CSS2 - Sample - CBLM & Assessment Tool
CSS2 - Sample - CBLM & Assessment Tool
SECTOR: ELECTRONICS
QUALIFICATION: NCII CSS
UNIT OF COMPETENCY: SET-UP COMPUTER NETWORKS
MODULE TITLE: SETTING-UP COMPUTER NETWORK
PREPARED BY: SUSAN F. ECHALAS
List of Competencies
Document No
Date Developed:
Issued by:
8/21/2018
CBLM in NCII CSS Page 2 of 114
Developed by: SFIST
SUSAN F.
ECHALAS Revision # 01
HOW TO USE THIS COMPETENCY- BASED LEARNING
MATERIALS
Welcome!
The unit of competency, “: SET-UP COMPUTER NETWORKS ", is one of the
competencies of NCII CSS, a course which comprises the knowledge, skills and
attitudes required for a TVET trainer to possess.
Remember to:
Perform the Task Sheets and Job Sheets until you are confident that your
outputs conform to the Performance Criteria Checklist that follows the sheets.
Submit outputs of the Task Sheets and Job Sheets to your facilitator for
evaluation and recording in the Accomplishment Chart. Outputs shall serve as
your portfolio during the Institutional Competency Evaluation. When you feel
confident that you have had sufficient practice, ask your trainer to evaluate you.
The results of your assessment will be recorded in your Progress Chart and
Accomplishment Chart. You must pass the Institutional Competency Evaluation
for this competency before moving to another competency. A Certificate of
Document No
Date Developed:
Issued by:
8/21/2018
CBLM in NCII CSS Page 3 of 114
Developed by: SFIST
SUSAN F.
ECHALAS Revision # 01
Achievement will be awarded to you after passing the evaluation. You need to
complete this module before you can perform the module on Set Network
Configuration.
Document No
Date Developed:
Issued by:
8/21/2018
CBLM in NCII CSS Page 4 of 114
Developed by: SFIST
SUSAN F.
ECHALAS Revision # 01
MODULE CONTENT
MODULE DESCRIPTOR: This unit covers the knowledge, skills and attitudes
needed to diagnose computer systems and networks
LEARNING OUTCOMES:
At the end of this module you MUST be able to:
LO1. Install network cables
LO2. Set network configuration
LO3. Set router/Wi-Fi/ wireless access point/repeater configuration
LO4. Inspect and test the configured computer networks
ASSESSMENT CRITERIA:
Cable routes are determined and planned in accordance with network
design and actual installation site.
Network materials necessary to complete the work are identified and
obtained in accordance with established procedures and checked
against systems requirements
Tools, equipment and testing devices needed to carry out the installation
work are obtained in accordance with established procedures and
checked for correct operation and safety
Appropriate personal protective equipment is used and OHS policies and
procedures are followed
Copper cable splicing is performed based on Electronic Industries
Alliance/Telecommunications Industry Association (EIA/TIA) standards
Document No
Date Developed:
Issued by:
8/21/2018
CBLM in NCII CSS Page 5 of 114
Developed by: SFIST
SUSAN F.
ECHALAS Revision # 01
Network cables and cable raceway are installed in accordance with
established procedures and installation requirements
Installation work is performed and is checked to ensure no unnecessary
damage has occurred and complies with requirements
OHS standards and 5S principles are followed according to enterprise
requirements
Excess components and materials are disposed of based on WEEE
directives and 3Rs waste management program
Document No
Date Developed:
Issued by:
8/21/2018
CBLM in NCII CSS Page 6 of 114
Developed by: SFIST
SUSAN F.
ECHALAS Revision # 01
LEARNING OUTCOME NO. 1
Install Network Cables
Contents:
1. Determine and plan the cable route
2. Identify and obtain network materials necessary to complete the
work.
3. Obtain the needed tools, equipment and testing devices
4. Use appropriate personal protective equipment
5. Perform cable splicing based on standards
6. Install network cables and cable raceway
7. Perform and check installation work
8. Follow 5S and 3Rs
Assessment Criteria
1. Cable routes are determined and planned in accordance with
network design and actual installation site.
2. Network materials necessary to complete the work are identified
and obtained in accordance with established procedures and
checked against systems requirements
3. Tools, equipment and testing devices needed to carry out the
installation work are obtained in accordance with established
procedures and checked for correct operation and safety
4. Appropriate personal protective equipment is used and OHS
policies and procedures are followed
5. . Copper cable splicing is performed based on Electronic Industries
Alliance/Telecommunications Industry Association (EIA/TIA)
standards
6. Network cables and cable raceway are installed in accordance with
established procedures and installation requirements
7. Installation work is performed and is checked to ensure no
unnecessary damage has occurred and complies with requirements
Document No
Date Developed:
Issued by:
8/21/2018
CBLM in NCII CSS Page 7 of 114
Developed by: SFIST
SUSAN F.
ECHALAS Revision # 01
8. OHS standards and 5S principles are followed according to
enterprise requirements
9. Excess components and materials are disposed of based on WEEE
directives and 3Rs waste management program
Conditions
The participants will have access to:
Cable plan/procedural manual
1. Raceway 13. Modular box
2. Personal protective 14. RJ45
equipment 15. Diagnostics software and
3. Gloves and goggles CD-ROMs
4. Masks 16. Tools and test equipment
5. Anti-static wrist wraps 17. Slotted head screwdriver
6. Materials 18. Philips head screwdriver
7. Contact cleaners/ soap or 19. Long nosed pliers
detergents 20. Allen bit wrench
8. Dust brush 21. Multi-tester
9. Chamois or rags 22. Cable/LAN tester
10. Basin/ water 23. Crimping tool
11. Cable tie 24. Wire stripper
12. Patch panel 25. Spare parts
Methodology:
Lecture/discussion
Brainstorming
Assessment Method:
1. Oral questioning
2. Written Examination
3. Demonstration
4. Portfolio
5. Third party Report
Document No
Date Developed:
Issued by:
8/21/2018
CBLM in NCII CSS Page 8 of 114
Developed by: SFIST
SUSAN F.
ECHALAS Revision # 01
Learning Experiences
Learning Outcome 1
INSTALL NETWORK CABLES
Document No
Date Developed:
Issued by:
8/21/2018
CBLM in NCII CSS Page 9 of 114
Developed by: SFIST
SUSAN F.
ECHALAS Revision # 01
Answer computer - based Click the auto feedback to know
assessment after viewing the the result.
multi-media.
Read Information Sheet 2.1-3 on Familiarize the Tools, Equipment
Obtaining Tools, Equipment and and Testing Devices used in
Testing Devices installing network cables
Answer Self Check 2.1-3 on Try to familiarize and answer self-
Obtaining Tools, Equipment and check without looking at the
Testing Devices. answer key.
Compare your answer with the Find it out what makes your
answer key 2.1-3 of Obtaining answer correct or incorrect.
Tools, Equipment and Testing
Devices.
View Power Point Presentation of Ask your trainer to assist you for
Obtaining Tools, Equipment and any technical problem you may
Testing Devices encounter.
Answer computer-based Click the auto feedback to view
assessment. your answer and find it out what
makes you correct or incorrect.
Read Information Sheet 2.1-4 on Familiarize the appropriate
Using Appropriately the Personal Personal Protective Equipment
Protective Equipment. used in cable splicing &
installation.
Answer Self Check 2.1-4 on Try to familiarize and answer
Using Appropriately the Personal self-check without looking at the
Protective Equipment. answer key 2.1-4.
Compare your answer with the Find it out what makes your
answer key 2.1-4. answer correct or incorrect.
Document No
Date Developed:
Issued by:
8/21/2018
CBLM in NCII CSS Page 10 of 114
Developed by: SFIST
SUSAN F.
ECHALAS Revision # 01
Answer Self Check 2.1-5 on Try to familiarize and answer
Performing Cable Splicing. self-check without looking at the
answer key.
Compare your answer with the Find it out what makes your
Answer key 2.1-5. answer correct or incorrect.
Document No
Date Developed:
Issued by:
8/21/2018
CBLM in NCII CSS Page 11 of 114
Developed by: SFIST
SUSAN F.
ECHALAS Revision # 01
Perform Job Sheet 2.1-6 on Repeat the task if you fail to
Install Network Cables and its achieve the Performance criteria.
Raceway.
Evaluate your performance using Repeat the task if you fail to
Performance criteria checklist achieve the Performance criteria
2.1-6. 2.1-5.
Read the Information Sheet 2.1-7 Familiarize the Tools needed in
on Performing and Checking Checking Installation network.
Installation Network.
Compare your answer with the Find it out what makes your
answer key 2.1-7 on Performing answer correct or incorrect.
and Checking Installation
Network.
Perform Task sheet 2.1-7 on Always wear appropriate PPE when
Check Installation Network. performing the task.
Evaluate your performance using Repeat the task if you fail to
Performance Criteria Checklist achieve the criteria.
2.1-7.
Read Information Sheet 2.1-8 on Familiarize the tools used for
Perform and Check Installation checking the installation
Answer Self Check 2.1-7 on Try to familiarize with the 5S and
Following 5S and 3Rs. 3Rs practices.
Compare your answer with the Find it out what makes your
answer key on Following 5S and answer correct or incorrect.
3Rs.
Document No
Date Developed:
Issued by:
8/21/2018
CBLM in NCII CSS Page 12 of 114
Developed by: SFIST
SUSAN F.
ECHALAS Revision # 01
Information Sheet 2.1-1
Planning Cable Route
Learning Objectives:
After reading this INFORMATION SHEET, YOU MUST be able to:
1. Define Network Topology.
2. Identify the different types of Network Topology.
3. Discuss the Planning Cable.
Introduction:
Everyone has heard the saying: it’s the little things that make the
biggest impact. This holds true especially when designing a data center.
There are many important aspects to consider—from power and cooling
requirements, to servers and hardware. Good cable pathway designers
know that multiple products must work together to ensure a successful
pathway from point A to point B. Let’s talk about a few of the key
elements.
