This lesson plan outlines a demonstration on LAN cabling. The objectives are for students to be able to identify tools for LAN cabling, the color coding of straight-through LAN cables, perform straight-through LAN cabling, and follow safety precautions. It discusses crimping tools, materials like UTP cable and RJ45 connectors, and the T568B wiring standard. Students will practice making a straight-through cable and be assessed on their process, product, time management, awareness of importance, safety observation, and workmanship. Follow-up assignments include defining crossover cables and structured cabling systems.
Semi-Detailed Lesson Plan - Input and Output Devices of ComputersAnjenette Columnas
A Semi-Detailed Lesson Plan about Input and Output Devices of Computers in the Computer Subject. I'm now a professional teacher and this lesson plan was used during my teaching demonstration in Sicayab National High School.
Program/Course : Computer System Servicing NC II
Unit of Competency : Set-up Computer Networks
Module : Install Network Cables
Learning Outcome 01: Installing Network Cables
for full compilation just visit my website.
http://computersystemsolution.com/
CSS LO6 - PREPARING AND INSTALLING OPERATING SYSTEMMarvin Bronoso
CSS LO6 - PREPARING AND INSTALLING OPERATING SYSTEM
LEARNING OUTCOME:
AT THE END OF THIS LESSON THE LEARNERS WILL BE ABLE TO . . .
1.Understand the function of Operating System
2. Learn the Minimum requirement for Windows 7 operating system.
3. Learn the procedure in creating and preparing the OS.
3. Learn and experience to install Window 7 operating system.
4. Discover and prepare the basic applications needed to be installed.
This module covers the knowledge, skills and attitudes needed to perform computer operations. This includes inputting, accessing, producing, and transferring data using appropriate hardware and software.
Semi-Detailed Lesson Plan - Input and Output Devices of ComputersAnjenette Columnas
A Semi-Detailed Lesson Plan about Input and Output Devices of Computers in the Computer Subject. I'm now a professional teacher and this lesson plan was used during my teaching demonstration in Sicayab National High School.
Program/Course : Computer System Servicing NC II
Unit of Competency : Set-up Computer Networks
Module : Install Network Cables
Learning Outcome 01: Installing Network Cables
for full compilation just visit my website.
http://computersystemsolution.com/
CSS LO6 - PREPARING AND INSTALLING OPERATING SYSTEMMarvin Bronoso
CSS LO6 - PREPARING AND INSTALLING OPERATING SYSTEM
LEARNING OUTCOME:
AT THE END OF THIS LESSON THE LEARNERS WILL BE ABLE TO . . .
1.Understand the function of Operating System
2. Learn the Minimum requirement for Windows 7 operating system.
3. Learn the procedure in creating and preparing the OS.
3. Learn and experience to install Window 7 operating system.
4. Discover and prepare the basic applications needed to be installed.
This module covers the knowledge, skills and attitudes needed to perform computer operations. This includes inputting, accessing, producing, and transferring data using appropriate hardware and software.
NETWORKING SYSTEMS 1
NETWORKING SYSTEMS 5
Networking System
Sarju Thapa
Dr. Stephen Gardner
East Central University
Abstract
In this report, the planning to design the network will be discussed and demonstrated in detail. The planning to design the network layout will be made according to the scenario given in the requirements. The plan will be implemented by the evaluation of the aspects that are important to design the network and other necessary things to design and implement the network. After implementing the network, the network will be tested by secure communication, WAN communication Channel, Wireless network, and PAN network. The troubleshooting of the network will also be discussed and elaborated in detail. The protocols used in this network will also be taken into consideration.
Introduction
Designing a network is not a simple task for someone. There are different phases to design the network. Each phase has a very important role to design the network. The first phase is to collect all the requirements to design the network. The second phase is to evaluate the requirements to make sure that either requirement is enough to design the network or not. After evaluating the requirements, the third phase is to implement all the aspects that are gathered in requirements. The fourth and last phase after implementing the network design is to optimize the network by performance.
Network Layout
The physical arrangement of the network is called network layout. The network layout of the given is scenario is shown below:
Diagram created using CISCO PACKET TRACER 7.3.0
Demonstration
This network consists of two different places one place is headquarter which is the main point of this network and another place is Therall which is the working point of this network.
