English For Skills 2 PDF
English For Skills 2 PDF
English For Skills 2 PDF
SW 2013
Except for the quotations of short passages for the purpose of criticism and
review, NO part of this publication may be reproduced, stored in a retrieval
system, or transmitted, in any form or by any means, electronic, mechanical,
photocopying, recording or otherwise, without the prior written permission of
the British Council Albania Office .
INTRODUCTION
English Language is a vital part of our work in British Council; British Council delivers it
throughout different initiatives and collaborations with local and international partners.
English language acquisition and Vocational Education and Training, ICT remain
the main priorities of Ministry of Education and Science in Albania and also British
Council Albania. Each of them aims at a better Education system and compatible with
European standards.
The product of the second phase “English for Skills 2” is planned as a revised practical
format of the curricula for students of grade XIII of Vocational Highs Schools, ICT
branch. The “English for Skills 2” introduced new aspects in the field of linguistic
objectives and in the field of IT.
• The ability of our experts to work with the same pace and professionalism with
international experts to improve language learning and bringing it closer to
the requirements of market economy.
• A further communication between the ICT specialists and the English teachers
in order to prepare students for the world of work.
Daniela Nuredini Tatjana Vuçani
Program Manager Project coordinator
British Council Ministry of Education and Science
English for Skills Course Outline 18 Weeks SW 2013
Acknowledgements
British Council Albania would like to thank all institutional partners including
Ministry of Education and Science and the Westminster Kingsway College who
have helped and contribute to put together this Methodological Kit for teachers
of English in ICT Vocational Schools and the Working Group from Albania and
United Kingdom.
Working Group:
Albania
Daniela Nuredini British Council Programme Manager
Tatjana Vucani English Language Curricula Consultant
Dorina Rapti VET Curricula Consultant
Fozilet Simoni English Language specialist
Ludmilla Stefani English Language teacher
Ridvana Mena English Language teacher
Megi Shaba English Language teacher
Elida Mesi ICT teacher
Griselda Lushi ICT teacher
Etra Kaduku English Language teacher
United Kingdom
Simon Goodier Program Manager for English as a second Language
Melanie Rowland ESOL Lecturer
4
English for Skills Course
Course Outline
Outline 18 Weeks SW 2013
CONTENTS
1. LEARNING OBJECTIVES 6
2. PROGRAMME ENGLISH FOR SKILLS- VOCATIONAL ENGLISH WITH ICT 9
3. WEEK 1-2: COMPUTER NETWORKS (LANS,WANS&PEER-TO-PEER) 14
WHAT IS A NETWORK? DIFFERENCES BETWEEN LANs AND WANs 16
ICT VIRUSES 24
DEFINING THE PEER-TO-PEER-MODEL 27
4. WEEK 3-4:COMPUTER NETWORKS 29
DEFINING THE CLIENT –SERVER MODEL 30
5. WEEK 5-6: TOPOLOGIES OF COMPUTER NETWORKS 34
HISTORY OF NETWORK TOPOLOGIES 36
BUS TOPOLOGY 39
STAR TOPOLOGY: ADVANTAGES AND DISADVANTAGES 40
6. WEEK 7-8: TOPOLOGIES OF COMPUTER NETWORKS 43
TREE TOPOLOGY: ADVANTAGES AND DISADVANTAGES 44
RING TOPOLOGY: ADVANTAGES AND DISADVANTAGES 45
HYBRID NETWORK TOPOLOGY 48
7. WEEK 9-10: CABLE TRANSMISSION MEDIA 51
USE OF COPPER 52
TYPES OF CABLES 54
CABLE CATEGORIES 56
8. WEEK 11-12: CABLE TRANSMISSION MEDIA 59
HOW CABLE TELEVISION WORKS 60
COAXIAL CABLES 62
COAXIAL CABLE HISTORY 64
FIBER OPTIC CABLE 65
9. WEEK 13-14: ACTIVE COMPONENTS OF THE NETWORK 73
SWITCHES,HUBS AND REPEATERS 74
HISTORY OF SWITCHES 75
BRIDGES AND ROUTERS 77
ROUTERS HISTORY 78
10. WEEK 15-16: ACTIVE COMPONENTS OF THE NETWORK 80
GATEWAY 81
BILL GATES 84
NETWORK ADAPTER 86
SUCCESSFUL PEOPLE (STEVE JOBS) 88
WRITING A COVER LETTER 91
11. WEEK 17-18: ASSESSMENT 92
TEST 1 (WEEKS 1-4) 92
TEST 2 (WEEKS 5-8) 93
TEST 3 (WEEKS 9-12) 95
SUMMATIVE ASSESSMENT 98
5
English for Skills Course Outline 18 Weeks SW 2013
LEARNING OBJECTIVES
Language Objectives
The “English for Skills 2” program is planned as a revised practical format of the
curricula for students of Vocational Highs Schools, ICT branch.
At the end of the grade XIII students will be able to globally achieve the communicative
language competences at the B2 level (independent user) according to the standards
described at the Common European Framework of Reference for Languages.
Respecting students overall growth and their vocational orientation at the end of grade 13
they :
Can understand the main ideas of the complex text on both concrete and abstract
topics, including technical discussions in her/his field of specialization.
