100% found this document useful (1 vote)
607 views

CSS2 - Sample - CBLM & Assessment Tool

Uploaded by

Pot Alo
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
100% found this document useful (1 vote)
607 views

CSS2 - Sample - CBLM & Assessment Tool

Uploaded by

Pot Alo
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 114

COMPETENCY-BASED LEARNING MATERIALS

SECTOR: ELECTRONICS
QUALIFICATION: NCII CSS
UNIT OF COMPETENCY: SET-UP COMPUTER NETWORKS
MODULE TITLE: SETTING-UP COMPUTER NETWORK
PREPARED BY: SUSAN F. ECHALAS

RAPU-RAPU NATIONAL HIGH SCHOOL


Poblacion Rapu-Rapu Albay
(NCII CSS)
COMPETENCY-BASED LEARNING MATERIALS

List of Competencies

No. Unit of Competency Module Title Code


Install and configure Install and configure
1. ELC724331
computer systems computer systems
Set-up computer Setting up Computer
2. ELC724332
Networks Networks
Setting-up Computer
3. Set-up Computer Servers ELC724333
Servers
Maintain and repair Maintaining and Repair
4. computer systems and Computer Systems and ELC724334
networks Networks

Document No
Date Developed:
Issued by:
8/21/2018
CBLM in NCII CSS Page 2 of 114
Developed by: SFIST
SUSAN F.
ECHALAS Revision # 01
HOW TO USE THIS COMPETENCY- BASED LEARNING
MATERIALS

Welcome!
The unit of competency, “: SET-UP COMPUTER NETWORKS ", is one of the
competencies of NCII CSS, a course which comprises the knowledge, skills and
attitudes required for a TVET trainer to possess.

The module, “: SET-UP COMPUTER NETWORKS” contains training materials


and activities related to identifying learner’s requirements, preparing session
plan, preparing basic instructional materials and organizing learning and
teaching activities for you to complete. In this module, you are required to go
through a series of learning activities in order to complete each learning outcome.
In each learning outcome are Information Sheets, Self-Checks, Task Sheets and
Job Sheets. Follow and perform the activities on your own. If you have questions,
do not hesitate to ask for assistance from your facilitator.

Remember to:

Read information sheets and complete the self-checks. Suggested references


are included to supplement the materials provided in this module.

Perform the Task Sheets and Job Sheets until you are confident that your
outputs conform to the Performance Criteria Checklist that follows the sheets.

Submit outputs of the Task Sheets and Job Sheets to your facilitator for
evaluation and recording in the Accomplishment Chart. Outputs shall serve as
your portfolio during the Institutional Competency Evaluation. When you feel
confident that you have had sufficient practice, ask your trainer to evaluate you.
The results of your assessment will be recorded in your Progress Chart and
Accomplishment Chart. You must pass the Institutional Competency Evaluation
for this competency before moving to another competency. A Certificate of
Document No
Date Developed:
Issued by:
8/21/2018
CBLM in NCII CSS Page 3 of 114
Developed by: SFIST
SUSAN F.
ECHALAS Revision # 01
Achievement will be awarded to you after passing the evaluation. You need to
complete this module before you can perform the module on Set Network
Configuration.

Document No
Date Developed:
Issued by:
8/21/2018
CBLM in NCII CSS Page 4 of 114
Developed by: SFIST
SUSAN F.
ECHALAS Revision # 01
MODULE CONTENT

UNIT OF COMPETENCY: SET-UP COMPUTER NETWORKS


MODULE TITLE : SETTING-UP COMPUTER NETWORKS

MODULE DESCRIPTOR: This unit covers the knowledge, skills and attitudes
needed to diagnose computer systems and networks

NOMINAL DURATION: 40 hours

LEARNING OUTCOMES:
At the end of this module you MUST be able to:
 LO1. Install network cables
 LO2. Set network configuration
 LO3. Set router/Wi-Fi/ wireless access point/repeater configuration
 LO4. Inspect and test the configured computer networks

ASSESSMENT CRITERIA:
 Cable routes are determined and planned in accordance with network
design and actual installation site.
 Network materials necessary to complete the work are identified and
obtained in accordance with established procedures and checked
against systems requirements
 Tools, equipment and testing devices needed to carry out the installation
work are obtained in accordance with established procedures and
checked for correct operation and safety
 Appropriate personal protective equipment is used and OHS policies and
procedures are followed
 Copper cable splicing is performed based on Electronic Industries
Alliance/Telecommunications Industry Association (EIA/TIA) standards

Document No
Date Developed:
Issued by:
8/21/2018
CBLM in NCII CSS Page 5 of 114
Developed by: SFIST
SUSAN F.
ECHALAS Revision # 01
 Network cables and cable raceway are installed in accordance with
established procedures and installation requirements
 Installation work is performed and is checked to ensure no unnecessary
damage has occurred and complies with requirements
 OHS standards and 5S principles are followed according to enterprise
requirements
 Excess components and materials are disposed of based on WEEE
directives and 3Rs waste management program

Document No
Date Developed:
Issued by:
8/21/2018
CBLM in NCII CSS Page 6 of 114
Developed by: SFIST
SUSAN F.
ECHALAS Revision # 01
LEARNING OUTCOME NO. 1
Install Network Cables

Contents:
1. Determine and plan the cable route
2. Identify and obtain network materials necessary to complete the
work.
3. Obtain the needed tools, equipment and testing devices
4. Use appropriate personal protective equipment
5. Perform cable splicing based on standards
6. Install network cables and cable raceway
7. Perform and check installation work
8. Follow 5S and 3Rs

Assessment Criteria
1. Cable routes are determined and planned in accordance with
network design and actual installation site.
2. Network materials necessary to complete the work are identified
and obtained in accordance with established procedures and
checked against systems requirements
3. Tools, equipment and testing devices needed to carry out the
installation work are obtained in accordance with established
procedures and checked for correct operation and safety
4. Appropriate personal protective equipment is used and OHS
policies and procedures are followed
5. . Copper cable splicing is performed based on Electronic Industries
Alliance/Telecommunications Industry Association (EIA/TIA)
standards
6. Network cables and cable raceway are installed in accordance with
established procedures and installation requirements
7. Installation work is performed and is checked to ensure no
unnecessary damage has occurred and complies with requirements
Document No
Date Developed:
Issued by:
8/21/2018
CBLM in NCII CSS Page 7 of 114
Developed by: SFIST
SUSAN F.
ECHALAS Revision # 01
8. OHS standards and 5S principles are followed according to
enterprise requirements
9. Excess components and materials are disposed of based on WEEE
directives and 3Rs waste management program
Conditions
The participants will have access to:
Cable plan/procedural manual
1. Raceway 13. Modular box
2. Personal protective 14. RJ45
equipment 15. Diagnostics software and
3. Gloves and goggles CD-ROMs
4. Masks 16. Tools and test equipment
5. Anti-static wrist wraps 17. Slotted head screwdriver
6. Materials 18. Philips head screwdriver
7. Contact cleaners/ soap or 19. Long nosed pliers
detergents 20. Allen bit wrench
8. Dust brush 21. Multi-tester
9. Chamois or rags 22. Cable/LAN tester
10. Basin/ water 23. Crimping tool
11. Cable tie 24. Wire stripper
12. Patch panel 25. Spare parts
Methodology:
Lecture/discussion
Brainstorming
Assessment Method:
1. Oral questioning
2. Written Examination
3. Demonstration
4. Portfolio
5. Third party Report

Document No
Date Developed:
Issued by:
8/21/2018
CBLM in NCII CSS Page 8 of 114
Developed by: SFIST
SUSAN F.
ECHALAS Revision # 01
Learning Experiences
Learning Outcome 1
INSTALL NETWORK CABLES

Learning Activities Special Instructions


Read Information Sheet 2.1-1 on Familiarize the network topology,
Planning Cable Route. their advantage and disadvantage
and consideration in determining
cable routes.
Answer Self Check 2.1-1 on Try to answer self-check without
Planning Cable Route. looking at the answer key.
Perform Task Sheet 2.1-1 on Lay Familiarize with the different
out Network Cable Route software application to be able to
through Computer. use in cable route plan layout
through computer.
Evaluate your performance using Repeat the task if you fail to
Performance criteria checklist achieve the Performance criteria
2.1-1 on Lay out Network Cable 2.1-1.
Route through Computer.
Read Information Sheet 2.1-2 on Familiarize the network materials
Identifying Necessary Network its function.
Materials.
Answer Self Check 2.1-2 on Try to familiarize and answer self-
Identifying Necessary Network check without looking at the
Materials. answer key.
Compare your answer with the Find it out what makes your
answer key 2.1-2 of Identifying answer correct or incorrect.
Necessary Network Materials.
View the Multi-Media Ask your trainer to assist you for
Presentation on Different any technical problem you may
Necessary Network Materials. encounter.

Document No
Date Developed:
Issued by:
8/21/2018
CBLM in NCII CSS Page 9 of 114
Developed by: SFIST
SUSAN F.
ECHALAS Revision # 01
Answer computer - based Click the auto feedback to know
assessment after viewing the the result.
multi-media.
Read Information Sheet 2.1-3 on Familiarize the Tools, Equipment
Obtaining Tools, Equipment and and Testing Devices used in
Testing Devices installing network cables
Answer Self Check 2.1-3 on Try to familiarize and answer self-
Obtaining Tools, Equipment and check without looking at the
Testing Devices. answer key.
Compare your answer with the Find it out what makes your
answer key 2.1-3 of Obtaining answer correct or incorrect.
Tools, Equipment and Testing
Devices.
View Power Point Presentation of Ask your trainer to assist you for
Obtaining Tools, Equipment and any technical problem you may
Testing Devices encounter.
Answer computer-based Click the auto feedback to view
assessment. your answer and find it out what
makes you correct or incorrect.
Read Information Sheet 2.1-4 on Familiarize the appropriate
Using Appropriately the Personal Personal Protective Equipment
Protective Equipment. used in cable splicing &
installation.
Answer Self Check 2.1-4 on Try to familiarize and answer
Using Appropriately the Personal self-check without looking at the
Protective Equipment. answer key 2.1-4.
Compare your answer with the Find it out what makes your
answer key 2.1-4. answer correct or incorrect.

Read Information Sheet 2.1-5 on Familiarize the color coding of


Performing Cable Splicing. the straight through & cross over
cable

Document No
Date Developed:
Issued by:
8/21/2018
CBLM in NCII CSS Page 10 of 114
Developed by: SFIST
SUSAN F.
ECHALAS Revision # 01
Answer Self Check 2.1-5 on Try to familiarize and answer
Performing Cable Splicing. self-check without looking at the
answer key.
Compare your answer with the Find it out what makes your
Answer key 2.1-5. answer correct or incorrect.

View video presentation on Ask your trainer to assist you for


Straight through Cable Splicing. any technical problem you may
encounter.
Answer computer- based Click the auto feedback to know
assessment. the result.
Perform Task Sheet 2.1-5 on Always wear appropriate PPE
Make UTP Cable According to when performing the task.
Standard.
Evaluate your performance using Repeat the task if you fail to
Performance Criteria Checklist achieve the Performance criteria
2.1-5 on Make UTP Cable 2.1-5.
According to Standard.
Read Information Sheet 2.1-6 on Familiarize the Tools needed in
Obtaining Tools, Installing Cable Installing Cable & Cable
& Cable Raceway. Raceway.
Answer Self Check 2.1-6 on Try to familiarize and answer
Installing Network Cables and its self-check without looking at the
Raceway. answer key 2.1-6.
Compare your answer with the Find it out what makes your
answer key 2.1-6. answer correct or incorrect.

View multi-media presentation Ask your trainer to assist you for


on Installing Network Cables and any technical problem you may
its Raceway. encounter.
Answer computer- based Click the auto feedback to know
assessment. the result.

Document No
Date Developed:
Issued by:
8/21/2018
CBLM in NCII CSS Page 11 of 114
Developed by: SFIST
SUSAN F.
ECHALAS Revision # 01
Perform Job Sheet 2.1-6 on Repeat the task if you fail to
Install Network Cables and its achieve the Performance criteria.
Raceway.
Evaluate your performance using Repeat the task if you fail to
Performance criteria checklist achieve the Performance criteria
2.1-6. 2.1-5.
Read the Information Sheet 2.1-7 Familiarize the Tools needed in
on Performing and Checking Checking Installation network.
Installation Network.
Compare your answer with the Find it out what makes your
answer key 2.1-7 on Performing answer correct or incorrect.
and Checking Installation
Network.
Perform Task sheet 2.1-7 on Always wear appropriate PPE when
Check Installation Network. performing the task.
Evaluate your performance using Repeat the task if you fail to
Performance Criteria Checklist achieve the criteria.
2.1-7.
Read Information Sheet 2.1-8 on Familiarize the tools used for
Perform and Check Installation checking the installation
Answer Self Check 2.1-7 on Try to familiarize with the 5S and
Following 5S and 3Rs. 3Rs practices.

Compare your answer with the Find it out what makes your
answer key on Following 5S and answer correct or incorrect.
3Rs.

Document No
Date Developed:
Issued by:
8/21/2018
CBLM in NCII CSS Page 12 of 114
Developed by: SFIST
SUSAN F.
ECHALAS Revision # 01
Information Sheet 2.1-1
Planning Cable Route

Learning Objectives:
After reading this INFORMATION SHEET, YOU MUST be able to:
1. Define Network Topology.
2. Identify the different types of Network Topology.
3. Discuss the Planning Cable.

