The words you are searching are inside this book. To get more targeted content, please make full-text search by clicking here.

Provide Student Reflection, Practical Work Exercise, Example Question

Discover the best professional documents and content resources in AnyFlip Document Base.
Search
Published by Shah Erawati, 2020-11-22 21:21:50

STUDENT WORK BOOK FOR DATA COMMUNICATION AND NETWORKING

Provide Student Reflection, Practical Work Exercise, Example Question

Keywords: Data Communication

1

PRAKATA

Kursus DEP50033 – Data Communication and Networking merupakan kursus
wajib yang diambil oleh pelajar semester lima Diploma Kejuruteraan Elektronik
(Komunikasi) – DEP di politeknik Malaysia. Kursus ini mendedahkan pelajar kepada
asas komunikasi data dan rangkaian sebelum mereka melangkah ke peringkat
pengajian yang lebih tinggi ataupun menceburi bidang kerjaya. Buku kerja pelajar
kursus DEP50033 ini merupakan satu inisiatif pensyarah kursus untuk
membangunkan bahan pembelajaran kendiri yang lebih komprehensif dan berpusat.
Buku ini mengandungi TIGA bahagian iaitu modul refleksi pelajar, kerja amali dan
koleksi soalan-soalan peperiksaan akhir mengikut topik.

Di bahagian modul refleksi pelajar mengandungi latihan-latihan pengukuhan
mengikut turutan topik seperti yang terkandung di dalam silibus kurikulum. Pelajar
akan membuat latihan ini secara kendiri atau berbincang dalam kumpulan seusai
habis setiap topik yang diajar di dalam kelas teori. Sesi perbincangan bersama
pensyarah akan dijalankan untuk menyemak jawapan. Melalui latihan-latihan ini
pelajar akan dapat membiasakan diri mengenal bentuk soalan peperiksaan akhir dan
mempelajari teknik menjawab soalan dengan baik dan berkesan.

Di bahagian kerja amali mengandungi 6 lembaran yang akan digunakan oleh
pelajar semasa sesi praktikal di makmal. Lembaran kerja dibekalkan bagi
memudahkan pelajar merujuk dan membaca kandungan amali yang akan dibuat
sebelum memulakan sesi. Secara tidak langsung pelajar dapat membuat persediaaan
lebih awal tentang keperluan pada setiap amali yang akan dilaksanakan.

Bahagian terakhir merupakan kompilasi soalan-soalan peperiksaan akhir yang
disusun mengikut format yang ditetapkan dalam garis panduan Final Exam Item
Specification Table (FEIST). Bahagian ini bertujuan untuk memberi pendedahan
kepada pelajar mengenai format dan soalan-soalan yang acapkali keluar dalam
peperiksaan akhir. Menerusi latih tubi di bahagian ini, pelajar akan dapat dilatih untuk
membiasakan diri menjawab soalan dengan kaedah yang betul dan tepat.

Semoga dengan adanya buku kerja ini, dapat membantu dan melatih pelajar
secara kendiri di dalam pembelajaran kursus DEP50033 dengan lebih berkesan dan
memperolehi skor markah yang baik.

2

WORK BOOK STUDENTS

DEP50033
DATA COMMUNICATION AND NETWORKING

NAME : ____________________________________________________
MATRIX NUMBER : _________________________________________

3

1.0 BASIC CONCEPT OF DATA COMMUNICATION

1.1 Understand basic data communication system.

1.1.1 Describe data communication.

…………………………………………………………………………………………
…………………………………………………………………………………………
…………………………………………………………………………………………

1.1.2 Explain the elements of basic data communication with the aids of diagram.

Element Explanation

a. Source

b. Transmitter

c. Receiver

d. Transmission Medium

e. Destination

Diagram

1.1.3 Describe Data Terminal Equipment (DTE) and Data Communication
Equipment (DCE).

4

Data Terminal Equipment (DTE) Data Communication Equipment (DCE).

1. 2 Know data encoding
1.2.1 Describe data encoding.
……………………………………………………………………………………….
………………………………………………………………………………………..
………………………………………………………………………………………...