Document No
Date Developed:
Issued by:
8/21/2018
CBLM in NCII CSS Page 13 of 114
Developed by: SFIST
SUSAN F.
ECHALAS Revision # 01
Planning cabling patch ways—it’s one of the most important factors
to consider when cabling a data center. The key parameters that
affect these cabling pathways are the rack density,
type/count/diameter of cables, end equipment cable entry and the
room height.
Cable Selection
Outside diameter is the key to reducing cable fill in your cable tray
and your cable management. Let’s look at the options available.
Copper cables are more difficult due to their weight and large OD
compared to fiber optic cables. Copper cables are typically used for
inter and intra rack communications.
Fiber optic cables offer options to reduce cable fill and can provide
much greater bandwidth than copper.
Pre-Terminated fiber optic cables are also prevalent in data centers.
They are used for many reasons including quality, dependability,
and reduced installation time. Cable slack is hard to accommodate
in data centers no matter where it is located—cable trays, vertical
or horizontal cable managers. Every effort should be made to get
the lengths right before they are installed.
Other Considerations
Cable management in the racks is as important as in the
pathways. Waterfalls from the overhead cable supports into the vertical
wire managers provide necessary strain relief. Spools that can be
attached in the vertical wire manager help maintain bend radius for both
copper and fiber cable. Also, Velcro cable supports are reusable and a
safe way to secure the cable without damaging it.
Problem
One of the biggest problems facing an installation contractor is the
cable pull itself. When pulling to a telecommunications closet or
Document No
Date Developed:
Issued by:
8/21/2018
CBLM in NCII CSS Page 14 of 114
Developed by: SFIST
SUSAN F.
ECHALAS Revision # 01
computer room, technicians pull extra cable so that the run will reach
the patch panel or block. This means that, typically, they can throw away
15 to 20 feet of cable per run. At Category 5 prices, that can amount to
$500 for 100 runs.
Solution
If the installer plans the pull beforehand, one hour of planning time
(at an estimated $50 an hour) can be substituted for that $500 worth of
wasted cable ends. The planning process involves measuring the actual
distance from one end of the cable run to the other, rather than guessing
and then adding a safety margin to be discarded later.
Procedure
1) Look at your blueprints or cabling plan, and walk the route of the run.
Note any obstacles that must be routed around or other factors that may
affect the run length.
2) Decide on a way to measure the exact distance from your cable reels or
boxes to the telecommunications closet or computer room, making sure
to include the distance from the outside of the closet to the patch panel
or block within. Ceiling and floor tiles of standard (and known) size can
be counted, and the distance computed in that way. But perhaps the
best method is to actually run a pull string from the cable boxes or
spools to the panel or block in the closet.
3) Make sure to include the length of any looped extra cable to be stored
in the closet as well. The pull string should follow the path of any wire
way or other cable management device used in the closet.
4) Retrieve the pull string and lay it out in the corridor where the pull is
being made. Pull the cables to match the length of the pull string, and
cut them. Leave minimal extra cable at each end of the pull--perhaps 2
feet per end.
Running a pull string along the route of a cable pull can help you
determine the exact length to which your horizontal cabling should be
Document No
Date Developed:
Issued by:
8/21/2018
CBLM in NCII CSS Page 15 of 114
Developed by: SFIST
SUSAN F.
ECHALAS Revision # 01
cut. Make sure to include the lengths of service loops at either end, the
distance through any conduit to the wall plate and the distance along
wire ways in the closet to the termination point on the panel or block in
the equipment rack.
Document No
Date Developed:
Issued by:
8/21/2018
CBLM in NCII CSS Page 16 of 114
Developed by: SFIST
SUSAN F.
ECHALAS Revision # 01
E-Class Room Network Diagram
Document No
Date Developed:
Issued by:
8/21/2018
CBLM in NCII CSS Page 17 of 114
Developed by: SFIST
SUSAN F.
ECHALAS Revision # 01
Now let us talk about network topology
Star Topology
Many home networks use the star topology. A star network features a
central connection point called a "hub" that may be a hub, switch or
router. Devices typically connect to the hub with Unshielded Twisted Pair
(UTP) Ethernet
Document No
Date Developed:
Issued by:
8/21/2018
CBLM in NCII CSS Page 18 of 114
Developed by: SFIST
SUSAN F.
ECHALAS Revision # 01
Compared to the bus topology, a star network generally requires
more cable, but a failure in any star network cable will only take down
one computer's network access and not the entire LAN. (If the hub fails,
however, the entire network also fails.)
See the illustration of Star Network Topology.
Star-Wired Ring
A star-wired ring topology may appear (externally) to be the same
as a star topology. Internally, the MAU of a star-wired ring contains
wiring that allows information to pass from one device to another in a
circle or ring (See fig. 3). The Token Ring protocol uses a star-wired ring
topology.
Document No
Date Developed:
Issued by:
8/21/2018
CBLM in NCII CSS Page 19 of 114
Developed by: SFIST
SUSAN F.
ECHALAS Revision # 01
Ring Topology
In a ring network, every device has exactly two neighbors for
communication purposes. All messages travel through a ring in the same
direction (either "clockwise" or "counterclockwise"). A failure in any cable
or device breaks the loop and can take down the entire network.
Bus Topology
Bus networks (not to be confused with the system bus of a
computer) use a common backbone to connect all devices. A single cable,
the backbone functions as a shared communication medium that devices
attach or tap into with an interface connector. A device wanting to
communicate with another device on the network sends a broadcast
message onto the wire that all other devices see, but only the intended
recipient actually accepts and processes the message
Ethernet bus topologies are relatively easy to install and don't
require much cabling compared to the alternatives. 10Base-2 ("ThinNet")
many years ago for bus topologies. However, bus networks work best
Document No
Date Developed:
Issued by:
8/21/2018
CBLM in NCII CSS Page 20 of 114
Developed by: SFIST
SUSAN F.
ECHALAS Revision # 01
with a limited number of devices. If more than a few dozen computers are
added to a network bus, performance problems will likely result. In
addition, if the backbone cable fails, the entire network effectively
becomes unusable.
See the illustration of Bus Network Topology.
Document No
Date Developed:
Issued by:
8/21/2018
CBLM in NCII CSS Page 21 of 114
Developed by: SFIST
SUSAN F.
ECHALAS Revision # 01
See the illustration of Tree Network Topology.
Mesh Topology
Mesh topologies involve the concept of routes. Unlike each of the
previous topologies, messages sent on a mesh network can take any of
several possible paths from source to destination. (Recall that even in a
ring, although two cable paths exist, messages can only travel in one
direction.) Some WANs, most notably the Internet, employ mesh routing.
A mesh network in which every device connects to every other is called a
full mesh. As shown in the illustration below, partial mesh networks also
exist in which some devices connect only indirectly to others.
See the illustration of Mesh Network Topology.
Document No
Date Developed:
Issued by:
8/21/2018
CBLM in NCII CSS Page 22 of 114
Developed by: SFIST
SUSAN F.
ECHALAS Revision # 01
Hybrid Topology
A combination of any two or more network topologies. Note 1:
Instances can occur where two basic network topologies, when connected
together, can still retain the basic network character, and therefore not
be a hybrid network. For example, a tree network connected to a tree
network is still a tree network. Therefore, a hybrid network accrues only
when two basic networks are connected and the resulting network
topology fails to meet one of the basic topology definitions. For example,
two star networks connected together exhibit hybrid network topologies.
Note 2: A hybrid topology always accrues when two different basic
network topologies are connected.
5-4-3 Rule
A consideration in setting up a tree topology using Ethernet protocol is
the 5-4-3 rule. One aspect of the Ethernet protocol requires that a signal
sent out on the network cable reach every part of the network within a
specified length of time. Each concentrator or repeater that a signal goes
through adds a small amount of time. This leads to the rule that between
any two nodes on the network there can only be a maximum of 5
segments, connected through 4 repeaters/concentrators. In addition,
only 3 of the segments may be populated (trunk) segments if they are
made of coaxial cable. A populated segment is one which has one or more
nodes attached to it. In Figure 4, the 5-4-3 rule is adhered to. The
furthest two nodes on the network have 4 segments and 3
repeaters/concentrators between them.
This rule does not apply to other network protocols or Ethernet
networks where all fiber optic cabling or a combination of a fiber
backbone with UTP cabling is used. If there is a combination of fiber optic
backbone and UTP cabling, the rule is simply translated to 7-6-5 rule.
Considerations When Choosing a Topology
Money. A linear bus network may be the least expensive way to
install a network; you do not have to purchase concentrators.
Document No
Date Developed:
Issued by:
8/21/2018
CBLM in NCII CSS Page 23 of 114
Developed by: SFIST
SUSAN F.
ECHALAS Revision # 01
Length of cable needed. The linear bus network uses shorter
lengths of cable.
Future growth. With a star topology, expanding a network is easily
done by adding another concentrator.
Cable type. The most common cable in schools is unshielded
twisted pair, which is most often used with star topologies.
Document No
Date Developed:
Issued by:
8/21/2018
CBLM in NCII CSS Page 24 of 114
Developed by: SFIST
SUSAN F.
ECHALAS Revision # 01
SELF CHECK 2.1-1
Planning Cable Route
TRUE OR FALSE:
Determine whether the statement is true or false. Write T if the
Statement is true and F if the statement is false. Write on answer on a
separate sheet.
______ 1. Planning the basic design for the data center is essential to save
money and time resources
_____ 2. UTP copper cable is used commonly in data center today with a
higher speed than fiber optic cables
_____ 3. Failure in any star network cable will only take down one
computer's network access and not the entire LAN.
_____ 4. Disadvantage of Tree Topology is: It is more difficult to configure
and wire than other topologies
_____ 5. Bus topologies are relatively difficult to install and require much
cabling
Document No
Date Developed:
Issued by:
8/21/2018
CBLM in NCII CSS Page 25 of 114
Developed by: SFIST
SUSAN F.
ECHALAS Revision # 01
ANSWER KEY 2.1-1
1. T
2. F
3. F
4. T
5. F
Document No
Date Developed:
Issued by:
8/21/2018
CBLM in NCII CSS Page 26 of 114
Developed by: SFIST
SUSAN F.
