TVE 12- CSS 1ST SEMESTER FINALS MODULE 4 (FERNANDEZ) PDF

Summary

This module is on Computer Systems Servicing, specifically focusing on OSI Layers. It contains introductory messages, learning objectives, and questions related to computer networking concepts.

Full Transcript

12 Quarter 2 Module 4 OSI LAYERS Republic Act 8293, section 176 states that: No copyright shall subsist in any work of the Government of the Philippines. However, prior approval of the government agency or office wherein the work is created shall be necessary for exploitation of such wo...

12 Quarter 2 Module 4 OSI LAYERS Republic Act 8293, section 176 states that: No copyright shall subsist in any work of the Government of the Philippines. However, prior approval of the government agency or office wherein the work is created shall be necessary for exploitation of such work for profit. Such agency or office may, among other things, impose as a condition the payment of royalties. Borrowed materials (i.e., pictures, photos, brand names, trademarks, etc.) included in this module are owned by their respective copyright holders. Every effort has been exerted to locate and seek permission to use these materials from their respective copyright owners. The publisher and authors do not represent nor claim ownership over them. Published by the Department of Education Secretary: Leonor Magtolis Briones Undersecretary: Diosdado M. San Antonio INTRODUCTORY MESSAGE Welcome to the TECHNICAL VOCATIONAL LIVELIHOOD 12 Alternative Delivery Mode (ADM) Module on (CSS) COMPUTER SYSTEMS SERVICING NC II. This module was designed and developed to assist, in helping the learners meet the standards set by the K to 12 Curriculum while overcoming their personal, social, and economic constraints in schooling. This learning resource hopes to engage the learners into guided and independent learning activities at their own pace and time. Furthermore, this also aims to help learners acquire the needed 21st century skills while taking into consideration their needs and circumstances. In addition to the material in the main text, you will also see this box in the body of the module: For the learner: Welcome to the TECHNICAL VOCATIONAL LIVELIHOOD 12 Alternative Delivery Mode (ADM) Module on (CSS) COMPUTER SYSTEMS SERVICING NC II. The hand is one of the most symbolized part of the human body. It is often used to depict skill, action and purpose. Through our hands we may learn, create and accomplish. Hence, the hand in this learning resource signifies that you as a learner is capable and empowered to successfully achieve the relevant competencies and skills at your own pace and time. Your academic success lies in your own hands! This module was designed to provide you with fun and meaningful opportunities for guided and independent learning at your own pace and time. You will be enabled to process the contents of the learning resource while being an active learner. The following are some reminders in using this module: 1. Use the module with care. Do not put unnecessary mark/s on any part of the module. Use a separate sheet of paper in answering the exercises. 2. Do not forget to answer What I Know before moving on to the other activities included in the module. 3. Read the instruction carefully before doing each task. 4. Observe honesty and integrity in doing the tasks and checking your answers. 5. Finish the task at hand before proceeding to the next. 6. Return this module to your teacher/facilitator once you are through with it. If you encounter any difficulty in answering the tasks in this module, do not hesitate to consult your teacher or facilitator. Always bear in mind that you are not alone. We hope that through this material, you will experience meaningful learning and gain deep understanding of the relevant competencies. You can do it! What I Need to Know INTRODUCTION / LEARNING OBJECTIVES In this module you will learn how to identify OSI layers, enumerate and explain different OSI layer. You will also identify the different types of modular box and how to configure it. All People Seem to Need Data Processing is not only a fact of life, it’s also a reminder to help computer network technicians remember the OSI model and help isolate problems when troubleshooting networks. [ What I Know Now, to start with this module, let us determine how much you already know about selecting OSI layers. Multiple Choice 1. It is the user interface that internet users interact with to send or receive data through email, online games, peer to peer file transfer, and other applications. a. Application layer c. Presentation layer b. Data link layer d. Network layer 2. It establishes a “mechanism for opening, closing and managing a session between end-user application processes and responses”. a. Application layer c. Presentation layer b. Data link layer d. Session layer 3. One device transmits at a time until all the information has been completely sent. a. single mode c. full-duplex mode b. half duplex mode d. half and full duplex mode 1 4. It seeks for the best-known path to route information to reach its destination similar to searching for an address on a GPS. a. Application layer c. Presentation layer b. Data link layer d. Network layer 5. When the device can transmit and receive information simultaneously, such as in phone conversation. a. single mode c. full-duplex mode b. half duplex mode d. half and full duplex mode 6. NOT only defines how data is sent, but also provides validation and firewall security. a. Application layer c. Presentation layer b. Transport layer d. Network layer 7. It is layer that ensures that a transmission occurs without any