1.2.2 List types of data encoding:
a. Digital-to-Digital encoding:
i. ...............................................
ii. …………………………………
iii. …………………………………
iv. …………………………………
v. …………………………………
vi. …………………………………
vii. …………………………………

b. Analog-to-Digital encoding:
i. ………………………………..

c. Digital-to-Analog encoding:
i. ………………………………..
ii. ………………………………..
iii. ………………………………..

1.3 Understand digital-to-digital encoding.
1.3.1 Explain the following digital-to-digital data encoding with an illustration.

1. 4 Apply the understanding of digital-to-digital encoding.
1.4.2 Carry out the encoding scheme in 1.3.1 for a given data stream.

5

1. 5 Analyze digital-to-digital encoding.
1.5.1 Compare the characteristic of digital-to-digital encoding in 1.3.1.

Type Waveform Characteristics

NRZ

RZ

Manchester

AMI

HDB3

MLT-3

4B/5B

6

1. 6 Understand Digital Modulation Review
1.6.1 Review types of basic digital modulation:
Type

Amplitude Shift Keying (ASK)

Frequency Shift Keying (FSK)

Phase Shift Keying (PSK)

1.6.2 Describe the concept of Multi-level (M-ary) amplitude and phase modulation.

…………………………………………………………………………………………
…………………………………………………………………………………………
…………………………………………………………………………………………
…………………………………………………………………………………………

1.6.3 Describe the following digital modulation: Description
Type

Minimum Shift Keying (MSK)

Gaussian Minimum Shift
Keying (GMSK)

7

Quadrature Phase Shift Keying
(QPSK or 4-PSK)

Quadrature Amplitude
Modulation (QAM)

1. 7 Apply the understanding of digital modulation
1.7.1 Apply QPSK/4-PSK and QAM in digital modulation for a given stream of data.

Type Stream of data

Quadrature Phase Shift Keying
(QPSK/4-PSK)

Quadrature Amplitude
Modulation (QAM)

8

1. 8 Understand error detection.
1.8.1 Describe error detection.
…………………………………………………………………………………………
…………………………………………………………………………………………
…………………………………………………………………………………………
…………………………………………………………………………………………
1.8.2 Describe type of error detection:
a. Vertical Redundancy Check (VRC)
……………………………………………………………………………………
……………………………………………………………………………………
…………………………………………………………………………………...
b. Cyclic Redundancy Check
……………………………………………………………………………………
……………………………………………………………………………………
……………………………………………………………………………………

1.9 Apply error detection in data transmission
1.9.1 Implement the use of parity bit in VRC.

9

1.9.2 Interpret the procedure in CRC.
1.9.3 Apply the CRC to determine the CRC bit or check bit.

10

1.10 Analyze error detection in data transmission.
1.10.1 Examine the quality of data transmission using CRC methods to verify the
existence of error.

11

2.0 INTRODUCTION TO NETWORKING

2.1 Know basic concept and elements of computer network.

2.1.1 Define computer network.

…………………………………………………………………………………………
…………………………………………………………………………………………
…………………………………………………………………………………………
…………………………………………………………………………………………

2.1.2 Describe fundamental types of networks: Description
Types

Peer-to-peer network

Client/server network
12

2.1.3 Describe the common elements required in Client/server Network:

Element Description

Client

Server

Network interface
card

Network operating
system

Node

Connectivity device

Backbone

Segment

Transmission Medium

Topology

13

2.2 Understand Data Communication Equipment (DCE) or Networking hardware
2.2.1 Explain the network security.

2.2.2 List THREE (3) component of network security.

2.3 Understand network topology and classification.
2.3.1 Describe types of network security

Type Explanation

Access Control

Antivirus and anti-
malware software

Application Security

Behavioral

Data Loss Prevention

14

Distributed denial of
Service Prevention

Email Security

Firewalls

Mobile Device security

Network segmentation

Security information and
even management

Web Security

Endpoint security

VPN

Intrusion Detection
Appliances

Cloud security

15

Wireless Security

2.3.2 Recognize the following network classification with an illustration of a
diagram:

Type Description Diagram

Local Area
Network
(LAN)

Metropolitan
Area Network
(MAN)

Wide Area
Network
(WAN)

Global Area
Network
(GAN)

2.4 Analyze network topology.
2.4.1 Identify the strength and weakness of star, bus and ring topology.

Type Strength Weakness

Star Topology

Bus Topology

16

Ring
Topology

2.5 Know the wiring standard in networking
2.5.1 Identify the following types of wiring standard:

Type Identification

TIA/EIA-568-A

TIA/EIA-568-B

17

2.6 Understand network cabling preparation. Explanation
2.6.1 Explain types of network cabling:
Type

Straight-
through

Cross-over

2.7 Apply the understanding of network cabling preparation
2.7.1 Implement straight-through unshielded twisted pair (UTP) cable complying
with TIA/EIA-568-B wiring standard.