Can interact with a degree of fluency and spontaneity that makes regular interaction
with native speakers quite possible without strain for the other party.
Can produce clear, detailed text on a wide range of subjects and explain a view point
on a topical issues giving the advantages and disadvantages of various options.
The above CEF reference scale (B2) allows students to achieve the following abilities:
1. Can use the right repertoire according to the situation while communicating in a foreign
language.
2. Can apply technical means of communication as well as knowledge gained from other
learning objects\means.
3. Can use English language in specific professional environment in oral or written form.
4. Can reproduce in English what according to a given criterion is the essence of an
important professional text in English
5. Can summarize and comment in English a text of professional importance.
6. Can recognize economic, political, ecological, social and cultural facts of English-
speaking countries to the extent that concerns their every day and professional life.
7. Can present and compare the Albanian culture with English culture.
8. Can use the vocabulary or phraseology related to field of interest TIC (information
technology) related to the given situation in oral or written form.
9. Can write in English issues linked with business correspondence.
10. Can develop self-confidence, independence, and positive attitude towards the business
English being able to present and explain a product and its functions; introduce their
own business, be able to assist and solve the professional situations linked with ICT
11. Can master standard situations on the phone, write messages, transmit correctly
numbers and dates, fix appointments and provide information about products,
company, the service status.
12. Can prepare their own CV, apply for a job vacancy, have a job interview, develop
simple reports in standard English.
13. Can manage situations linked in the field of Front –Office- help-desk like the attention
and support for the client.
6
English for Skills Course Outline 18 Weeks SW 2013
GRADE XIII:
Subject: English for ICT
Topics for communication:
Technology of communication, society, culture, international relations, present situation.
Language abilities:
Deepening and extending\expand language abilities already learned paying always attention
or stressing language autonomy
Language structures:
Deepening and extending\ expand language structures.
Business Communication:
Strengthening and expanding business communications language learned so far; application in
situations related to the profession (eg job application, business trip, preparing an order forma,
making lists;); seeking expertise about complex business cases
Language strategies:
Strengthening and expanding current linguistic acquisition techniques.
Thorough communication that goes beyond individual subjects areas.
Communicating in cross curricular subject areas
Team working:
Collection and selection of materials; the importance of information; enhancing and deepening
of cross cultural skills,
Beyond subject preparation:
Preparation for international certificates; participations and project design; preparation for in
and abroad internships
ICT connection
Writing and designing texts and documents to be presented by computer. Finding, sharing
information in the intranet / internet; writing and preparing business correspondence using
computer programs; Using software programs
Assignment:
Every two to three weeks assuagement.
1. IT Objectives
Chapter I: Computer networks
Explain differences between computer networks( LAN, WAN)
Analyze peer to peer networks
Describe proper environment using peer to peer network
Explain the network client- server; advantages and disadvantages
Describe types of servers and their functions
Chapter II: Computer networking topologies
Explain the term “topology”
Describe the “topology”, and make the difference between several topologies
Describe their mixed forms
Chapter III: Media and cable transmission
Describe the STP cable
Describe the UTP cable
Analyze the physical structure of the coaxial cable
Describe the optic fibers, advantages and disadvantages
Chapter IV: Active network components
Distinguish the active components of the network
Explain their function differentiation based on OSI model
Distinguish Hubbs from switches
7
English for Skills Course Outline 18 Weeks SW 2013
8
English for Skills Course
Course Outline
Outline 18 Weeks SW 2013
Week COMPUTER Connecting Compare & Reading for Vocabulary focus: http://www. http://www.
1 NETWORKS words expressing contrast Specific Networks differenceb- bbc.co.uk/
contrast: while, Info etween.net/ learningzone/
Differences whereas, on the Whole group technology/ clips/computer-
between other hand) Explain meaning of Identifying & language focus difference- networks-lan-and-
computer specialist nouns writing topic between-lan-and- wan/
networks (LANs Specialist lexis sentences Cloze exercise wan/
& WANs) – computer Group
networks presentation on Summarizing main Comprehension: http://www.
advantages of points in text Qs & As computerworld. http://www.bbc.
Acronyms networks com/s/ co.uk/bitesize/
Supporting video article/341095/ standard/
Discourse Listening Mesh_Networks computing/
markers to for specific Matching comms_networks/
structure formal information pairs (words / http://www. lan/revision/1/
speech definitions) youtube.com/
watch?v=tYL
Small groups: U755T6_I
presentations
Week COMPUTER If-clauses to Action & effect Reading for Whole group www.techterms.
http://www.bbc.
2 NETWORKS express action specific info language focus com
co.uk/schools/
and effect Listening
gcsebitesize/
Peer-to-peer for specific Group writing Comprehension http://compnet
ict/implications/
networks & information a persuasive multiple-choice working.about.
virusesrev1.shtml
virus control poster com/od/
Supporting video basicnetw
http://www.bbc.
