Module 8 Page 18-33
Module 8 Page 18-33
COMPETENCY-BASED
LEARNING MATERIALS
Sector:
Module Title:
Learning Objectives:
After reading this INFORMATION SHEET, YOU MUST be able to:
1. Learn the Network Occupation Health and Safety
2. Learn the Network 5s Principles
Before installing network cables we must practice Network OHS & 5s
Principles to ensure our safety during the training.
Manufacturing companies are all familiar with the 5S methodology to organize the
workspace for efficiency and effectiveness. 5S is the name of a workplace organization
method that uses a list of five Japanese words: seiri, seiton, seiso, seiketsu,
and shitsuke. Amazingly, transliterated or translated into English, they all
start with the letter S: sort, set, shine, standardize, sustain. (Credit goes to
Hiroyuki Hirano and his overall approach to production systems)
The obvious benefit of 5S methodology is improved productivity. This methodology
can be applied to any workplace – and for our purpose we can
discuss it to improve your Computer Network environment. Organizing the
hardware and software used in your environment, identifying and running the items
used, maintaining the equipment, and sustaining the new order through
standardization, which builds understanding among employees of how they should best
utilize the computer network – including hardware, software and business applications
in the cloud – to be most productive at work. Let’s review.
1. Sort
Sorting helps you to use a red tag method that will get rid of all the different
processes or items that you don’t need. Throughout the years, your organization may
have acquired software and hardware that may be either used partially, or not used at
all. I bet you have some old boxes and bundles of cables and trinkets that you don’t
know what to do with. Some of them you probably don’t even know what they are for!
This is also a good time to do an inventory of your software, to make sure that all of your
copies are licensed and up-to-date. Perhaps you can donate your old or unused
computers, or discard old and broken gadgets and network-related equipment. Don’t
forget to comply with your local laws about e- waste! Check these resources for more on
e-cycling and electronic waste:
EcoSquid is a web search platform that helps consumers identifies the best
options to resell, recycle, or donate new and used electronics.
Earth 911 has taken environmental hotlines, web sites and other information
sources nationwide, and consolidated them into one network where you can find
community-specific information on e-Cycling and much more.
Electronic Industries Alliance’s Consumer Education Initiative helps you find reuse,
recycling and donation programs for electronics products in your state; here is the link
to their page specific to e-Cycling in New Jersey)
TechSoup provides resources for those who would like to donate hardware, those
who would like to acquire recycled hardware, and refurbishes.
Evaluate your legacy systems to have full understanding of what is going to go now.
Take steps to remove these items from your location. Sorting will de-clutter and free up
space that your organization will need to move on to the next step – Set.
2. Set
Now that you have a better understanding of what you have, and what you need –
and let’s not forget some free space, you can move on to the next aspect of
5 S method: set everything in order. During this step you will make sure to lay out your
computer network in most efficient way, and make sure that your employees have a
proper workplace that allows them to be productive within your network: make sure that
if new equipment, software or license is required, it is acquired. Don’t be an
unintentional software pirate! Make sure that your offices are properly wired, and your
necessary items such as printers, scanners, etc. at a reachable distance and can be
easily accessed. So, set things in order – and then shine!
3. Shine
Once you have the workplace sorted and set, it’s time to put some shine on. What
are you doing to make sure your network is neat and clean? The third step, shine, is
crucial to the 5 S methods. Teach your workforce the importance of maintaining and
cleaning the equipment and data for a great impact on the way your business operates.
Shine also helps the equipment to last longer as you aren’t neglecting it and allowing it
to get cluttered or dusty. In addition to prolonging the lifespan of your equipment,
keeping things right is also healthy for your employees. This page from OSHA –
Ergonomic Solutions for Occupational Safety is a great resource for
recommended workspace standards. Any environment can benefit from equipment
that is ergonomic – there is plethora of items such as monitors, keyboards, mice, office
chairs, etc. that are designed to keep your employees comfortable while on the job.
When they perform their jobs better, your business is doing better. To propel your
success even further, move on to the next step – standardize.
4. Standardize
One of the most important things you can do for your business is to standardize
the equipment and processes within your computer network. New procedures, once
vetted, should be properly documented and made standard. It will ensure that large
orders and other processes would flow easily, especially if you are looking to expand
your business. When you have your equipment documented, and when procedures
become part of the employee manual, your organization will benefit from improved
operations. You can easily use standard procedures for cross-training of your
employees, or bringing new hires on board. In addition, many platforms and solutions
now come with options to migrate data
one to another, and having a standardized setup makes things like data migrations,
equipment and software updates a breeze.