ECHALAS Revision # 01
TASK SHEET 2.1-1
Title: Lay out Network Cable Route through Computer.
Supplies/Materials : USB
Steps/Procedures:
1. Create a layout plan base on client-server network.
2. Use block diagram to represent your network devices.
3. Use lines to represent your cable connection.
4. Network devices will be the patch panel, router, access point,
client, server, Ethernet switch, cables, and modular jack for
your I/O device.
5. You are free to use any application.
6. Save you output on USB flash drive.
7. Print your output.
8. Evaluate your output according to the Performance criteria
standard.
9. Present your output for final evaluation and interview.
Assessment Method:
Practical Demonstration
Oral Questioning
Observation
Document No
Date Developed:
Issued by:
8/21/2018
CBLM in NCII CSS Page 27 of 114
Developed by: SFIST
SUSAN F.
ECHALAS Revision # 01
Performance Criteria Checklist 2.2.1
CRITERIA
YES NO
Did you….
1. use client-server network?
2. use blocks to represent your network device?
3. represent completely the network devices given?
4. save your output in your USB flash drive?
5. finish your output at the time allotted?
6. print your output with the correct margin?
7. follow the standard in lay outing Cable Route?
Document No
Date Developed:
Issued by:
8/21/2018
CBLM in NCII CSS Page 28 of 114
Developed by: SFIST
SUSAN F.
ECHALAS Revision # 01
Information Sheet 2.1-2
Identifying Necessary Network Materials
Learning Objectives:
After reading this INFORMATION SHEET, YOU MUST be able to:
1. Identify the different network devices.
2. Discuss Basic DHCP (Dynamic Host Configuration Protocol).
3. Enumerate the four pairs of cables with different color codes.
Introduction:
Network Devices
There are several network devices used to complete the task in installing
and these are:
• Hub • Basic DHCP (Dynamic
• Repeater Host Configuration
• Modem Protocol) server
• NIC (Network Interface • Network cables
Card) • Patch panel
• Media converters • RJ45 connector
• Basic switch
• Bridge
• Wireless access point
• Basic router
• Basic firewall
Document No
Date Developed:
Issued by:
8/21/2018
CBLM in NCII CSS Page 29 of 114
Developed by: SFIST
SUSAN F.
ECHALAS Revision # 01
Hub
Repeater
A wireless repeater.
A repeater is an electronic device that receives a signal and
retransmits it at a higher level and/or higher power, or onto the other
side of an obstruction, so that the signal can cover longer distances
without degradation. Because repeaters work with the actual physical
signal, and do not attempt to interpret the data being transmitted, they
operate on the physical layer, the first layer of the OSI model. Repeaters
are majorly employed in long distance transmission to reduce the effect of
Document No
Date Developed:
Issued by:
8/21/2018
CBLM in NCII CSS Page 30 of 114
Developed by: SFIST
SUSAN F.
ECHALAS Revision # 01
attenuation. It is important to note that repeaters do not amplify the
original signal but simply regenerate it.
Modem
Modem (from modulator-demodulator) is a device that turns the
digital 1s and 0s of a personal computer into sounds that can be
transmitted over the telephone lines of Plain Old Telephone
Systems (POTS), and once received on the other side, converts those
sounds back into a form used by a USB, Ethernet, serial, or network
connection. Modems are generally classified by the amount of data they
can send in a given time, normally measured in bits per second, or "bps".
Media converters
Media converters are simple networking devices that make it
possible to connect two dissimilar media types such as twisted pair with
Document No
Date Developed:
Issued by:
8/21/2018
CBLM in NCII CSS Page 31 of 114
Developed by: SFIST
SUSAN F.
ECHALAS Revision # 01
fiber optic cabling. They were introduced to the industry nearly two
decades ago, and are important in interconnecting fiber optic cabling-
based systems with existing copper-based, structured cabling systems.
Media converters support many different data communication protocols
including Ethernet, T1/E1, T3/E3, as well as multiple cabling types such
as coaxial, twisted pair, multimode and single-mode fiber optics. When
expanding the reach of a Local Area Network to span multiple locations,
media converters are useful in connecting multiple LANs to form one
large "campus area network" that spans over a limited geographic area.
As local networks are primarily copper-based, media converters can
extend the reach of the LAN over single-mode fiber up to 130 kilometers
with 1550 nm optics.
Basic switch
Switches are often confused with bridges because they also operate at
the data link layer of the OSI model. Similar to a hub, switches provide a
central connection between two or more computers on a network, but
with some intelligence. They provide traffic control for packets; rather
than forwarding data to all the connected ports, a switch forwards data
only to the port on which the destination system is connected. They use a
database of MAC addresses to determine where computers are located
and very efficiently send packets only where they need to go. The
database is created dynamically as computers communicate on the
network. The switch simply watches the incoming packets and
memorizes the MAC address and port a packet arrives on. If a packet
arrives with a destination computer that the switch does not have an
Document No
Date Developed:
Issued by:
8/21/2018
CBLM in NCII CSS Page 32 of 114
Developed by: SFIST
SUSAN F.
ECHALAS Revision # 01
address for in its MAC address table, it will flood the packet out all
connected ports. A switch creates separate collision domains for each
physical connection. A switch will only create separate broadcast
domains if separate VLANs (Virtual Local Area Networks) are assigned to
different ports on the switch. Otherwise, a broadcast received on one port
will be flooded out all ports except the one it came in on.
Bridge
Bridges can be identified by the fact that they operate at the layer
of the OSI model. Bridges have intelligence and can "bridge" two of their
ports together at very high speed. They use a database of addresses to
determine where computers are located and very efficiently send frames
only where they need to go. The database is created dynamically as
computers communicate on the network. A bridge simply watches the
incoming frame and memorizes the MAC address and port a frame
arrives on. It uses this information to locate a computer if a packet comes
in that must be forwarded to it. If a frame arrives at the bridge and the
bridge does not know where to send it, the bridge will flood the frame just
like a hub does. Bridging is often inaccurately called switching.
Document No
Date Developed:
Issued by:
8/21/2018
CBLM in NCII CSS Page 33 of 114
Developed by: SFIST
SUSAN F.
ECHALAS Revision # 01
Wireless access point
Basic router
Basic firewall
Document No
Date Developed:
Issued by:
8/21/2018
CBLM in NCII CSS Page 35 of 114
Developed by: SFIST
SUSAN F.
ECHALAS Revision # 01
A firewall is a part of a computer system or network that is
designed to block unauthorized access while permitting outward
communication. It is also a device or set of devices configured to permit,
deny, encrypt, decrypt, or proxy all computer traffic between different
security domains based upon a set of rules and other criteria.
Firewalls can be implemented in both hardware and software, or a
combination of both. Firewalls are frequently used to prevent
unauthorized Internet users from accessing private networks connected
to the Internet. All messages entering or leaving the Local Area
Network pass through the firewall, which examines each message and
blocks those that do not meet the specified security criteria. Without
proper configuration, a firewall can often become worthless. Standard
security practices dictate a "default-deny" firewall rule set, in which the
only network connections which are allowed are the ones that have been
explicitly allowed.
Document No
Date Developed:
Issued by:
8/21/2018
CBLM in NCII CSS Page 36 of 114
Developed by: SFIST
SUSAN F.
ECHALAS Revision # 01
UTP cable
The UTP cable will be used to connect the following devices
1. Router to router – depending on scenario
2. Router to switch
3. Router to PC – or other hosts end devices
4. Switch to switch
5. Switch to hosts.
These configurations use three main types of UTP cable configurations
which are.
Straight through
Cross over
Rollover cable
TIA/EIA governs the UTP cabling standards, the figure below shows an
example of the UTP cable. It has four pairs of cables with different color
codes.
Patch Panel
A patch panel in a local area network (LAN) is a mounted hardware
assembly that contains ports used to connect and manage incoming and
outgoing LAN cables. Patch panels are also referred to as patch
bays, patch fields or jack fields and are also commonly used in
radio and television.
Document No
Date Developed:
Issued by:
8/21/2018
CBLM in NCII CSS Page 37 of 114
Developed by: SFIST
SUSAN F.
ECHALAS Revision # 01
RJ45 Connectors
A registered jack (RJ) is a standardized physical network interface
for connecting telecommunications or data equipment. The physical
connectors that registered jacks use are mainly of the modular connector
and 50-pin miniature ribbon connector types. The most common twisted-
pair connector is an 8-position, 8-contact (8P8C) modular plug and jack
commonly referred to as an RJ45 connector.
Modular Jack
A modular connector is an electrical connector that was originally
designed for use in telephone wiring, but has since been used for many
other purposes. Many applications that originally used a bulkier, more
expensive connector have converted to modular connectors. Probably the
best known applications of modular connectors are for telephone and
Ethernet.
Document No
Date Developed:
Issued by:
8/21/2018
CBLM in NCII CSS Page 38 of 114
Developed by: SFIST
SUSAN F.
ECHALAS Revision # 01
SELF CHECK 2.1-2
Identifying Necessary Network Materials
Multiple Choice
Choose the letter of the correct answer & write it on your answer sheet
1. Connector that was originally designed for use in telephone wiring
a. Modular jack b. RJ45 c. UTP RJ11
2. Hardware assembly that contains ports used to connect and
manage incoming and outgoing LAN cables.
a. Router b. access point c. patch panel d. Ethernet switch
3. Cable used to connect LAN devices
a. Modular jack b. RJ45 c. UTP RJ11
4. Is a device that allows wireless communication devices to connect
to a wireless network using Wi-Fi, Bluetooth or related standards.
a. Router b. access point c. patch panel d. Ethernet switch
5. An Intelligent device that provides a central connection between
two or more computers on a network
a. Router b. access point c. patch panel d. Ethernet switch
Document No
Date Developed:
Issued by:
8/21/2018
CBLM in NCII CSS Page 39 of 114
Developed by: SFIST
SUSAN F.
