Checkfu

Standard set

Networking

CTE (2020-)Grades 11, 12CSP ID: B7F381509DB44E21B811E68B61EA6BD1Standards: 150

Standards

Showing 150 of 150 standards.

Filter by depth

Depth 0

Safety

Depth 0

Career Exploration

Depth 0

Types of Networks 

Depth 0

Open Systems Interconnection Model (OSI) Model

Depth 0

Data Transmission

Depth 0

Transmission Control Protocol (TCP)/Internet Protocol (IP)

Depth 0

Network Hardware

Depth 0

Wireless Networking

Depth 0

Network Operating Systems

Depth 0

Security

Depth 0

Troubleshooting

1

Depth 1

Accurately read, interpret, and demonstrate adherence to safety rules, including but not limited to rules published by the National Science Teachers Association (NSTA), rules pertaining to electrical safety, Internet safety, Occupational Safety and Health Administration (OSHA) guidelines, and state and national code requirements. Be able to distinguish between rules and explain why certain rules apply. Complete safety test with 100 percent accuracy. 

2

Depth 1

Identify and explain the intended use of safety equipment available in the classroom. For example, demonstrate how to properly inspect, use, and maintain safe operating procedures with tools and equipment. 

3

Depth 1

Locate and access the Computer Technology Industry Association (CompTIA) website and analyze its structure, policies, and requirements for CompTIA Network+ certification. Explain what steps are required to obtain the certification, methods to prepare for the examination, and how it can be a stepping stone to more advanced certifications.

4

Depth 1

Research the following networking standards organizations and write an informative paper explaining the industry standards that are managed by each. Describe why these standards are important and how they influence the work of a network administrator or other IT professional.

5

Depth 1

Define the term “network,” define and describe the necessary features and components of a network, and differentiate between different network types. Using graphic illustrations, or other diagrams, identify and describe the following types of networks, outlining the features that distinguish each network from the others and effectively diagraming the flow of information in each.

6

Depth 1

Describe the following functions provided by a network. Distinguish between these network services in a large office versus an office with few users, providing specific examples.

7

Depth 1

Create and use diagrams to explain the Open Systems Interconnection (OSI) Model and the flow of data through it. Define the functions and identify the associated hardware components of the OSI Model’s following seven layers. For example, explain how each layer interacts to ensure that data arrives in the correct place without errors. 

8

Depth 1

Identify and describe a range of standard cable types (e.g., coaxial cable, shielded twisted pair, unshielded twisted pair, single-mode fiber, multimode fiber, serial, plenum, and nonplenum), comparing and contrasting their characteristics and properties and differentiating between them accurately. Explain why it is necessary to consider the following properties when selecting and installing the appropriate cables for a networking task, and why these decisions must conform to industry standards. For a given task and environment, make a recommendation about an appropriate cable type and defend the recommendation with specific evidence and reasoning.

9

Depth 1

Research and identify the common subprotocols associated with transmission control protocol (TCP) and internet protocol. Using a combination of text and graphic illustrations, explain their functions and how they correlate to the layers of the open systems connection (OSI) model. Examples of subprotocols include, but are not limited to: hypertext transfer protocol (HTTP), user diagram protocol (UDP), internet control message protocol (ICMP), internet group management protocol (IGMP), address resolution protocol (ARP), domain name system (DNS), network time protocol (NTP), file transfer protocol (FTP), and trivial file transfer protocol (TFTP).

10

Depth 1

Describe the following address formats: IPv6, IPv4, and MAC. Using the advantages and disadvantages as supporting evidence, identify and explain the application of each format.

11

Depth 1

Define each of the following physical network topologies, and draw diagrams to distinguish among the layouts. Include examples of the most effective applications, as well as identify the advantages and disadvantages of each topology.

12

Depth 1

Compare and contrast logical network topologies to physical network topologies. Explain how these two types of topologies differ. Identify the common logical network topologies and describe their characteristics. Provide examples demonstrating how logical network topologies are useful in troubleshooting.

13

Depth 1

Define switching and detail the role that it occupies in a logical network topology. Describe the three types of switching (circuit, message, and packet) and identify the specific details that distinguish how each method establishes paths between nodes.

14

Depth 1

Define routing and explain why a router is protocol dependent. Identify and list the properties of a router and describe its basic functions, citing examples found in informational texts.

15

Depth 1

Write descriptive text that outlines the process used to determine the most efficient path (e.g., route) for data to flow across a network. Identify and describe that variables the influence the best path, including the following most common routing protocols. 

16

Depth 1

Research the following types of network interface cards (NICs). Create a table or other graphic organizer that lists examples and characteristics of NICs, as well as steps to selecting the appropriate NIC. Demonstrate proper installation and configuration of each device, attending to appropriate measurements and units. Summarize the multistep procedure to install and configure the various NICs. 