Summarizing orkingfaqs/
co.uk/apps/
advantages & a/peer-to-peer.
ifl/schools/
disadvantages htm
gcsebitesize/ict/
(P2P networks)
quizengine?quiz=
www.youtube.com/
viruses;templateS
Use of watch?v=
tyle=ict)
connecting c34QwtYI40g
words to express
action & effect http://news.bbc.
co.uk/1/hi/
technology/
3409187.stm
9
English for Skills Course Outline 18 Weeks SW 2013
Reading
Week COMPUTER Gerunds / Defining for specific Jigsaw reading http://www. http://youtu.be/
3 NETWORKS infinitives technical terms information functionx.com/ YJBBo0NqXyA
Comprehension networking/
Client Server Comparing / Summarizing the Qs & As Lesson06.htm http://www.teach-
Networks contrasting CSN advantages and ict.com/gcse_new/
(CSN) /P2P disadvantages Read & abstract networks/peer_
of CSN & P2P important peer/home_peer_
information (advs peer.htm
& disadvs)
Whole group:
language focus
Week
TOPOLOGIES Analyse and
5 Verb + Qs & As on Whole group www-history.mcs. http://www.
OF COM- describe data
preposition history of Language focus youtube.com/
PUTER from a diagram st-and.ac.uk/.../
combinations topology watch?v=zsN_
NETWORKS Topology_in_
Comprehension guq__Ac
Reading mathematics.html
Develop fluency Qs & As / multi-
History for specific
by participating choice http://youtu.be/an-
information
in discussion ZgJV4WvY
Identifying key
Explaining
points in text
function
and writing a
using visual
summary
representation
10
English for Skills Course Outline 18 Weeks
Course Outline SW 2013
TOPOLOGIES
Week 2nd conditional Comparing Reading Whole group ttp://www.bbc. http://youtu.be/
OF COM-
6 PUTER
for possible topologies (Ring for specific language focus co.uk/schools/ cmYa0c-5h7w
effect (and & Tree). information gcsebitesize/
NETWORKS
suggesting Comprehension- ict/datacomm/
solutions) Providing an Providing multiple-choice/ networktopsrev1. http://www.youtu
Bus topology
explanation on solutions true & false shtml be.com/watch?v=X
Star topology
Congunctions how they work to possible 221CtO5NQA
problems of the Game http://www.
networks. youtube.com/
watch?v=ySd-k7i7
G5k&list=UUwkrK5
O1Nr6TXoCSK3u9z
Dw&index=2
http://www.
youtube.com/
watch?v=Awt4
ikvFYyI
Week TOPOLOGIES 2nd conditional Comparing Reading Whole group http://www.bbc. http://youtu.be/
7 OF COM- for possible topologies (Ring for specific language focus co.uk/schools/ dOHpbT-2lJA
PUTER effect (and & Tree). information gcsebitesize/ict
NETWORKS suggesting Comprehension-
solutions) Providing Providing multiple- http://it.toolbox.
Ring solution to solutions choice/ true & com/wiki/index.
topology Nouns + hypothetical to possible false php/Ring_
Tree topology suffixes problem problems of the Topology
networks. Game
Week CABLE Ordering of Listening for Reading Whole group http://youtu.be/ http://www.
9 TRANSM- adjectives and for specific language focus LKPuzaJHW00 ictglobal.com/
ITION MEDIA giving information. trans_types.html
Adjectives + instructions Dictionary work
Copper cable suffixes Online activities
transmission Describing the and tests
technique Reviewing functions of
word families different cables Writing a
descriptive
paragraph
11
English for Skills Course Outline 18 Weeks SW 2013
CABLE So/such Qs & As on Reading gap-fill Gap fill reading http://youtu.be/ www.
Week
TRANSMI- Revision of history of cable text “ nKEvciE5G7c howstuffworks.
11
TION MEDIA passive voice television in USA Whole group com/cable-tv.htm
Revision of Reading short language focus http://www.
Categories narrative Describing history of youtube.com/
of cables tenses events coaxial cable to Supporting watch?v=f http://www.
(coaxial Passives identify specific video xHXPltuZ74 teachingenglish.
cable) Specialist Expressing vocabulary org.uk/lesson-
vocabulary opinions Small group plans/telling-a-
discussions story
Listening
for / specific
information
12
CourseOutline
English for Skills Course Outline 18 Weeks SW 2013
ACTIVE Revision of Comparing and Writing 10 rules Jigsaw reading http://youtu.be/ http://www.
Week
COMPO- Reported contrasting on becoming KuNQgln6TL0 ehow.com/
16
NENTS Speech successful Group work see example video_5361853_
OF THE (question and Speaking Research resources install-satellite-
NETWORK orders) about the life Writing a cover dish.html
of successful letter Whole class http://www. http://youtu.
Network Discourse people discussion/ teachingenglish. be/1WxZ2Zk3v5Y
cards markets to Reading debate org.uk/lesson- http://youtu.be/
structure Listening to for general plans/ebookssee Tz2d17gWZnc
formal speech. Steve Jobs understanding Supporting example http://www.
on rules for video resources on how youtube.com/
Stating success to write a cover watch?v=KuN
opinions letter Qgln6TL0
Class debate http://video.ab
Agreeing/ out.com/esl/Lea
disagreeing rn-ESL--How-to-
Wri
te-a-Cover-Letter.
htm
Week
17
Formative Assessment X 3
• Week 4
• Week 8
• Week 12
Week
18
Summative Assessment
• English in Use
• Reading
• Writing
13
English for Skills Course Outline 18 Weeks SW 2013
How learning
Activity Differentiation Interaction will be checked /
assessed
1. Introduce learning objectives – explain Additional set of T-Ss Elicitation technique
learning outcomes. Qs for faster Ss
Ss-Ss
2. Reading What is a network?
• Pre-reading: T asks questions to activate schemata. Additional set of Ss-Ss Monitoring &
Qs for faster Ss Feedback
(Either in open class or pair work).