ECHALAS Revision # 01
ANSWER KEY 2.1-2
1. a
2. c
3. c
4. b
5. d
Document No
Date Developed:
Issued by:
8/21/2018
CBLM in NCII CSS Page 40 of 114
Developed by: SFIST
SUSAN F.
ECHALAS Revision # 01
Information Sheet 2.1-3
Obtaining Tools, Equipment and Testing Devices
Learning Objectives:
After reading this INFORMATION SHEET, YOU MUST be able to:
1. Identify the tools required for the cable splicing and
Installation.
2. Classify the tools, equipment and testing devices according to
use.
3. Give some tips on how to use tools, equipment and testing
devices.
Introduction:
Electrical work can't be done without the right tools. As basic tools
have been improved over the years and new specialized tools are
developed, the list of tool choices for electricians becomes even
longer.
An electric drill
A drill is a tool fitted with a cutting tool attachment or driving tool
attachment, usually a drill bit or driver bit, used for making holes in
various materials or driving screws. The attachment is gripped by a
chuck at one end of the drill and rotated while pressed against the
target material. The tip, and sometimes edges, of the cutting tool does
the work of cutting into the target material. This may be slicing off
Document No
Date Developed:
Issued by:
8/21/2018
CBLM in NCII CSS Page 41 of 114
Developed by: SFIST
SUSAN F.
ECHALAS Revision # 01
thin shavings (twist drills or auger bits), grinding off small particles
(oil drilling), crushing and removing pieces of the work piece (SDS
masonry drill), countersinking, counter boring, or other operations.
Hole saw
A hole saw (also styled hole saw), also known as a hole cutter, is a
saw blade of annular (ring) shape, whose annular kerf creates a hole in
the work piece without having to cut up the core material. It is used in a
drill. Hole saws typically have a pilot drill bit at their center to keep the
saw teeth from walking. The fact that a hole saw creates the hole without
needing to cut up the core often makes it preferable to twist drills or
spade drills for relatively large holes (especially those larger than 25
millimeters (1.0 inch)). The same hole can be made faster and using less
power
Document No
Date Developed:
Issued by:
8/21/2018
CBLM in NCII CSS Page 42 of 114
Developed by: SFIST
SUSAN F.
ECHALAS Revision # 01
Fish tape
A fish tape (also known as a draw wire or draw tape) is a tool used by
electricians to route new wiring through walls and electrical conduit.
Cable Tie
A cable tie (also known as a wire tie, hose tie, steggel tie, zap strap
or zip tie, and by the brand names Ty-Rap and Panduit strap) is a
type of fastener, for holding items together, primarily electrical cables
or wires.
Cable stripper
Stripping is the act of removing the protective outer jacket around
network cables in preparation for installation of plugs or keystone
jacks. It can help you speed up the process of performing fiber
network maintenance work and avoid excessive network downtime.
Document No
Date Developed:
Issued by:
8/21/2018
CBLM in NCII CSS Page 43 of 114
Developed by: SFIST
SUSAN F.
ECHALAS Revision # 01
A stripping tool is an essential part in the process of wring Cat5e
patch panel. FS.COM supplies a wide variety of cable strippers,
including wire stripping knife tool, multifunctional network cable
stripper and diagonal cutting plier, which are all at very competitive
price to help you get the job done right.
Document No
Date Developed:
Issued by:
8/21/2018
CBLM in NCII CSS Page 44 of 114
Developed by: SFIST
SUSAN F.
ECHALAS Revision # 01
110 punch down tool
Punch down tool is a small hand tool used by telecommunication
and network technicians. It is used for inserting wire into insulation-
displacement connectors on punch down blocks, patch panels,
keystone modules, and surface mount boxes. FS FPDT-X02 is a good
choice to insert and cut cable terminations effortlessly. .
A punch down tool that is use in terminating a twisted pair cable
into a Cat5e receptacle.
Crimping tool
A crimping tool is a device used to conjoin two pieces of metal by
deforming one or both of them in a way that causes them to hold each
other. The result of the tool's work is called a crimp. A good example of
crimping is the process of affixing a connector to the end of a cable.
Document No
Date Developed:
Issued by:
8/21/2018
CBLM in NCII CSS Page 45 of 114
Developed by: SFIST
SUSAN F.
ECHALAS Revision # 01
Wire stripper
A wire stripper is a portable handheld tool used by workers,
especially electricians, for removing the protective coating of an electric
wire in order to replace or repair the wire. It is also capable of stripping
the end portions of an electric wire in order to connect them to other
wires or to terminals. A wire stripper is often considered an important
tool for professional electricians and other related personnel.
Wire Cutter
Any of various devices designed to cut wire.
Document No
Date Developed:
Issued by:
8/21/2018
CBLM in NCII CSS Page 46 of 114
Developed by: SFIST
SUSAN F.
ECHALAS Revision # 01
SELF CHECK 2.1-3
Obtaining Tools, Equipment and Testing Devices
Document No
Date Developed:
Issued by:
8/21/2018
CBLM in NCII CSS Page 47 of 114
Developed by: SFIST
SUSAN F.
ECHALAS Revision # 01
ANSWER KEY 2.1-3
1. Crimping Tool
2. Wire cutter
3. LAN Tester
4. Wire stripper
5. Cable Stripper
6. Patch panel
7. Router
8. Access Point
9. LAN Tester
10. slicing off thin shavings (twist drills or auger bits),
11. grinding off small particles (oil drilling)
12. crushing and removing pieces of the work piece (SDS masonry
drill).
13. test the Cat5e
14. Cat6
15. Cat6e cables
16. coaxial cable
17. telephone wire
Document No
Date Developed:
Issued by:
8/21/2018
CBLM in NCII CSS Page 48 of 114
Developed by: SFIST
SUSAN F.
ECHALAS Revision # 01
Information Sheet 2.1-4
Using Appropriately the Personal Protective Equipment
Learning Objectives:
After reading this INFORMATION SHEET, YOU MUST be able to:
1. Give the importance of PPE.
2. Classify the PPE according to use.
3. Acquire some tips on how to maintain the PPE.
Introduction:
On-the-job safety, whether for the independent cabling contractor
or for the cabling technician working for an enterprise, must be an
integral part of everyday routine. The problem is that we all feel
lucky, and it is often easier and quicker to take shortcuts than it is to
go by the safety manual. And then, it always jolts us when our luck
changes, as it almost always does.
Document No
Date Developed:
Issued by:
8/21/2018
CBLM in NCII CSS Page 49 of 114
Developed by: SFIST
SUSAN F.
ECHALAS Revision # 01
It should fit comfortably, encouraging worker use. If the personal
protective equipment does not fit properly, it can make the difference
between being safely covered or dangerously exposed. When
engineering, work practice, and administrative controls are not
feasible or do not provide sufficient protection, employers must
provide personal protective equipment to their workers and ensure its
proper use. Employers are also required to train each worker required
to use personal protective equipment to know:
When it is necessary
What kind is necessary
How to properly put it on, adjust, wear and take it off
The limitations of the equipment
Proper care, maintenance, useful life, and disposal of the
equipment
If PPE is to be used, a PPE program should be implemented. This
program should address the hazards present; the selection,
maintenance, and use of PPE; the training of employees; and
monitoring of the program to ensure its ongoing effectiveness.
Personal Protective equipment used in Installing computer system
and network
Safety eyeglasses
Cut resistance gloves
Safety Shoes
Goggles, or safety glasses, are forms of protective eyewear that
usually enclose or protect the area surrounding the eye in order to
prevent particulates, water or chemicals from striking the eyes.
Document No
Date Developed:
Issued by:
8/21/2018
CBLM in NCII CSS Page 50 of 114
Developed by: SFIST
SUSAN F.
ECHALAS Revision # 01
Cut resistance gloves
Cut-resistant gloves are those designed to protect the wearer's
hands from cuts while working with sharp tools. They can be divided
into metal mesh gloves, cut-and-sewn, and seamless knitted gloves.
Safety Shoes
Safety Shoes – Protect Your Foot While in a Workplace. ... The
sturdy and robust nature of these shoes provides maximum
protection from the potential hazards at the workplace, such as
falling of objects on foot, being incurred to punctures, or cutting.
Document No
Date Developed:
Issued by:
8/21/2018
CBLM in NCII CSS Page 51 of 114
Developed by: SFIST
SUSAN F.
ECHALAS Revision # 01
SELF CHECK 2.1-4
Using Appropriately the Personal Protective Equipment
TRUE OR FALSE:
Determine whether the statement is true or false. Write T if the
Statement is true and F if the statement is false. Write on answer on a
separate sheet.
______ 1. PPE", is equipment worn to minimize exposure to hazards that
cause serious workplace injuries and illnesses
______ 2. The sturdy and robust nature of these shoes provides maximum
protection from the potential hazards at the workplace, such
as falling of objects on foot, being incurred to punctures, or
cutting.
______ 3. Goggles, or safety glasses, are forms of protective eyewear that
usually enclose or protect the area surrounding the eye in
order to prevent particulates, water or chemicals from striking
the eyes.
______ 4. Cut-resistant gloves are those designed to protect the wearer's
hands from electricity
______ 5. If the personal protective equipment does not fit properly, it can
make the difference between being safely covered or
dangerously exposed
Document No
Date Developed:
Issued by:
8/21/2018
CBLM in NCII CSS Page 52 of 114
Developed by: SFIST
SUSAN F.
ECHALAS Revision # 01
ANSWER KEY 2.1-4
1. T
2. T
3. T
4. F
5. T
Document No
Date Developed:
Issued by:
8/21/2018
CBLM in NCII CSS Page 53 of 114
Developed by: SFIST
SUSAN F.
ECHALAS Revision # 01
Information Sheet 2.1-5
Performing Cable Splicing Based on Standards
Learning Objectives:
After reading this INFORMATION SHEET, YOU MUST be able to:
1. Give some tips on how to code color the straight through cable
& cross over cable.
2. Identify the steps on Wire Cat5e Patch Panels.
Introduction:
Document No
Date Developed:
Issued by:
8/21/2018
CBLM in NCII CSS Page 55 of 114
Developed by: SFIST
SUSAN F.