Headquarter
In headquarter, the Executive office, R&D, Reception, Guest office, and accounting office’s host are connected with one switch. Twisted pair cable is used in this part of the network. Each device directly connected with the headquarter switch. 8P8C (Actually, RJ-45 is the more common term) jack is used in this part of the network and it is located in the reception area. Bus topology is used in this part of the network. (I think that what you have in your diagram is a bus-star hybrid. The switch is the bus, the individual cables to the hosts are the star)
Thrall
In Thrall Remote, the Engineering area, production area, and reception area’s host are connected with the switch. Twisted pair cable is used in this part of the network. Each device directly connected with the headquarter switch. 8P8C jack is used in this part of the network and it is located in the reception area. Bus topology is used in this part of the network.
For bot.
For more course tutorials visit
www.newtonhelp.com
Chapter 1-Questions
1-3: Discuss the relationship between network architecture and protocol
1-5: Define the following terms: protocol, connection-orientated protocols, connectionless protocols, and protocol stacks.
For more course tutorials visit
www.tutorialrank.com
Chapter 1-Questions
1-3: Discuss the relationship between network architecture and protocol
1-5: Define the following terms: protocol, connection-orientated protocols, connectionless protocols, and protocol stacks.
1-11: Briefly describe the seven layers of the OSI protocol hierarchy
CompTIA exam study guide presentations by instructor Brian Ferrill, PACE-IT (Progressive, Accelerated Certifications for Employment in Information Technology)
"Funded by the Department of Labor, Employment and Training Administration, Grant #TC-23745-12-60-A-53"
Learn more about the PACE-IT Online program: www.edcc.edu/pace-it
For more classes visit
www.snaptutorial.com
Chapter 1-Questions
1-3: Discuss the relationship between network architecture and protocol
1-5: Define the following terms: protocol, connection-orientated protocols, connectionless protocols, and protocol
For more classes visit
www.snaptutorial.com
Chapter 1-Questions
1-3: Discuss the relationship between network architecture and protocol
1-5: Define the following terms: protocol, connection-orientated protocols, connectionless protocols, and protocol stacks.
1-11: Briefly describe the seven layers of the OSI protocol hierarchy
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptxBrad Spiegel Macon GA
Brad Spiegel Macon GA’s journey exemplifies the profound impact that one individual can have on their community. Through his unwavering dedication to digital inclusion, he’s not only bridging the gap in Macon but also setting an example for others to follow.
# Internet Security: Safeguarding Your Digital World
In the contemporary digital age, the internet is a cornerstone of our daily lives. It connects us to vast amounts of information, provides platforms for communication, enables commerce, and offers endless entertainment. However, with these conveniences come significant security challenges. Internet security is essential to protect our digital identities, sensitive data, and overall online experience. This comprehensive guide explores the multifaceted world of internet security, providing insights into its importance, common threats, and effective strategies to safeguard your digital world.
## Understanding Internet Security
Internet security encompasses the measures and protocols used to protect information, devices, and networks from unauthorized access, attacks, and damage. It involves a wide range of practices designed to safeguard data confidentiality, integrity, and availability. Effective internet security is crucial for individuals, businesses, and governments alike, as cyber threats continue to evolve in complexity and scale.
### Key Components of Internet Security
1. **Confidentiality**: Ensuring that information is accessible only to those authorized to access it.
2. **Integrity**: Protecting information from being altered or tampered with by unauthorized parties.
3. **Availability**: Ensuring that authorized users have reliable access to information and resources when needed.
## Common Internet Security Threats
Cyber threats are numerous and constantly evolving. Understanding these threats is the first step in protecting against them. Some of the most common internet security threats include:
### Malware
Malware, or malicious software, is designed to harm, exploit, or otherwise compromise a device, network, or service. Common types of malware include:
- **Viruses**: Programs that attach themselves to legitimate software and replicate, spreading to other programs and files.
- **Worms**: Standalone malware that replicates itself to spread to other computers.
- **Trojan Horses**: Malicious software disguised as legitimate software.
- **Ransomware**: Malware that encrypts a user's files and demands a ransom for the decryption key.
- **Spyware**: Software that secretly monitors and collects user information.
### Phishing
Phishing is a social engineering attack that aims to steal sensitive information such as usernames, passwords, and credit card details. Attackers often masquerade as trusted entities in email or other communication channels, tricking victims into providing their information.
### Man-in-the-Middle (MitM) Attacks
MitM attacks occur when an attacker intercepts and potentially alters communication between two parties without their knowledge. This can lead to the unauthorized acquisition of sensitive information.