• Ss read texts (1 & 2) (What is a network?/ T-Ss
LANs & WANs) and complete gap fill to check Pairs (weak/strong Monitoring
understanding of key specialist vocabulary. Ss) Ss-Ss Qs& As
• Ss read text (3) (What are the differences between
LANs & WANs) and answer Qs.
4. Writing: Topic sentences on the advantages/ Pairs (weak/strong Pairs Monitoring &
disadvs of networks. Ss) language input
• T elicits role of topic sentences in written text. Individual
• In pairs Ss underline topic sentences in text (3) Ss Qs & As
What are the differences between LANs & WANs?
• Ss summarize the differences between a LAN Monitoring &
Individual feedback
and a WAN using topic sentences and discourse
Ss
markers (on the other hand, while, whereas)
[This can be completed for homework]
6. Reading: Mesh Network: These self-healing nets Additional Qs for T-Ss Monitoring &
are fast & reliable faster Ss. Feedback
• Pre-reading task: Vocabulary check Ss-Ss
Elicitating & language
In pair Ss match specialist
Pairs / pronunciation
vocabulary on mesh networks to correction
correct definition Ss-Ss
• Ss read text and complete gap fill T-Ss
to produce a definition of a mesh network. Ss-Ss
14
Course Outline
English for Skills Course Outline 18 Weeks SW 2013
How learning
Activity Differentiation Interaction will be checked /
assessed
7. Video: How mesh networks work Group work (mixed Ss-Ss Qs & As
• Ss watch video (recycles specialist vocabulary ability)
from reading above) and make notes on the Ss-Ss Monitors
advantages/disadvantages of mesh network. Supported
• Class discussion on the latest developments in sentences for T-Ss
wireless networks. weaker Ss Qs & As
8. Reading Advantages/Disadvs of networks.
• T ellicits what Ss remember about LANs & WANs T monitors & inputs
from previous lesson. key language when
• T asks pre-reading question to activate schemata. Individual necessary
What advantages do you think networks have over Ss
standalone computers? Gap fill for weaker Provides feedback
• In pairs Ss order laminated sentences according ss
to advs/disadvs of networks. Individual
• Ss answer true/false questions. Ss Qs & As
9. Speaking: Group Case study Group activity Monitoring &
• T sets up scenario (strong / weaker Individual feedback
• In groups Ss work out the solution to a work-based Ss) Ss
situation.T provides input on appropriate key Monitoring
language. Ss-Ss
• Ss are given laminated cards with discourse
markers to structure formal speech (to begin with, Qs & As
moreover, consequently, additionally, in conclusion).
Ss decide where to use this in their presentations. Additional Qs for T-S
• Ss present solution to the scenario to whole class / faster Ss
or to other group. Ss listen for use of the discourse
markers. Individual
10. Reading: BBC GCSE Bitesize: ICT viruses Ss Monitoring &
• Pre-reading activity –T asks questions to activate language in-put
schemata. (Either in open class or pair work).
• Ss read text and answer multiple-choice questions.
(This can be done either on-line or paper-based)
11. Language activity (if sentences for action & Monitoring &
effect) feedback
• Sts practice writing if-sentences describing anti-
virus software, using information from the reading
& multiple-choice questions.
12. Utube listening activity on viruses, worms & bots
• Could also be used either before the above
reading or for self study by the Ss
• Ss makes notes on the different viruses.
13. Writing: Persuasive Poster
• In small groups Ss prepare a poster persuading Ss
to use anti-virus software. They use the vocabulary
and grammar practised in the lesson. T inputs with
persuasive words used in advertising.
• Posters are displayed and Ss vote for most
persuasive poster.
14. Reading Viruses turn to peer-to-peer nets &
defining the Peer-to-Peer model
• T elicits what Ss know about the Peer-to-Peer
model
• Sts read article
• Sts complete gap fill and define peer-to-peer model
15
English for Skills Course Outline 18 Weeks SW 2013
WHAT IS A NETWORK?
DIFFERENCE BETWEEN LANs AND WANs
LAN
A LAN covers a small area such as one site or building, eg a school or a college.
(Source: http://www.bbc.co.uk/bitesize/standard/computing/comms_networks/lan/revision/1)
16
English for Skills Course Outline 18 Weeks
Course Outline SW 2013
WAN
A WAN covers a large geographical area. Most WANs are made from several LANs connected
together.
17
English for Skills Course Outline 18 Weeks SW 2013
Pre-Reading Activity
Teacher asks the following questions to students (either in pairs or in open class) to assess
their knowledge and activate the schemata
1. What is a network?
2. What are its hardware components?
3. What is a LAN and WAN?
Reading Activity
Students read text (1) – (2) and find a word in the text to complete the gaps.
1. A ........................ is a main computer that provides a service on the network.
2. A ....................... is a number of computers and peripherals linked together.
3. A ...................... is a network connecting computer over a small distance.
4. The Internet is an example of a ....................................... .
cases satellites. Signal deterioration is also a very real problem for WANs, that’s why
repeaters are used at intervals to amplify or rebuild the original signal.