ECHALAS Revision # 01
Here's how to Make a Standard Cable
Cut into the plastic sheath about 1 inch (2.5 cm) from the end of
the cut cable. The crimping tool has a razor blade that will do the trick
with practice.
Document No
Date Developed:
Issued by:
8/21/2018
CBLM in NCII CSS Page 56 of 114
Developed by: SFIST
SUSAN F.
ECHALAS Revision # 01
Pinch the wires between your fingers and straighten them out as
shown. The color order is important to get correct.
Document No
Date Developed:
Issued by:
8/21/2018
CBLM in NCII CSS Page 57 of 114
Developed by: SFIST
SUSAN F.
ECHALAS Revision # 01
A view from the top. All the wires are all the way in. There are no
short wires.
WRONG WAY - Note how the blue plastic sleeve is not inside the
connector where it can be locked into place. The wires are too long. The
wires should extend only 1/2 inch from the blue cut sleeve.
CRIMPING THE CABLE ... carefully place the connector into the
Ethernet Crimper and cinch down on the handles tightly. The copper
splicing tabs on the connector will pierce into each of the eight wires.
There is also a locking tab that holds the blue plastic sleeve in place for a
tight compression fit. When you remove the cable from the crimper, that
end is ready to use.
Document No
Date Developed:
Issued by:
8/21/2018
CBLM in NCII CSS Page 58 of 114
Developed by: SFIST
SUSAN F.
ECHALAS Revision # 01
For a standard "Straight Through" cable, repeat all steps and wire
color order on the other end of cable. For a cross-over cable, the other
end will have a different color order as shown by the crossover picture
above.
NOTE - The maximum cable length of CAT-5, CAT-5e or CAT-6 Ethernet cable is
328 feet or 100 meters.
Document No
Date Developed:
Issued by:
8/21/2018
CBLM in NCII CSS Page 59 of 114
Developed by: SFIST
SUSAN F.
ECHALAS Revision # 01
There are fiber and copper patch panels. Copper patch panels are
designed for both shielded and unshielded copper cables like Cat5e,
Cat6, Cat6a and Cat7. This article will mainly introduce Cat5e patch
panels and show you how to wire a Cat5e patch panel step by step.
Document No
Date Developed:
Issued by:
8/21/2018
CBLM in NCII CSS Page 61 of 114
Developed by: SFIST
SUSAN F.
ECHALAS Revision # 01
Cat5e Patch Panel Wiring Steps
Technical information:
There are two wiring schemes: T568A and T568B. The difference
between the two standards are only color, the way the pairs are grouped
is still the same.
Patch Panel Color Code
Specified Steps:
Step 1: Examine the 110-style punch down connectors on the back of the
Cat5e patch panel. The Cat5e patch panels should have 110
style insulation displacement connectors. It is necessary to
acquire enough patch connectors on the patch panels to
accommodate all of the incoming Ethernet cables.
Document No
Date Developed:
Issued by:
8/21/2018
CBLM in NCII CSS Page 62 of 114
Developed by: SFIST
SUSAN F.
ECHALAS Revision # 01
Step 2: Remove the outer jacket from the end of each cable.
You should use the cable strippers to remove approximately 1
inch (25mm) of the outer jacket from the end of each cable,
which ensures a nice clean fit into the patch panel without the
risk of exposing too much cable and damaging it.
Document No
Date Developed:
Issued by:
8/21/2018
CBLM in NCII CSS Page 63 of 114
Developed by: SFIST
SUSAN F.
ECHALAS Revision # 01
(Note: There are two color patterns, T568A and T568B. Make sure to terminate
both sides of the cable on the same pattern used.)
Document No
Date Developed:
Issued by:
8/21/2018
CBLM in NCII CSS Page 64 of 114
Developed by: SFIST
SUSAN F.
ECHALAS Revision # 01
Now you can plug a short patch cable from the desired port on the
patch panel to the closely located hub or switch. The other end of the
wire would be terminated at a wall socket.
Document No
Date Developed:
Issued by:
8/21/2018
CBLM in NCII CSS Page 65 of 114
Developed by: SFIST
SUSAN F.
ECHALAS Revision # 01
SELF CHECK 2.1-5
Labeling
Give the color coding of straight through cable & cross over cable.
Write your answer on a separate sheet.
straight through T568A/T568B cross over T568A/T568B
PIN ID Side A Side B Side A Side B
1
2
3
4
5
6
7
8
Document No
Date Developed:
Issued by:
8/21/2018
CBLM in NCII CSS Page 66 of 114
Developed by: SFIST
SUSAN F.
ECHALAS Revision # 01
ANSWER KEY 2.1-5
Document No
Date Developed:
Issued by:
8/21/2018
CBLM in NCII CSS Page 67 of 114
Developed by: SFIST
SUSAN F.
ECHALAS Revision # 01
TASK SHEET 2.1-5
Title: Make UTP Cable According to Standard.
Steps/Procedure:
1. Create a straight-through cable or cross over cable.
2. Use color coding either T568A or T568B.
3. Use standard length for cutting color coded wires.
4. Follow the correct color coding.
5. Crimp your cable correctly.
6. Test your UTP cable.
7. Label your UTP cable with your name when it is correct.
8. Evaluate your performance based from the standard criteria.
Repeat the process when you have not achieved the standard
until you get the correct UTP cable.
9. Present the output for final evaluation and interview.
Assessment Method:
1. Observation
2. Oral-questioning
3. Demonstration
Document No
Date Developed:
Issued by:
8/21/2018
CBLM in NCII CSS Page 68 of 114
Developed by: SFIST
SUSAN F.
ECHALAS Revision # 01
Performance Criteria Checklist 2.2.5
CRITERIA
YES NO
Did you….
1. follow the standard color coding?
2. follow the standard length in cutting color coded
wires?
3. crimp your cable correctly?
4. test the cable?
5. explain the process accurately?
Document No
Date Developed:
Issued by:
8/21/2018
CBLM in NCII CSS Page 69 of 114
Developed by: SFIST
SUSAN F.
ECHALAS Revision # 01
Information Sheet 2.1-6
Installing Network Cables and its Raceway
Learning Objectives:
After reading this INFORMATION SHEET, YOU MUST be able to:
1. Define Raceway.
2. Identify the different types of raceway.
3. Give some techniques on how to install network cables and its
raceway.
Introduction:
Although wireless is simpler for a lot of people, due to multimedia
sharing, bandwidth on a home network, and paranoia about wireless
security, you may want to use a hard wired solution for home
networking. Having a wired network at home allows you to have a
private, high-speed network for internet access, file sharing, media
streaming, online gaming, IP security cameras, and much more.
Document No
Date Developed:
Issued by:
8/21/2018
CBLM in NCII CSS Page 71 of 114
Developed by: SFIST
SUSAN F.
ECHALAS Revision # 01
It's legitimately one of the most useful and versatile cable
management tools for both home users and professionals, and can do
wonders for both a DIY home theater set-up and a professional
conference room at a Fortune 500 company.
So, it's a track for hiding cables. But it's much more complex than
that: there are tons of different types of raceway, each suited for a unique
application. What are the differences? Which one is right for you? If those
are your questions, then you've come to the right place. Let's take a look:
Wiring Solution
Wire Guards
Document No
Date Developed:
Issued by:
8/21/2018
CBLM in NCII CSS Page 72 of 114
Developed by: SFIST
SUSAN F.
ECHALAS Revision # 01
For Commercial / Industrial Settings
Document No
Date Developed:
Issued by:
8/21/2018
CBLM in NCII CSS Page 73 of 114
Developed by: SFIST
SUSAN F.
ECHALAS Revision # 01
SELF CHECK 2.1-6
Installing Network Cables and its Raceway
TRUE OR FALSE:
Determine whether the statement is true or false. Write T if the
Statement is true and F if the statement is false. Write your answer on
the separate sheet.
______ 1. Cable raceway is a race track where some kind of competitive
speed event takes place, involving cars or horses or video game
characters riding go-karts
______ 2. A well-grounded metallic conduit provides RF (radio frequency)
shielding that minimizes the risk of trouble with
electromagnetic interference (EMI).
_____ 3. Cable raceway is one of the most useful and versatile cable
management tools
_____ 4. Raceways are an important component in the design of complex
data centers and blade servers
_____ 5. Having a wired network at home did not allows you to have a
private, high-speed network for internet access, file sharing,
media streaming, online gaming, IP security cameras, and
much more.
Document No
Date Developed:
Issued by:
8/21/2018
CBLM in NCII CSS Page 74 of 114
Developed by: SFIST
SUSAN F.
ECHALAS Revision # 01
ANSWER KEY 2.1-6
1. F
2. T
3. T
4. T
5. F
Document No
Date Developed:
Issued by:
8/21/2018
CBLM in NCII CSS Page 75 of 114
Developed by: SFIST
SUSAN F.
ECHALAS Revision # 01
JOB SHEET 2.1-6
Title: Install Network Cables and its Raceway.
Equipment : None
Steps/Procedure:
Assessment Method:
1.Observation
2.Oral-questioning
3.Demonstration
Document No
Date Developed:
Issued by:
8/21/2018
CBLM in NCII CSS Page 76 of 114
Developed by: SFIST
SUSAN F.
ECHALAS Revision # 01
Performance Criteria Checklist 2.1-6
CRITERIA
YES NO
Did you….
1. use appropriate tools, materials and appropriate
materials?
2. use the exact raceway length?
3. install network cable and raceway correctly?
4. check the network computers if functioning or
not?
5. observe safety practices while performing the
task?
Document No
Date Developed:
Issued by:
8/21/2018
CBLM in NCII CSS Page 77 of 114
Developed by: SFIST
SUSAN F.
ECHALAS Revision # 01
Information Sheet 2.1-7
Performing and Checking Installation Network
Learning Objectives:
After reading this INFORMATION SHEET, YOU MUST be able to:
1. Identify the different network diagnostic tools.
2. Enumerate the steps on how to run traceroute on windows.
3. List the different network monitoring software in performing
installation network.