### Denial-of-Service (DoS) and Distributed Denial-of-Service (DDoS) Attacks
This 7-second Brain Wave Ritual Attracts Money To You.!nirahealhty
Discover the power of a simple 7-second brain wave ritual that can attract wealth and abundance into your life. By tapping into specific brain frequencies, this technique helps you manifest financial success effortlessly. Ready to transform your financial future? Try this powerful ritual and start attracting money today!
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024APNIC
Ellisha Heppner, Grant Management Lead, presented an update on APNIC Foundation to the PNG DNS Forum held from 6 to 10 May, 2024 in Port Moresby, Papua New Guinea.
1.Wireless Communication System_Wireless communication is a broad term that i...JeyaPerumal1
Wireless communication involves the transmission of information over a distance without the help of wires, cables or any other forms of electrical conductors.
Wireless communication is a broad term that incorporates all procedures and forms of connecting and communicating between two or more devices using a wireless signal through wireless communication technologies and devices.
Features of Wireless Communication
The evolution of wireless technology has brought many advancements with its effective features.
The transmitted distance can be anywhere between a few meters (for example, a television's remote control) and thousands of kilometers (for example, radio communication).
Wireless communication can be used for cellular telephony, wireless access to the internet, wireless home networking, and so on.
1. LP for ICT Computer Hardware Servicing – Grade 10 Page 1
Demonstration Lesson Plan in
ICT 10-COMPUTER HARDWARE SERVICING
Area: LAN Cabling Date: August 2, 2018
I. Learning Objectives:
At the end of the session, students are expected to:
A. enumerate the tools and materials used in LAN cabling;
B. identify the color coding of wires used in straight through LAN cable;
C. perform a straight through LAN cabling;
D. value the importance of following safety precaution while working.
II. Learning Content
General Competency: LAN Cabling
Specific Competency: Straight through LAN cabling
A. New Knowledge
Crimp system
Are designed to compact the wire strands together to set level so that no interstitial
spaces (gaps) are left between the strands.
This stops both moisture and oxygen entering the crimp and therefore prevents rust
from occurring.
B. Values
Accuracy
Awareness
Workmanship
C. Materials
Laptop
LCD Projector
UTP cable
RJ45
Crimping Tool
Cable Tester
D. Reference/s
Sheryl B. Calabig and Carmelita H. Benito. (2014). Data Communication.
FUTUREBUILDER PUBLICATIONS INC. p.34-35, 48-50.
Engr. Alex S.E SY (TESDA manual amended-December 2013).TR Computer Systems
Servicing NC II. p.44.
https://www.computercablestore.com/straight-through-crossover-and-rollover-wiring
III Learning Experience
A. Daily Routine
1. Prayer
2. Arrangement of chairs and cleanliness
3. Checking of Attendance via seat plan
4. Others
B. LessonProper
1. Review of the past lesson
LAN or Local Area Network is a connection of computers within a room or
building that is in the same location.
Using this Network we can use peripheral connected to one computer such as
Printers to printer files or documents from the other computer.
2. LP for ICT Computer Hardware Servicing – Grade 10 Page 2
2. Presentation
a. Motivation:
Show pictures of gamers who are playing Dota in a room where computer
uses LAN connection.
Ask the student if they want to know how it works.
Use Picture equation to reveal the topic for the day.
b. Raised Up Question:
The teacher will ask at least 2 students the following questions:
What do you want to know or to learn about the topic that will be answered
after the discussion?
The teacher will show the objectives of the lesson over PowerPoint
Presentation.
The teacher will introduce the topic to the class.
c. Materials: Technical terms, Definitions, and Pictures
UTP Cat5e Cable
Unshielded Twisted Pair Category 5 enhanced is used as a cabling
infrastructure for Ethernet. The most common cable used in computer
networking. Number of twisted-pair wires are often grouped together and
enclosed in a protective sheath to form a cable.
Crimping Tool/Crimper
A device used to conjoin two pieces of metal by deforming one or both of
them in a way that causes them to hold each other. Used to crimp UTP cable
to RJ45 connector
RJ-45
Registered Jack 45 is a standard type of connector for Ethernet network
cables. It is an eight-wire connector used to connect computers to category 5
unshielded twisted-pair cables in a network
LAN Tester
Local Area Network Tester or cable tester is an electronic device used to
verify the electrical connections in a cable or other wired.
LAN Cabling
the process of creating the cable used to create a network that interconnects
computers.
T568B Straight-Through Connection
is used to connect computer to a network device such as a router.