17

Depth 1

Define a repeater and explain its limitations. Describe the characteristics of a hub; explain how it is a type of repeater, yet it still differs from the repeater. Install and configure the following types of hubs and identify their distinguishing characteristics.

18

Depth 1

Compare and contrast bridges with repeaters and hubs, identifying examples of advantages that bridges have over these devices. Provide supporting evidence to justify each example.

19

Depth 1

Create and execute a plan to first install multiple nodes to a small switch, and then to connect the switch to another connectivity device. Verbally describe the steps of the procedure as they are being demonstrated. 

20

Depth 1

Identify common gateway devices and explain how they are different from connectivity devices. Further, explain why the gateways must operate on multiple layers of the open systems interconnection (OSI) model.

21

Depth 1

Demonstrate understanding of wireless transmission technology. Use a combination of graphic illustrations and text to describe how a wireless signal originates from an electrical current and travels along a conductor. Include definitions and functions of the following concepts.

22

Depth 1

Compare and contrast wireless local area network (WLAN) infrastructure to that of wired network topologies. Identify and explain the differences between the two layout types.

23

Depth 1

Locate and access the 802.11 standards (wireless fidelity or Wi-Fi) developed by the Institute for Electrical and Electronics Engineers (IEEE). Explain the purpose of these standards, as well as how IT professionals should apply them to networking systems.

24

Depth 1

Explore Bluetooth technology, differentiating between purposes of, and standards that govern, Bluetooth and other technologies (such as those governed by IEEE 802.111). 

25

Depth 1

Given specifications to install and configure a basic wireless network in a home or small office, write and execute a plan that includes, but is not limited to, the following:

Depth 1

Provide details of the multistep procedure and justify the recommendations in the plan by providing supporting evidence that conforms to industry standards (e.g., Institute for Electrical and Electronics Engineers (IEEE) 802.11, Bluetooth). 

26

Depth 1

Given specifications to install and configure a wireless network in a large office, conduct a site survey to assess requirements of the clients, facility characteristics, and coverage area. Using the survey results, write and execute a plan that includes, but is not limited to, the following: 

Depth 1

Provide details of the multistep procedure and justify the plan by providing supporting evidence that conforms to the Institute for Electrical and Electronics Engineers (IEEE) 802.11 standards.

27

Depth 1

In teams, research various types of network operating systems (NOS) (e.g., Microsoft Windows server, Linux enterprise server, UNIX, etc.). Identify the basic functions of a NOS, and synthesize the findings to write an explanatory text that includes, but is not limited to, the following:

Depth 1

Present the paper to other teams and revise it based on constructive feedback from peers. 

28

Depth 1

Develop a plan for a regularly scheduled audit to examine a network’s security risks. The plan should include, but is not limited to, the following:

Depth 1

Implement the security plan for the duration of the course, revising as necessary.

29

Depth 1

Research and describe the most common security risks associated with people; data transmission and hardware; protocols and software; and internet access. Investigate and distinguish among the following common prevention methods to secure a network system.

Depth 1

Given various scenarios, identify the most applicable best practices to secure a network. Implement these practices and write a justification for each scenario solution. Provide supporting evidence drawing on industry standards.

30

Depth 1

Explore the application of firewalls to secure networks. Describe their features and functions while distinguishing between the types (e.g., software and hardware). Install and configure a basic firewall. Verbally explain each step of the implementation process as it is executed. Cite any applicable industry standards. 

31

Depth 1

Define fault tolerance, distinguishing between failures and faults in a network. Write a paper describing the following aspects that should be monitored and managed to sustain fault tolerance.

Depth 1

Identify those aspects that are most influential on fault tolerance and justify the claim with supporting evidence. Demonstrate the application of these practices and compare the changes (if any) in the tolerance to results generated by other classmates. 

32

Depth 1

For each network system problem given, apply the following general troubleshooting theory. 

Depth 1

Following the steps of the general troubleshooting theory, select a problem to present to classmates as a case study. 

33

Depth 1

For a given assignment related to the following common problems, follow the troubleshooting theory using appropriate hardware and software tools (e.g., cable tester, butt set, multimeter, protocol analyzer, throughput testers, connectivity software, etc.).

Depth 1

Identify the problem(s) and document the findings and resolution. Include an explanation of the common symptoms, diagnostic procedures, and specific tools used that led to the problem resolution.