Introduction:
After installing the network cable and raceway, it is important to
check unnecessary damage to the cables or raceway. Check can be done
through visual inspection.
Document No
Date Developed:
Issued by:
8/21/2018
CBLM in NCII CSS Page 78 of 114
Developed by: SFIST
SUSAN F.
ECHALAS Revision # 01
ipconfig Usage
From the command prompt, type 'ipconfig' to run the utility with
default options. The output of the default command contains the IP
address, network mask and gateway for all physical and virtual network
adapters.
ipconfig supports several command line options as described below.
The command "ipconfig /?" displays the set of available options.
ipconfig /all
This option displays the same IP addressing information for each
adapter as the default option. Additionally, it displays DNS and WINS
settings for each adapter.
ipconfig /release
This option terminates any active TCP/IP connections on all network
adapters and releases those IP addresses for use by other applications.
"pconfig /release" can be used with specific Windows connection names.
In this case, the command will affect only the specified connections and
not all. The command accepts either full connection names or wildcard
names. Examples:
ipconfig /release "Local Area Connection 1"
Document No
Date Developed:
Issued by:
8/21/2018
CBLM in NCII CSS Page 79 of 114
Developed by: SFIST
SUSAN F.
ECHALAS Revision # 01
ipconfig /release *Local*
ipconfig /renew
This option re-establishes TCP/IP connections on all network
adapters. As with the release option, ipconfig /renew takes an optional
connection name specifier.
Both /renew and /release options only work on clients configured for
dynamic (DHCP) addressing.
Document No
Date Developed:
Issued by:
8/21/2018
CBLM in NCII CSS Page 80 of 114
Developed by: SFIST
SUSAN F.
ECHALAS Revision # 01
that your computer can connect to it, to eliminate it as a possible cause
for a networking issue.
Traceroute – Traces the route of packets to destination host from
our server. A traceroute is a function which traces the path from one
network to another. It allows us to diagnose the source of many
problems.
To run traceroute on Windows:
1. Open the command prompt.
1. Go to Start > Run.
2. Type cmd and press the Enter key.
3. This will bring up a command prompt window. It has a line that looks
like this:
C:\Documents and Settings\yourname> _ with a cursor blinking next
to the ">" symbol.
Document No
Date Developed:
Issued by:
8/21/2018
CBLM in NCII CSS Page 81 of 114
Developed by: SFIST
SUSAN F.
ECHALAS Revision # 01
There are other tools in the list will help with performance issues,
network management, security, file sharing and more. And they're all
free, and very lightweight: even installing all ten will use less than 7MB
hard drive space. And if you're thinking about networking, you may also
want to consider network monitoring software, too.
1. Network Stuff 3.0.9 - 1.34 MB
2. DNS Jumper 1.0.5 - 812KB
3. RawCap 0.1.4.0 - 20KB
4. Fast Software Audit 1.0.0 - 160 KB
5. CloseTheDoor 0.2.1 portable - 484 KB
6. BlueLife Hosts Editor 1.0 - 388KB
7. Network Activity Indicator 1.6 -1.03 MB
8. RemoteRebootX 2012 - 428KB
Document No
Date Developed:
Issued by:
8/21/2018
CBLM in NCII CSS Page 82 of 114
Developed by: SFIST
SUSAN F.
ECHALAS Revision # 01
SELF CHECK 2.1-7
Performing and Checking Installation Network
Document No
Date Developed:
Issued by:
8/21/2018
CBLM in NCII CSS Page 83 of 114
Developed by: SFIST
SUSAN F.
ECHALAS Revision # 01
ANSWER KEY 2.1-5
1. ipconfig
2. ping command
3. Traceroute
4. cmd
5. ipconfig/all
Document No
Date Developed:
Issued by:
8/21/2018
CBLM in NCII CSS Page 84 of 114
Developed by: SFIST
SUSAN F.
ECHALAS Revision # 01
TASK SHEET 2.1-7
Title: Check Network Connection
Equipment :
Steps/Procedure:
1. Prepare the tools, equipment and PPE needed to check network
connection.
2. Visually inspect the cables and raceway installation to know
the damage.
3. Test if the computers are functioning.
4. Ping the router.
5. Ping the access point.
6. Ping the client.
7. Ping the server.
8. Ping the internet connection.
9. Observe safety practices.
10. Observe the proper procedure checking network connection
according to the performance criteria.
Assessment Method:
1.Observation
2.Oral-questioning
3.Demonstration
Document No
Date Developed:
Issued by:
8/21/2018
CBLM in NCII CSS Page 85 of 114
Developed by: SFIST
SUSAN F.
ECHALAS Revision # 01
Performance Criteria Checklist 2.1-6
CRITERIA
YES NO
Did you….
1. prepare the tools, equipment and PPE needed to
check network connection?
2. find damage to cables and raceway?
3. test if the computers are functioning?
4. ping the router?
5. ping the access point?
6. ping thee client?
7. ping the server?
8. ping the internet connection?
9. observe safety practices?
Document No
Date Developed:
Issued by:
8/21/2018
CBLM in NCII CSS Page 86 of 114
Developed by: SFIST
SUSAN F.
ECHALAS Revision # 01
INFORMATION SHEET 2.1-8
Follow 5S and 3Rs
Learning Objectives:
After reading this INFORMATION SHEET, YOU MUST be able to:
1. Identify the 5S methods/programs.
2. Enumerate the 3Rs initiatives.
3. Give the importance of 3Rs initiatives and 5S methods/program.
Introduction:
With the ever changing economic climate, many organizations are
periodically adjusting their resources to align with business strategy.
This often results in the need to achieve more work with fewer resources.
In order to remain successful, businesses must become more efficient,
reduce waste and thereby reduce cost. We must find ways to do what we
are currently doing in less time and at a lower cost. One way we can
accomplish this is through the use of 5S Principles.
The Japanese later adapted the CANDO methods and applied them in
their production facilities. Some commonly used words describing the
steps in 5S are Sort, Set, Shine, Standardize and Sustain. Throughout
different companies, various words are used that have similar meanings.
No matter what specific words are used to identify the steps in 5S, the
purpose remains the same: create a clean, organized and efficient work
environment.
5S Methods /Program
Document No
Date Developed:
Issued by:
8/21/2018
CBLM in NCII CSS Page 87 of 114
Developed by: SFIST
SUSAN F.
ECHALAS Revision # 01
5S is often one element of a larger Lean initiative and promotes
continuous improvement. The 5S list is as follows:
Importance of 5S
There are many benefits to implementing the 5S Methods into a work
area on the production line or in the business office. To not only survive
but thrive in business today, cost must be controlled and waste must be
avoided or eliminated. The 5S steps, when implemented properly, can
identify and reduce many forms of waste in any process or workstation.
An organized work area reduces excessive motion and wasted time
looking for the right tool. The visual aspect of the 5S Methodology is also
very effective. When everything has a place, it is easier to spot something
missing or misplaced. A clean work area helps draw attention to possible
problems or safety hazards. A clean floor helps spot any leaks or spills
could indicate machine maintenance and prevent slips and falls.
Furthermore, encouraging people to watch for and address problems can
result in a positive change to an organizations culture. Therefore, the 5S
Principles implemented as part of a larger Lean initiative or as a
standalone tool can reduce waste, improve quality, promote safety and
drive continuous improvement.
Document No
Date Developed:
Issued by:
8/21/2018
CBLM in NCII CSS Page 88 of 114
Developed by: SFIST
SUSAN F.
ECHALAS Revision # 01
Implementation of 5S
Sort
The first step in 5S is sorting. During sorting the team should go
through all items in the work area including any tools, supplies, bulk
storage parts, etc. The 5S team leader should review and evaluate every
item with the group. This will help to identify which items are essential
for getting the job done effectively and efficiently. If the item is essential
for everyday operations it should be tagged and cataloged. If the item is
not essential, determine how often it is used in the performance of work
in that area. If it is a bulk item, decide the proper amount to be kept in
the area and move the remaining quantity to storage. Excess inventory is
one form of waste and should be eliminated during the 5S activities.
Straighten
Designate a place for all items that remain in the work area. Put all
items in their designated location. An often referenced quote is “A place
for everything and everything in its place”. During the straighten step,
look for ways to reduce or eliminate waste. One form of waste in a
process is unnecessary operator motion or movement. Therefore,
frequently used tools and supplies should be stored in the immediate
work area close to the operator. One effective method commonly used to
avoid wasted time searching for the correct tool is constructing shadow
boards for all essential tools. Items that are not used as often should be
stored based on their frequency of use. All parts bins should be properly
labeled. The label should include part number, part description, storage
location and the recommended min / max quantities. A properly
straightened work area allows the operator to quickly review and verify
that they have everything they need to successfully perform their task at
hand.
Document No
Date Developed:
Issued by:
8/21/2018
CBLM in NCII CSS Page 89 of 114
Developed by: SFIST
SUSAN F.
ECHALAS Revision # 01
Shine
The next step is to clean everything in the area and remove any
trash. To be effective we must keep the area and any related equipment
clean. Dirty process equipment can actually increase the potential for
process variability and lead to equipment failure. Lost time due to
equipment failure is considered waste and non-value-added time. A dirty
area can also contribute to safety issues that have the potential to cause
a worker to be injured. Operators should clean their areas at the end of
each shift. By doing this they will likely notice anything out of the
ordinary such as oil or lubricant leaks, worn lift cables, burnt out bulbs,
dirty sensors, etc. The purpose is to reduce waste and improve operator
safety and efficiency.
Standardize
The fourth step has been called the most important step in the 5S
Process. In this step we must develop the standards for the 5S system.
They will be the standards by which the previous 5S steps are measured
and maintained. In this step, work instructions, checklists, standard
work and other documentation are developed. Without work instructions
or standard work, operators tend to gradually just do things their own
way instead of what was determined by the team. The use of visual
management is very valuable in this phase. Color coding and standard
colors for the surroundings are sometimes used. Photos of the area in the
standard 5S configuration are often posted for easier identification of
non-conformance. The operators are trained to detect non-conforming
conditions and correct them immediately. Schedules should also be
developed for regular maintenance activities in each area.
