Aoraki Digital Technologies/Level 2/DT 2.50 AS91377/Check List for 91377

From WikiEducator
Jump to: navigation, search

 The checklist below is not part of the assessment, but is provided to help you organise your research and report writing.  It should not be used as a guide to the assessment.
Demonstrating your understanding of the purposes and key characteristics of LANs includes: the information in your written discussion annotated diagrams with written discussion, images, and drawings as appropriate.


Evidence/Judgements for Achievement Evidence/Judgements for Achievement with Merit Evidence/Judgements for Achievement with Excellence
The student has demonstrated understanding of local area network technologies.

They have:

  • described networking concepts
    Networking concepts described will include but are not limited to: the characteristics and purposes of a LAN, standard networking models Open System Interconnection (OSI) and Transmission Control Protocol/Internet Protocol (TCP/IP), bandwidth, data transmission modes, IP addressing, DHCP (Dynamic Host Configuration Protocol), NAT (Network Address Translation) and ICMP (Internet Control Message Protocol).


The student would typically describe the characteristics and purposes of a LAN. The description would cover:

  • hosts, networking devices, peripherals, the connections between these and the dual function of some devices
  • examples of where LANs are used,
  • their interconnectivity with other networks,
  • the types of devices that can connect to a LAN
  • the type of resources that are shared on a LAN
  • the information that can be accessed through a LAN.
  • explained why the components have been used in a LAN (local area network) to achieve the desired characteristics

The students explanation will typically cover:

  • the reasons certain devices have been chosen to support the purpose of a particular LAN

e.g. is a 10Mbps connection sufficient or do we require 100Mbps (or 1Gbps) because we may need high video demand-discussion on bandwidth that matches the purpose of the LAN (e.g. home office versus gaming)

  • the choice of components in relation to whether they are using a desktop, personal computer , or laptop and the characteristics of these devices

e.g. currently wont get HD video out of a smart phone-limitations of these components to perform a function within a LAN

  • resolution, speed, bandwidth to handle the network traffic, connection of devices (or hosts)

e.g. does the purpose of using the smartphone on the LAN require the immediacy of a blue tooth connection or is the simplicity of using existing Internet email connections sufficient?

Traffic on the LAN is controlled by the switching (of hubs, repeaters, bridges and routers and

WAP )

  • data transmission including the modes of transmission of data, and examples of these

e.g. A telephone conversation is an example of full-duplex communication. Full-duplex networking technology increases network performance because data can be sent and received at the same time.

  • standard networking models including the title and a brief description of the purpose of each layer for the OSI model ,TCP/IP, DHCP, NAT and ICMP

e.g. The OSI model is an industry-standard framework that is used to divide network communications into seven distinct layers. Each layer is responsible for part of the processing to prepare data for transmission on the network. E.g. layer one is called physical and defines all of the electrical and physical specifications for devices.

  • the different uses of Internet Control Message Protocol (ICMP) to send control and error messages
  • the different uses of IP addressing (including classes, and the different parts of an IP address
  • explained how the connection technologies allow the components to function in a LAN

Connection technologieswill include but are not limited to:

  • common wired, optical and wireless technologies
  • LAN architecture specified in terms of physical topologies and logical topologies
  • the explanation will typically cover :
  • the reasons for the choice of device in relation to the bandwidth

e.g. the bandwidth chosen allows for a video to function not just a word processor

  • the reasons for a choice of a switch rather than a hub
  • the types of connections such as using wired, optical or wireless connections and the limitations and benefits of these technologies
  • an explanation of the purposes and characteristics of LAN architectures and topologies, Physical Topologies, Logical Topologies, LAN Architecture

e.g.LAN architecture describes both the physical and logical topologies used in a network. The three most common LAN architectures are

  • Ethernet
  • Token Ring
  • DDI
  • described the access control method used in the Ethernet architecture

The student could describe the access control method used in the Ethernet architecture using a flow diagram identifying actions and responses to activity.


The examples above relate to only part of what is required, and are indicative only.