Introduction:
Everyone has heard the saying: it’s the little things that make the
biggest impact. This holds true especially when designing a data center.
There are many important aspects to consider—from power and cooling
requirements, to servers and hardware. Good cable pathway designers
know that multiple products must work together to ensure a successful
pathway from point A to point B. Let’s talk about a few of the key
elements.

Basic Design for the Data Center


Using structured cabling—this approach to cabling includes
designing cable runs and connections for better data center cable
management.
 Choosing the right cabling solution—though UTP copper cable is
used commonly in data center today, but as mentioned above, the
need for maximum and future support for higher-speed system is
resulting in the installation of more fiber. Fiber optic cabling in
data center is becoming the non-negligible option.
 Cable routing and design—airflow and cooling issues have become
a new challenge in data center cabling design. Cable routing and
design can strongly influence and affect airflow design efficiency.

Document No
Date Developed:
Issued by:
8/21/2018
CBLM in NCII CSS Page 13 of 114
Developed by: SFIST
SUSAN F.
ECHALAS Revision # 01
 Planning cabling patch ways—it’s one of the most important factors
to consider when cabling a data center. The key parameters that
affect these cabling pathways are the rack density,
type/count/diameter of cables, end equipment cable entry and the
room height.

Cable Selection
Outside diameter is the key to reducing cable fill in your cable tray
and your cable management. Let’s look at the options available.
 Copper cables are more difficult due to their weight and large OD
compared to fiber optic cables. Copper cables are typically used for
inter and intra rack communications.
 Fiber optic cables offer options to reduce cable fill and can provide
much greater bandwidth than copper.
 Pre-Terminated fiber optic cables are also prevalent in data centers.
They are used for many reasons including quality, dependability,
and reduced installation time. Cable slack is hard to accommodate
in data centers no matter where it is located—cable trays, vertical
or horizontal cable managers. Every effort should be made to get
the lengths right before they are installed.

Other Considerations
Cable management in the racks is as important as in the
pathways. Waterfalls from the overhead cable supports into the vertical
wire managers provide necessary strain relief. Spools that can be
attached in the vertical wire manager help maintain bend radius for both
copper and fiber cable. Also, Velcro cable supports are reusable and a
safe way to secure the cable without damaging it.

Problem
One of the biggest problems facing an installation contractor is the
cable pull itself. When pulling to a telecommunications closet or
Document No
Date Developed:
Issued by:
8/21/2018
CBLM in NCII CSS Page 14 of 114
Developed by: SFIST
SUSAN F.
ECHALAS Revision # 01
computer room, technicians pull extra cable so that the run will reach
the patch panel or block. This means that, typically, they can throw away
15 to 20 feet of cable per run. At Category 5 prices, that can amount to
$500 for 100 runs.

Solution
If the installer plans the pull beforehand, one hour of planning time
(at an estimated $50 an hour) can be substituted for that $500 worth of
wasted cable ends. The planning process involves measuring the actual
distance from one end of the cable run to the other, rather than guessing
and then adding a safety margin to be discarded later.

Procedure
1) Look at your blueprints or cabling plan, and walk the route of the run.
Note any obstacles that must be routed around or other factors that may
affect the run length.
2) Decide on a way to measure the exact distance from your cable reels or
boxes to the telecommunications closet or computer room, making sure
to include the distance from the outside of the closet to the patch panel
or block within. Ceiling and floor tiles of standard (and known) size can
be counted, and the distance computed in that way. But perhaps the
best method is to actually run a pull string from the cable boxes or
spools to the panel or block in the closet.
3) Make sure to include the length of any looped extra cable to be stored
in the closet as well. The pull string should follow the path of any wire
way or other cable management device used in the closet.
4) Retrieve the pull string and lay it out in the corridor where the pull is
being made. Pull the cables to match the length of the pull string, and
cut them. Leave minimal extra cable at each end of the pull--perhaps 2
feet per end.
Running a pull string along the route of a cable pull can help you
determine the exact length to which your horizontal cabling should be
Document No
Date Developed:
Issued by:
8/21/2018
CBLM in NCII CSS Page 15 of 114
Developed by: SFIST
SUSAN F.
ECHALAS Revision # 01
cut. Make sure to include the lengths of service loops at either end, the
distance through any conduit to the wall plate and the distance along
wire ways in the closet to the termination point on the panel or block in
the equipment rack.

Enterprise Network Diagram

Document No
Date Developed:
Issued by:
8/21/2018
CBLM in NCII CSS Page 16 of 114
Developed by: SFIST
SUSAN F.
ECHALAS Revision # 01
E-Class Room Network Diagram

Document No
Date Developed:
Issued by:
8/21/2018
CBLM in NCII CSS Page 17 of 114
Developed by: SFIST
SUSAN F.
ECHALAS Revision # 01
Now let us talk about network topology

Network Topology and its Types


The physical topology of a network refers to the configuration of
cables, computers, and other peripherals
In networking, the term "topology" refers to the layout of connected
devices on a network. This article introduces the standard topologies of
computer networking.
One can think of a topology as a network's virtual shape or
structure. This shape does not necessarily correspond to the actual
physical layout of the devices on the network. For example, the
computers on a home LAN may be arranged in a circle in a family room,
but it would be highly unlikely to find an actual ring topology there.
Network topologies are categorized into the following basic types:
• Star Topology
• Ring Topology
• Bus Topology
• Tree Topology
• Mesh Topology
• Hybrid Topology

More complex networks can be built as hybrids of two or more of


the above basic topologies.

Star Topology
Many home networks use the star topology. A star network features a
central connection point called a "hub" that may be a hub, switch or
router. Devices typically connect to the hub with Unshielded Twisted Pair
(UTP) Ethernet

Document No
Date Developed:
Issued by:
8/21/2018
CBLM in NCII CSS Page 18 of 114
Developed by: SFIST
SUSAN F.
ECHALAS Revision # 01
Compared to the bus topology, a star network generally requires
more cable, but a failure in any star network cable will only take down
one computer's network access and not the entire LAN. (If the hub fails,
however, the entire network also fails.)
See the illustration of Star Network Topology.

Advantages of a Star Topology


• Easy to install and wire.
• No disruptions to the network then connecting or removing devices.
• Easy to detect faults and to remove parts.
Disadvantages of a Star Topology
• Requires more cable length than a linear topology.
• If the hub or concentrator fails, nodes attached are disabled.
• More expensive than linear bus topologies because of the cost of
the concentrators.
The protocols used with star configurations are usually Ethernet or
LocalTalk. Token Ring uses a similar topology, called the star-wired ring.

Star-Wired Ring
A star-wired ring topology may appear (externally) to be the same
as a star topology. Internally, the MAU of a star-wired ring contains
wiring that allows information to pass from one device to another in a
circle or ring (See fig. 3). The Token Ring protocol uses a star-wired ring
topology.
Document No
Date Developed:
Issued by:
8/21/2018
CBLM in NCII CSS Page 19 of 114
Developed by: SFIST
SUSAN F.
ECHALAS Revision # 01
Ring Topology
In a ring network, every device has exactly two neighbors for
communication purposes. All messages travel through a ring in the same
direction (either "clockwise" or "counterclockwise"). A failure in any cable
or device breaks the loop and can take down the entire network.

To implement a ring network, one typically uses FDDI, SONET, or


Token Ring technology. Ring topologies are found in some office buildings
or school campuses.
See the illustration of Ring Topology

Bus Topology
Bus networks (not to be confused with the system bus of a
computer) use a common backbone to connect all devices. A single cable,
the backbone functions as a shared communication medium that devices
attach or tap into with an interface connector. A device wanting to
communicate with another device on the network sends a broadcast
message onto the wire that all other devices see, but only the intended
recipient actually accepts and processes the message
Ethernet bus topologies are relatively easy to install and don't
require much cabling compared to the alternatives. 10Base-2 ("ThinNet")
many years ago for bus topologies. However, bus networks work best

Document No
Date Developed:
Issued by:
8/21/2018
CBLM in NCII CSS Page 20 of 114
Developed by: SFIST
SUSAN F.
ECHALAS Revision # 01
with a limited number of devices. If more than a few dozen computers are
added to a network bus, performance problems will likely result. In
addition, if the backbone cable fails, the entire network effectively
becomes unusable.
See the illustration of Bus Network Topology.

Advantages of a Linear Bus Topology


 Easy to connect a computer or peripheral to a linear bus.
 Requires less cable length than a star topology.
Disadvantages of a Linear Bus Topology
 Entire network shuts down if there is a break in the main cable.
 Terminators are required at both ends of the backbone cable.
 Difficult to identify the problem if the entire network shuts down.
 Not meant to be used as a stand-alone solution in a large building.
Tree Topology Tree topologies integrate multiple star topologies
together onto a bus. In its simplest form, only hub devices connect
directly to the tree bus and each hub functions as the "root" of a tree of
devices. This bus/star hybrid approach supports future expandability of
the network much better than a bus (limited in the number of devices
due to the broadcast traffic it generates) or a star (limited by the number
of hub connection points) alone.

Document No
Date Developed:
Issued by:
8/21/2018
CBLM in NCII CSS Page 21 of 114
Developed by: SFIST
SUSAN F.
ECHALAS Revision # 01
See the illustration of Tree Network Topology.

Advantages of a Tree Topology


 Point-to-point wiring for individual segments.
 Supported by several hardware and software venders.
 Disadvantages of a Tree Topology
 Overall length of each segment is limited by the type of cabling
used.
 If the backbone line breaks, the entire segment goes down.
 More difficult to configure and wire than other topologies.

Mesh Topology
Mesh topologies involve the concept of routes. Unlike each of the
previous topologies, messages sent on a mesh network can take any of
several possible paths from source to destination. (Recall that even in a
ring, although two cable paths exist, messages can only travel in one
direction.) Some WANs, most notably the Internet, employ mesh routing.
A mesh network in which every device connects to every other is called a
full mesh. As shown in the illustration below, partial mesh networks also
exist in which some devices connect only indirectly to others.
See the illustration of Mesh Network Topology.

Document No
Date Developed:
Issued by:
8/21/2018
CBLM in NCII CSS Page 22 of 114
Developed by: SFIST
SUSAN F.
ECHALAS Revision # 01
Hybrid Topology
A combination of any two or more network topologies. Note 1:
Instances can occur where two basic network topologies, when connected
together, can still retain the basic network character, and therefore not
be a hybrid network. For example, a tree network connected to a tree
network is still a tree network. Therefore, a hybrid network accrues only
when two basic networks are connected and the resulting network
topology fails to meet one of the basic topology definitions. For example,
two star networks connected together exhibit hybrid network topologies.
Note 2: A hybrid topology always accrues when two different basic
network topologies are connected.
5-4-3 Rule
A consideration in setting up a tree topology using Ethernet protocol is
the 5-4-3 rule. One aspect of the Ethernet protocol requires that a signal
sent out on the network cable reach every part of the network within a
specified length of time. Each concentrator or repeater that a signal goes
through adds a small amount of time. This leads to the rule that between
any two nodes on the network there can only be a maximum of 5
segments, connected through 4 repeaters/concentrators. In addition,
only 3 of the segments may be populated (trunk) segments if they are
made of coaxial cable. A populated segment is one which has one or more
nodes attached to it. In Figure 4, the 5-4-3 rule is adhered to. The
furthest two nodes on the network have 4 segments and 3
repeaters/concentrators between them.
This rule does not apply to other network protocols or Ethernet
networks where all fiber optic cabling or a combination of a fiber
backbone with UTP cabling is used. If there is a combination of fiber optic
backbone and UTP cabling, the rule is simply translated to 7-6-5 rule.
Considerations When Choosing a Topology
 Money. A linear bus network may be the least expensive way to
install a network; you do not have to purchase concentrators.

Document No
Date Developed:
Issued by:
8/21/2018
CBLM in NCII CSS Page 23 of 114
Developed by: SFIST
SUSAN F.
ECHALAS Revision # 01
 Length of cable needed. The linear bus network uses shorter
lengths of cable.
 Future growth. With a star topology, expanding a network is easily
done by adding another concentrator.
 Cable type. The most common cable in schools is unshielded
twisted pair, which is most often used with star topologies.

Document No
Date Developed:
Issued by:
8/21/2018
CBLM in NCII CSS Page 24 of 114
Developed by: SFIST
SUSAN F.
ECHALAS Revision # 01
SELF CHECK 2.1-1
Planning Cable Route
TRUE OR FALSE:
Determine whether the statement is true or false. Write T if the
Statement is true and F if the statement is false. Write on answer on a
separate sheet.
______ 1. Planning the basic design for the data center is essential to save
money and time resources
_____ 2. UTP copper cable is used commonly in data center today with a
higher speed than fiber optic cables
_____ 3. Failure in any star network cable will only take down one
computer's network access and not the entire LAN.
_____ 4. Disadvantage of Tree Topology is: It is more difficult to configure
and wire than other topologies
_____ 5. Bus topologies are relatively difficult to install and require much
cabling

Document No
Date Developed:
Issued by:
8/21/2018
CBLM in NCII CSS Page 25 of 114
Developed by: SFIST
SUSAN F.
ECHALAS Revision # 01
ANSWER KEY 2.1-1

1. T
2. F
3. F
4. T
5. F

Document No
Date Developed:
Issued by:
8/21/2018
CBLM in NCII CSS Page 26 of 114
Developed by: SFIST
SUSAN F.
ECHALAS Revision # 01
TASK SHEET 2.1-1
Title: Lay out Network Cable Route through Computer.

Performance Objective: Given required supplies and materials you


should be able to layout your network cable
route through computer.