errors. a. Application layer c. Presentation layer b. Data link layer d. Network layer 8. It is also known as the physical address of a computer 48-bit address burnt onto the network interface card (NIC). a. MAC Address c. TCP/IP b. IP address d. HTTP 9. It consists of the physical components in a Local Area Network (LAN) such as networking hardware and Ethernet cables. a. Application layer c. Presentation layer b. Data link layer d. Network layer 10. Is an abstract description for layered communications and computer network protocol design. a. Open System Interconnection b. Operating System Interconnection c. Open System Interconnect d. Open Systematized Interconnection 2 What’s New Direction: True or False. Read each statement below and answer true or false. Write your answers in a separate sheet of paper. ______ 1. There are (7) seven layers of OSI model. ______ 2. OSI model utilizes the TCP/IP protocol. ______ 3. Network layer defines how data is sent, but also provides validation and firewall security. ______ 4. Transport layer seeks for the best-known path to route information to reach its destination similar to searching for an address on a GPS. ______ 5. Physical layer ensures that a transmission occurs without any errors. What is It OSI LAYERS LEARNING OBJECTIVES After reading this INFORMATION SHEET, STUDENT(S) MUST be able to: 1. Identify OSI layers 2. Enumerate and explain different OSI layers. INTRODUCTION All People Seem to Need Data Processing is not only a fact of life, it’s also a reminder to help computer network technicians remember the OSI model and help isolate problems when troubleshooting networks. Even though the OSI model utilizes the TCP/IP protocol, the model was originally designed by the Open Systems Interconnection group to promote the OSI 3 protocol in its attempt to create a standardized network architecture for network communications. Unfortunately, though the OSI protocol supported more virtual addresses, its complexity made the TCP/IP protocol the more popular choice among network technicians. Ironically, the simplicity of the TCP/IP protocol has led to IPv4 address exhaustion and its newer IPv6 protocol very much resembles the original OSI protocol in complexity. The Open System Interconnection Reference Model (OSI Reference Model or OSI Model) is an abstract description for layered communications and computer network protocol design. It was developed as part of the Open Systems Interconnection (OSI) initiative. In its most basic form, it divides network architecture into seven layers which, from top to bottom, are the Application, Presentation, Session, Transport, Network, Data-Link, and Physical Layers. It is therefore often referred to as the OSI Seven Layer Model. APPLICATION LAYER The application layer is the user interface that internet users interact with to send or receive data through email, online games, peer to peer file transfer, and other applications. Clicking on a link on an internet browser is akin to a customer dialing on their phone to order a pizza. Common protocols associated with the application layer: Hypertext Transfer Protocol (TTP), Hypertext Transfer Protocol Secure (HTTPS), Telnet, Secure Shell (SSH), File Transfer Protocol (FTP), Trivial File Transfer Protocol (TFTP), Simple Mail Transfer Protocol (SMTP), Post Office Protocol 3 (POP3), Dynamic Host Configuration Protocol (DHCP), Domain Name System (DNS), Network Time Protocol (NTP). 4 PRESENTATION LAYER The presentation layer translates the commands received from the application layer into universal, well-known networking formats. Think of the presentation layer as a more effective version of Google Translate but for networks. This is the layer where data encryption and character set conversion occur. Common protocols: Joint Photographic Experts Group (JPEG), Graphics Interchange Format (GIF),(Tagged Image Format File (TIFF), Moving Picture Experts Group (MPEG), American Standards Code for Information Interchange [ASCII], Extended Binary Coded Decimal Interchange Code [EBCDIC], Secure Sockets Layer (SSL), HyperText Transfer Protocol (HTTP), HyperText MarkUp Language (HTML), File Transfer Protocol (FTP) AppleTalk Filing Protocols, JAVA. SESSION LAYER This layer can be compared to making a phone call and having the other person pick up the phone. Without another party on the line, no food-related or network- related conversation would occur. 5 TRANSPORT LAYER The transport layer not only defines how data is sent, but also provides validation and firewall security.. You can think of the transport layer as quality control. Suspicious packets will not make it past a firewall. Similarly, suspicious looking pizzas will not go out for delivery. Other Functions: Flow control Error detection 6 Correction Common protocols: Transmission Control Protocol (TCP), User Datagram Protocol (UDP), Sequenced Packet Exchange (SPX), Name-Binding Protocol (NBP) NETWORK LAYER The network layer seeks for the best-known path to route information to reach its destination like searching for an address on a GPS. In the same way that the network layer determines the best way to route information, our pizza delivery person will rely on a GPS to map out a customer’s location. DATA LINK LAYER The Data Link Layer ensures that a transmission occurs without any errors. The Data Link Layer consists of two sub-layers, Logical Link Control (LLC) and the Media Access Control (MAC), that ensure a successful transmission across different mediums. 