4.a

Depth 2

American National Standards Institute

4.b

Depth 2

Electronic Industries Alliance and Telecommunications Industry Association

4.c

Depth 2

Institute of Electrical and Electronics Engineers

4.d

Depth 2

International Organization for Standardization

4.e

Depth 2

International Telecommunication Union

4.f

Depth 2

Internet Society

4.g

Depth 2

Internet Assigned Numbers Authority

4.h

Depth 2

Internet Corporation for Assigned Names and Numbers

5.a

Depth 2

Peer-to-peer networks

5.b

Depth 2

Client/server networks

5.c

Depth 2

Local area networks (LAN) 

5.d

Depth 2

Metropolitan area networks (MAN)

5.e

Depth 2

Wide area networks (WAN)

6.a

Depth 2

File and print services

6.b

Depth 2

Access services

6.c

Depth 2

Communication services

6.d

Depth 2

Internet services

6.e

Depth 2

Management services

7.a

Depth 2

Application

7.b

Depth 2

Presentation

7.c

Depth 2

Session

7.d

Depth 2

Transport

7.e

Depth 2

Network

7.f

Depth 2

Data Link

7.g

Depth 2

Physical

8.a

Depth 2

Transmission speeds

8.b

Depth 2

Distance

8.c

Depth 2

Duplex

8.d

Depth 2

Noise immunity (e.g., security, electromagnetic interference (EMI) )

8.e

Depth 2

Frequency

11.a

Depth 2

Star

11.b

Depth 2

Mesh

11.c

Depth 2

Bus

11.d

Depth 2

Ring

11.e

Depth 2

Point to point

11.f

Depth 2

Point to multipoint

11.g

Depth 2

Hybrid 

15.a

Depth 2

Link-state: open shortest path first (OSPF), intermediate system to intermediate system (IS-IS)

15.b

Depth 2

Distance-vector: routing information protocol (RIP), routing information protocol version 2 (RIPv2), border gateway protocol (BGP) 

15.c

Depth 2

Hybrid: enhanced interior gateway routing protocol (EIGRP)

16.a

Depth 2

Internally attached (internal bus standards)

16.b

Depth 2

Externally attached (peripheral bus standards)

16.c

Depth 2

On-board

16.d

Depth 2

Wireless

17.a

Depth 2

Passive

17.b

Depth 2

Intelligent

17.c

Depth 2

Managed

17.d

Depth 2

Stand-alone

17.e

Depth 2

Workgroup

21.a

Depth 2

Antenna

21.b

Depth 2

Signal propagation

21.c

Depth 2

Signal degradation

21.d

Depth 2

Frequency ranges

21.e

Depth 2

Narrowband, broadband, and spread spectrum signals

21.f

Depth 2

Fixed vs. mobile

25.a

Depth 2

Install the client

25.b

Depth 2

Locate and place the access point 

25.c

Depth 2

Install the access point

25.d

Depth 2

Verify installation

26.a

Depth 2

Wireless access point placement

26.b

Depth 2

Antenna types

26.c

Depth 2

Interference 

26.d

Depth 2

Frequencies 

26.e

Depth 2

Channels

26.f

Depth 2

Wireless standards

26.g

Depth 2

Service set identifier (SSID) (e.g., enable/disable) 

27.a

Depth 2

Guiding questions to determine the optimal software requirements

27.b

Depth 2

Client support features

27.c

Depth 2

Organization of network elements

27.d

Depth 2

Sharing applications

27.e

Depth 2

Managing system resources (e.g., memory, multitasking, multiprocessing)

27.f

Depth 2

Why it is important to consider future needs

28.a

Depth 2

How often and when the audit will be conducted

28.b

Depth 2

Security threats to be examined

28.c

Depth 2

Rating system to assess the security threats 

28.d

Depth 2

Security policy goals and content 

28.e

Depth 2

How security breaches will be addressed

29.a

Depth 2

Physical security

29.b

Depth 2

Security in network design

29.c

Depth 2

Network operating system security

29.d

Depth 2

Encryption

29.e

Depth 2

Authentication protocols

29.f

Depth 2

Wireless network security

31.a

Depth 2

Environment

31.b

Depth 2

Power

31.c

Depth 2

Topology and connectivity

31.d

Depth 2

Servers

31.e

Depth 2

Storage

32.a

Depth 2

Gather information from users or the system, back up data, and document findings 

32.b

Depth 2

Verify the problem exists and how many users are affected 

32.c

Depth 2

Isolate the cause of the problem and generate alternative solutions

32.d

Depth 2

Determine whether escalation is necessary

32.e

Depth 2

Plan a solution and resolve the problem

32.f

Depth 2

Verify that the problem was resolved and prevent a future occurrence

32.g

Depth 2

Document findings, resolution, and preventative maintenance plan

33.a

Depth 2

Wireless problems (e.g., interference, signal strength, configurations, latency)

33.b

Depth 2

Router and switch problems (e.g., switching loop, bad cables, port configuration) 

33.c

Depth 2

Physical connectivity problems (e.g., connectors, wiring, split cables, cable placement)

Framework metadata

Source document
Networking
License
CC BY 4.0 US