Supplies/Materials : USB

Equipment : Computer Set and Printer

Steps/Procedures:
1. Create a layout plan base on client-server network.
2. Use block diagram to represent your network devices.
3. Use lines to represent your cable connection.
4. Network devices will be the patch panel, router, access point,
client, server, Ethernet switch, cables, and modular jack for
your I/O device.
5. You are free to use any application.
6. Save you output on USB flash drive.
7. Print your output.
8. Evaluate your output according to the Performance criteria
standard.
9. Present your output for final evaluation and interview.

Assessment Method:
Practical Demonstration
Oral Questioning
Observation

Document No
Date Developed:
Issued by:
8/21/2018
CBLM in NCII CSS Page 27 of 114
Developed by: SFIST
SUSAN F.
ECHALAS Revision # 01
Performance Criteria Checklist 2.2.1

CRITERIA
YES NO
Did you….
1. use client-server network?
2. use blocks to represent your network device?
3. represent completely the network devices given?
4. save your output in your USB flash drive?
5. finish your output at the time allotted?
6. print your output with the correct margin?
7. follow the standard in lay outing Cable Route?

Document No
Date Developed:
Issued by:
8/21/2018
CBLM in NCII CSS Page 28 of 114
Developed by: SFIST
SUSAN F.
ECHALAS Revision # 01
Information Sheet 2.1-2
Identifying Necessary Network Materials
Learning Objectives:
After reading this INFORMATION SHEET, YOU MUST be able to:
1. Identify the different network devices.
2. Discuss Basic DHCP (Dynamic Host Configuration Protocol).
3. Enumerate the four pairs of cables with different color codes.

Introduction:

Computer networking devices are units that mediate data in a


computer network and are also called network equipment. Units which
are the last receiver or generate data are called hosts or data terminal
equipment.

Network Devices

There are several network devices used to complete the task in installing
and these are:
• Hub • Basic DHCP (Dynamic
• Repeater Host Configuration
• Modem Protocol) server
• NIC (Network Interface • Network cables
Card) • Patch panel
• Media converters • RJ45 connector
• Basic switch
• Bridge
• Wireless access point
• Basic router
• Basic firewall

Document No
Date Developed:
Issued by:
8/21/2018
CBLM in NCII CSS Page 29 of 114
Developed by: SFIST
SUSAN F.
ECHALAS Revision # 01
Hub

Hubs connect computers together in a star topology network. Due


to their design, they increase the chances for collisions. Hubs operate in
the physical layer of the OSI model and have no intelligence. Hubs flood
incoming packets to all ports all the time. For this reason, if a network is
connected using hubs, the chances of a collision increase linearly with
the number of computers (assuming equal bandwidth use). Hubs pose a
security risk since all packets are flooded to all ports all the time. If a
user has packet sniffing software, they can extract data from the network
and potentially decode it and use it. Hubs make it easy to "spy" on users
on the same LAN as you.

Repeater

A wireless repeater.
A repeater is an electronic device that receives a signal and
retransmits it at a higher level and/or higher power, or onto the other
side of an obstruction, so that the signal can cover longer distances
without degradation. Because repeaters work with the actual physical
signal, and do not attempt to interpret the data being transmitted, they
operate on the physical layer, the first layer of the OSI model. Repeaters
are majorly employed in long distance transmission to reduce the effect of
Document No
Date Developed:
Issued by:
8/21/2018
CBLM in NCII CSS Page 30 of 114
Developed by: SFIST
SUSAN F.
ECHALAS Revision # 01
attenuation. It is important to note that repeaters do not amplify the
original signal but simply regenerate it.

Modem
Modem (from modulator-demodulator) is a device that turns the
digital 1s and 0s of a personal computer into sounds that can be
transmitted over the telephone lines of Plain Old Telephone
Systems (POTS), and once received on the other side, converts those
sounds back into a form used by a USB, Ethernet, serial, or network
connection. Modems are generally classified by the amount of data they
can send in a given time, normally measured in bits per second, or "bps".

NIC (Network Interface Card)

A network interface card is a computer hardware component


designed to allow computers to communicate over a computer network. It
is both an OSI layer 1 (physical layer) and layer 2 (data link layer) device,
as it provides physical access to a networking medium and provides a
low-level addressing system through the use of MAC addresses. It allows
users to connect to each other either by using cables or wirelessly. Most
motherboards today come equipped with a network interface card in the
form of a controller, with the hardware built into the board itself,
eliminating the need for a standalone card.

Media converters
Media converters are simple networking devices that make it
possible to connect two dissimilar media types such as twisted pair with

Document No
Date Developed:
Issued by:
8/21/2018
CBLM in NCII CSS Page 31 of 114
Developed by: SFIST
SUSAN F.
ECHALAS Revision # 01
fiber optic cabling. They were introduced to the industry nearly two
decades ago, and are important in interconnecting fiber optic cabling-
based systems with existing copper-based, structured cabling systems.
Media converters support many different data communication protocols
including Ethernet, T1/E1, T3/E3, as well as multiple cabling types such
as coaxial, twisted pair, multimode and single-mode fiber optics. When
expanding the reach of a Local Area Network to span multiple locations,
media converters are useful in connecting multiple LANs to form one
large "campus area network" that spans over a limited geographic area.
As local networks are primarily copper-based, media converters can
extend the reach of the LAN over single-mode fiber up to 130 kilometers
with 1550 nm optics.

Basic switch

Switches are often confused with bridges because they also operate at
the data link layer of the OSI model. Similar to a hub, switches provide a
central connection between two or more computers on a network, but
with some intelligence. They provide traffic control for packets; rather
than forwarding data to all the connected ports, a switch forwards data
only to the port on which the destination system is connected. They use a
database of MAC addresses to determine where computers are located
and very efficiently send packets only where they need to go. The
database is created dynamically as computers communicate on the
network. The switch simply watches the incoming packets and
memorizes the MAC address and port a packet arrives on. If a packet
arrives with a destination computer that the switch does not have an

Document No
Date Developed:
Issued by:
8/21/2018
CBLM in NCII CSS Page 32 of 114
Developed by: SFIST
SUSAN F.
ECHALAS Revision # 01
address for in its MAC address table, it will flood the packet out all
connected ports. A switch creates separate collision domains for each
physical connection. A switch will only create separate broadcast
domains if separate VLANs (Virtual Local Area Networks) are assigned to
different ports on the switch. Otherwise, a broadcast received on one port
will be flooded out all ports except the one it came in on.

Bridge

Bridges can be identified by the fact that they operate at the layer
of the OSI model. Bridges have intelligence and can "bridge" two of their
ports together at very high speed. They use a database of addresses to
determine where computers are located and very efficiently send frames
only where they need to go. The database is created dynamically as
computers communicate on the network. A bridge simply watches the
incoming frame and memorizes the MAC address and port a frame
arrives on. It uses this information to locate a computer if a packet comes
in that must be forwarded to it. If a frame arrives at the bridge and the
bridge does not know where to send it, the bridge will flood the frame just
like a hub does. Bridging is often inaccurately called switching.

Document No
Date Developed:
Issued by:
8/21/2018
CBLM in NCII CSS Page 33 of 114
Developed by: SFIST
SUSAN F.
ECHALAS Revision # 01
Wireless access point

A wireless access point (WAP or AP) is a device that allows wireless


communication devices to connect to a wireless network using Wi-Fi,
Bluetooth or related standards. The WAP usually connects to a wired
network, and can relay data between the wireless devices (such as
computers or printers) and wired devices on the network.
A typical corporate use involves attaching several WAPs to a wired
network and then providing wireless access to the office Local Area
Network. Within the range of the WAPs, the wireless end user has a full
network connection with the benefit of mobility. In this instance, the WAP
functions as a gateway for clients to access the wired network.
A Hot Spot is a common public application of WAPs, where wireless
clients can connect to the Internet without regard for the particular
networks to which they have attached for the moment. The concept has
become common in large cities, where a combination of coffeehouses,
libraries, as well as privately owned open access points, allow clients to
stay more or less continuously connected to the Internet, while moving
around. A collection of connected Hot Spots can be referred to as a lily-
pad network.
Home networks generally have only one WAP to connect all the
computers in a home. Most are wireless routers, meaning converged
Document No
Date Developed:
Issued by:
8/21/2018
CBLM in NCII CSS Page 34 of 114
Developed by: SFIST
SUSAN F.
ECHALAS Revision # 01
devices that include a WAP, router, and often an Ethernet switch in the
same device. Many also converge a broadband modem. In places where
most homes have their own WAP within range of the neighbors' WAP, it's
possible for technically savvy people to turn off their encryption and set
up a wireless community network, creating an intra-city communication
network without the need of wired networks.

Basic router

Routers operate at the network layer of the OSI model and


efficiently route information between Local Area Networks. Since routers
operate in the third layer, the network layer, they must understand layer
3 addressing... such as TCP/IP. A router will divide a broadcast domain
by not forwarding broadcasts on one connected network to another
connected network. Routers operate in two different planes: the control
plane, in which the router learns the outgoing interface that is most
appropriate for forwarding specific packets to specific destinations, and
the forwarding plane, which is responsible for the actual process of
sending a packet received on a logical interface to an outbound logical
interface.

Basic firewall

Document No
Date Developed:
Issued by:
8/21/2018
CBLM in NCII CSS Page 35 of 114
Developed by: SFIST
SUSAN F.
ECHALAS Revision # 01
A firewall is a part of a computer system or network that is
designed to block unauthorized access while permitting outward
communication. It is also a device or set of devices configured to permit,
deny, encrypt, decrypt, or proxy all computer traffic between different
security domains based upon a set of rules and other criteria.
Firewalls can be implemented in both hardware and software, or a
combination of both. Firewalls are frequently used to prevent
unauthorized Internet users from accessing private networks connected
to the Internet. All messages entering or leaving the Local Area
Network pass through the firewall, which examines each message and
blocks those that do not meet the specified security criteria. Without
proper configuration, a firewall can often become worthless. Standard
security practices dictate a "default-deny" firewall rule set, in which the
only network connections which are allowed are the ones that have been
explicitly allowed.

Basic DHCP (Dynamic Host Configuration Protocol) server


When a DHCP-configured client (be it a computer or any other
network-aware device) connects to a network, the DHCP client sends a
broadcast query requesting necessary information from a DHCP server.
The DHCP server manages a pool of IP addresses and information about
client configuration parameters such as the default gateway, the domain
name, the DNS(Domain Name System) servers, other servers such as
time servers, and so forth. Upon receipt of a valid request the server will
assign the computer an IP address, a lease (the length of time for which
the allocation is valid), and other IP configuration parameters, such as
the subnet mask and the default gateway. The query is typically initiated
immediately after booting and must be completed before the client can
initiate IP-based communication with other hostsher hosts

Document No
Date Developed:
Issued by:
8/21/2018
CBLM in NCII CSS Page 36 of 114
Developed by: SFIST
SUSAN F.
ECHALAS Revision # 01
UTP cable
The UTP cable will be used to connect the following devices
1. Router to router – depending on scenario
2. Router to switch
3. Router to PC – or other hosts end devices
4. Switch to switch
5. Switch to hosts.
These configurations use three main types of UTP cable configurations
which are.
 Straight through
 Cross over
 Rollover cable
TIA/EIA governs the UTP cabling standards, the figure below shows an
example of the UTP cable. It has four pairs of cables with different color
codes.

Patch Panel
A patch panel in a local area network (LAN) is a mounted hardware
assembly that contains ports used to connect and manage incoming and
outgoing LAN cables. Patch panels are also referred to as patch
bays, patch fields or jack fields and are also commonly used in
radio and television.

Document No
Date Developed:
Issued by:
8/21/2018
CBLM in NCII CSS Page 37 of 114
Developed by: SFIST
SUSAN F.
ECHALAS Revision # 01
RJ45 Connectors
A registered jack (RJ) is a standardized physical network interface
for connecting telecommunications or data equipment. The physical
connectors that registered jacks use are mainly of the modular connector
and 50-pin miniature ribbon connector types. The most common twisted-
pair connector is an 8-position, 8-contact (8P8C) modular plug and jack
commonly referred to as an RJ45 connector.

Modular Jack
A modular connector is an electrical connector that was originally
designed for use in telephone wiring, but has since been used for many
other purposes. Many applications that originally used a bulkier, more
expensive connector have converted to modular connectors. Probably the
best known applications of modular connectors are for telephone and
Ethernet.

Document No
Date Developed:
Issued by:
8/21/2018
CBLM in NCII CSS Page 38 of 114
Developed by: SFIST
SUSAN F.
ECHALAS Revision # 01
SELF CHECK 2.1-2
Identifying Necessary Network Materials
Multiple Choice
Choose the letter of the correct answer & write it on your answer sheet
1. Connector that was originally designed for use in telephone wiring
a. Modular jack b. RJ45 c. UTP RJ11
2. Hardware assembly that contains ports used to connect and
manage incoming and outgoing LAN cables.
a. Router b. access point c. patch panel d. Ethernet switch
3. Cable used to connect LAN devices
a. Modular jack b. RJ45 c. UTP RJ11
4. Is a device that allows wireless communication devices to connect
to a wireless network using Wi-Fi, Bluetooth or related standards.
a. Router b. access point c. patch panel d. Ethernet switch
5. An Intelligent device that provides a central connection between
two or more computers on a network
a. Router b. access point c. patch panel d. Ethernet switch

Document No
Date Developed:
Issued by:
8/21/2018
CBLM in NCII CSS Page 39 of 114
Developed by: SFIST
SUSAN F.
ECHALAS Revision # 01
ANSWER KEY 2.1-2

1. a
2. c
3. c
4. b
5. d

Document No
Date Developed:
Issued by:
8/21/2018
CBLM in NCII CSS Page 40 of 114
Developed by: SFIST
SUSAN F.
ECHALAS Revision # 01
Information Sheet 2.1-3
Obtaining Tools, Equipment and Testing Devices

Learning Objectives:
After reading this INFORMATION SHEET, YOU MUST be able to:
1. Identify the tools required for the cable splicing and
Installation.
2. Classify the tools, equipment and testing devices according to
use.
3. Give some tips on how to use tools, equipment and testing
devices.