18

2.7.2 Implement cross-over UTP cable complying with TIA/EIA-568-B wiring
standard.

2.7.3 Demonstrate Test UTP cables using cable tester.

19

3.0 THE OPEN SYSTEMS INTERCONNECTION (OSI) MODEL AND NETWORK
PROTOCOL

3.1 Know Open Systems Interconnection (OSI) Model.
3.1.1 Define OSI model.
……………………………………………………………………………………........
…………………………………………………………………………………………
…………………………………………………………………………………………
3.1.2 Describe the purpose of OSI model.
………………………………………………………………………………………….
………………………………………………………………………………………….
………………………………………………………………………………………….
………………………………………………………………………………………….

3.2 Understand Open Systems Interconnection (OSI) Model.
20

3.2.1 Identify the seven layer of OSI model.

3.2.2 Explain the functions of each OSI layer. Functions
OSI Layer

3.3 Know Network Protocol.
3.3.1 Define network protocol.
………………………………………………………………………………………..
………………………………………………………………………………………..
………………………………………………………………………………………..

3.3.2 Identify common network protocol suites:

21

a. Transmission Control Protocol (TCP/IP)

b. Internet Protocol (IP).

c. Transmission Control Protocol/Internet Protocol (TCP/IP)

3.4 Understand the TCP/IP protocol suite
3.4.1 Describe TCP/IP.
………………………………………………………………………………………….
………………………………………………………………………………………….
………………………………………………………………………………………….
………………………………………………………………………………………….

22

3.4.2 Explain the function of TCP/IP layer: Function
TCP/IP Layer

Physical and Data Link Layers

Network Layer

Transport Layer

Application Layer

3.5 Apply the understanding of TCP/IP protocol suite
3.5.1 Illustrate IP packet (datagram) header format.

23

3.5.2 Relate the TCP/IP protocol layer to OSI model layer.

3.6 Understand addressing schemes for TCP/IP protocol suite.
3.6.1 Explain four levels of TCP/IP address:

TCP/IP Address Explanation

Physical (link) address

Logical(IP) address

24

Port address

Specific address

3.7 Apply the understanding of addressing scheme for TCP/IP protocol suite.
3.7.1 Show the example of addressing scheme for TCP/IP protocol suite in 3.6.1.

TCP/IP Address Example of Addressing
Physical (link) address

Logical(IP) address

25

Port address

Specific address

3.8 Know types of network services
3.8.1 Define Domain Name System (DNS).
…………………………………………………………………………………………
…………………………………………………………………………………………
…………………………………………………………………………………………
3.8.2 Describe the function of Domain Name System (DNS).
…………………………………………………………………………………………
…………………………………………………………………………………………

3.8.3 Describe the relationship between Web Clients and server.
…………………………………………………………………………………………
…………………………………………………………………………………………

3.8.4 Describe File Transfer Protocol (FTP) in transferring file.
…………………………………………………………………………………………
…………………………………………………………………………………………
26

3.8.5 Describe World Wide Web (WWW) and Hypertext Transfer Protocol (HTTP).
…………………………………………………………………………………………
…………………………………………………………………………………………

3.8.6 Identify internet audio and video services.
…………………………………………………………………………………………
…………………………………………………………………………………………
………………………………………………………………………………....

27

4.0. LOCAL AREA NETWORK
4.1 Know Local Area Network.

4.1.1 Describe Local Area Network (LAN).
___________________________________________________________________
___________________________________________________________________

4.1.2 Describe Ethernet Local Area Network (Ethernet LAN).
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
4.1.3 Identify the four generation of Ethernet LAN.

1.
2.
3.
4.

4.2 Understand Media Access Control (MAC).
4.2.1 Describe MAC.
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________

4.2.2 Explain types of MAC:
a. Carrier Sense Multiple Access /Collision Avoidance (CSMA/CA).

b. Carrier Sense Multiple Access /Collision Detection (CSMA/CD).

c. Token Passing.

