues, requiring the movement of
reflected light from one life-form to the visual _______________ of another life-form. Humans
developed sophisticated languages to _______________ data, and invented new media to
_______________ this data. The invention of _______________ and printing enabled the very largescale
transfer of data in the form of _______________ and _______________. During the 19th
century, the invention and use of the _______________ led to widespread use of the
_______________ transmission of messages by signals. In the 21st _______________, most of our
data transmission is via the wires that make up telephone and _______________ networks.
Network computers are _______________ to each other using:
a wire-based medium, such as _______________ wire
wireless adaptors and wireless access _______________over a wireless medium
a _______________ of _______________ infrastructure and _______________ media
36

EMT443

Melinda Hicks

11416723

37

EMT443

Melinda Hicks

11416723

Appendix 6: Factors Influencing Media Transmission Reading

Factors influencing media transmission


When creating a network, you need to consider a number of factors that influence
media transmission. These include set-up cost, the number of nodes and the distance
between them, and the ease with which the network can be maintained and
expanded.
Cost
One of the major influencing factors in building a network is cost. When building a
network, there is always a trade-off between what is desired and what is affordable;
nearly all network development projects are constrained by the available funds or
budget. The budget will
influence all decisions including the type and brand of hubs, switches and cabling. For
example, optical fibre cabling is faster and can carry data for greater distances than
UTP but it is also more expensive. Building a suitable network with a limited budget is
a difficult task.
Distance
Distance is an important factor to consider when deciding what type of cabling to use.
Different types of cable have maximum effective length limits. For example, the
maximum length for UTP is 100 metres in total between nodes. Data transmission
signals degrade over distance so you will need to determine how many repeaters are
required to ensure there is no data loss. Over large distances, you may need to decide
between using optical fibre cable and microwave; cost will then be an important
factor.
The number of nodes
In a network, nodes are the devices at the end of a cable, such as workstations and
printers. The size and shape of your network will be determined in part by the number
of nodes in it; a network with two nodes will be very different from a network with
1000 or more nodes. The number of nodes in your network will also influence the
transfer rate of data through your network. The more nodes you have, the greater the
demand for individual frequencies (bandwidth) for data
transmission. The number of nodes may also influence whether you choose hubs or
switches. Hubs share their bandwidth between the number of users, so a 100-Mbps
hub with 10 users will give each user 10 Mbps. However, switches give each user the
full bandwidth, so a 100-Mbps switch with 10 users will give each user 100 Mbps.
Sustainability and expansion (scaling)
When designing a network, you need to consider how it will be maintained and you
need to design it so that it can expand easily. For example, it is easier and cheaper to
add nodes to a star network than to a ring network.

38

EMT443
Melinda Hicks
Appendix 7: Media Transmission Revision Worksheet

11416723

Data Transmission
Remember
1. Define the term data transmission.
2. Describe three types of data transmission.
3. Give three advantages of optical fibres over copper wire cable for data transmission and
give one disadvantage.
4. Describe one disadvantage of using radio waves to transmit data.
5. Describe three influences on data transmission.

Think
1. Explain the differences between optical fibre and UTP cables
2. Explain the difference between baud rate and bps.

39

EMT443
Melinda Hicks
Appendix 8: Protocol Revision Worksheet

11416723

Protocols

Remember
1. Define the term protocol.
2. Explain what each of the following protcol names stand for, and describe the main features
of each protocol.
-

TCP/IP
IPX/SPX
Netbui
Appletalk

Think
1. Discus why there are so many protocols.

40

EMT443
Melinda Hicks
Appendix 9: Security Case Study (Worksheet)

11416723

Case Study- Department of Justice


What issues can arise by not protecting information?
What should have happened to the information on the Attorney Office Computer information?
What is sensitive information at the department of justice?
How can data integrity be threatened?
What is risk management?
What is the individuals role in computer security at the Department of Justice?
What threats can occur when using unauthorised software?
What are some signs of data security breeches?
What are the three main points in data security at the Department of Justice?

41

EMT443

Melinda Hicks

11416723

Appendix 10: Data Handling Worksheet

Name__________________________________Date_________Class________

Data handling
Common two- and three-letter words have been substituted with symbols. Decode the information.