(Source: http://www.differencebetween.net/technology/difference-between-lan-and-wan/)
(Source: http://www.digsitevalue.org/k/one-lan)
Reading Activity
Students read text (3) to find out the answers to these questions.
1. Which are faster LANs or WANs?
2. WANs are more secure. True or False?
3. Which network is more expensive to implement?
• while
• whereas
• on the other hand
These expressions are used to balance two facts or ideas that contrast but do
not contradict each other. See how they are used in the reading (3) above.
Activity: Using contrasting statements on the other hand, while, whereas link pairs of
sentences. See the example below.
Example: LANs are networks that are limited to a small geographic location. WANs cover
great distances and are not limited to a single location.
LANS are networks that are limited to a small geographic location, whereas WANS cover
greater distances and are not limited to a single location.
19
English for Skills Course Outline 18 Weeks SW 2013
Extension Activity – Additional questions for students who finish more quickly
Can you complete these sentences using ideas from the reading (3) and appropriate
contrasting words?
1. A LAN network can consist of just several computers ..
Reading: Mesh networks: These self-healing nets are fast and reliable.
Reading Activity
Complete gap fill of definition of a mesh network
A mesh network is a ........................ (usually wireless) where each ........................ is connected to many
others, configured to allow connections to be ....................... around broken or blocked paths, with the
signal ........................ from node to node until it reaches it destination. Mesh networks are self healing and
very ......................
Answer
A mesh network is a LAN (usually wireless) where each node is connected to many others,
configured to allow connections to be rerouted around broken or blocked paths, with the
signal hopping from node to node until it reaches its destination. Mesh networks are self-
healing and very reliable.
(Source: http://www.computerworld.com/s/article/341095/Mesh_Networks)]
Mesh networks are not just experimental network architectures — they are actively being
used to connect devices in a decentralized way. This video explains how mesh networks work.
(Published on Dec 4, 2012).
(source: http://www.youtube.com/watch?v=tYLU755T6_I)
21
English for Skills Course Outline 18 Weeks SW 2013
Video Activity
Students watch this short video (up to 3mins. 10secs).and make notes on the advantages
/ disadvantages of Mesh Networks. Weaker students could be given the advantages /
disadvantages in the form of a gap fill. As they watch the video they fill in the missing information.
Pre-reading Activity.
Tasks the following question to students (either in pairs or in
open class) to assess their knowledge and activate the schemata.
What advantages do you think networks have over standalone computers?
Reading Activity (1).
The advantages & disadvantages of networks are put on laminated cards. In pairs Students divide the
sentences into advantages & disadvantages.
You are an IT consultant. A local school with 20 stand-alone PCs is considering networking them
together and adding a file server and has asked for your advice.
In your groups consider four possible benefits of doing this. You will then orally present your
case to your class mates.
Moreover Additionally
In conclusion
Teaching Tip
Each student in the group presenting their case study takes a card with a discourse marker (see
cards above). During their oral presentation the students have to use the discourse markers.
The other students listen for the use of the discourse markers.
23
CourseOutline
English for Skills Course Outline 18 Weeks SW 2013
ICT VIRUSES
• Using up to date anti-virus software.
• Not opening an email attachment unless you are expecting it and know the source (many
email servers scan emails with anti-virus software on the user’s behalf).
• Not allowing other users to use their own memory stick on your system.
24
English for Skills Course Outline 18 Weeks SW 2013
Reading Activity
2. What is the most common way people’s computers get infected by a virus?
receive a fax
install new hardware
download email attachments
4. What type of warning are you most likely to receive if a virus is found on your system?
the computer will shut itself down
a siren will sound and continue until the virus is removed
your anti-virus software will display a message and ask you how to proceed
6. Which of the following is BAD advice for protecting your computer against infection?
open email attachments if they look interesting
use up-to-date anti-virus software and always download the latest definitions
only download files from reputable internet sites
(source: http://www.bbc.co.uk/apps/ifl/schools/gcsebitesize/ict/quizengine?quiz=viruses;templateStyle=ict)
25
CourseOutline
English for Skills Course Outline 18 Weeks SW 2013
The action is in the Present simple and the effect is in the Present simple or described
using will, can, or may depending on how certain it is to follow.
• Students use examples from the multiple-choice reading to write some action
and effect sentences.
1. Students needing more support in writing can be given a prepared list of actions/
effects. They join action and effect using an if-sentence.
Examples:
Column A Column B
1. download an email attachment a. your anti-virus software will display a message
2. a virus is found on your system b. your computer may get infected by a virus
Additional Resources
If students want to broaden their knowledge of the different type of viruses: virus, worm
and bots – there is a short cartoon video (approx 4 min) at: http://www.youtube.com/
watch?v=c34QwtYI40g
Suggested Listening Activity.
Students could be asked to write notes on the differences between viruses,
worms and bots or weaker students could be given a gap fill activity to complete.
Viruses turn to peer-to-peer nets (BBC News, Technology January 20th 2004)
One of the first viruses to set up a peer-to-peer network to help it spread was
the Slapper worm that was aimed at the Linux operating system.