Introduction:
Electrical work can't be done without the right tools. As basic tools
have been improved over the years and new specialized tools are
developed, the list of tool choices for electricians becomes even
longer.

Tools Required for the Cable Splicing and Installation.

An electric drill
A drill is a tool fitted with a cutting tool attachment or driving tool
attachment, usually a drill bit or driver bit, used for making holes in
various materials or driving screws. The attachment is gripped by a
chuck at one end of the drill and rotated while pressed against the
target material. The tip, and sometimes edges, of the cutting tool does
the work of cutting into the target material. This may be slicing off
Document No
Date Developed:
Issued by:
8/21/2018
CBLM in NCII CSS Page 41 of 114
Developed by: SFIST
SUSAN F.
ECHALAS Revision # 01
thin shavings (twist drills or auger bits), grinding off small particles
(oil drilling), crushing and removing pieces of the work piece (SDS
masonry drill), countersinking, counter boring, or other operations.

Hole saw
A hole saw (also styled hole saw), also known as a hole cutter, is a
saw blade of annular (ring) shape, whose annular kerf creates a hole in
the work piece without having to cut up the core material. It is used in a
drill. Hole saws typically have a pilot drill bit at their center to keep the
saw teeth from walking. The fact that a hole saw creates the hole without
needing to cut up the core often makes it preferable to twist drills or
spade drills for relatively large holes (especially those larger than 25
millimeters (1.0 inch)). The same hole can be made faster and using less
power

Surface Raceway Cutting Tool


Surface Raceway Cutting Tool, Used to cut all LD profile raceway,
Leaves a clean burr-free finish on raceway, Can also be used to cut
Plastic conduit.

Document No
Date Developed:
Issued by:
8/21/2018
CBLM in NCII CSS Page 42 of 114
Developed by: SFIST
SUSAN F.
ECHALAS Revision # 01
Fish tape
A fish tape (also known as a draw wire or draw tape) is a tool used by
electricians to route new wiring through walls and electrical conduit.

Cable Tie
A cable tie (also known as a wire tie, hose tie, steggel tie, zap strap
or zip tie, and by the brand names Ty-Rap and Panduit strap) is a
type of fastener, for holding items together, primarily electrical cables
or wires.

Cable stripper
Stripping is the act of removing the protective outer jacket around
network cables in preparation for installation of plugs or keystone
jacks. It can help you speed up the process of performing fiber
network maintenance work and avoid excessive network downtime.

Document No
Date Developed:
Issued by:
8/21/2018
CBLM in NCII CSS Page 43 of 114
Developed by: SFIST
SUSAN F.
ECHALAS Revision # 01
A stripping tool is an essential part in the process of wring Cat5e
patch panel. FS.COM supplies a wide variety of cable strippers,
including wire stripping knife tool, multifunctional network cable
stripper and diagonal cutting plier, which are all at very competitive
price to help you get the job done right.

Network cable tester


Cable tester is a tool to test whether a cable or wire is set up
properly, connected to the appropriate source points, and if the
communication strength between the source and destination is
strong enough to serve its intended purpose. FS NS-468 is the key
tool used in the wiring process of Cat5e patch panel. It can test the
Cat5e, Cat6, Cat6e cables and the coaxial cable as well as the
telephone wire, etc. And it can also be used to test the situations like
the breaking at the set point, the short circuits, the gross pair wire,
and the split pairs as well the reversed pair wire, etc.

Document No
Date Developed:
Issued by:
8/21/2018
CBLM in NCII CSS Page 44 of 114
Developed by: SFIST
SUSAN F.
ECHALAS Revision # 01
110 punch down tool
Punch down tool is a small hand tool used by telecommunication
and network technicians. It is used for inserting wire into insulation-
displacement connectors on punch down blocks, patch panels,
keystone modules, and surface mount boxes. FS FPDT-X02 is a good
choice to insert and cut cable terminations effortlessly. .
A punch down tool that is use in terminating a twisted pair cable
into a Cat5e receptacle.

Crimping tool
A crimping tool is a device used to conjoin two pieces of metal by
deforming one or both of them in a way that causes them to hold each
other. The result of the tool's work is called a crimp. A good example of
crimping is the process of affixing a connector to the end of a cable.

Document No
Date Developed:
Issued by:
8/21/2018
CBLM in NCII CSS Page 45 of 114
Developed by: SFIST
SUSAN F.
ECHALAS Revision # 01
Wire stripper
A wire stripper is a portable handheld tool used by workers,
especially electricians, for removing the protective coating of an electric
wire in order to replace or repair the wire. It is also capable of stripping
the end portions of an electric wire in order to connect them to other
wires or to terminals. A wire stripper is often considered an important
tool for professional electricians and other related personnel.

Wire Cutter
Any of various devices designed to cut wire.

Document No
Date Developed:
Issued by:
8/21/2018
CBLM in NCII CSS Page 46 of 114
Developed by: SFIST
SUSAN F.
ECHALAS Revision # 01
SELF CHECK 2.1-3
Obtaining Tools, Equipment and Testing Devices

Enumeration: Answer the following questions accurately.


1-5 . What are the different tools used for cable splicing and
installation? Give at least five (5)
6-8. What are the network equipment needed in computer network? Give
at least 3.
9. What is the most important testing device needed in testing network
cable?
10-12. What other operations can be used in electric drill? Give at least
three (3) operations.
13-17. What are the cables being tested by the cable network
tester?

Document No
Date Developed:
Issued by:
8/21/2018
CBLM in NCII CSS Page 47 of 114
Developed by: SFIST
SUSAN F.
ECHALAS Revision # 01
ANSWER KEY 2.1-3

1. Crimping Tool
2. Wire cutter
3. LAN Tester
4. Wire stripper
5. Cable Stripper
6. Patch panel
7. Router
8. Access Point
9. LAN Tester
10. slicing off thin shavings (twist drills or auger bits),
11. grinding off small particles (oil drilling)
12. crushing and removing pieces of the work piece (SDS masonry
drill).
13. test the Cat5e
14. Cat6
15. Cat6e cables
16. coaxial cable
17. telephone wire

Document No
Date Developed:
Issued by:
8/21/2018
CBLM in NCII CSS Page 48 of 114
Developed by: SFIST
SUSAN F.
ECHALAS Revision # 01
Information Sheet 2.1-4
Using Appropriately the Personal Protective Equipment

Learning Objectives:
After reading this INFORMATION SHEET, YOU MUST be able to:
1. Give the importance of PPE.
2. Classify the PPE according to use.
3. Acquire some tips on how to maintain the PPE.
Introduction:
On-the-job safety, whether for the independent cabling contractor
or for the cabling technician working for an enterprise, must be an
integral part of everyday routine. The problem is that we all feel
lucky, and it is often easier and quicker to take shortcuts than it is to
go by the safety manual. And then, it always jolts us when our luck
changes, as it almost always does.

Personal Protective Equipment (PPE) and its Uses

Personal protective equipment, commonly referred to as "PPE", is


equipment worn to minimize exposure to hazards that cause serious
workplace injuries and illnesses. These injuries and illnesses may
result from contact with chemical, radiological, physical, electrical,
mechanical, or other workplace hazards. Personal protective
equipment may include items such as gloves, safety glasses and
shoes, earplugs or muffs, hard hats, respirators, or coveralls, vests
and full body suits.
To ensure proper use of personal protective equipment, all personal
protective equipment should be safely designed and constructed, and
should be maintained in a clean and reliable fashion.

Document No
Date Developed:
Issued by:
8/21/2018
CBLM in NCII CSS Page 49 of 114
Developed by: SFIST
SUSAN F.
ECHALAS Revision # 01
It should fit comfortably, encouraging worker use. If the personal
protective equipment does not fit properly, it can make the difference
between being safely covered or dangerously exposed. When
engineering, work practice, and administrative controls are not
feasible or do not provide sufficient protection, employers must
provide personal protective equipment to their workers and ensure its
proper use. Employers are also required to train each worker required
to use personal protective equipment to know:
 When it is necessary
 What kind is necessary
 How to properly put it on, adjust, wear and take it off
 The limitations of the equipment
 Proper care, maintenance, useful life, and disposal of the
equipment
If PPE is to be used, a PPE program should be implemented. This
program should address the hazards present; the selection,
maintenance, and use of PPE; the training of employees; and
monitoring of the program to ensure its ongoing effectiveness.
Personal Protective equipment used in Installing computer system
and network
 Safety eyeglasses
 Cut resistance gloves
 Safety Shoes
Goggles, or safety glasses, are forms of protective eyewear that
usually enclose or protect the area surrounding the eye in order to
prevent particulates, water or chemicals from striking the eyes.

Document No
Date Developed:
Issued by:
8/21/2018
CBLM in NCII CSS Page 50 of 114
Developed by: SFIST
SUSAN F.
ECHALAS Revision # 01
Cut resistance gloves
Cut-resistant gloves are those designed to protect the wearer's
hands from cuts while working with sharp tools. They can be divided
into metal mesh gloves, cut-and-sewn, and seamless knitted gloves.

Safety Shoes
Safety Shoes – Protect Your Foot While in a Workplace. ... The
sturdy and robust nature of these shoes provides maximum
protection from the potential hazards at the workplace, such as
falling of objects on foot, being incurred to punctures, or cutting.

Document No
Date Developed:
Issued by:
8/21/2018
CBLM in NCII CSS Page 51 of 114
Developed by: SFIST
SUSAN F.
ECHALAS Revision # 01
SELF CHECK 2.1-4
Using Appropriately the Personal Protective Equipment
TRUE OR FALSE:
Determine whether the statement is true or false. Write T if the
Statement is true and F if the statement is false. Write on answer on a
separate sheet.
______ 1. PPE", is equipment worn to minimize exposure to hazards that
cause serious workplace injuries and illnesses
______ 2. The sturdy and robust nature of these shoes provides maximum
protection from the potential hazards at the workplace, such
as falling of objects on foot, being incurred to punctures, or
cutting.
______ 3. Goggles, or safety glasses, are forms of protective eyewear that
usually enclose or protect the area surrounding the eye in
order to prevent particulates, water or chemicals from striking
the eyes.
______ 4. Cut-resistant gloves are those designed to protect the wearer's
hands from electricity
______ 5. If the personal protective equipment does not fit properly, it can
make the difference between being safely covered or
dangerously exposed

Document No
Date Developed:
Issued by:
8/21/2018
CBLM in NCII CSS Page 52 of 114
Developed by: SFIST
SUSAN F.
ECHALAS Revision # 01
ANSWER KEY 2.1-4
1. T
2. T
3. T
4. F
5. T

Document No
Date Developed:
Issued by:
8/21/2018
CBLM in NCII CSS Page 53 of 114
Developed by: SFIST
SUSAN F.
ECHALAS Revision # 01
Information Sheet 2.1-5
Performing Cable Splicing Based on Standards
Learning Objectives:
After reading this INFORMATION SHEET, YOU MUST be able to:
1. Give some tips on how to code color the straight through cable
& cross over cable.
2. Identify the steps on Wire Cat5e Patch Panels.

3. Discuss Ethernet cable with its function.

Introduction:

Cable splicing technicians are the key to the high-speed data


service networks and electrical lines crisscrossing the nation. These
skilled workers must pay close attention to electrical specifications,
waterproofing techniques and relevant codes to be successful. Splicing
technicians are really general cable maintenance experts, responsible for
installation, repairs and replacement when necessary. Generally, all
technicians require is a high school education, with further job-specific
learning coming later.

How to Make an Ethernet Cable

Ethernet cable color-coding exists as part of the industry standard


- T568A/T5688B. Standards exist so technicians can know how the cable
should work and can reliably alter the cable when necessary.

UTP Cable Splicing Color Coding

Purchasing Ethernet cables can be quite expensive and pre-made


lengths are not always the length you need. Making Ethernet cables is
Document No
Date Developed:
Issued by:
8/21/2018
CBLM in NCII CSS Page 54 of 114
Developed by: SFIST
SUSAN F.
ECHALAS Revision # 01
easy with a box of bulk Category 5e Ethernet cable and RJ-45 connectors
that are attached to the cut ends of your preferred cable length.
You may also use Category 6 or CAT6 cabling which has higher
performance specifications and is about 20% more expensive than
CAT5e.
Bulk RJ45 Crimp able Connectors for CAT-5e or Bulk RJ45 Crimp
able Connectors for CAT-6.
There are two kinds of Ethernet cables you can make, Straight
Through and Crossover.
Straight Through Ethernet cables are the standard cable used for
almost all purposes, and are often called "patch cables". It is highly
recommend you duplicate the color order as shown on the left. Note how
the green pair is not side-by-side as are all the other pairs. This
configuration allows for longer wire runs.

Crossover Cables - The purpose of a Crossover Ethernet cable is to


directly connect one computer to another computer (or device) without
going through a router, switch or hub.

Document No
Date Developed:
Issued by:
8/21/2018
CBLM in NCII CSS Page 55 of 114
Developed by: SFIST
SUSAN F.
ECHALAS Revision # 01
Here's how to Make a Standard Cable
Cut into the plastic sheath about 1 inch (2.5 cm) from the end of
the cut cable. The crimping tool has a razor blade that will do the trick
with practice.