Networking systems designed transfer data. Files may stored a central server,
access them may rely network place. Most networks transfer data with serial transmission.
Data sent one bit after another along connecting channels, usually packets data. Packets
contain data front indicating destination packet.
Broadband systems transfer data a similar fashion parallel data transfer. Multiple packets data
can sent once through connecting cabling. Optic fibres utilise broadband transmission.
speed a network measured how many bits can transferred per second. main parts
larger networks usually have transmission rates measured gigabits per second.
Data security becomes an issue with computer networks because large volumes data being
transferred through network. Encryption technology scrambles data before it sent, it
decrypted when it arrives its destination. receiving computer must possess correct key
able decode data correctly. Insecure network sections often involve wireless data transmission
infra-red signals radio transmitters (short distance), microwave signals (mid-distance), satellites
(long distance).

42

EMT443

Melinda Hicks

11416723

Appendix 11: Components of Networks Crossword Worksheet

43

EMT443

Melinda Hicks

11416723

Appendix 12: Network Operating Systems Reading

Network operating systems


Until a computer's operating system is loaded, it is just a collection of hardware. It is
the operating system that makes the computer usable. This also applies to networks.
A network requires cables, workstations, hubs and switches but it is the network
operating system (NOS) that enables data to be transferred between these
components. The network operating system is a set of programs that ensures reliable
data transfer. It also provides tools so that the network administrator can manage
various functions of the network.

Purpose
The network operating system manages the flow of data across the network. It
enables clients (workstations) attached to the network to access network resources,
such as files and printers, that are shared by the network servers. Usually, many
clients are attached to a LAN so clients may request access to one or more network
services simultaneously. The NOS must be able to handle several requests at once;
this is called `multitasking'. In addition, the client operating system must be able to
multitask because it needs to handle incoming network traffic, such as email, without
demanding the user's attention. This allows the user to perform other tasks on the
workstation without interruption. The NOS typically comprises two parts: the client
software that is installed on each workstation and the server software that is installed
on the server only. Together, the client software and the server software provide a
secure method for clients to access resources on the server. When users log in, their
identity is authenticated by the server. This means that the client software sends the
user name and password to the server. The server software then searches its
database for that username. If the user exists and the password is correct, the user
will be logged in to the system. If the user does not exist or the password is incorrect,
the user will not be logged in to the system and an error message will be displayed.
For a network to function efficiently, the network server running the NOS must meet
the minimum required specifications. The table on the right shows the minimum
hardware requirements of some popular network operating systems.

Management
A network operating system provides the network administrator with the tools to
manage the network. The network administrator uses these tools to perform a huge
range of tasks including:
establishing users and groups. The network administrator adds and removes users
and groups from the system. Users and groups are allocated access to the
resources they need to do their work. Groups contain users who have similar tasks
to perform and who require access to the same resources. Establishing groups
allows the network administrator to give file and resource permissions to a group
instead of individual users. When users are added to a group, they acquire the
permissions of that group.
security permissions. Security is an integral part of any network. When users are
created, they are given access only to the files and resources that they will need to
perform their work. These security permissions are usually applied when the user
logs in to the network.
policies and profiles. Policies and profiles are used to customise the client's
desktop. Policies can be `open' (users have rights to use everything on the client
machine) or `locked down' to restrict what a user can do on a client machine.
Profiles can be used in conjunction with policies. Profiles generally give the user a
44

EMT443

Melinda Hicks

11416723

uniform working environment regardless of which workstation they use on the


network.
use of compression technologies. No matter how new or expensive a network is, it
seems that it never has enough storage space and it never has high enough data
transfer rates. Compression technologies go some way to solving these two
problems. Data that are used infrequently can be tagged for compression, thus
taking up less disk space while not in use. Equally, there are a number of data
compression technologies that compress data to be transferred so that they will
require less bandwidth.