A Windows virus called Sinit appeared in late 2003 that turned every ma-
It’s always been an arms
chine infected by the malicious program into a member of a peer-to-peer
network. race in the battle be-
It was expected that Sinit’s creator would issue commands to infected com- tween virus writers and
puters via this network. anti-virus companies
“It’s always been an arms race in the battle between virus writers and anti-
Pete Simpson, Clearswift
virus companies,” said Pete Simpson of mail filtering firm Clearswift.
“Sinit represents a new and daunting challenge to anti-virus companies.”
There are many different ways to organize machines into peer-to-peer net-
works but most avoid having one central computer, or server, controlling all machines involved.
Instead, each machine shares the burden of organizing the system and each member lets others
know the information that it holds. The most well-known peer-to-peer networks, such as Kazaa, are
used by many people to find and share music, videos and other types of files.
Boot nets
In the past some creators of Trojan programs, that open up a
backdoor into an infected PC, have used net chat channels as a
way to issue commands.
Often thousands of computers were enrolled in these remote
controlled networks that have been dubbed “’boot nets”. Finding
and shutting down the chat channels would effectively cut a virus
writer off from his network of slave machines.
But shutting down a distributed network would be much more dif-
ficult because no one machine is in charge. It also is much more
difficult to trace where commands were being inserted and find
the network’s controller.
Kevin Hogan, head of Symantec Security Response, said the good
news about peer-to-peer virus networks was that they were rare.
“It’s a little bit trickier to do than just having the Trojan point to a single server,” he said. He said
many peer-to-peer networks were often not very efficient at passing commands between mem-
ber machines. Also many swap data via rarely used ports that most firewalls routinely block.
(Source: news.bbc.co.uk/2/hi/technology/3409187.stm)
27
English for Skills Course Outline 18 Weeks SW 2013
Peer-to-peer (P2P) networking first and foremost means that each computer is treated as
an equal. This means each computer has an equal ability to serve data and to access data,
just like any other computer on the network. Before servers became popular in PC-based
computer networks, each PC had the ability to …… data. Even after the client-server model
became king, peer-to-peer ……. still had their place, especially in smaller networks with 10
computers or less. Today, peer computers can serve data; the only ……. is that they can only
serve it to a small number of computers at the same time.
In organizations that use these small networks, the cost, administration, and maintenance
of a server is too much for the organization to consider viable. Thus, a Microsoft peer-to-
peer network might consist only of a couple Windows XP computers, a few Windows Vista
computers, and some newer Windows 7 and older Windows 2000 computers. These are
client operating systems, and as such are known as peers because there is no controlling
……. in the network. This usually works well enough for smaller organizations. The beauty
of Microsoft client ……. systems is that up to 10 computers (20 in Windows 7 Ultimate) can
concurrently access an individual peer’s ……… resource. So, in these environments, one lucky
peer usually acts as a sort of pseudo-server, so to speak. Still, additional resources like files,
databases, printers, and so on can be added to any other computer on the network. The main
disadvantage of this network …….. is that there is no centralized user database. Usernames
and …….. are individually stored per computer. To implement a centralized user ………., you
need to have a Windows Server, which means that a client-server model would be employed.
Homework
Writing
Networks connect computers together so they can share resources and data.
Summarize the differences between a LAN and a WAN by using topic sentences and dis-
course
markers practiced earlier (on the other hand, while whereas).
28
English for Skills Course Outline 18 Weeks SW 2013
Learning objectives: By the end of the lesson students will be better able to:
Client / Server type is more complex than p2p network type. In this type of network
computer controls all the functions of rest of the computers. This computer is known as Server
or dedicated server in some cases. All computers (clients) are connected to server using hub or
switches with help of LAN cards and cable. Clients access dedicated server at the same time for
retrieving files, documents, database, images, spreadsheets and hardware like printers, scanners
etc. In client server methodology server is the only controller which centralized everything on
the network, if server fails entire network will fail and only clients’ local drive will be accessible
using administrator user/pass for that computer.
First and most important step is to configure Server, for that we will choose OS for server.
We can install windows 2000 or windows 2003 server. After installing OS first step would be to
create domain. We can make domain with the help of RUN ”DCPROMO.exe” command. Once you
run this command you will be asked for unique domain name. This domain name will be used
in all client computers to include them client of the server. Before running this command make
sure that you have all the hardware plugged in properly because after completing domain name,
this command will install active directory onto the server and step by step wizard will guide
you through the rest of the process. Server should be restart when Active directory is installed,
thereafter network users can be defined on the server.
After server installation and configuration, clients are required to be configured. Installed
Windows XP professional addition on each client and perform the following steps to make them
part of network.
Here are some examples of uses for servers:
Print server: A print server controls printers that can be connected directly to the server
or (and more commonly) are connected to the network. The print server can control the starting
and stopping of document printing, as well as concepts such as spooling, printer pooling, ports,
and much more. By default, Windows Server 2008, Windows Server 2003, and Windows Server
2000 can be print servers right out of the box.
Database server: A database server houses a relational database made up of one or
more files. SQL databases fall into this category. They require special software, such as Microsoft
SQL Server. Access databases (which are just one file) do not necessarily require a database
server; they are usually stored on a regular file server.