Unwind and pair the similar colors.

Document No
Date Developed:
Issued by:
8/21/2018
CBLM in NCII CSS Page 56 of 114
Developed by: SFIST
SUSAN F.
ECHALAS Revision # 01
Pinch the wires between your fingers and straighten them out as
shown. The color order is important to get correct.

Use scissors, wire cutter or crimping tool to make a straight cut


across the 8 wires to shorten them to 1/2 Inch (1.3 cm) from the cut
sleeve to the end of the wires.

Carefully push all 8 unstripped colored wires into the connector.


Note the position of the blue plastic sleeve. Also note how the wires go all
the way to the end.

Document No
Date Developed:
Issued by:
8/21/2018
CBLM in NCII CSS Page 57 of 114
Developed by: SFIST
SUSAN F.
ECHALAS Revision # 01
A view from the top. All the wires are all the way in. There are no
short wires.

WRONG WAY - Note how the blue plastic sleeve is not inside the
connector where it can be locked into place. The wires are too long. The
wires should extend only 1/2 inch from the blue cut sleeve.

CRIMPING THE CABLE ... carefully place the connector into the
Ethernet Crimper and cinch down on the handles tightly. The copper
splicing tabs on the connector will pierce into each of the eight wires.
There is also a locking tab that holds the blue plastic sleeve in place for a
tight compression fit. When you remove the cable from the crimper, that
end is ready to use.

Document No
Date Developed:
Issued by:
8/21/2018
CBLM in NCII CSS Page 58 of 114
Developed by: SFIST
SUSAN F.
ECHALAS Revision # 01
For a standard "Straight Through" cable, repeat all steps and wire
color order on the other end of cable. For a cross-over cable, the other
end will have a different color order as shown by the crossover picture
above.

Make sure to test the cables before installing them. An inexpensive


Ethernet cable tester does this quite well.

NOTE - The maximum cable length of CAT-5, CAT-5e or CAT-6 Ethernet cable is
328 feet or 100 meters.

Wiring Cat5e Patch Panels


Today, wireless network is seemingly popular in everywhere. But
the explosive fast Internet is available in most homes and businesses, a
wired network often can achieve speeds much closer to the promised
maximum. In this case, wiring the Internet creates a large mass of
incoming cables. Patch panels play a central role in network functionality
by centralizing cables in one place, which make it easy for network
administrators to move, add or change complex network architectures.

Document No
Date Developed:
Issued by:
8/21/2018
CBLM in NCII CSS Page 59 of 114
Developed by: SFIST
SUSAN F.
ECHALAS Revision # 01
There are fiber and copper patch panels. Copper patch panels are
designed for both shielded and unshielded copper cables like Cat5e,
Cat6, Cat6a and Cat7. This article will mainly introduce Cat5e patch
panels and show you how to wire a Cat5e patch panel step by step.

Cat5e Patch Cable


Cat5e patch cable is the basic component to connect end devices to
patch panel ports and to connect the ports between two local patch
panels. So when wiring the Cat5e patch panel, a big issue is the design
and quality of the terminations of Cat5e patch cables. When choosing a
suitable patch cable, booted and non-booted are two basic types of plug
features. The booted cable is an ideal choice to protect the tab from
breaking, and the non-booted is usually used for applications that don’t
require frequent unplugging. (For more detailed information, you may
read Plug Boot Options for Ethernet Patch Cables) FS.COM offer a full
range of Cat5e patch cables available in a variety of length and color,
including snag less booted cable, non-booted cable and retractable cable.
Besides, we can also provide custom and OEM services for network patch
cable. Customized jacket, connector types, length and colors of network
patch cable are all available to you.
Cat5e Patch Panels
A copper patch panel is used in a local area network (LAN) as a
mounted hardware assembly that contains ports to connect and manage
incoming and outgoing Ethernet cables. It is compliant with TIA/EIA 568
industry specifications and features both T-568A and T-568B wiring
configurations.
Document No
Date Developed:
Issued by:
8/21/2018
CBLM in NCII CSS Page 60 of 114
Developed by: SFIST
SUSAN F.
ECHALAS Revision # 01
These patch panels can maximize the network performance and
keep up with the growing changes in the network. Generally, Cat5e
copper patch panels can be divided into shielded and unshielded patch
panels, which are required to match with cable applications. Cat5e
shielded patch panels are designed for high EMI (Electro Magnetic
Interference) environments, while unshielded patch panels are designed
for the place where no high power electrical wires have. Besides, there is
also the difference in configuration: punch down and feedthrough patch
panel. Punch down types is available in Cat5e patch panel. On the front
plate, RJ45 ports are used to directly connect Ethernet copper cable. All
ports are numbered for easy identification. In the rear, it’s patch panel
module with color markings for punching down Ethernet cable. Color
coded labels are designed for T568A and T568B wiring configurations.
However, Cat5e feedthrough patch panel provides patching without
punching down the wires to the ports. Each feedthrough patch panel has
both RJ45 ports on the front and rear side. And ports on front side are
numbered for easy identification and installation. With feedthrough patch
panel, the Ethernet patch cables can be inserted into the ports directly in
an easy and fast way. So Cat5e feedthrough patch panel is quite suitable
for high-density network system, which can protect cable and improve
cable management efficiency. When choosing a suitable Cat5e patch
panel, the priority is to clarify all of the different types. FS.COM offers the
mentioned types of Cat5e patch panels available in 24 and 48-port sizes.
The high density panel design can be mounted to standard racks or
cabinets, accommodate top, bottom or side cable entry, and also save
valuable rack space. The following table shows the Cat5e patch panel
from FS.COM.

Document No
Date Developed:
Issued by:
8/21/2018
CBLM in NCII CSS Page 61 of 114
Developed by: SFIST
SUSAN F.
ECHALAS Revision # 01
Cat5e Patch Panel Wiring Steps
Technical information:
There are two wiring schemes: T568A and T568B. The difference
between the two standards are only color, the way the pairs are grouped
is still the same.
Patch Panel Color Code

Specified Steps:
Step 1: Examine the 110-style punch down connectors on the back of the
Cat5e patch panel. The Cat5e patch panels should have 110
style insulation displacement connectors. It is necessary to
acquire enough patch connectors on the patch panels to
accommodate all of the incoming Ethernet cables.

Document No
Date Developed:
Issued by:
8/21/2018
CBLM in NCII CSS Page 62 of 114
Developed by: SFIST
SUSAN F.
ECHALAS Revision # 01
Step 2: Remove the outer jacket from the end of each cable.
You should use the cable strippers to remove approximately 1
inch (25mm) of the outer jacket from the end of each cable,
which ensures a nice clean fit into the patch panel without the
risk of exposing too much cable and damaging it.

Step 3: Spread out the cable wires.


Once the outer jacket has been removed, you will see 4 twisted
pairs of wires (a total of 8 wires) inside the Ethernet cable. The
wires are color coded with 4 being solid colors, and 4 with a
white stripe around the color. In order to successfully punch
down the cables into the patch panel, you need to gently
untwist the pairs and spread them out so that the 8 wires can
be individually
worked work with.

Step 4: Set the wires into the patch panel connectors.


Place all 8 wires into the 110 style connector of the patch panel
in the patch panel outlet that is used to receive the incoming
cables. You will see the color code labels on the patch panel
that indicates which wire is to be placed into which connector
pin.

Document No
Date Developed:
Issued by:
8/21/2018
CBLM in NCII CSS Page 63 of 114
Developed by: SFIST
SUSAN F.
ECHALAS Revision # 01
(Note: There are two color patterns, T568A and T568B. Make sure to terminate
both sides of the cable on the same pattern used.)

Step 5: Begin terminating each wire.


Use a 110 punch down tool to firmly press down on each wire
so that it is grasped by both sets of teeth of the insulation
displacement connector. Punch down tool is with a cutting
edge, you can use it to cut the excess wire of the Ethernet
cables during the pushing process.

Step 6. Mark the terminated incoming cables with a label.


This step is optional but recommended. Mark the terminated
incoming cables with a label indicating where the cables are
from with the room or floor numbers. It will help you locate the
system problems precisely or handing the futures upgrading
projects.
Step 7. Use a cable tester to assure that you correctly terminated all the
wires.

Document No
Date Developed:
Issued by:
8/21/2018
CBLM in NCII CSS Page 64 of 114
Developed by: SFIST
SUSAN F.
ECHALAS Revision # 01
Now you can plug a short patch cable from the desired port on the
patch panel to the closely located hub or switch. The other end of the
wire would be terminated at a wall socket.

Document No
Date Developed:
Issued by:
8/21/2018
CBLM in NCII CSS Page 65 of 114
Developed by: SFIST
SUSAN F.
ECHALAS Revision # 01
SELF CHECK 2.1-5
Labeling
Give the color coding of straight through cable & cross over cable.
Write your answer on a separate sheet.
straight through T568A/T568B cross over T568A/T568B
PIN ID Side A Side B Side A Side B
1
2
3
4
5
6
7
8

Document No
Date Developed:
Issued by:
8/21/2018
CBLM in NCII CSS Page 66 of 114
Developed by: SFIST
SUSAN F.
ECHALAS Revision # 01
ANSWER KEY 2.1-5

straight through T568A/T458B cross over T568A/T458B


PIN ID Side A Side B Side A Side B
1 OW - GW OW - GW OW - GW GW - OW
2 O- G O- G O- G O- G
3 GW- OW GW- OW GW- OW OW - GW
4 BL- BL BL- BL BL- BL BL- BL
5 WBL- WBL WBL- WBL WBL- WBL WBL- WBL
6 G- O G- O G- O O G
7 WBR- WBR WBR- WBR WBR- WBR WBR- WBR
8 BR- BR BR- BR BR- BR BR- BR

Document No
Date Developed:
Issued by:
8/21/2018
CBLM in NCII CSS Page 67 of 114
Developed by: SFIST
SUSAN F.
ECHALAS Revision # 01
TASK SHEET 2.1-5
Title: Make UTP Cable According to Standard.

Performance Objective: Given required supplies and materials you


Should be able to make UTP cable according
to standard.

Supplies/Materials: UTP cable CAT5, crimping tool, wire cutter, wire


Stripper, LAN Tester, RJ45 connectors.
Equipment : None

Steps/Procedure:
1. Create a straight-through cable or cross over cable.
2. Use color coding either T568A or T568B.
3. Use standard length for cutting color coded wires.
4. Follow the correct color coding.
5. Crimp your cable correctly.
6. Test your UTP cable.
7. Label your UTP cable with your name when it is correct.
8. Evaluate your performance based from the standard criteria.
Repeat the process when you have not achieved the standard
until you get the correct UTP cable.
9. Present the output for final evaluation and interview.

Assessment Method:
1. Observation
2. Oral-questioning
3. Demonstration

Document No
Date Developed:
Issued by:
8/21/2018
CBLM in NCII CSS Page 68 of 114
Developed by: SFIST
SUSAN F.
ECHALAS Revision # 01
Performance Criteria Checklist 2.2.5

CRITERIA
YES NO
Did you….
1. follow the standard color coding?
2. follow the standard length in cutting color coded
wires?
3. crimp your cable correctly?
4. test the cable?
5. explain the process accurately?

Document No
Date Developed:
Issued by:
8/21/2018
CBLM in NCII CSS Page 69 of 114
Developed by: SFIST
SUSAN F.
ECHALAS Revision # 01
Information Sheet 2.1-6
Installing Network Cables and its Raceway

Learning Objectives:
After reading this INFORMATION SHEET, YOU MUST be able to:
1. Define Raceway.
2. Identify the different types of raceway.
3. Give some techniques on how to install network cables and its
raceway.

Introduction:
Although wireless is simpler for a lot of people, due to multimedia
sharing, bandwidth on a home network, and paranoia about wireless
security, you may want to use a hard wired solution for home
networking. Having a wired network at home allows you to have a
private, high-speed network for internet access, file sharing, media
streaming, online gaming, IP security cameras, and much more.

Network Cables and its Raceway


Networking cables are networking hardware used to connect one
network device to other network devices or to connect two or more
computers to share printers, scanners etc. Different types of network
cables, such as coaxial cable, optical fiber cable, and twisted pair cables,
are used depending on the network's physical layer, topology, and size.
The devices can be separated by a few meters (e.g. via Ethernet) or nearly
unlimited distances (e.g. via the interconnections of the Internet).
There are several technologies used for network connections. Patch
cables are used for short distances in offices and wiring closets.
Document No
Date Developed:
Issued by:
8/21/2018
CBLM in NCII CSS Page 70 of 114
Developed by: SFIST
SUSAN F.
ECHALAS Revision # 01
Electrical connections using twisted pair or coaxial cable are used
within a building. Optical fiber cable is used for long distances or for
applications requiring high bandwidth or electrical isolation. Many
installations use structured cabling practices to improve reliability and
maintainability. In some home and industrial applications power lines
are used as network cabling.
Raceway (sometimes referred to as a raceway system) is an
enclosed conduit that forms a physical pathway for electrical wiring.
Raceways protect wires and cables from heat, humidity, corrosion, water
intrusion and general physical threats.
A well-grounded metallic conduit provides RF (radio frequency)
shielding that minimizes the risk of trouble with electromagnetic
interference (EMI). In some systems, plastic conduit is sufficient.
However, because it offers no electrical grounding or RF shielding, plastic
conduit is used mainly to contain coaxial cables or other forms of cable
that have their own RF shielding.
Raceways are an important component in the design of complex
data centers and blade servers.