Document No
Date Developed:
Issued by:
8/21/2018
CBLM in NCII CSS Page 90 of 114
Developed by: SFIST
SUSAN F.
ECHALAS Revision # 01
Sustain
This step in the 5S Process can sometimes become the most
challenging of all the five steps. Sustaining is the continuation of the
Sort, Straighten, Shine and Standardize steps. It is the most important
step in that it addresses the need to perform 5S on a consistent and
systematic basis. During this step a standard audit system is usually
developed and implemented. The goal of the sustain step is to ingrain the
5S process into the company culture. The company must strive to make
5S a way of life so the benefits gained through the exercise can be
maintained. 5S is not a one-time exercise. Following the 5S Process must
become a habit.
5S + 1
Some organizations have added an additional step and titled their
process 5S + 1. The additional step being applied is safety. The goal of
adding this step is to foster a culture that enhances safety by identifying
any workplace hazards and removing them. In addition, tools and
workstations are selected or designed with proper ergonomics in mind.
The emphasis being that in each of the other 5S steps the motto is
“Safety First”.
Document No
Date Developed:
Issued by:
8/21/2018
CBLM in NCII CSS Page 91 of 114
Developed by: SFIST
SUSAN F.
ECHALAS Revision # 01
The 3Rs Initiative
Document No
Date Developed:
Issued by:
8/21/2018
CBLM in NCII CSS Page 92 of 114
Developed by: SFIST
SUSAN F.
ECHALAS Revision # 01
SELF CHECK 2.1-8
Following 5S and 3Rs.
Document No
Date Developed:
Issued by:
8/21/2018
CBLM in NCII CSS Page 93 of 114
Developed by: SFIST
SUSAN F.
ECHALAS Revision # 01
ANSWER KEY 2.1-8
1. Seiri / Sort
2. Seiton / Straighten
3. Seiso / Shine
4. Seiketsu / Standardize:
5. Shitsuke / Sustain
6. Reduce,
7. Reuse
8. Recycle
9. Can identify and reduce many forms of waste in any process or
workstation.
10. To build a sound-material-cycle society through the effective
use of resources and materials.
11. Safety
Document No
Date Developed:
Issued by:
8/21/2018
CBLM in NCII CSS Page 94 of 114
Developed by: SFIST
SUSAN F.
ECHALAS Revision # 01
Evidence Plan
Demonstration &
Observation &
Questioning
Questioning
Portfolio
Written
The evidence must show that the trainee…
*Cable routes are determined and planned in √ √ √
accordance with network design and actual
installation site.
*Network materials necessary to complete the √ √ √
work are identified and obtained in accordance
with established procedures and checked
against systems requirements
*Tools, equipment and testing devices needed √ √ √
to carry out the installation work are obtained
in accordance with established procedures and
checked for correct operation and safety
*Appropriate personal protective equipment is √ √ √
used and OHS policies and procedures are
followed
*Copper cable splicing is performed based on √ √
Electronic Industries
√
Alliance/Telecommunications Industry
Association (EIA/TIA) standards
Document No
Date Developed:
Issued by:
8/21/2018
CBLM in NCII CSS Page 95 of 114
Developed by: SFIST
SUSAN F.
ECHALAS Revision # 01
*Network cables and cable raceway are √ √ √
installed in accordance with established
procedures and installation requirements
*Installation work is performed and is checked √ √ √
to ensure no unnecessary damage has occurred
and complies with requirements
*OHS standards and 5S principles are followed √ √ √
according to enterprise requirements
*Excess components and materials are √
disposed of based on WEEE directives and 3Rs √ √
waste management program
Cable routes are determined and planned in
accordance with network design and actual
installation site.
Network materials necessary to complete the
work are identified and obtained in accordance
with established procedures and checked
against systems requirements
Tools, equipment and testing devices needed to
carry out the installation work are obtained in
accordance with established procedures and
checked for correct operation and safety
Appropriate personal protective equipment is
used and OHS policies and procedures are
followed
Copper cable splicing is performed based on
Electronic Industries
Alliance/Telecommunications Industry
Association (EIA/TIA) standards
Document No
Date Developed:
Issued by:
8/21/2018
CBLM in NCII CSS Page 96 of 114
Developed by: SFIST
SUSAN F.
ECHALAS Revision # 01
Network cables and cable raceway are installed
in accordance with established procedures and
installation requirements
Installation work is performed and is checked
to ensure no unnecessary damage has occurred
and complies with requirements
OHS standards and 5S principles are followed
according to enterprise requirements
Excess components and materials are disposed
of based on WEEE directives and 3Rs waste
management program.
NOTE: *Critical aspects of competency
Document No
Date Developed:
Issued by:
8/21/2018
CBLM in NCII CSS Page 97 of 114
Developed by: SFIST
SUSAN F.
ECHALAS Revision # 01
TABLE OF SPECIFICATION
Objectives/Content Percentage
Knowledge Comprehension Application
area/Topics of test
Use appropriate
personal protective .05% .05%
equipment
TOTAL 100%
Document No
Date Developed:
Issued by:
8/21/2018
CBLM in NCII CSS Page 98 of 114
Developed by: SFIST
SUSAN F.
ECHALAS Revision # 01
Item Analysis
Objectives/Content # of test
Knowledge Comprehension Application
area/Topics item
Use appropriate
personal protective 1
equipment 1
20
TOTAL
Items
Document No
Date Developed:
Issued by:
8/21/2018
CBLM in NCII CSS Page 99 of 114
Developed by: SFIST
SUSAN F.
ECHALAS Revision # 01
Written Test
Name:___________________________ Date:_________________
Score:___________
Multiple Choice: Using bank sheet of paper write the letter of the best
answer
1. Types of network topology that features a central connection point
called a "hub" that may be a hub, switch or router.
a. Ring b. star c. bus d. hybrid
2. Types of network topology that every device has exactly two
neighbors for communication purposes.
a. ring b. star c. bus d. hybrid
3. Types of network topology that has a single cable, the backbone
functions as a shared communication medium that devices attach
or tap into with an interface connector.
a. ring b. star c. bus d. hybrid
4. Network device that connect computers together in star topology
but with no intelligence
a. hub B. router c. switch d. access point
5. It is an electronic device that receives a signal and retransmits it at
a higher level and/or higher power, or onto the other side of an
obstruction
a. hub B. router c. router d. repeater
6. It is a computer hardware component designed to allow computers
to communicate over a computer network
a. RAM b. network interface card c. motherboard d. HDD
7. It is a small hand tool used for inserting wire into insulation-
displacement connectors, patch panels, keystone modules, and
surface mount boxes.
a. Screw driver b. wire cutter c. punch down tool d. crimping
tool
Document No
Date Developed:
Issued by:
8/21/2018
CBLM in NCII CSS Page 100 of 114
Developed by: SFIST
SUSAN F.
ECHALAS Revision # 01
8. It is a device used to conjoin two pieces of metal by deforming one
or both of them in a way that causes them to hold each other
a. Screw driver b. wire cutter c. punch down tool d. crimping
tool
9. It is a tool to test whether a cable or wire is set up properly,
connected to the appropriate source points
a. LAN tester b. Multi-Meter c. cable stripper d. fish tape
10. Safety eyes glasses that is designed to protect the wearer's hands
from cuts while working with sharp tools
a. Safety shoes b. gloves c. mask d. safety eye glasses
True or False: Using blank sheet of paper write true if the statement
is correct and write false if the statement is wrong.
1. In splicing UTP cable, it does not matter if you do not follow the
standard color coding, the cable will still work
2. It is important to test the cable after crimping before connecting it to
any network device to avoid problem with your cable connection
3. Before splicing a cable you must wear anti-cut resistance gloves to
protect yourselves from any cut.
4. It is important to cover the cable with the raceway during the
installation to avoid damage on the cable
5. A well-grounded metallic conduit provides RF (radio frequency)
shielding that minimizes the risk of trouble with electromagnetic
interference (EMI).
cable raceway is one of the most useful and versatile cable
management tools
6. Raceways are an important component in the design of complex data
centers and blade servers to protect the cable from damage and
interference.
7. To execute ping command you must type ipconfig and press enter
8. To find the IP address of the network device just type ipconfig on
command prompt
Document No
Date Developed:
Issued by:
8/21/2018
CBLM in NCII CSS Page 101 of 114
Developed by: SFIST
SUSAN F.
ECHALAS Revision # 01
9. To execute traceroute command in the command prompt, type: tracert
hostname where [hostname] is the name of the server connection you
are testing
10. Reducing in 3R involves the repeated use of items or parts of items
which still have usable aspects..
Document No
Date Developed:
Issued by:
8/21/2018
CBLM in NCII CSS Page 102 of 114
Developed by: SFIST
SUSAN F.
ECHALAS Revision # 01
Answer Key
Multiple Choice:
1. b
2. a
3. c
4. d
5. b
6. a
7. c
8. d
9. d
10. b
True or False
1. F
2. T
3. T
4. T
5. T
6. T
7. F
8. T
9. T
10. F
Document No
Date Developed:
Issued by:
8/21/2018
CBLM in NCII CSS Page 103 of 114
Developed by: SFIST
SUSAN F.
ECHALAS Revision # 01
Performance Test
List of Tools:
Cable splicing tools and testing devices
List of Equipment:
Patch panel, switch, router, access point, client and server computer
List of Materials:
Document No
Date Developed:
Issued by:
8/21/2018
CBLM in NCII CSS Page 104 of 114
Developed by: SFIST
SUSAN F.
ECHALAS Revision # 01
Performance Criteria Checklist for Performance Test
CRITERIA
YES NO
Did you….
1. splice a straight through UTP cable based on
standard color coding?
2. follow the OHS policies during installation?
3. install the cable to the network devices?
4. follow the network diagram given?
5. check your cable & network connection?
6. finish the installation on the time allotted?
7. test the computers if functioning or not after
installing cable?
8. observe safety practices?