With standards in mind keep an eye on the new trend – Bring Your Own Device (BYOD).
Users are shifting away from corporate issued devices, such as Blackberry smart
phones, to devices they feel more comfortable with, such as iOS or Android based
platforms. If not all of your equipment is standard, processes still should be. Keep
computer network security and efficiency in mind when considering BYOD for your
organization.
5. Sustain
Your final step, sustain, is the hardest – not falling back into old habits is not
easy. It is even more difficult if you don’t have a full-time IT staff on board to perform
tech support and maintenance. Left unmonitored, your data, your network and
computer equipment and devices may get compromised and bring you to a gradual
decline back to the old ways. It may affect your business directly by having your
business data and environment vulnerable. It turns, it will leave employees idle and
impacting your ability to do business, costing you evens more through the loss of
productivity, revenue, or reputation.
Managed Services allows you to maintain and review standards through practice of
outsourcing day-to-day IT management and Computer Network Tech Support as a cost-
effective method for improving business operations. Boost performance, tighten security,
and extend the life of your IT assets. Many IT companies provide Managed services. If
your business is in New Jersey or New York, give us a call at 201-493-1414 to discuss
the benefits of Managed IT Services for your business.
Self-check CO2.1-3
Write T if the answer is True and write F if the answer is False.
4. Always wear personal protective equipments (PPE) like coverall, shoes with
rubber sole, anti-static wrist strap, etc.
5. Ask for assistance from your trainer when it comes on dealing with tools &
equipments.
1.
2.
3.
4.
5.
Answer-key CO2.1-3
TRUE OR FALSE
1. T
2. F
3. T
4. T
5. T
6. T
7. T
ENUMERATION
1. Sort
2. Set
3. Shine
4. Standardize
5. Sustain
Information Sheets CO2.1-4
“Network Tools, Equipment, Materials & Testing Devices”
Learning Objectives:
After reading this INFORMATION SHEET, YOU MUST be able to:
1. Learn Different Networking tools, materials & testing devices.
2. Familiarize Different Networking tools, equipment, materials & testing
devices.
Before installing network cables we must know the different Networking
tools, materials, equipments & testing devices that we will use during the training.
Network Tools
Crimping tool
- A crimping tool is a tool designed to crimp or
connect a connector to the end of a cable. For
example, network cables and phone cables are
created using a crimping tool to connect
the RJ-45 and RJ-11 connectors to the end of
the cable. In the example picture below, this
crimper is capable of crimping a RJ-11 (6-Pin)
and RJ-45 (8-Pin) connectors and also includes
a wire cutter near the handles that can be used
to cut phone or CAT5 cable.
Wire stripper
- A tool designed to remove the protective
covering off of a cable to expose the inner wires.
Because different wires come in different
shapes, there are dozens of different wire
strippers available. The picture shows an
example of a wire stripper, which strips a cable
by placing the cable in-between the blade and
one of the ridges and then spun around the cable until the jacket can be
pulled off.
Electric Hand Drill with Drill bit
- Is a tool fitted with a cutting tool attachment or driving tool attachment,
usually a drill bit or driver bit, used for boring holes in various materials
or fastening various materials together with the use of fasteners. The
attachment is gripped by a chuck at one end of the drill and rotated
Page 25while
of 118
pressed against the target material. The tip, and sometimes edges, of the
cutting tool does the work of cutting into the target material. This may be
slicing off thin shavings (twist drills or auger bits), grinding off small
particles (oil drilling), crushing and removing pieces of the work piece (SDS
masonry drill), countersinking, counter boring, or other operations.
Drills are commonly used in woodworking, metalworking, construction
and do-it-yourself projects. Specially designed drills are also used in
medicine, space missions and other applications. Drills are available with a
wide variety of performance characteristics, such as power and capacity.
Network Equipments
Patch panel
- A patch panel, patch bay, patch
field or jack field is a device or unit
featuring a number of jacks, usually
of the same or similar type, for the
use of connecting and
routing circuits for monitoring,
interconnecting, and testing circuits
in a convenient, flexible manner. Patch panels are commonly used
in computer networking, recording studios, and radio and television.