But, as Wikipedia tells us, raceway can also refer to a “surface


mounted wire molding”. Maybe that doesn't clear it up very much, but
basically what it refers to is a channel to run cables through, that
mounts on a wall, or a desk, or some other surface, concealing wires or
cables so your set-up looks nice and pretty.

Document No
Date Developed:
Issued by:
8/21/2018
CBLM in NCII CSS Page 71 of 114
Developed by: SFIST
SUSAN F.
ECHALAS Revision # 01
It's legitimately one of the most useful and versatile cable
management tools for both home users and professionals, and can do
wonders for both a DIY home theater set-up and a professional
conference room at a Fortune 500 company.

So, it's a track for hiding cables. But it's much more complex than
that: there are tons of different types of raceway, each suited for a unique
application. What are the differences? Which one is right for you? If those
are your questions, then you've come to the right place. Let's take a look:

For the Home

Wiring Solution

For the Professional

Connectrac 2.7 On-Floor Wireway

For the Outdoors

Wire Guards
Document No
Date Developed:
Issued by:
8/21/2018
CBLM in NCII CSS Page 72 of 114
Developed by: SFIST
SUSAN F.
ECHALAS Revision # 01
For Commercial / Industrial Settings

Panduit® FiberRunner® Cable Routing Systems

Document No
Date Developed:
Issued by:
8/21/2018
CBLM in NCII CSS Page 73 of 114
Developed by: SFIST
SUSAN F.
ECHALAS Revision # 01
SELF CHECK 2.1-6
Installing Network Cables and its Raceway

TRUE OR FALSE:
Determine whether the statement is true or false. Write T if the
Statement is true and F if the statement is false. Write your answer on
the separate sheet.
______ 1. Cable raceway is a race track where some kind of competitive
speed event takes place, involving cars or horses or video game
characters riding go-karts
______ 2. A well-grounded metallic conduit provides RF (radio frequency)
shielding that minimizes the risk of trouble with
electromagnetic interference (EMI).
_____ 3. Cable raceway is one of the most useful and versatile cable
management tools
_____ 4. Raceways are an important component in the design of complex
data centers and blade servers
_____ 5. Having a wired network at home did not allows you to have a
private, high-speed network for internet access, file sharing,
media streaming, online gaming, IP security cameras, and
much more.

Document No
Date Developed:
Issued by:
8/21/2018
CBLM in NCII CSS Page 74 of 114
Developed by: SFIST
SUSAN F.
ECHALAS Revision # 01
ANSWER KEY 2.1-6

1. F
2. T
3. T
4. T
5. F

Document No
Date Developed:
Issued by:
8/21/2018
CBLM in NCII CSS Page 75 of 114
Developed by: SFIST
SUSAN F.
ECHALAS Revision # 01
JOB SHEET 2.1-6
Title: Install Network Cables and its Raceway.

Performance Objective: Given required supplies and materials you


should be able to install network cables and
cable raceway.
Supplies/Materials: UTP cable CAT5, hand drill, raceway,

Equipment : None

Steps/Procedure:

1. Prepare the appropriate tools and materials including the


appropriate PPE needed to install network cable and raceway
for the cable.
2. Measure the raceway based from cable length.
3. Install network cable and raceway based from the diagram
given.
4. Observe Safety practices.
5. Evaluate your output according to the standard criteria.

Assessment Method:
1.Observation
2.Oral-questioning
3.Demonstration

Document No
Date Developed:
Issued by:
8/21/2018
CBLM in NCII CSS Page 76 of 114
Developed by: SFIST
SUSAN F.
ECHALAS Revision # 01
Performance Criteria Checklist 2.1-6

CRITERIA
YES NO
Did you….
1. use appropriate tools, materials and appropriate
materials?
2. use the exact raceway length?
3. install network cable and raceway correctly?
4. check the network computers if functioning or
not?
5. observe safety practices while performing the
task?

Document No
Date Developed:
Issued by:
8/21/2018
CBLM in NCII CSS Page 77 of 114
Developed by: SFIST
SUSAN F.
ECHALAS Revision # 01
Information Sheet 2.1-7
Performing and Checking Installation Network

Learning Objectives:
After reading this INFORMATION SHEET, YOU MUST be able to:
1. Identify the different network diagnostic tools.
2. Enumerate the steps on how to run traceroute on windows.
3. List the different network monitoring software in performing
installation network.

Introduction:
After installing the network cable and raceway, it is important to
check unnecessary damage to the cables or raceway. Check can be done
through visual inspection.

Checking the Network Connectivity

To check the network connection there some network diagnostic tools


that can be used to check the network connectivity.
ipconfig is a command line utility available on all versions of
Microsoft Windows starting with Windows NT. ipconfig is designed to be
run from the Windows command prompt. This utility allows you to get
the IP address information of a Windows computer. It also allows some
control over active TCP/IP connections. ipconfig is an alternative to the
older 'winipcfg' utility.

Document No
Date Developed:
Issued by:
8/21/2018
CBLM in NCII CSS Page 78 of 114
Developed by: SFIST
SUSAN F.
ECHALAS Revision # 01
ipconfig Usage
From the command prompt, type 'ipconfig' to run the utility with
default options. The output of the default command contains the IP
address, network mask and gateway for all physical and virtual network
adapters.
ipconfig supports several command line options as described below.
The command "ipconfig /?" displays the set of available options.
ipconfig /all
This option displays the same IP addressing information for each
adapter as the default option. Additionally, it displays DNS and WINS
settings for each adapter.
ipconfig /release
This option terminates any active TCP/IP connections on all network
adapters and releases those IP addresses for use by other applications.
"pconfig /release" can be used with specific Windows connection names.
In this case, the command will affect only the specified connections and
not all. The command accepts either full connection names or wildcard
names. Examples:
ipconfig /release "Local Area Connection 1"
Document No
Date Developed:
Issued by:
8/21/2018
CBLM in NCII CSS Page 79 of 114
Developed by: SFIST
SUSAN F.
ECHALAS Revision # 01
ipconfig /release *Local*
ipconfig /renew
This option re-establishes TCP/IP connections on all network
adapters. As with the release option, ipconfig /renew takes an optional
connection name specifier.
Both /renew and /release options only work on clients configured for
dynamic (DHCP) addressing.

The ping command is a Command Prompt command used to test the


ability of the source computer to reach a specified destination computer.
The ping command is usually used as a simple way to verify that a
computer can communicate over the network with another computer or
network device.
To execute the ping command, type cmd and click enter then type
the ip address or the website address you want to ping.

The ping command operates by sending Internet Control Message


Protocol (ICMP) Echo Request messages to the destination computer and
waiting for a response. How many of those responses are returned, and
how long it takes for them to return, are the two major pieces of
information that the ping command provides.
For example, you might find that there are no responses when
pinging a network printer, only to find out that the printer is offline and
its cable needs replaced. Or maybe you need to ping a router to verify

Document No
Date Developed:
Issued by:
8/21/2018
CBLM in NCII CSS Page 80 of 114
Developed by: SFIST
SUSAN F.
ECHALAS Revision # 01
that your computer can connect to it, to eliminate it as a possible cause
for a networking issue.
Traceroute – Traces the route of packets to destination host from
our server. A traceroute is a function which traces the path from one
network to another. It allows us to diagnose the source of many
problems.
To run traceroute on Windows:
1. Open the command prompt.
1. Go to Start > Run.
2. Type cmd and press the Enter key.
3. This will bring up a command prompt window. It has a line that looks

like this:
C:\Documents and Settings\yourname> _ with a cursor blinking next
to the ">" symbol.

2. In the command prompt, type: tracert hostname


where [hostname] is the name of the server connection you are
testing. See the section "Determining [hostname]" below for help with the
hostname.

Document No
Date Developed:
Issued by:
8/21/2018
CBLM in NCII CSS Page 81 of 114
Developed by: SFIST
SUSAN F.
ECHALAS Revision # 01
There are other tools in the list will help with performance issues,
network management, security, file sharing and more. And they're all
free, and very lightweight: even installing all ten will use less than 7MB
hard drive space. And if you're thinking about networking, you may also
want to consider network monitoring software, too.
1. Network Stuff 3.0.9 - 1.34 MB
2. DNS Jumper 1.0.5 - 812KB
3. RawCap 0.1.4.0 - 20KB
4. Fast Software Audit 1.0.0 - 160 KB
5. CloseTheDoor 0.2.1 portable - 484 KB
6. BlueLife Hosts Editor 1.0 - 388KB
7. Network Activity Indicator 1.6 -1.03 MB
8. RemoteRebootX 2012 - 428KB

Document No
Date Developed:
Issued by:
8/21/2018
CBLM in NCII CSS Page 82 of 114
Developed by: SFIST
SUSAN F.
ECHALAS Revision # 01
SELF CHECK 2.1-7
Performing and Checking Installation Network

Identification. Identify the correct answer of the following statements.


Write your answer on the separate answer sheet.
1. _________________Command line utility allows you to get the
IP address information of a Windows computer or other
devices on the network.
2. _________________Command Prompt command used to test
the ability of the source computer to reach a specified
destination computer.
3. _________________A function which traces the path from one
network to another. It allows us to diagnose the source of
many problems.
4. _________________Type this in run to bring the command
prompt window.
5. ________________ This option displays the same IP addressing
information for each adapter as the default option.
Additionally, it displays DNS and WINS settings for each
adapter.

Document No
Date Developed:
Issued by:
8/21/2018
CBLM in NCII CSS Page 83 of 114
Developed by: SFIST
SUSAN F.
ECHALAS Revision # 01
ANSWER KEY 2.1-5

1. ipconfig
2. ping command
3. Traceroute
4. cmd
5. ipconfig/all

Document No
Date Developed:
Issued by:
8/21/2018
CBLM in NCII CSS Page 84 of 114
Developed by: SFIST
SUSAN F.
ECHALAS Revision # 01
TASK SHEET 2.1-7
Title: Check Network Connection

Performance Objective: Given required supplies and materials you


should be able to Check Network Connection.

Supplies/Materials: Computer & network devices, LAN Tester

Equipment :

Steps/Procedure:
1. Prepare the tools, equipment and PPE needed to check network
connection.
2. Visually inspect the cables and raceway installation to know
the damage.
3. Test if the computers are functioning.
4. Ping the router.
5. Ping the access point.
6. Ping the client.
7. Ping the server.
8. Ping the internet connection.
9. Observe safety practices.
10. Observe the proper procedure checking network connection
according to the performance criteria.

Assessment Method:
1.Observation
2.Oral-questioning
3.Demonstration

Document No
Date Developed:
Issued by:
8/21/2018
CBLM in NCII CSS Page 85 of 114
Developed by: SFIST
SUSAN F.
ECHALAS Revision # 01
Performance Criteria Checklist 2.1-6

CRITERIA
YES NO
Did you….
1. prepare the tools, equipment and PPE needed to
check network connection?
2. find damage to cables and raceway?
3. test if the computers are functioning?
4. ping the router?
5. ping the access point?
6. ping thee client?
7. ping the server?
8. ping the internet connection?
9. observe safety practices?

Document No
Date Developed:
Issued by:
8/21/2018
CBLM in NCII CSS Page 86 of 114
Developed by: SFIST
SUSAN F.
ECHALAS Revision # 01
INFORMATION SHEET 2.1-8
Follow 5S and 3Rs

Learning Objectives:
After reading this INFORMATION SHEET, YOU MUST be able to:
1. Identify the 5S methods/programs.
2. Enumerate the 3Rs initiatives.
3. Give the importance of 3Rs initiatives and 5S methods/program.
Introduction:
With the ever changing economic climate, many organizations are
periodically adjusting their resources to align with business strategy.
This often results in the need to achieve more work with fewer resources.
In order to remain successful, businesses must become more efficient,
reduce waste and thereby reduce cost. We must find ways to do what we
are currently doing in less time and at a lower cost. One way we can
accomplish this is through the use of 5S Principles.
The Japanese later adapted the CANDO methods and applied them in
their production facilities. Some commonly used words describing the
steps in 5S are Sort, Set, Shine, Standardize and Sustain. Throughout
different companies, various words are used that have similar meanings.
No matter what specific words are used to identify the steps in 5S, the
purpose remains the same: create a clean, organized and efficient work
environment.

5S Methods /Program

The 5S Method is a standardized process that when properly


implemented creates and maintains an organized, safe, clean and
efficient workplace. Improved visual controls are implemented as part of
5S to make any process non-conformance obvious and easily detectable.

Document No
Date Developed:
Issued by:
8/21/2018
CBLM in NCII CSS Page 87 of 114
Developed by: SFIST
SUSAN F.
ECHALAS Revision # 01
5S is often one element of a larger Lean initiative and promotes
continuous improvement. The 5S list is as follows:

 Seiri / Sort: Separating of the essential from the nonessential items


 Seiton / Straighten: Organizing the essential materials where
everything has its place
 Seiso / Shine: Cleaning the work area
 Seiketsu / Standardize: Establishing a system to maintain and
make 5S a habit
 Shitsuke / Sustain: Establishing a safe and sanitary work
environment (Safety)
The 5S Principles are recognized in many industries as effective tools
for improving workplace organization, reducing waste and increasing
efficiency.