Document No
Date Developed:
Issued by:
8/21/2018
CBLM in NCII CSS Page 105 of 114
Developed by: SFIST
SUSAN F.
ECHALAS Revision # 01
QUESTIONING TOOL
Satisfactory
Questions to probe the candidate’s underpinning knowledge
response
Extension/Reflection Questions Yes No
1. What is the first thing you will observe in your workplace
before installing?
2. What are the important tools and materials needed in cable
splicing and installation?
Safety Questions
3. Why we need to follow the OHS before Installation?
4. What PPE are you going to wear in installing network cable?
Contingency Questions
5. What are you going to do if the lights from the Ethernet
switch did not blink after installing your network cables?
6. What are you going to do to check if your network devices
are properly installed?
Job Role/Environment Questions
7. How can you contribute for the environmental safety?
8. Why we need to segregate waste materials?
Rules and Regulations
9. What are basic things to do to ensure that your network
connection is functioning?
10. What are the considerations to be followed in installing
network cables?
The candidate’s underpinning Satisfactory Not
knowledge was: Satisfactory
Document No
Date Developed:
Issued by:
8/21/2018
CBLM in NCII CSS Page 106 of 114
Developed by: SFIST
SUSAN F.
ECHALAS Revision # 01
Expected Answer for Questioning Tool
Satisfactory
Questions to probe the candidate’s underpinning knowledge response
Document No
Date Developed:
Issued by:
8/21/2018
CBLM in NCII CSS Page 107 of 114
Developed by: SFIST
SUSAN F.
ECHALAS Revision # 01
Inventory of Training Resources
Qualification Title: NCII in CSS
Resources for Skills practice of Competency #1
______________________________
Supplies and Materials As per TR As per Remarks
Inventory
RJ 45 400 pcs. 400 pcs. complete
Modular box (RJ45) 25 pcs. 25 pcs. complete
Raceway or Slotted PVC 1.5” x 1.5” x 20 pcs. 20 pcs. complete
48”
UTP cable 1 box 1 box complete
Contact cleaner 1 can 1 can complete
Whiteboard 1 piece 1 piece complete
Fastener 1 lot 1 lot complete
Filler (lead-free) 1 spool 1 spool complete
Fiber optic cable 2 meters 8 pcs 8 pcs complete
(terminated) (Optional)
INSTALLERS / SOFTWARE QUANTITY
Desktop OS (license for proprietary 26 Incomplete
software)
Network OS (license for proprietary 10 5 For
software) acquisition
Office productivity software (license 26 15 For
for proprietary software) acquisition
Anti-virus (license for proprietary 26 15 For
software) acquisition
Disk utility software 5 3 Incomplete
Virtualization software (license for 5 3 Incomplete
proprietary software)
Disk creator software 5 2 Incomplete
Document No
Date Developed:
Issued by:
8/21/2018
CBLM in NCII CSS Page 108 of 114
Developed by: SFIST
SUSAN F.
ECHALAS Revision # 01
Disk image software 5 2 Incomplete
RESOURCES / MANUALS QUANTITY
Motherboard’s manual and installer 26 pieces 20 Incomplete
Device driver installer 10 pieces 1 pc Incomplete
Assorted Computer book, PC 1 lot For
Magazines and journals acquisition
Tools and test equipment As per TR As per Remarks
Inventory
Screwdriver (standard) 10 pieces 1 Incomplete
Screwdriver (Philips) 10 pieces 1 Incomplete
Long nose pliers 10 pieces 5 Incomplete
Mechanical pliers 10 pieces 10 pieces Complete
Allen wrench 10 sets 10 sets Complete
Crimping tools 10 pieces 10 pieces Complete
Soldering iron 10 pieces 10 pieces Complete
Solder sucker 10 pieces 10 pieces Complete
Wire stripper 10 pieces 10 pieces Complete
Portable electric hand drill 5 pieces 5 pieces Complete
Drill bit 1 unit 1 unit Complete
Precision screw drivers 1 set 1 set Complete
Anti-static devices 5 sets 5 sets Complete
Flash light/Head mounted light 10 pcs 10 pcs Complete
Equipment 1 unit As per Remarks
Inventory
Desktop Computer 26 units 26 units Complete
Laptop computer/Netbook 10 10 Complete
Computers for server 10 10 Complete
Server cabinet/Frame 10 10 Complete
Patch panel (48-ports) 20 pcs 20 pcs Complete
Document No
Date Developed:
Issued by:
8/21/2018
CBLM in NCII CSS Page 109 of 114
Developed by: SFIST
SUSAN F.
ECHALAS Revision # 01
Working tables 10 sets 10 sets Complete
Internet subscription (at least 2 1 unit 1 unit Complete
MBPS)
Uninterruptible Power Supply (UPS) 10 units 10 units Complete
Hub / Switch 10 unit 10 unit Complete
Managed switch 2 units 2 units Complete
Network controller 1 1 Complete
ADSL Router with Wi-Fi 11 11 Complete
Wireless Access Point 10 10 Complete
PC Video camera 1 unit 1 unit Complete
External optical drive 2 units 2 units Complete
USB External HD 1 unit 1 unit Complete
Network External HD 1 unit 1 unit Complete
scanner 1 unit 2 Complete
USB printer 1 unit 1 Complete
Network printer 1 unit 1 Incomplete
Flash disk / Memory stick 11 pieces 0 replenish
ment
Electronic tester VOM 10 units 2 replenish
ment
LAN Cable tester 5 units 2 replenish
ment
Note: In the remarks section, remarks may include for repair, for
replenishment, for reproduction, for maintenance etc.
Prepared By: Susan F. Echalas
Document No
Date Developed:
Issued by:
8/21/2018
CBLM in NCII CSS Page 110 of 114
Developed by: SFIST
SUSAN F.
ECHALAS Revision # 01
WORKSHOP LAYOUT
Workshop Layout 92 m2
LEARNING RESOURCE
AREA
Document No
Date Developed:
Issued by:
8/21/2018
CBLM in NCII CSS Page 111 of 114
Developed by: SFIST
SUSAN F.
ECHALAS Revision # 01
ENDNOTES
https://www.edrawsoft.com/Network-Topologies.php
https://community.fs.com/blog/basic-knowledge-tips-of-data-center-
fiber-cabling.html
https://www.datacenterknowledge.com/archives/2013/10/09/cable-
pathways-a-data-center-design-guide-and-best-practices
https://www.cablinginstall.com/articles/print/volume-4/issue-1/cable-
installer-tips/measure-your-cable-route-to-save-money.html
https://www.smartdraw.com/network-diagram/examples/
https://www.edrawsoft.com/network-layout.php
https://en.wikibooks.org/wiki/Network_Plus_Certification/Devices/Com
mon_Devices
https://searchnetworking.techtarget.com/definition/patch-panel
https://www.anixter.com/en_au/resources/literature/techbriefs/what-
is-an-rj45-connector.html
https://en.wikipedia.org/wiki/Modular_connector
https://www.pcmag.com/article2/0,2817,28159,00.asp
https://www.google.com/search?ei=hxh9W-
yNDs349QPOnaSAAg&q=what+is+the+function+of+crimping+tools&oq=w
hat+is+crimping+tools&gs_l=psy-
ab.1.1.0j0i7i30k1l2.20953.23597.0.26693.8.6.0.0.0.0.369.609.2-
1j1.2.0....0...1c.1.64.psy-ab..6.2.597....0.TnvL6X-Mybs
https://www.google.com/search?q=lan+tester+definition
https://en.wikipedia.org/wiki/Drill
https://www.osha.gov/SLTC/personalprotectiveequipment/
https://en.wikipedia.org/wiki/Hole_saw
http://www.starrett.com/category/saws/pvc-
saw/241105#currentPage=1&displayMode=grid&itemsPerPage=24&sortB
y=wp/asc
Document No
Date Developed:
Issued by:
8/21/2018
CBLM in NCII CSS Page 112 of 114
Developed by: SFIST
SUSAN F.
ECHALAS Revision # 01
http://www.bb-elec.com/Learning-Center/All-White-
Papers/Ethernet/Ethernet-Cables-RJ45-Colors-Crossover.aspx
https://www.google.com.ph/search?q=patch+panel++cable+color+coding
&hl=en-
PH&tbm=isch&source=iu&ictx=1&fir=6Ly_gvPLyFZtoM%253A%252CmU
14wnXsn5UK9M%252C_&usg=AFrqEzfmPClDmziCmwQHieiGYJKUx5Qu
mQ&sa=X&ved=2ahUKEwilnY-
ckYLdAhWBWX0KHVgxB7EQ9QEwA3oECAUQCg#imgrc=6Ly_gvPLyFZto
M:
https://community.fs.com/blog/cat5e-patch-panel-wiring-steps.html
https://iihelp.iinet.net.au/How_to_run_a_ping_test
https://kb.intermedia.net/article/682
https://support.n4l.co.nz/s/article/How-to-use-Tracert-Traceroute
https://docs.microsoft.com/en-us/windows-
server/administration/windows-commands/nslookup
https://www.lifewire.com/ping-command-2618099
https://kb.intermedia.net/article/682
https://quality-one.com/5s/
https://technet.microsoft.com/en-
us/library/aa997324(v=exchg.65).aspx
https://www.lifewire.com/netstat-command-2618098
https://www.computerweekly.com/tip/How-to-use-a-netstat-command-
in-Windows-to-watch-open-ports
https://en.wikipedia.org/wiki/Tera_Term
https://en.wikipedia.org/wiki/PuTTY
http://ping-test.net/speed_test
http://mediacomcc.custhelp.com/app/answers/detail/a_id/763/~/how-
to-run-a-speedtest
https://www.5stoday.com/what-is-5s/
Document No
Date Developed:
Issued by:
8/21/2018
CBLM in NCII CSS Page 113 of 114
Developed by: SFIST
SUSAN F.
ECHALAS Revision # 01
Document No
Date Developed:
Issued by:
8/21/2018
CBLM in NCII CSS Page 114 of 114
Developed by: SFIST
SUSAN F.
ECHALAS Revision # 01