3. LP for ICT Computer Hardware Servicing – Grade 10 Page 3
Use a straight-through cable when:
1. Connecting a router to hub.
2. Connecting a computer to a switch.
3. Connecting a LAN port to a switch, hub, or computer.
T568 B Straight Through Connection Wire Color Coding
PIN COLOR PIN COLOR
1 White-Orange 1 White-Orange
2 Orange 2 Orange
3 White-Green 3 White-Green
4 Blue 4 Blue
5 White-Blue 5 White-Blue
6 Green 6 Green
7 White-Brown 7 White-Brown
8 Brown 8 Brown
d. Application
Steps in LAN cabling:
1. Prepare all the materials needed.
2. Carefully remove the outer jacket of the cable.
3. Untwist the pairs and arrange the wires based on Straight-Through wiring.
4. Trim the untwisted wires to a suitable length.
5. Keep the wires flat and in order as you push them into the RJ-45.
6. Place the wired plug into the crimping tool.
7. Repeat all the steps with the other end of the cable.
8. Test the cable using the LAN Tester.
e. Analysis
The teacher will ask the following questions to students:
What are the devices that use Straight-Through cable wiring?
How do you know the accuracy of your Straight-through cable?
Can you explain what must have happened to the UTP cable and RJ45 when
LAN tester won’t give accurate light as expected?
Can we reuse RJ45? Why?
f. Generalization
LAN Cabling is a process of creating a LAN Cable which is used in
interconnecting computers. Straight-Through cable is just one of the three types of
LAN cable. The other two types of LAN cables are Cross-over and Roll-over
cables. Each cable type has a distinct use, and should not be used in place of
another. Straight-Through cable is used to connect computers, printers, and other
network client devices to the router switch or hub.
IV. Assessment
A. REMEMBER & UNDERSTAND
(20%)
Direction: Write the missing color in the Straight-
through connection wiring diagram. Write the letter of
the correct answer on the space provided.
Pin 1 Pin 2 Pin 3 Pin 4 Pin 5 Pin 6 Pin 7 Pin 8
(1.)______ (2.)______ WG (3.)______ WB G (4.)______ (5.)_
____
_
a. WBr b. WO c. O d. G e. B f. Br
4. LP for ICT Computer Hardware Servicing – Grade 10 Page 4
B. APPLY & ANALYZE
(60%)
Direction: Students will create a T568B or Straight-
Through LAN cable by following the steps in crimping
a LAN cable for 15 minutes.
Dimension 3 2 1 Rating
1. Process Systematically
follow the steps
prescribed all
the time.
Systematically
follow the steps
prescribed
sometimes
Cannot follow
the steps
prescribed.
2. Product Able to
complete the
task correctly
Able to complete
the task with
error resolved
Wasn’t able to
complete the
task
3. Time management Able to finish
the task ahead
of time
Able to finish the
task a minute
after the given
time
Unable to finish
the task
TOTAL
C. EVALUATE &
CREATE (20%)
Direction: Students will create a T568B or Straight-Through
LAN cable by following the steps in crimping a LAN cable for
15 minutes.
Dimension 3 2 1 Rating
1. Awareness Student
express
maximum
awareness
on the
importance
of LAN
cabling.
Student express
some awareness
on the importance
of LAN cabling.
Student express
a little
awareness on
the importance
of LAN cabling.
2. Safety Observe the
safety
precaution
prescribed
all the time.
Observe the
safety precaution
prescribed
sometimes.
Cannot observe
the safety
precaution
prescribed.
3. Workmanship Practiced at
all times.
Practiced at all
sometimes.
Cannot practice
cooperation at
all.
TOTAL
Individual Computation: Formula
A. REMEMBER & UNDERSTAND Score/5x20=AG ____/5x20= _______
B. APPLY & ANALYZE Score/9x60=BG ____/5x20= _______
C. EVALUATE & CREATE Score/9x20=CG ____/5x20= _______
Total Grade TOTAL=_________
Assessment’s Answer Key:
A. 1. b. WO
2. c. O
3. e. B
4. a. WBr
5. f. Br
B. & C’s answers are based on how they perform their task and the quality of their finished
product.
5. LP for ICT Computer Hardware Servicing – Grade 10 Page 5
V. Assignment
A. Follow-up Assignment:
1. What is Cross-over LAN cable?
2. What is the color coding of Cross-over LAN cable?
B. Advance Assignment:
1. What are the Structured Cabling Systems?
2. Identify and describe the elements that are recommended for structured cabling
networks.
Reference:
Structured Cabling System, Internetworking Fundamental-Students’ Manual pp. 79-89.
Ms. Rachelle R. Bibat
Demonstrator