Importance of 5S
There are many benefits to implementing the 5S Methods into a work
area on the production line or in the business office. To not only survive
but thrive in business today, cost must be controlled and waste must be
avoided or eliminated. The 5S steps, when implemented properly, can
identify and reduce many forms of waste in any process or workstation.
An organized work area reduces excessive motion and wasted time
looking for the right tool. The visual aspect of the 5S Methodology is also
very effective. When everything has a place, it is easier to spot something
missing or misplaced. A clean work area helps draw attention to possible
problems or safety hazards. A clean floor helps spot any leaks or spills
could indicate machine maintenance and prevent slips and falls.
Furthermore, encouraging people to watch for and address problems can
result in a positive change to an organizations culture. Therefore, the 5S
Principles implemented as part of a larger Lean initiative or as a
standalone tool can reduce waste, improve quality, promote safety and
drive continuous improvement.
Document No
Date Developed:
Issued by:
8/21/2018
CBLM in NCII CSS Page 88 of 114
Developed by: SFIST
SUSAN F.
ECHALAS Revision # 01
Implementation of 5S
Sort
The first step in 5S is sorting. During sorting the team should go
through all items in the work area including any tools, supplies, bulk
storage parts, etc. The 5S team leader should review and evaluate every
item with the group. This will help to identify which items are essential
for getting the job done effectively and efficiently. If the item is essential
for everyday operations it should be tagged and cataloged. If the item is
not essential, determine how often it is used in the performance of work
in that area. If it is a bulk item, decide the proper amount to be kept in
the area and move the remaining quantity to storage. Excess inventory is
one form of waste and should be eliminated during the 5S activities.

Straighten
Designate a place for all items that remain in the work area. Put all
items in their designated location. An often referenced quote is “A place
for everything and everything in its place”. During the straighten step,
look for ways to reduce or eliminate waste. One form of waste in a
process is unnecessary operator motion or movement. Therefore,
frequently used tools and supplies should be stored in the immediate
work area close to the operator. One effective method commonly used to
avoid wasted time searching for the correct tool is constructing shadow
boards for all essential tools. Items that are not used as often should be
stored based on their frequency of use. All parts bins should be properly
labeled. The label should include part number, part description, storage
location and the recommended min / max quantities. A properly
straightened work area allows the operator to quickly review and verify
that they have everything they need to successfully perform their task at
hand.

Document No
Date Developed:
Issued by:
8/21/2018
CBLM in NCII CSS Page 89 of 114
Developed by: SFIST
SUSAN F.
ECHALAS Revision # 01
Shine
The next step is to clean everything in the area and remove any
trash. To be effective we must keep the area and any related equipment
clean. Dirty process equipment can actually increase the potential for
process variability and lead to equipment failure. Lost time due to
equipment failure is considered waste and non-value-added time. A dirty
area can also contribute to safety issues that have the potential to cause
a worker to be injured. Operators should clean their areas at the end of
each shift. By doing this they will likely notice anything out of the
ordinary such as oil or lubricant leaks, worn lift cables, burnt out bulbs,
dirty sensors, etc. The purpose is to reduce waste and improve operator
safety and efficiency.

Standardize
The fourth step has been called the most important step in the 5S
Process. In this step we must develop the standards for the 5S system.
They will be the standards by which the previous 5S steps are measured
and maintained. In this step, work instructions, checklists, standard
work and other documentation are developed. Without work instructions
or standard work, operators tend to gradually just do things their own
way instead of what was determined by the team. The use of visual
management is very valuable in this phase. Color coding and standard
colors for the surroundings are sometimes used. Photos of the area in the
standard 5S configuration are often posted for easier identification of
non-conformance. The operators are trained to detect non-conforming
conditions and correct them immediately. Schedules should also be
developed for regular maintenance activities in each area.

Document No
Date Developed:
Issued by:
8/21/2018
CBLM in NCII CSS Page 90 of 114
Developed by: SFIST
SUSAN F.
ECHALAS Revision # 01
Sustain
This step in the 5S Process can sometimes become the most
challenging of all the five steps. Sustaining is the continuation of the
Sort, Straighten, Shine and Standardize steps. It is the most important
step in that it addresses the need to perform 5S on a consistent and
systematic basis. During this step a standard audit system is usually
developed and implemented. The goal of the sustain step is to ingrain the
5S process into the company culture. The company must strive to make
5S a way of life so the benefits gained through the exercise can be
maintained. 5S is not a one-time exercise. Following the 5S Process must
become a habit.

5S + 1
Some organizations have added an additional step and titled their
process 5S + 1. The additional step being applied is safety. The goal of
adding this step is to foster a culture that enhances safety by identifying
any workplace hazards and removing them. In addition, tools and
workstations are selected or designed with proper ergonomics in mind.
The emphasis being that in each of the other 5S steps the motto is
“Safety First”.

Many companies have implemented 5S into all areas of their


business. The greatest benefits are usually realized when 5S is
implemented as part of a larger Lean initiative within the organization. If
implemented properly, 5S can help drive your company’s lean initiatives
and be a powerful stimulus for developing a continuous improvement
culture.

Document No
Date Developed:
Issued by:
8/21/2018
CBLM in NCII CSS Page 91 of 114
Developed by: SFIST
SUSAN F.
ECHALAS Revision # 01
The 3Rs Initiative

The principle of reducing waste, reusing and recycling resources


and products is often called the "3Rs." Reducing means choosing to use
things with care to reduce the amount of waste generated. Reusing
involves the repeated use of items or parts of items which still have
usable aspects. Recycling means the use of waste itself as resources.
Waste minimization can be achieved in an efficient way by focusing
primarily on the first of the 3Rs, "reduce," followed by "reuse" and then
"recycle."
The Importance of 3Rs Initiative

The 3R Initiative aims to promote the "3Rs" (reduce, reuse and


recycle) globally so as to build a sound-material-cycle society through the
effective use of resources and materials. It was agreed upon at the G8
Sea Island Summit in June 2004 as a new G8 initiative. In order to
formally launch the 3R Initiative, it was also agreed to hold a ministerial
meeting in Japan in the spring of 2005.

Document No
Date Developed:
Issued by:
8/21/2018
CBLM in NCII CSS Page 92 of 114
Developed by: SFIST
SUSAN F.
ECHALAS Revision # 01
SELF CHECK 2.1-8
Following 5S and 3Rs.

Enumeration. Answer the following questions briefly


.
1-5. What are the 5S methods/program that should be observed in
the workshop?
6-8. What are the 3Rs initiatives that should be observed in the
workshop?
9.What is the importance of 5S?
10.What is the importance of 3Rs?
11. What step is added in 5S?

Document No
Date Developed:
Issued by:
8/21/2018
CBLM in NCII CSS Page 93 of 114
Developed by: SFIST
SUSAN F.
ECHALAS Revision # 01
ANSWER KEY 2.1-8

1. Seiri / Sort
2. Seiton / Straighten
3. Seiso / Shine
4. Seiketsu / Standardize:
5. Shitsuke / Sustain
6. Reduce,
7. Reuse
8. Recycle
9. Can identify and reduce many forms of waste in any process or
workstation.
10. To build a sound-material-cycle society through the effective
use of resources and materials.
11. Safety

Document No
Date Developed:
Issued by:
8/21/2018
CBLM in NCII CSS Page 94 of 114
Developed by: SFIST
SUSAN F.
ECHALAS Revision # 01
Evidence Plan

Competency Computer System Servicing NCII


standard:
Unit of Install Network Cables
competency:
Ways in which evidence will be collected:

Third party Report


[tick the column]

Demonstration &
Observation &
Questioning

Questioning

Portfolio
Written
The evidence must show that the trainee…
*Cable routes are determined and planned in √ √ √
accordance with network design and actual
installation site.
*Network materials necessary to complete the √ √ √
work are identified and obtained in accordance
with established procedures and checked
against systems requirements
*Tools, equipment and testing devices needed √ √ √
to carry out the installation work are obtained
in accordance with established procedures and
checked for correct operation and safety
*Appropriate personal protective equipment is √ √ √
used and OHS policies and procedures are
followed
*Copper cable splicing is performed based on √ √
Electronic Industries

Alliance/Telecommunications Industry
Association (EIA/TIA) standards

Document No
Date Developed:
Issued by:
8/21/2018
CBLM in NCII CSS Page 95 of 114
Developed by: SFIST
SUSAN F.
ECHALAS Revision # 01
*Network cables and cable raceway are √ √ √
installed in accordance with established
procedures and installation requirements
*Installation work is performed and is checked √ √ √
to ensure no unnecessary damage has occurred
and complies with requirements
*OHS standards and 5S principles are followed √ √ √
according to enterprise requirements
*Excess components and materials are √
disposed of based on WEEE directives and 3Rs √ √
waste management program
Cable routes are determined and planned in
accordance with network design and actual
installation site.
Network materials necessary to complete the
work are identified and obtained in accordance
with established procedures and checked
against systems requirements
Tools, equipment and testing devices needed to
carry out the installation work are obtained in
accordance with established procedures and
checked for correct operation and safety
Appropriate personal protective equipment is
used and OHS policies and procedures are
followed
Copper cable splicing is performed based on
Electronic Industries
Alliance/Telecommunications Industry
Association (EIA/TIA) standards

Document No
Date Developed:
Issued by:
8/21/2018
CBLM in NCII CSS Page 96 of 114
Developed by: SFIST
SUSAN F.
ECHALAS Revision # 01
Network cables and cable raceway are installed
in accordance with established procedures and
installation requirements
Installation work is performed and is checked
to ensure no unnecessary damage has occurred
and complies with requirements
OHS standards and 5S principles are followed
according to enterprise requirements
Excess components and materials are disposed
of based on WEEE directives and 3Rs waste
management program.
NOTE: *Critical aspects of competency

Document No
Date Developed:
Issued by:
8/21/2018
CBLM in NCII CSS Page 97 of 114
Developed by: SFIST
SUSAN F.
ECHALAS Revision # 01
TABLE OF SPECIFICATION

Objectives/Content Percentage
Knowledge Comprehension Application
area/Topics of test

Determine and plan


15 % 15 %
the cable route

Identify and obtain


network materials
15 % 15 %
necessary to complete
the work

Obtain the needed


tools, equipment and 15 % 15 %
testing devices

Use appropriate
personal protective .05% .05%
equipment

Perform cable splicing


15% 15%
based on standards

Install network cables


15 % 15 %
and cable raceway

Perform and check


15 % 15 %
installation work

Follow 5S and 3Rs .05% .05%

TOTAL 100%

Document No
Date Developed:
Issued by:
8/21/2018
CBLM in NCII CSS Page 98 of 114
Developed by: SFIST
SUSAN F.
ECHALAS Revision # 01
Item Analysis

Objectives/Content # of test
Knowledge Comprehension Application
area/Topics item

Determine and plan


3
the cable route 3

Identify and obtain


network materials
3
necessary to complete
the work 3

Obtain the needed


tools, equipment and 2 1
testing devices 3

Use appropriate
personal protective 1
equipment 1

Perform cable splicing


3
based on standards 3

Install network cables


3
and cable raceway 3

Perform and check


installation work 3
3

Follow 5S and 3Rs 1 1

20
TOTAL
Items

Document No
Date Developed:
Issued by:
8/21/2018
CBLM in NCII CSS Page 99 of 114
Developed by: SFIST
SUSAN F.
ECHALAS Revision # 01
Written Test
Name:___________________________ Date:_________________
Score:___________
Multiple Choice: Using bank sheet of paper write the letter of the best
answer
1. Types of network topology that features a central connection point
called a "hub" that may be a hub, switch or router.
a. Ring b. star c. bus d. hybrid
2. Types of network topology that every device has exactly two
neighbors for communication purposes.
a. ring b. star c. bus d. hybrid
3. Types of network topology that has a single cable, the backbone
functions as a shared communication medium that devices attach
or tap into with an interface connector.
a. ring b. star c. bus d. hybrid
4. Network device that connect computers together in star topology
but with no intelligence
a. hub B. router c. switch d. access point
5. It is an electronic device that receives a signal and retransmits it at
a higher level and/or higher power, or onto the other side of an
obstruction
a. hub B. router c. router d. repeater
6. It is a computer hardware component designed to allow computers
to communicate over a computer network
a. RAM b. network interface card c. motherboard d. HDD
7. It is a small hand tool used for inserting wire into insulation-
displacement connectors, patch panels, keystone modules, and
surface mount boxes.
a. Screw driver b. wire cutter c. punch down tool d. crimping
tool

Document No
Date Developed:
Issued by:
8/21/2018
CBLM in NCII CSS Page 100 of 114
Developed by: SFIST
SUSAN F.
ECHALAS Revision # 01
8. It is a device used to conjoin two pieces of metal by deforming one
or both of them in a way that causes them to hold each other
a. Screw driver b. wire cutter c. punch down tool d. crimping
tool
9. It is a tool to test whether a cable or wire is set up properly,
connected to the appropriate source points
a. LAN tester b. Multi-Meter c. cable stripper d. fish tape
10. Safety eyes glasses that is designed to protect the wearer's hands
from cuts while working with sharp tools
a. Safety shoes b. gloves c. mask d. safety eye glasses

True or False: Using blank sheet of paper write true if the statement
is correct and write false if the statement is wrong.
1. In splicing UTP cable, it does not matter if you do not follow the
standard color coding, the cable will still work
2. It is important to test the cable after crimping before connecting it to
any network device to avoid problem with your cable connection
3. Before splicing a cable you must wear anti-cut resistance gloves to
protect yourselves from any cut.
4. It is important to cover the cable with the raceway during the
installation to avoid damage on the cable
5. A well-grounded metallic conduit provides RF (radio frequency)
shielding that minimizes the risk of trouble with electromagnetic
interference (EMI).
cable raceway is one of the most useful and versatile cable
management tools
6. Raceways are an important component in the design of complex data
centers and blade servers to protect the cable from damage and
interference.
7. To execute ping command you must type ipconfig and press enter
8. To find the IP address of the network device just type ipconfig on
command prompt
Document No
Date Developed:
Issued by:
8/21/2018
CBLM in NCII CSS Page 101 of 114
Developed by: SFIST
SUSAN F.
ECHALAS Revision # 01
9. To execute traceroute command in the command prompt, type: tracert
hostname where [hostname] is the name of the server connection you
are testing
10. Reducing in 3R involves the repeated use of items or parts of items
which still have usable aspects..