28

4.3 Apply the understanding of Media Access Control (MAC).
4.3.1 Generalize the application of Media Access Control (MAC) in 4.2.2.
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________

4.4 Understand IEEE Standard Project 802
4.4.1 Describe LAN Standard IEEE802
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________

4.4.2 Recognize the relationship of IEEE 802 standard to the OSI model.
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________

4.4.3 Identify the function of sub-layer in data link layer of IEEE 802:
a. Logical link control (LLC)

___________________________________________________________________
___________________________________________________________________
___________________________________________________________________

b. Media Access Control (MAC)
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________

4.4.4 Describe the physical layer of IEEE 802 standard.
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________

4.5 Know Standard Ethernet.
4.5.1 Define Standard Ethernet.

29

___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
4.5.2 Describe the MAC frame format for Standard Ethernet (IEEE 802.3).
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
4.5.3 Identify the encoding technique use in Standard Ethernet:

(a) NRZ

(b) Manchester

(c) MLT-3

(d) 4B/5B

4.6 Apply the understanding of Standard Ethernet LAN
4.6.1 Implement the Standard Ethernet according to the following categories:
a. 10 Base-T
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
30

b. 10 Base-F
__________________________________________________________________
___________________________________________________________________
___________________________________________________________________

4.7 Understand Wireless LAN
4.7.1 Describe Wireless LAN.
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________

4.7.2 Describe basic hardware of Wireless LAN:

(a) Access Point (AP)
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________

(b) Adapter card
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________

(c) Directional antenna
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________

(d) Extension point (EP)
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________

(e) Wired network
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________

4.7.3 Describe the two types of services in wireless LAN:
a. Basic Service Set (BSS)
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________

31

b. Extended Service Set (ESS)
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
4.7.4 Describe WLAN Standard IEEE802.11
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
4.8 Apply the understanding of Wireless LAN.
4.8.1 Illustrate the configuration of Wireless LAN:
a. Peer-to-peer network

b. Client and access point

32

5.0 PUBLIC DATA NETWORK
5.1 Know Public Data Network

5.1.1 Define:
a. Data Network

___________________________________________________________________
___________________________________________________________________
___________________________________________________________________

b. Value Added Network (VAN)
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________

c. Packet Switching Network
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________

5.1.2 Describe types of common switching network :
a. Circuit Switching

b. Message switching

c. Packet Switching

33

5.1.3 Describe packet switching methods :
a. Datagram

b. Virtual Circuit

5.2 Know Metropolitan-area Ethernet (Metro-E)
5.2.1 Define Metro-E
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
5.2.2 Identify Metro-E configuration or topology
__________________________________________________________________
___________________________________________________________________
___________________________________________________________________
5.2.3 Describe main components of Metro-E:
a. Access User
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
b. Aggregation or distribution
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
c. Edge Network
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________

34

d. Provider node
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
5.3 Understand Multiprotocol Label Switching (MPLS)
5.3.1 Describe Multiprotocol Label Switching MPLS.

5.4 Apply the understanding of MPLS-based Metro-E.
5.4.1 Implement MPLS in Metro-E.

35

EXERCISE:

1. Data communication is an exchange of digital data coding between two devices via

some form of transmission medium. Provide THREE (3) elements in data

communication. (CLO1:C1) [3 marks]

2. By using RZ encoding method, determine the encoded waveform for 10101110 data.

(CLO2:C2) [5 marks]

3. Illustrate the data signal of 101101100011 by using differential Manchester encoding

method. Assume the start is at positive voltage. (CLO2:C3) [7 marks]

4. Data Communications between remote parties can be achieved through a process
called networking. Networking involves the connection of computers, media and
networking devices. There are two types of fundamental network, being used by all
organization in the world which is peer-to peer network and client or server network.

(a) Describe computer network. (CLO1:C1) [3 marks]

(b) From the statement above, explain any ONE (1) of the types of fundamental

network. (CLO1:C2) [5 marks]

(c) Sketch THREE (3) network classifications. (CLO1:C3) [7 marks]

5. There are two major network models that are used to describe the process of

transferring and receiving data from two connected systems. The models are the

Open Systems Interconnection (OSI) Model and Transmission Control

Protocol/Internet Protocol (TCP/IP).