Network controller: A controlling server, such as a Microsoft domain controller, is
in charge of user accounts, computer accounts, network time, and the general well-being of
an entire domain of computers and users. Windows Server 2008, Windows Server 2003, and
Windows Server 2000 can be domain controllers, but they need to be promoted to that status.
By default, a Windows Server operating system is not a controller. Network controller operating
systems are also referred to as network operating systems or NOS.
Messaging server: This category is enormous. Messaging servers include not just email
servers, but also fax, instant messaging, collaborative, and other types of messaging servers.
For a Windows Server to control email, special software known as Exchange Server has to
(Source: http://www.wifinotes.com/computer-networks/how/to-configure-network.html)
30
English for Skills Course
Course Outline
Outline 18 Weeks SW 2013
31
English for Skills Course Outline 18 Weeks SW 2013
1. All ………………………….are connected to server using hub or switches with help of LAN cards
and cable.
2. In client server methodology server is the only controller which centralized everything
on the …………………
3. The first and most important step is ………………… , for that we will choose OS for server.
4. The print server ……………….. the starting and stopping of document printing, as well as
concepts such as spooling, printer pooling, ports.
5. …………….. servers include not just email servers, but also fax, instant messaging,
collaborative, and other types of messaging servers.
6. On a client /server network, one computer ……………. server that provides services and
the other computers (client) on the network request services from the server.
7. Client /server is easy ……………….. .
8. Client /server is used in ………………………. networks.
The –ing form of a verb is used after prepositions. This includes to when it is a preposition
and not part of the infinitive.
Look at these examples from the reading Defining the Client-Server Model
After installing OS.
Before running this command
32
CourseOutline
English for Skills Course Outline 18 Weeks SW 2013
Language Practice
Complete each gap in these sentences with the correct form of an appropriate verb from this
list: infinitive or –ing form.
Answers
1. Search engines are ways of finding information on the web.
2. Fibber-optic cable can be used for linking computers in a network.
3. In wireless networks, instead of installing cables, devices are linked by radio waves.
4. We look forward to having faster and cheaper computers.
5. Many organizations are now choosing to install wireless networks.
6. People sometimes try to hack into a computer system without using the password.
7. Networks save money by sharing peripherals such as printers.
8. In some old buildings it can be expensive to install cables and access points.
Writing Activity
After exchanging information about client and peer-to-peer servers, students write a paragraph of
their findings (advantages and disadvantages of the two different types of servers)
Homework
Writing
Describe the function of an email server and show how it differs from a web server.
33
English for Skills Course Outline 18 Weeks SW 2013
Learning objectives: By the end of the lesson students will be better able to:
1. Define the term topology and extend their vocabulary for different kinds of topology
2. Explain the functions of topologies with the aid of visual representation
3. Use appropriately verb and preposition combinations
4. Develop fluency and cohesion in long turn discussions talking about the impact of
inventions in people’s life
5. Produce information leaflets on different kinds of topologies
6. Identify specific information in a reading passage
7. Use sequencers to order the steps of a process
8. Analyze and describe data from diagrams
9. Produce a coherent paragraph comparing particular topologies
34
English for Skills Course
Course Outline
Outline 18 Weeks SW 2013
8. Integrated skills
• Lead-in to star topology:
Students look at the diagram
and identify the differences in
arrangement as compared to
bus topology.
• Based on the information from
the text on star topology and the
advantages and disadvantages
of bus topology, students
are asked to work out the
advantages and disadvantages
of star topology in two groups.
9. Writing activity
• Students contrast the pros and
cons of bus and star topologies.
They should practise using topic
sentences and linkers to express
contrast.
35
English for Skills Course Outline 18 Weeks SW 2013
Reading Activity
The beginnings of Topology
Problem 1.
36
CourseOutline
English for Skills Course Outline 18 Weeks SW 2013
The problem now becomes one of drawing this picture without retracing any line and without
picking your pencil up off the paper.
All four of the vertices in the picture above have an odd number of arcs connected to them.
You could start at that vertex, and then arrive and leave later. But then you can’t come
back. Thus every vertex with an ODD number of arcs attached to it has to be either at the
beginning or the end of your pencil-path. So you can only have up to two ‘odd vertices’! Thus
it is impossible to draw the above picture in one pencil stroke without retracing.
Thus we are unable to solve The Bridges of Konigsberg problem. Take one of these vertices,
say one of the ones with three arcs connected to it. Say you’re going along, trying to trace
out the above figure out without picking up your pencil. The first time you get to this vertex,
you can leave by another arc. But the next time you arrive you can’t. So you’d better be
through drawing the picture when you get there!
One of the first papers in topology was the demonstration, by Leonhard Euler, that it was
impossible to find a route through the town of Königsberg (now Kaliningrad) that would cross
each of its seven bridges exactly once. This result did not depend on the lengths of the
bridges, nor on their distance from one another, but only on connectivity properties: which
bridges are connected to which islands or riverbanks. This problem, the Seven Bridges of
Königsberg, is now a famous problem in introductory mathematics, and led to the branch of
mathematics known as graph theory.
(Source: http://www.historymcs.st-and.ac.uk/_/topology_in_mathematics.html)
What is a Topology?