45

EMT443

Melinda Hicks

11416723

Appendix 13: Creating a Peer to Peer Network Worksheet

46

EMT443

Melinda Hicks

11416723

47

EMT443

Melinda Hicks

11416723

48

EMT443

Melinda Hicks

11416723

49

EMT443

Melinda Hicks

11416723

50

EMT443

Melinda Hicks

11416723

51

EMT443

Melinda Hicks

11416723

Appendix 14: Internet Case Study Worksheet

Internet Case Study


Getting Started
1. Define each of the following terms: Internet, website, network, intranet, global
decentralisation, virus?
2. Explain the use of abbreviations such as .edu, .com, .org in internet addresses?
All Data Lost After Internet Crash
1. Outline the basic input/output devices most probably used to send the fatal error
message?
2. How many windows did Mr Timpden have open on his computer? Name 10 of them
and classify the programs?
3. What caused the global shut down and how?
4. What is the problem with not having a back up of network data? How is this a
network security risk?
The Internet is the Corporate Network
1.
2.
3.
4.
5.
6.

What is causing a change to mobile networks?


What is the percentage of businesses considered mobile?
What does SAS stand for?
In your own words describe the mobile blind spot?
What is Fiberlink Extend 360 Platinum?
What security issues can arise with a mobile network? What applications does
Fiberlink have to maintain network security?

Think
How is network security and management important in a growing global network and
in what way can individuals safely and securely use the internet?

52

EMT443

Melinda Hicks

11416723

Appendix 15: Team Quiz Worksheets

Team Quiz Questions


Students are to write answers down in groups and the group with the most correct
answers wins.
1. A permission on a network resource
A. allows all users to access the resource equally
B. prevents all users from accessing the resource
C. defines which user(s) can use the resource and what they can do with it
D. is only used for administrators to access network resources
2. A protocol is
A. a device to connect computers to communications networks
B. an agreed method of communication between two communicating devices
C. always defined by the Internet Engineering Task Force
D. visible to the internet
3. Simplex communication allows signals between devices
A. in both directions
B. in neither direction
C. in one direction
D. only if the communications are simple
6 A printer is advertised as a network printer, as it is fitted with a network interface card. This tells us
that the printer
A. can be used as a fileserver
B. requires an email server to work properly
C. can be connected to the network without the use of a print-server
D. will cost more to run than printers without a network interface card
7 Which one of the following is a valid IP address
A. 257.129.45.8
B. 258.258.258.1
C. 192.172.168.290
D. 192.75.45.1
8 A network operating system is used
A. on every computer on the network
B. on server computers
C. only by Internet Service Providers
D. only on print servers
9 Which network topology does wireless most closely resemble?
A. ring
B. mesh
C. star
D. bus
10 A network device used to receive a signal, amplify it, then retransmit the amplified signal is called a
A. repeater
B. gateway
53

EMT443

Melinda Hicks

11416723

C. bridge
D. network interface card
True of False
1. Duplex data could be sent along a single wire which allowed data transmission in only one direction?
2. A Bus is a network topology where all the nodes are attached in the shape of a closed loop?
3. An operating system to support computers connected on a LAN is a NOS?
4. The baud rate is the number of bits transferred per second?
5. A computer that provides resources to other computers on the network is called a server?

Answer the following Questions


1. What are the different types of topologies?
2. What does TCP/IP stand for?
3. What is a node?
4. What does VPN stand for?
5. State two types of wireless transmission?
6. State two major factors influencing transmission media?
7. What is the name of the device that links two similar networks?
8. State two types of wired transmission?
9. A set of rules that governs the transfer of data between computers is?
10. What is the purpose of a network operating system?

54

EMT443

Melinda Hicks

11416723

Team Quiz Answers


1.
2.
3.
4.
5.
6.
7.
8.

C
B
C
C
D
B
B
A

True/False
1.
2.
3.
4.
5.

T
F
T
F
T

Word Answers
1.
2.
3.
4.
5.
6.
7.
8.
9.

Star, Bus and Ring


Transmission Control Protocol/ Internet Protocol
Each device on a network
Virtual Private Network
Radio waves, Bluetooth, etc
Cost, distance, extension limitations
Bridge
Twisted-pair cable, Coaxial Cable, Optical Fibre, etc
Protocol
10. To support computers connected on a LAN, they control the flow of data
between devices on a network.

55

You might also like