(a) Based on the suitable diagram, identify the seven Layer Open Systems

Interconnection (OSI) Model. (CLO1:C2) [3 marks]

(b) Referring to the Figure A-3b, interpret the function of the following Transmission
Control Protocol TCP/IP Layer : (CLO1:C3)

Figure A-3b [6 marks]
36

(c) Relate between TCP/IP protocol layers as in Figure A-3b to OSI model layer.

(CLO1:C3) [6 marks]

6. The Integrated Services Digital Network (ISDN) is an evolving set of standard for a

digital network carrying both voice and data communication.

(a) Give THREE (3) types of channels provided by Telekom Malaysia Berhad

according to ISDN standard. (CLO1:C1) [3 marks]

(b) ISDN is divided into three levels, which are level of a user, switching local level

and switching level network. Briefly explain each level. (CLO1:C2) [5 marks]

(c) Sketch an Integrated Services Network (ISDN) network topology that shows the

important reference points. (CLO1:C3) [7 marks]

7. A Media Access Control (MAC) is a sublayer in the data-link layer that owns multiple

access protocol to coordinate access to the link. Interpret THREE (3) types of MAC.

(CLO1:C3) [20 marks]

8. Cyclic Redundancy Check (CRC) is used in networks such as LAN and WANs to

detect the error both at the sender (encoder) and the receiver (decoder). Given the

message is 1001 and the generator bit is 1011, determine the CRC check bit at the

sender and the receiver. If the corrupted message 1000110 arrived at the receiver,

determine the CRC check bit and identify the types of error happen in the corrupted

message. (CLO1:C4) [20 marks]

37

PRACTICAL WORK

DEP50033
DATA COMMUNICATION AND NETWORKING

NAME : ____________________________________________________
MATRIX NUMBER : _________________________________________

38

PRACTICAL
WORK 1

39

TITLE : BASIC DATA COMMUNICATION SYSTEM
CLO : CLO2 (P4) , CLO3 (A3)
OUTCOMES : Upon completion the practical, students should be able to:
1. Set up Basic Data Communication Link.
2. Test the connection of Data Communication Link.

EQUIPMENTS: Quantity
1 unit
No Component 1 unit
1 Computer
2 Access Point

SAFETY PRACTICE :

1. Always aware, any machine that works on electricity is dangerous.
2. Understand the safety procedures specified by the lecturer.
3. The experiment should be done in an organized manner as this can minimize the risk of accident

occur.
4. Read and follow the experimental method and check with the lecturer if any problems occur

THEORY:

In command prompt layout, it is appear some information about ping command, traceroute command,
nslookup, Domain Name Service, IPV4 Address, IPV6 Address, Subnet Mask and total hops.

Ping and Traceroute are two programs that can be used to send packets of information to remote
computers for the purpose of retrieving information. These programs are useful for testing your internet
connection.

The ping command is a very common method for troubleshooting the accessibility of devices. It uses
a series of Internet Control Message Protocol (ICMP) Echo messages to determine:

• Whether a remote host is active or inactive.
• The round-trip delay in communicating with the host.
• Packet loss

This ping test verifies the operation of the base TCP/IP. If no packets are received, command
“Destination Host unreachable” or Request Timed Out” will appear. This indicate that your connection
is not routing properly.

The Traceroute Command is used to discover the routes that packets actually take when travelling to
their destination. Traceroutes can show where there is a break in your connection. This allows you to
determine exactly where your packets are being dropped or lost and dropped or lost packets on a
traceroute will usually show as asterisks (*).

The Name Server Lookup (Nslookup) is a network utility program used to obtain information about
domain name and IP address. Domain Name Service provides a way for hosts to use this name to
request the IP address of a specific server.

Internet Protocol (IP) is a unique number used by machines (computers) to refer to each other when
sending information via the Internet. Two types of IP are IPV4 and IPV6.

40

PROCEDURE:

Task 1: Identified detailed information of ping command prompt

1.1 Power on the computer
1.2 Go to All Programme, Accessories and Command Prompt (C :\).
1.3 Perform ‘ipconfig’ or ‘ipconfig/all’ command.