7 One of the major functions of the data link layer is to provide a physical MAC address so that requested information can find its destination. Without a physical address, our pizza delivery man would not be able to complete his delivery. Preparing network layer packets for delivery Common protocols: Ethernet, Token Ring, Fiber Distributed Data Interface (FDDI), and Point-to-Point Protocol (PPP), Frame Relay, and Carrier Sense Multiple Access/Collision Detect (CSMA/CD) PHYSICAL LAYER The physical layer consists of the physical components in a Local Area Network (LAN) such as networking hardware and Ethernet cables. Cabling issues in the 8 physical layer sometimes emerge due to the wrong types of cables (straight through vs. cross over cables) used or faulty cables. The physical layer comprises of the physical hardware components in a network. In this final step, our now starving customer will receive her delivery. Common protocols: Fast Ethernet, RS232, and ATM MODULAR BOX (Ethernet) 9 Modular Jack & Plug This type of connector is designed to make secure and reliable input/output connections. Many of our modular jacks and plugs offer a unique locking system that prevents both mis-mating and accidental unplugging resulting from shock and vibration. Shielded and unshielded plugs are manufactured in a compact, one-piece construction, with preloaded contacts, providing a space-saving, quick-to-install solution offering increased design flexibility. These connectors are used in many different applications, including data communications, consumer devices and industrial. MODULAR JACK CONFIGURATION Step 1. Strip approximately 1.5 inches of jacket from the twisted pair cable. 10 Step 2. Separate the twisted wire pairs from each other, then untwist each pair from each pair. Straighten wire ends out as much as possible. Step 3. Remove the protective cap of the modular jack. Step 4. Once the has been removed, you’ll notice that there is wire configurations printed near the termination slots. If you are given a choice between A and B configurations it simply pertains to T68A and T568B configuration. Choose whichever color configuration you’d like to use, just be sure to remember the configuration. Step 5. Use punch down tool to attach the twisted-pair firmly in your modular jack. Step 6. Attach the modular box on the rear port (110 type insulation displacement contacts) of patch panel. Step 7. Test the configuration. 11 What’s More TERMS AND DEFINITIONS Application layer is the user interface that internet users interact with to send or receive data through email, online games, peer to peer file transfer, and other applications. Presentation layer translates the commands received from the application layer into universal, well-known networking formats Session Layer -In order for a packet to reach its destination, the session layer establishes a “mechanism for opening, closing and managing a session between end- user application processes and responses”. Transport layer not only defines how data is sent, but also provides validation and firewall security. Network layer seeks for the best-known path to route information to reach its destination similar to searching for an address on a GPS. Data Link Layer ensures that a transmission occurs without any errors. Physical layer consists of the physical components in a Local Area Network (LAN) such as networking hardware and Ethernet cables. Modular box -It is a surface mounted box used in a commercial and industrial building to cleanly attach network cables. 12 Assessment Definition of Terms Direction: Read each line and select the best answer found in the Word bank for each question. Write the letter and words of your answer on a separate sheet of paper. WORD BANK Modular box Network layer Data link layer Physical layer Presentation layer Application Layer Session Layer Transport Modular Jack Single Mode Half Duplex Mode Full Duplex HTTPS OSI Model Logical Addressing 1. It is a surface mounted box used in a commercial and industrial building to cleanly attach network cables. 2. It seeks for the best-known path to route information to reach its destination similar to searching for an address on a GPS. 3. This ensures that a transmission occurs without any errors. 4. It consists of the physical components in a Local Area Network (LAN) such as networking hardware and Ethernet cables. 5. This layer translates the commands received from the application layer into universal, well-known networking formats 6. It is the user interface that internet users interact with to send or receive data through email, online games, peer to peer file transfer, and other applications. 7. This layer establishes a “mechanism for opening, closing and managing a session between end-user application processes and responses” in order for a packet to reach its destination. 8. This OSI layer defines how data is sent, but also provides validation and firewall security. 13 9. This type of connector is designed to make secure and reliable input/output connections. 10. It will transmit at a time until all the information has been completely sent. 11. Device that takes turns transmitting such as occurs when speaking through walkie talkies. 12. This is used when the device can transmit and receive information simultaneously. 13. It is an example of common protocols associated with the application layer. 14. An abstract description for layered communications and computer network protocol design. 15. These virtual IP addressing help packets navigate a network to reach their destination using IPv4 or IPv6 protocols. REFERENCE BALANA I.M., OSI Layers, viewed 9 December 2020 https://www.golurn.com/COC2_LO2/content/#/lessons/6ycP0g3DPsQjt8VsPyfI8I04aj Bbtytz https://www.golurn.com/COC2_LO1/content/#/lessons/qr-5H7hs8F4J- Lt79_3Jd7lUQMCmJXgV 14

Use Quizgecko on...
Browser
Browser