Network Hub
- When referring to a network, a hub is the
most basic networking device that
connects multiple computers or other
network devices together. Unlike a
network switch or router, a network hub
has no routing tables or intelligence on
where to send information and broadcasts all network data across each
connection. Most hubs can detect basic network errors such as collisions,
but having all information broadcast to multiple ports can be a security risk
Page 26 of 118
and cause bottlenecks. In the past network hubs were popular because they
were much cheaper than a switch and router, but today most switches do
not cost much more than a hub and are a much better solution for any
network.
- In general, a hub refers to a hardware device that enables multiple devices
or connections to be connected to a computer. Another example besides the
one given above is a USB hub, which allows dozens of to be connected to
one computer, even though that computer may only have a few USB
connections. The picture is an example of a USB hub.
Network Switch
- A network switch (also called switching
hub, bridging hub, officially MAC
Bridge) is a computer networking
device that connects devices together on
a computer network, by using packet
switching to receive, process and
forward data to the destination device.
Unlike less advanced network hubs, a network switch forwards data only to
one or multiple devices that need to receive it, rather than broadcasting the
same data out of each of its ports.
Managed switches
- Give you more control over your LAN
traffic and offer advanced features to
control that traffic. An
unmanaged switch simply allows
Ethernet devices to communicate with
one another, such as a PC or network
printer, and those are typically what we call “plug and play.”
Page 27 of
118
Page 28 of
118
Network Controller/Network Interface Card
Network Materials
RJ 45
- Short for Registered Jack-45, an eight-wire
connector used commonly to connect computers
onto local-area networks (LAN), especially
Ethernets. RJ-45 connectors look similar to the
ubiquitous RJ-11 connectors used for connecting
telephone equipment, but they are somewhat wider.
Modular Box
- Use to in a large building, usually place on the wall to
connect telephone lines or network cable easily.
Page 29 of 118
Raceway
- A raceway (sometimes referred to as a raceway
system) is an enclosed conduit that forms a
physical pathway for electrical wiring. Raceways
protect wires and cables from heat, humidity,
corrosion, water intrusion and general physical
threats.
UTP Cable
- Unshielded Twisted Pair cable is most certainly by
far the most popular cable around the world. UTP
cable is used not only for networking but also for
the traditional telephone.
Protective eyewear
- is protective gear for the eyes, which comes in many
types depending upon the threat that is to be
reduced. The threats can be particles, light, wind
blast, heat, sea spray or some type
of ball or puck used in sports.
Page 30 of 118
Gloves
- A glove (Middle English from Old English gloves)
is a garment covering the whole hand. Gloves have
separate sheaths or openings for each finger
and
the thumb; if there is an opening but no covering sheath
for each finger they are called "fingerless gloves".
Fingerless gloves have one large opening rather than
individual openings for each finger are sometimes called gauntlets. Gloves
which cover the entire hand or fist but do not have separate finger
openings or sheaths are called mittens. Mittens are warmer than gloves
made of the same material because fingers maintain their warmth better
when they are in contact with each other.
Reduced surface area reduces heat loss.
Working clothes
- is clothing worn for work, especially work that
involves manual labour. Often those employed
within trade industries elect to be outfitted in
workwear because it is built to provide
durability and safety.
Page 32 of
118
Self-Check CO2.1-4
Identification:
1. Is a tool designed to crimp or connect a connector to the end of a
cable?
2. A tool designed to remove the protective covering off of a cable to
expose the inner wires.
3. Is a device or unit featuring a number of jacks, usually of the
same or similar type, for the use of connecting and routing circuits for monitoring,
interconnecting, and testing circuits in a convenient, flexible manner?
4. Is a computer networking device that connects devices together
on a computer network, by using packet switching to receive, process and forward
data to the destination device.
5. It is used to provide access to the Internet or a private computer
network.
6. Is a device that is used to test the strength and connectivity of a
particular type of cable or other wired assemblies.
7. Is an eight-wire connector used commonly to connect computers
onto local-area networks (LAN), especially Ethernets.
8. Is an enclosed conduit that forms a physical pathway for
electrical wiring.
9. Is used not only for networking but also for the traditional
telephone.
10. Is protective gear for the eyes, which comes in many types
depending upon the threat that is to be reduced.
Page 33 of
118
Answer-Key CO2.1-4
1. Crimping Tool
2. Wire Stripper
3. Patch Panel
4. Network Switch
5. Wireless Router
6. Lan/Cable Tester
7. RJ 45
8. Raceway
9. UTP Cable