Figure 1 : Verification for ipconfig/all

1.4 Based on the result in step 1.3, complete the Table 1 below.

Types Of Command IP Address/Name of specific server

Connection Specific-DNS Suffix

Link Local IPv6 Address

IPv4 Address

Subnet Mask

Default Gateway

Table 1: LAN Adapter Network Connection

Task 2: Identified detailed information of nslookup command prompt

2.1 Perform ‘nslookup’ command for the following server and insert the IP address for all server in
Table 2.

i. www.psas.edu.my
ii. mail.psas.edu.my
iii. spmp.psas.edu.my
iv. computer

41

Figure 2: Verification for nslookup

Server IP Address Status Ping Response [ ⁄ ]

www.psas.edu.my

mail.psas.edu.my

spmp.psas.edu.my

computer

Table 2: Servers IP Addresses and Ping Command Result

Task 3: Identified detailed information of tracert command prompt

Figure 3: Verification for nslookup
3.1 Perform tracert www.psas.edu.my. Write down your result display. State the number of hop

before the signal reach www.psas.edu.my.
DISCUSSION (10 marks)
CONCLUSION (5 marks)

42

PRACTICAL WORK 1 : RUBRIC FOR PRACTICAL SKILL (70 Marks)

Learning Domain (LD) Skills / Aspects Excellent Good
4 3

A. Concern with the Able to concern with Able to concern w
safety precaution the safety precaution the safety precau
along the lab along the lab session along the lab sess
session without assistance with little assistan
and no mistake

CLO2 : Construct a Skills / Aspects Excellent Good
simple LAN and WAN
in accordance to IEEE B. Perform ipconfig 4 3
or TIA/EIA-568-A/B command
and the related data Able to perform Able to perform
communication (P4) C. Perform nslookup ipconfig command ipconfig command
command without assistance with little assistan
CLS3a:Practical Skills and no mistake
D. Perform ping Able to perform
CLS3c:Digital & command Able to perform nslookup comman
Numeracy Skills nslookup command with little assistan
without assistance
and no mistake Able to perform p
command with lit
Able to perform ping assistance
command without
assistance and no
mistake

E. Perform tracert Able to perform Moderate to perf
command tracert command tracert command
without assistance with little assistan
and no mistake

43

Fair Unsatisfactory STUDENT MARK

2 1 S1 S2 S3 S4

with Able to concern with the Unable to concern
ution safety precaution along with the safety
sion the lab session with more precaution along the
nce reminder assistance is lab session although
given assistance is given

Fair Unsatisfactory

21

Able to perform ipconfig Unable to perform

d command with more ipconfig command
nce reminder assistance is although assistance is
given given

Able to perform Unable to perform

nd nslookup command with nslookup command
nce more reminder although assistance is
assistance is given given

ping Able to perform ping Unable to perform ping
ttle command with more command although
assistance is given
reminder assistance is
given

form Able to perform tracert Unable to perform
d command although tracert command
nce assistance is given although assistance is
given

TOTAL MARK

PRACTICAL WORK 1 : RUBRIC FOR DISCUSSION AND CONCLUSION (30 Marks

Report DT Very Good Good Fair
Assessment 5
4 3
Student able to clearly
Student able to clearly Student o
describe the experiment describe the experiment able to cle
result in relation to the describe t
result in relation to the theory and practical work, experime
as well as stating the result in
Analysis / P2 theory and practical work, technical problems that relation to
Discussion as well as stating the occurred during experiment theory an
and its solutions or vice practical w
technical problems that versa.
Students
occurred during experiment Students able to conclude able to
the practical work by generally
and its solutions. referring to the experiment conclude
objective. practical w
Students able to conclude by referrin
the exper
Conclusion P2 the practical work by objective.
referring to the experiment

objective.

44

s)

r Weak Very weak STUDENT MARK

2 1 S1 S2 S3 S4

only Student able to Student are not
early describe able to describe
the experiment result experiment result
ent but with no at all.
relation to the
o the theory and No conclusion was
nd practical work. included or shows
work. little effort and
Students only able reflection on the
only conclude some of lab.
the practical work
the by referring to the
work experiment
ng to objective.
riment
.

