Differences
This shows you the differences between two versions of the page.
Both sides previous revision Previous revision | |||
networking [2024/09/03 13:54] – [Module UFCFDU-30-1 Level 4 30 credits] samuel | networking [2025/02/10 15:36] (current) – dan | ||
---|---|---|---|
Line 6: | Line 6: | ||
{{: | {{: | ||
- | |||
==== Overview ==== | ==== Overview ==== | ||
- | The aim of this unit is to provide apprentices with knowledge of computer networking essentials, how they operate, protocols, standards, security considerations and a range of networking technologies. | + | The aim of this unit is to provide apprentices with knowledge of computer networking essentials, how they operate, protocols, standards, security considerations and a range of networking technologies. |
- | It gives the apprentices the knowledge and skills that they need for the planning, designing, implementation and management of computer networks and understanding of the network infrastructure capabilities and limitations. | + | It gives the apprentices the knowledge and skills that they need for the planning, designing, implementation and management of computer networks and understanding of the network infrastructure capabilities and limitations. |
You will cover: | You will cover: | ||
- | + | | |
- | | + | * fundamental building blocks (e.g. routers, switches, hubs, storage, transmission) and typical architectures (e.g. server/ |
- | *fundamental building blocks (e.g. routers, switches, hubs, storage, transmission) and typical architectures (e.g. server/ | + | * data and protocols and how they relate to each other |
- | *data and protocols and how they relate to each other | + | * data formats and simple protocols in current use |
- | *data formats and simple protocols in current use | + | * failure modes in protocols |
- | *failure modes in protocols | + | * error control |
- | *error control | + | * network protocols in widespread use on the Internet and their purpose and relationship to each other, including the physical and data link layer – e.g., HTTP, SMTP, SNMP, TCP/IP, BGP, DNS, etc |
- | *network protocols in widespread use on the Internet and their purpose and relationship to each other, including the physical and data link layer – e.g., HTTP, SMTP, SNMP, TCP/IP, BGP, DNS, etc | + | * network performance |
- | *network performance | + | * virtualisation techniques |
- | *virtualisation techniques | + | * network monitoring and mapping |
- | *network monitoring and mapping | + | * static and dynamic routing protocols |
- | *static and dynamic routing protocols | + | * wireless network security |
- | *wireless network security | + | * common types of security hardware and software which are used to protect systems e.g., firewalls, encryption for data at rest, encryption for communication, |
- | *common types of security hardware and software which are used to protect systems e.g., firewalls, encryption for data at rest, encryption for communication, | + | * how these may be used to deliver risk mitigation or implement a security case |
- | *how these may be used to deliver risk mitigation or implement a security case | + | * benefits/ |
- | *benefits/ | + | * considering the implicit assurance (including supplier assurance and considering the benefits and risks of open source options) of the component |
- | *considering the implicit assurance (including supplier assurance and considering the benefits and risks of open source options) of the component | + | * residual risks |
- | *residual risks | + | |
=== Delivery === | === Delivery === | ||
All resources can be found on blackboard. | All resources can be found on blackboard. | ||
+ | |||
==== Assignment Brief ==== | ==== Assignment Brief ==== | ||
Line 44: | Line 43: | ||
=== Component A Presentation (30 minutes) === | === Component A Presentation (30 minutes) === | ||
- | Issued: | + | Issued: |
- | Due: Start of block release week 3 | + | Due: A week after block release week 2 |
Apprentices will be given a design requirement (including security) for a network along with an implementation. In the presentation they will: | Apprentices will be given a design requirement (including security) for a network along with an implementation. In the presentation they will: | ||
- | *Explain how the given implementation and components function | + | |
- | | + | |
- | | + | * Explain how the given implementation meets, or does meet, the design requirement |
+ | * Propose changes to the given implementation to take account of scalability | ||
=== Component B Practical Report (3,000 words) === | === Component B Practical Report (3,000 words) === | ||
- | Issued: | + | Issued: |
Due: Start of block release week 1 of next module | Due: Start of block release week 1 of next module | ||
- | Apprentices will build a network to a given specification. They will write a report detailing the selection of components, system configuration, | + | Apprentices will build a network to a given specification. They will write a report detailing the selection of components, system configuration, |
==== Submission details ==== | ==== Submission details ==== | ||
- | All assignments will be submitted and feedback given on the UWE Blackboard system | + | All assignments will be submitted and feedback given on the UWE Blackboard system |
==== Reading list (link to UWE library) ==== | ==== Reading list (link to UWE library) ==== | ||
Line 72: | Line 71: | ||
==== Communication ==== | ==== Communication ==== | ||
- | All questions about this module should be directed to the module leader. | + | All questions about this module should be directed to the module leader. |
Please contact via email, which is monitored continuously | Please contact via email, which is monitored continuously | ||
- | |||