The student has demonstrated in depth understanding of advanced concepts of local area network technologies

They have:

  • described networking concepts
  • compared and contrasted the characteristics and the purposes of peer to peer LANs and client/server LANs

The student would typically describe the characteristics and purposes of a LAN. The description would cover:

  • hosts, networking devices, peripherals, the connections between these and the dual function of some devices
  • examples of where LANs are used,
  • their interconnectivity with other networks,
  • the types of devices that can connect to a LAN
  • the type of resources that are shared on a LAN
  • the information that can be accessed through a LAN.

The students would also compare the advantages and disadvantages of peer to peer and client server LANs on the basis of:

  • network administration
  • centralised security
  • LAN complexity
  • LAN services ( e.g. centralised vs local, data storage, shared data, printers, and data backups)
  • explained the layers in the TCP/IP networking model and the role of this model in a LAN architecture

The explanation will cover standard networking models including the title and a brief description of the purpose of each layer for the OSI model, TCP/IP, DHCP, NAT and ICMP

e.g. The OSI model is an industry-standard framework that is used to divide network communications into seven distinct layers. Each layer is responsible for part of the processing to prepare data for transmission on the network.. Layer one is called physical and defines all of the electrical and physical specifications for devices.

The student explanation will typically cover:

  • layers in the TCP/IP model
  • dataflow through those layers
  • the role of the linked layer
  • the role of the internet layer
  • the role of the transport layer
  • the role of the application layer
  • an understanding of the relative informality of the TCP/IP model vs the formality of the OSI model
  • explained IP (Internet Protocol) addressing with reference to static addresses and dynamically obtained addresses

The students explanation could cover:

  • the different uses of IP addressing (including classes,
  • the different parts of an IP address (network and host)
  • the difference between an IP address and a MAC address
  • configuration of the IP address- default or automatic and the reasons for that choice
  • manual configuration of an IP address (static vs dynamically obtained, DHCP and NAT) and the reasons for those choices

For example the explanation for NAT would refer to the function of NAT, its purpose for a home network, and the effective and simple security it offers a network. * discussed the advantages and disadvantages of the common cable, fibre and wireless technologies for connecting the components of a LAN.

The discussion will cover the advantages and disadvantages of the connections on the basis of:

  • available bandwidth
  • impact on bandwidth of number of users(network saturation)
  • ability to secure data transfer on the medium
  • ease of set up and configuration
  • reliability
  • environmental conditions
  • suitability for the purpose of the LAN
  • described the access control method used in the Ethernet architecture

The student will describe the access control method used in the Ethernet architecture using a flow diagram identifying actions and responses to activity.


The examples above relate to only part of what is required, and are indicative only.




The student has demonstrated comprehensive understanding of local area network technologies

They have:

  • discussed IP addressing schema including the consequences for static addresses and dynamically obtained addresses

The student will describe the access control method used in the Ethernet architecture using a flow diagram identifying actions and responses to activity

The discussion will cover IP address classes and their relevance to identified situations

  • public versus private IP addresses
  • subnet masks
  • default gateway

Note: students are not expected to discuss IP6 in any depth. Identifying IP6 and the reasons IP6 is required is sufficient.The discussion will typically cover the consequences of the following errors in IP addresses:

  • incorrect configuration of an IP address
  • private vs public
  • incorrect subnet mask
  • incorrect default gateway
  • and the use of the ipconfig (or equivalent command)
  • discussed how the access control method used in Ethernet architecture manages Ethernet traffic on a LAN.

The student will describe the access control method that is used in an Ethernet architecture and discuss how this access control method manages the Ethernet traffic on a LAN

E.g. CSMA/CD (Carrier Sense Multiple Access / Collision Detection) is the protocol used in[1]Ethernet networks to ensure that only one network node is transmitting on the network wire at any one time.

In the discussion the student would use the terms:

  • carrier sense,
  • multiple access
  • collision detection

The student will discuss how collisions occur in CSMA/CD and how they are managed with the CSMA/CD protocol.

This discussion will refer to the terms

  • nodes,
  • transmissions,
  • Ethernet frames,
  • collisions,
  • acceptable levels of collisions and the use of Ethernet switches to overcome difficulties experienced with the CSMA/CD protocol.

The examples above relate to only part of what is required, and are indicative only.