Document No
Date Developed:
Issued by:
8/21/2018
CBLM in NCII CSS Page 102 of 114
Developed by: SFIST
SUSAN F.
ECHALAS Revision # 01
Answer Key
Multiple Choice:
1. b
2. a
3. c
4. d
5. b
6. a
7. c
8. d
9. d
10. b
True or False
1. F
2. T
3. T
4. T
5. T
6. T
7. F
8. T
9. T
10. F

Document No
Date Developed:
Issued by:
8/21/2018
CBLM in NCII CSS Page 103 of 114
Developed by: SFIST
SUSAN F.
ECHALAS Revision # 01
Performance Test

Specific Instruction for the Candidate


Qualification Computer System Servicing NC II
Unit of Competency Install Network Cable
General Instruction: Follow the standard procedure in cable splicing
and installing network cable (2 hours).
Specific Instruction:
1. Splice a straight through UTP cable base on standard color coding
2. Use either of the two standard color coding of UTP cable
3. Follows the OHS policies during installation
4. After cable splicing install the cable to the network devices
5. Follow the network diagram given
6. Install the network cable check your cable and network connection
7. Evaluate the output based from the performance criteria given.

List of Tools:
Cable splicing tools and testing devices
List of Equipment:
Patch panel, switch, router, access point, client and server computer
List of Materials:

Document No
Date Developed:
Issued by:
8/21/2018
CBLM in NCII CSS Page 104 of 114
Developed by: SFIST
SUSAN F.
ECHALAS Revision # 01
Performance Criteria Checklist for Performance Test

Name: ______________________Date of Assessment: ____________

CRITERIA
YES NO
Did you….
1. splice a straight through UTP cable based on
standard color coding?
2. follow the OHS policies during installation?
3. install the cable to the network devices?
4. follow the network diagram given?
5. check your cable & network connection?
6. finish the installation on the time allotted?
7. test the computers if functioning or not after
installing cable?
8. observe safety practices?

Document No
Date Developed:
Issued by:
8/21/2018
CBLM in NCII CSS Page 105 of 114
Developed by: SFIST
SUSAN F.
ECHALAS Revision # 01
QUESTIONING TOOL
Satisfactory
Questions to probe the candidate’s underpinning knowledge
response
Extension/Reflection Questions Yes No
1. What is the first thing you will observe in your workplace
 
before installing?
2. What are the important tools and materials needed in cable
 
splicing and installation?
Safety Questions
3. Why we need to follow the OHS before Installation?  
4. What PPE are you going to wear in installing network cable?  
Contingency Questions
5. What are you going to do if the lights from the Ethernet  
switch did not blink after installing your network cables?
6. What are you going to do to check if your network devices  
are properly installed?
Job Role/Environment Questions  
7. How can you contribute for the environmental safety?  
8. Why we need to segregate waste materials?  
Rules and Regulations  
9. What are basic things to do to ensure that your network  
connection is functioning?
10. What are the considerations to be followed in installing  
network cables?
The candidate’s underpinning  Satisfactory  Not
knowledge was: Satisfactory

Document No
Date Developed:
Issued by:
8/21/2018
CBLM in NCII CSS Page 106 of 114
Developed by: SFIST
SUSAN F.
ECHALAS Revision # 01
Expected Answer for Questioning Tool
Satisfactory
Questions to probe the candidate’s underpinning knowledge response

Extension/Reflection Questions Yes No


1. Before proceeding to installation process. Make sure that the
 
working area is clear and well lighted
2. The tools needed are wire cutter, wire stripper or cable stripper,
crimping tool, LAN tester and punch down tool, RJ45 connectors  
and UTP cable
Safety Questions
3. To avoid, illness, accident and injury in the workplace  
4. The PPE are cut-resistance gloves, safety eyeglasses, safety  
shoes
Contingency Questions
5. Check your cable connection if it is properly connected, test the  
UTP cables, check your network devices if it is powered on,
check if you follow the correct network diagram
6. Execute ping command to ping the connection of your network  
devices
Job Role/Environment Questions  
7. By observing the 5Ss and 3Rs through proper housekeeping,  
proper segregation and waste disposal
8. Following the correct segregation of waste and proper disposal  
Rules and Regulations  
9. Be sure to check the network cable installation by using the  
network diagnostic tools available in your workplace
10. In installing network cable we must adhere with the  
standards set
The candidate’s underpinning  Satisfactory  Not Satisfactory
knowledge was:

Document No
Date Developed:
Issued by:
8/21/2018
CBLM in NCII CSS Page 107 of 114
Developed by: SFIST
SUSAN F.
ECHALAS Revision # 01
Inventory of Training Resources
Qualification Title: NCII in CSS
Resources for Skills practice of Competency #1
______________________________
 Supplies and Materials As per TR As per Remarks
Inventory
RJ 45 400 pcs. 400 pcs. complete
Modular box (RJ45) 25 pcs. 25 pcs. complete
Raceway or Slotted PVC 1.5” x 1.5” x 20 pcs. 20 pcs. complete
48”
UTP cable 1 box 1 box complete
Contact cleaner 1 can 1 can complete
Whiteboard 1 piece 1 piece complete
Fastener 1 lot 1 lot complete
Filler (lead-free) 1 spool 1 spool complete
Fiber optic cable 2 meters 8 pcs 8 pcs complete
(terminated) (Optional)
INSTALLERS / SOFTWARE QUANTITY
Desktop OS (license for proprietary 26 Incomplete
software)
Network OS (license for proprietary 10 5 For
software) acquisition
Office productivity software (license 26 15 For
for proprietary software) acquisition
Anti-virus (license for proprietary 26 15 For
software) acquisition
Disk utility software 5 3 Incomplete
Virtualization software (license for 5 3 Incomplete
proprietary software)
Disk creator software 5 2 Incomplete
Document No
Date Developed:
Issued by:
8/21/2018
CBLM in NCII CSS Page 108 of 114
Developed by: SFIST
SUSAN F.
ECHALAS Revision # 01
Disk image software 5 2 Incomplete
RESOURCES / MANUALS QUANTITY
Motherboard’s manual and installer 26 pieces 20 Incomplete
Device driver installer 10 pieces 1 pc Incomplete
Assorted Computer book, PC 1 lot For
Magazines and journals acquisition
 Tools and test equipment As per TR As per Remarks
Inventory
Screwdriver (standard) 10 pieces 1 Incomplete
Screwdriver (Philips) 10 pieces 1 Incomplete
Long nose pliers 10 pieces 5 Incomplete
Mechanical pliers 10 pieces 10 pieces Complete
Allen wrench 10 sets 10 sets Complete
Crimping tools 10 pieces 10 pieces Complete
Soldering iron 10 pieces 10 pieces Complete
Solder sucker 10 pieces 10 pieces Complete
Wire stripper 10 pieces 10 pieces Complete
Portable electric hand drill 5 pieces 5 pieces Complete
Drill bit 1 unit 1 unit Complete
Precision screw drivers 1 set 1 set Complete
Anti-static devices 5 sets 5 sets Complete
Flash light/Head mounted light 10 pcs 10 pcs Complete
 Equipment 1 unit As per Remarks
Inventory
Desktop Computer 26 units 26 units Complete
Laptop computer/Netbook 10 10 Complete
Computers for server 10 10 Complete
Server cabinet/Frame 10 10 Complete
Patch panel (48-ports) 20 pcs 20 pcs Complete

Document No
Date Developed:
Issued by:
8/21/2018
CBLM in NCII CSS Page 109 of 114
Developed by: SFIST
SUSAN F.
ECHALAS Revision # 01
Working tables 10 sets 10 sets Complete
Internet subscription (at least 2 1 unit 1 unit Complete
MBPS)
Uninterruptible Power Supply (UPS) 10 units 10 units Complete
Hub / Switch 10 unit 10 unit Complete
Managed switch 2 units 2 units Complete
Network controller 1 1 Complete
ADSL Router with Wi-Fi 11 11 Complete
Wireless Access Point 10 10 Complete
PC Video camera 1 unit 1 unit Complete
External optical drive 2 units 2 units Complete
USB External HD 1 unit 1 unit Complete
Network External HD 1 unit 1 unit Complete
scanner 1 unit 2 Complete
USB printer 1 unit 1 Complete
Network printer 1 unit 1 Incomplete
Flash disk / Memory stick 11 pieces 0 replenish
ment
Electronic tester VOM 10 units 2 replenish
ment
LAN Cable tester 5 units 2 replenish
ment

Note: In the remarks section, remarks may include for repair, for
replenishment, for reproduction, for maintenance etc.
Prepared By: Susan F. Echalas

Document No
Date Developed:
Issued by:
8/21/2018
CBLM in NCII CSS Page 110 of 114
Developed by: SFIST
SUSAN F.
ECHALAS Revision # 01
WORKSHOP LAYOUT
Workshop Layout 92 m2

LEARNING RESOURCE
AREA

CONTEXTUAL LEARNING AREA

Document No
Date Developed:
Issued by:
8/21/2018
CBLM in NCII CSS Page 111 of 114
Developed by: SFIST
SUSAN F.
ECHALAS Revision # 01
ENDNOTES

https://www.edrawsoft.com/Network-Topologies.php
https://community.fs.com/blog/basic-knowledge-tips-of-data-center-
fiber-cabling.html
https://www.datacenterknowledge.com/archives/2013/10/09/cable-
pathways-a-data-center-design-guide-and-best-practices
https://www.cablinginstall.com/articles/print/volume-4/issue-1/cable-
installer-tips/measure-your-cable-route-to-save-money.html
https://www.smartdraw.com/network-diagram/examples/
https://www.edrawsoft.com/network-layout.php
https://en.wikibooks.org/wiki/Network_Plus_Certification/Devices/Com
mon_Devices
https://searchnetworking.techtarget.com/definition/patch-panel
https://www.anixter.com/en_au/resources/literature/techbriefs/what-
is-an-rj45-connector.html
https://en.wikipedia.org/wiki/Modular_connector
https://www.pcmag.com/article2/0,2817,28159,00.asp
https://www.google.com/search?ei=hxh9W-
yNDs349QPOnaSAAg&q=what+is+the+function+of+crimping+tools&oq=w
hat+is+crimping+tools&gs_l=psy-
ab.1.1.0j0i7i30k1l2.20953.23597.0.26693.8.6.0.0.0.0.369.609.2-
1j1.2.0....0...1c.1.64.psy-ab..6.2.597....0.TnvL6X-Mybs
https://www.google.com/search?q=lan+tester+definition
https://en.wikipedia.org/wiki/Drill
https://www.osha.gov/SLTC/personalprotectiveequipment/
https://en.wikipedia.org/wiki/Hole_saw
http://www.starrett.com/category/saws/pvc-
saw/241105#currentPage=1&displayMode=grid&itemsPerPage=24&sortB
y=wp/asc

Document No
Date Developed:
Issued by:
8/21/2018
CBLM in NCII CSS Page 112 of 114
Developed by: SFIST
SUSAN F.
ECHALAS Revision # 01
http://www.bb-elec.com/Learning-Center/All-White-
Papers/Ethernet/Ethernet-Cables-RJ45-Colors-Crossover.aspx
https://www.google.com.ph/search?q=patch+panel++cable+color+coding
&hl=en-
PH&tbm=isch&source=iu&ictx=1&fir=6Ly_gvPLyFZtoM%253A%252CmU
14wnXsn5UK9M%252C_&usg=AFrqEzfmPClDmziCmwQHieiGYJKUx5Qu
mQ&sa=X&ved=2ahUKEwilnY-
ckYLdAhWBWX0KHVgxB7EQ9QEwA3oECAUQCg#imgrc=6Ly_gvPLyFZto
M:
https://community.fs.com/blog/cat5e-patch-panel-wiring-steps.html
https://iihelp.iinet.net.au/How_to_run_a_ping_test
https://kb.intermedia.net/article/682
https://support.n4l.co.nz/s/article/How-to-use-Tracert-Traceroute
https://docs.microsoft.com/en-us/windows-
server/administration/windows-commands/nslookup
https://www.lifewire.com/ping-command-2618099
https://kb.intermedia.net/article/682
https://quality-one.com/5s/
https://technet.microsoft.com/en-
us/library/aa997324(v=exchg.65).aspx
https://www.lifewire.com/netstat-command-2618098
https://www.computerweekly.com/tip/How-to-use-a-netstat-command-
in-Windows-to-watch-open-ports
https://en.wikipedia.org/wiki/Tera_Term
https://en.wikipedia.org/wiki/PuTTY
http://ping-test.net/speed_test
http://mediacomcc.custhelp.com/app/answers/detail/a_id/763/~/how-
to-run-a-speedtest
https://www.5stoday.com/what-is-5s/

Document No
Date Developed:
Issued by:
8/21/2018
CBLM in NCII CSS Page 113 of 114
Developed by: SFIST
SUSAN F.
ECHALAS Revision # 01
Document No
Date Developed:
Issued by:
8/21/2018
CBLM in NCII CSS Page 114 of 114
Developed by: SFIST
SUSAN F.
ECHALAS Revision # 01

You might also like