You are on page 1of 4

COLLEGE OF COMPUTER STUDIES AND MULTIMEDIA ARTS

CCS0001L
(INTRODUCTION TO COMPUTING)

EXERCISE

8
Network Devices

Student Name / Group Christian Jacob D. Suntay


Name:

Name Role
Members (if Group):

TS03
Section:
Dr. Angelo Arguson
Professor:
I. PROGRAM OUTCOME/S (PO) ADDRESSED BY THE LABORATORY EXERCISE
● Apply knowledge through the use of current techniques and tools necessary for the IT profession [PO: I]
● Understand best practices and standards and their applications. [PO: M]

II. COURSE LEARNING OUTCOME/S (CLO) ADDRESSED BY THE LABORATORY EXERCISE


● To identify computing resources and technologies and understand their capabilities and limitations.
[CLO: 2]
● To select and use appropriate techniques and modern computing tools for computing activities. [CLO: 3]

III. INTENDED LEARNING OUTCOME/S (ILO) OF THE LABORATORY EXERCISE

At the end of this exercise, students must be able to:


● Identify various networking devices
● Use to describe the differences of each devices.

IV. BACKGROUND INFORMATION


Networks are more than computers and wiring. There also have to be specific devices—specialized pieces of
hardware—that handle electrical/digital connections and perform their unique roles efficiently.

V. LABORATORY ACTIVITY
A. Research about different devices that can be found inside a school networking laboratory room.

B. Name the different devices and define the purpose of each.

1. Computers/Workstations:
- Purpose: These devices serve the purpose of executing networking software, conducting
simulations, and engaging in practical exercises. Students utilize them for the configuration and
management of various network devices.

2. Servers:
- Purpose: Servers play host to a range of services and applications. Within a networking laboratory,
their utilization revolves around instructing server management, configuration, and the deployment of
applications reliant on server infrastructure.

3. Routers:
- Purpose: Routers guide the flow of network traffic among distinct networks. Within a laboratory
context, their application involves instructing on routing protocols, IP addressing, and the fundamental
principles of connecting networks.

CCS0001L – Introduction to Computing Page 2 of 4


4. Switches:
- Purpose: Switches are employed to establish local area networks (LANs) by linking devices within
a shared network. They are crucial for instructing the configuration and management of switches.

5. Firewalls:
- Purpose: Firewalls serve as security mechanisms that oversee and regulate both inbound and
outbound network traffic. Within a networking laboratory, their purpose extends to instructing network
security principles and the configuration of firewalls.

6. Access Points:
- Purpose: Access points facilitate wireless communication within a network. In a laboratory setting,
they are utilized for practical learning in the configuration and security measures of wireless networks.

7. Networking Cables and Connectors:


- Purpose: Cables such as Ethernet and fiber optic, along with connectors, serve the purpose of
establishing physical connections between network devices. This encompasses hands-on activities related
to cabling and connecting devices.

8. Network Adapters:
- Purpose: Network adapters, also known as network interface cards (NICs), facilitate the connection
of computers and servers to a network. They play a crucial role in enabling communication across the
network.

9. Network Analyzers:
- Purpose: Network adapters, also known as network interface cards (NICs), facilitate the connection
of computers and servers to a network. They play a crucial role in enabling communication across the
network.

10. Virtualization Servers:


- Purpose: These servers operate virtualization software, enabling the formation of virtual networks
and simulations. Their purpose lies in educating students about network virtualization concepts.

11. Lab Management Software:


- Purpose: Lab management software assists in the setup and administration of the networking
laboratory environment. It encompasses tools for creating exercises, overseeing resources, and tracking
student advancements.

12. Documentation and Reference Materials:


- Purpose: Documents, manuals, and reference materials furnish students with information and
direction. This encompasses materials such as network diagrams, configuration guides, and pertinent
literature.

13. Security Devices:

CCS0001L – Introduction to Computing Page 3 of 4


- Purpose: Security devices like intrusion detection systems or security appliances are employed for
instructing network security principles and methodologies.

14. VoIP Phones


- Purpose: VoIP phones, utilized in the context of instruction, are employed to educate on voice
communication over IP networks, encompassing the establishment and configuration of VoIP systems.

15. Unified Threat Management (UTM) Devices:


- Purpose: Unified Threat Management (UTM) devices consolidate various security functionalities,
such as firewall, antivirus, and intrusion prevention, within a singular appliance. This offers
all-encompassing threat management within a network.

16. Networking Prototyping Boards:


- Purpose: Prototyping boards serve as platforms for engaging in practical hardware and networking
projects, enabling students to construct and experiment with tangible circuits and configurations.

Together, these devices offer students a practical and thorough comprehension of networking principles
and their real-world applications.

VI. REFERENCES
● Docter, Q., Dulaney, E., & Skandier, T. (2016). CompTIA + Complete Study Guide (3rd Edition)
● Meyers, M. (2016). All In One CompTIA A+ Certification. Mc Graw Hill.
● Pearson. (2016). Introduction to Computers and Information Technology. Upper Saddle River, NJ: Pearson.
● Tavani, H. T. (2016). Ethics and Technology. Wiley.
● White, R. (2015). How Computer Work: The Evolution of Technology. IN: Que.

CCS0001L – Introduction to Computing Page 4 of 4

You might also like