Aoraki Digital Technologies/Level 2/DT 2.50 AS91377/Check List for 91377
The checklist below is not part of the assessment, but is provided to help you organise your research and report writing. It should not be used as a guide to the assessment.
Demonstrating your understanding of the purposes and key characteristics of LANs includes: the information in your written discussion annotated diagrams with written discussion, images, and drawings as appropriate.
|Evidence/Judgements for Achievement||Evidence/Judgements for Achievement with Merit||Evidence/Judgements for Achievement with Excellence|
| The student has demonstrated understanding of local area network technologies.
The students explanation will typically cover:
e.g. is a 10Mbps connection sufficient or do we require 100Mbps (or 1Gbps) because we may need high video demand-discussion on bandwidth that matches the purpose of the LAN (e.g. home office versus gaming)
e.g. currently wont get HD video out of a smart phone-limitations of these components to perform a function within a LAN
e.g. does the purpose of using the smartphone on the LAN require the immediacy of a blue tooth connection or is the simplicity of using existing Internet email connections sufficient?
Traffic on the LAN is controlled by the switching (of hubs, repeaters, bridges and routers and
e.g. A telephone conversation is an example of full-duplex communication. Full-duplex networking technology increases network performance because data can be sent and received at the same time.
e.g. The OSI model is an industry-standard framework that is used to divide network communications into seven distinct layers. Each layer is responsible for part of the processing to prepare data for transmission on the network. E.g. layer one is called physical and defines all of the electrical and physical specifications for devices.
Connection technologieswill include but are not limited to:
e.g. the bandwidth chosen allows for a video to function not just a word processor
e.g.LAN architecture describes both the physical and logical topologies used in a network. The three most common LAN architectures are
The student could describe the access control method used in the Ethernet architecture using a flow diagram identifying actions and responses to activity.
|The student has demonstrated in depth understanding of advanced concepts of local area network technologies
The student would typically describe the characteristics and purposes of a LAN. The description would cover:
The students would also compare the advantages and disadvantages of peer to peer and client server LANs on the basis of:
The explanation will cover standard networking models including the title and a brief description of the purpose of each layer for the OSI model, TCP/IP, DHCP, NAT and ICMP
e.g. The OSI model is an industry-standard framework that is used to divide network communications into seven distinct layers. Each layer is responsible for part of the processing to prepare data for transmission on the network.. Layer one is called physical and defines all of the electrical and physical specifications for devices.
The student explanation will typically cover:
The students explanation could cover:
For example the explanation for NAT would refer to the function of NAT, its purpose for a home network, and the effective and simple security it offers a network. * discussed the advantages and disadvantages of the common cable, fibre and wireless technologies for connecting the components of a LAN.
The discussion will cover the advantages and disadvantages of the connections on the basis of:
The student will describe the access control method used in the Ethernet architecture using a flow diagram identifying actions and responses to activity.
| The student has demonstrated comprehensive understanding of local area network technologies
The student will describe the access control method used in the Ethernet architecture using a flow diagram identifying actions and responses to activity
The discussion will cover IP address classes and their relevance to identified situations
Note: students are not expected to discuss IP6 in any depth. Identifying IP6 and the reasons IP6 is required is sufficient.The discussion will typically cover the consequences of the following errors in IP addresses:
The student will describe the access control method that is used in an Ethernet architecture and discuss how this access control method manages the Ethernet traffic on a LAN
E.g. CSMA/CD (Carrier Sense Multiple Access / Collision Detection) is the protocol used inEthernet networks to ensure that only one network node is transmitting on the network wire at any one time.
In the discussion the student would use the terms:
The student will discuss how collisions occur in CSMA/CD and how they are managed with the CSMA/CD protocol.
This discussion will refer to the terms
The examples above relate to only part of what is required, and are indicative only.