PRACTICAL WORK 1 : RUBRIC FOR GENERIC SKILS (100 Marks)

Attribute Subattribute Very Good Good
5 4

A.Work Perform assigned tasks Perform assigned tasks Perfo
Responsibility beyond the scope of within by the scope of withi
work and beyond work and exceeds work
expectation expectation expe

B. Work Has a well acknowledged Has a good relationship Has a
Relation relationship with with co-workers and relat
co-workers and within, institution, work co-w
within, institution, work groups and community instit
groups and community when at work and c
when at work work

Ethics

C. Work Ethics Always practise excellent Practise good working Pract
working culture such as culture such as good cultu
good moral, timeliness as mora
moral, timeliness as well as being efficient, as be
well as being efficient, productive and ethical at prod
productive and ethical at work in most situations work
work in all situations

D. Integrity Always perform Perform a task Perfo
a task with trust, with trust, honesty, accep
honesty, sincerity and sincerity and hone
transparent in any transparent in trans
situation most situations

45

Fair Weak Very weak STUDENT MARK

3 2 1 S1 S2 S3 S4

orm assigned tasks Perform assigned tasks Does not perform
in by the scope of within by the scope of assigned tasks within
k and meets work with close by the scope of work
ectation supervision even with close
supervision

a satisfactory Has a less harmonious Has a disharmonious
tionship with relationship with co- relationship with co-
workers and within, workers and within, workers and within,
tution, work groups institution, work groups institution, work
community when at and community groups and community
k when
Practise less appropriate at work
tise good working working culture such as
ure such as good inconsistent behaviour, Practise less
al, timeliness as well less punctuality as well appropriate
eing efficient, as being less efficient, working culture such
ductive and ethical at productive and ethical at as inconsistent
k in general work in many situations behaviour, less
punctuality as well as
being less efficient,
productive and ethical
at work in many
situations

orm a task with Perform a task with Perform a task with
ptable trust, limited trust, honesty, lack of trust, honesty,
esty, sincerity and sincerity and sincerity and
sparency transparency transparency

PRACTICAL
WORK 2

45

TITLE : UNDERSTAND PEER TO PEER NETWORKING

CLO : CLO2 (P4)

OUTCOMES : Upon completion the practical, students should be able to:
i. Develop an understanding of the basic functions of Packet Tracer.
ii. Create/model a simple Ethernet network using two hosts and a hub.
iii. Observe traffic behaviour on the network.
iv. Observe data flow of ARP broadcasts and pings (ICMP) traffic.

EQUIPMENTS: Quantity
No Component 1 unit
1 Computer 1 unit
2 Packet Tracer software

SAFETY PRECAUTION:

1. Do not plug in external devices (e.g USB thumb drive) without scanning.
2. Always back up all your important data files.

THEORY:

Packet Tracer is a cross-platform (multi-platform software or platform-independent software) allows users to
create network topologies and imitate modern computer networks. The software allows users to simulate the
configuration of Cisco routers and switches using a simulated command line interface. It provides device categories
or groups, such as Routers, Switches, Wireless Devices or End Devices (pc or laptops) and connections (wired and
wireless) such as copper cables, fiber optic, unshielded twisted pair or shielded twisted pair and provide much of
ways to inbuilt a security in a network (FTP, TELNET, console security, direct access security, password security,
encryption & decryption security, data hiding security).

Packet Tracer makes use of a drag and drop user interface, allowing users to add and remove simulated network
devices as they see fit. The software supports a multi-user system that enables multiple users to connect multiple
topologies together over a computer network.

Cisco Packet Tracer has two workspaces—logical and physical. The logical workspace allows users to build logical
network topologies by placing, connecting, and clustering virtual network devices. The physical workspace provides
a graphical physical dimension of the logical network, giving a sense of scale and placement in how network devices
such as routers, switches, and hosts would look in a real environment. The physical view also provides geographic
representations of networks, including multiple cities, buildings, and wiring closets.

The PING command is a Command Prompt command used to test the ability of the source computer to reach a
specified destination computer. The PING command is usually used as a simple way verify that a computer can
communicate over the network with another computer or network device.

DHCP service is a key component of your network infrastructure by allowing centralized ip address management
on a single pool of servers. It would simply be easy if DHCP service is enabled on the router. DHCP is a router
service which handles all dynamic IP address assignments to every DHCP enabled devices existing in the network.
As a general rule, only shared devices, like printers, servers, routers, and switches needs a static ip address. All
other devices should use DHCP-assigned IP addresses

46


Click to View FlipBook Version