The physical topology of a network refers to the configuration of cables, computers, and
other peripherals. Physical topology should not be confused with logical topology which is
the method used to pass information between workstations
37
English for Skills Course Outline 18 Weeks SW 2013
• Length of cable needed. The linear bus network uses shorter lengths of cable.
• Future growth. With a star topology, expanding a network is easily done by adding
another concentrator.
• Cable type. The most common cable in schools is unshielded twisted pair, which is most
often used with star topologies.
Reading Activity
Language Activity
38
English for Skills Course
Course Outline
Outline 18 Weeks SW 2013
BUS TOPOLOGY
A bus network uses a multi-drop transmission medium, all node on the network share a
common bus and thus share communication. This allows only one device to transmit at a time. A
distributed access protocol determines which station is to transmit. Data frames contain source
and destination addresses, where each station monitors the bus and copies frames addressed
to itself.
A bus topology connects each computer (nodes) to a single segment trunk (a communication
line, typically coax cable, that is referred to as the ‘bus’. The signal travels from one end of the
bus to the other. A terminator is required at each to absorb the signal so as it does not reflect
back across the bus. A media access method called CSMA/MA is used to handle the collision
that occur when two signals placed on the wire at the same time. The bus topology is passive.
In other words, the computers on the bus simply ‘listen’ for a signal; they are not responsible for
moving the signal along.
Advantages:
Failure of one
of the station
does not affect
others.
Good
compromise
over the other
two topologies
as it allows
relatively high
rate of data
transition.
Well suited
for temporary
networks that
must be set up
in a hurry.
Easy to
implement and
extend.
Disadvantage:
Require a network to detect when two nodes are transmitting at the same time.
Does not cope well with heavy traffic rates
Difficult to administer/troubleshoot.
Limited cable length and number of stations.
A cable brake can disable the entire network; no redundancy.
Maintenance cost may be higher in the long run.
Performance degrade as additional computers are added.
(Source: http://www.homepages.uel.ac.uk/uo116771/bus_topology.htm)
39
English for Skills Course Outline 18 Weeks SW 2013
In Star topology, all the components of network are connected to the central device
called “hub” which may be a hub, a router or a switch. Unlike Bus topology (discussed
earlier), where nodes were connected to central cable, here all the workstations are
connected to central device with a point-to-point connection. So it can be said that
every computer is indirectly connected to every other node by the help of “hub”.
All the data on the star topology passes through the central device before reaching the intended
destination. Hub acts as a junction to connect different nodes present in Star Network, and at the
same time it manages and controls whole of the network. Depending on which central device
is used, “hub” can act as repeater or signal booster. Central device can also communicate with
other hubs of different network. Unshielded Twisted Pair (UTP) Ethernet cable is used to connect
workstations to central node.
Reading exercise
when(ever)
while because but
if
as (soon as) as so … that so that although
unless
until since such … that in case even
as long as
after so though
since
Students can play the Process Jigsaw game. One suggestion for how the game can
be adapted is given below – see How To Set Up Your Home Network.
Integrated Skills
Based on the reading you have done so far, and the information you gained from the video
on a bus topology, complete the table below. You need to write about the advantages and
disadvantages of a star topology.
Star topology
Advantages Disadvantages
Writing Activity
Write paragraphs to compare and contrast the pros and cons of bus and star topology.
Remember to use topic sentences and connecting words to express contrast.
Homework
Research and write about great inventors and their contributions to society.
42
English for Skills Course Outline 18 Weeks
Course Outline SW 2013
Learning objectives: By the end of the lesson students will be better able to:
1. Extend their vocabulary for ring, tree and mixed topologies
2. Form nouns using a range of common suffixes
3. Present and justify an opinion, disagree and discuss implications
4. Use second conditionals to provide solutions to hypothetical situations
5. Make recommendations for the appropriate use of hybrid topology
6. Provide an explanation using a diagram and check understanding from the speaker`s point of view
7. Use indirect questions with greater oral accuracy
8. Express ability with the accurate use of ‘can’ and ‘be able to’
9. Structure a comparative essay demonstrating understanding of the role of paragraphs (e.g. thesis
statement/ concluding paragraphs etc.)
How learning
Activity Differentiation Interaction will be
checked/assessed
1. Introduce learning objectives – explain learning
outcomes. T-Ss Integrated skills
2. Reading Ring & Tree Topologies
• Lead-in: Students comment on the arrangement of Less
Ring and Tree topologies and make predictions on independent
the way they function.
• Post- reading activity: Teacher checks Multiple –choice
comprehension of the texts about Ring and Tree questions
topologies by giving students a multiple choice Ss-Ss
exercise.
3. Vocabulary: Word families
• Teacher asks students to underline the nouns and
verbs used in the texts. Ss-Ss
• Students complete the table with the correct parts Qs & As
of speech.
• Suffix game. Students in groups pick up card and
give the required form of the word. More Monitoring
4. Speaking skills: case study independent
• Teacher asks students to analyze a problem Ss-Ss
presented in the text on tree topology Tips for
• Teacher divides students in groups and asks them to Presenting and
provide a solution to a hypothetical situation using justifying an
the second conditional. Ss-Ss opinion, disagreeing
5. Reading: Hybrid Network Topology and discussing
• Students read the text and answer the questions. implications
6. Speaking: Compare/contrast hybrid topologies
• Teacher divides the class into Qs & As
small groups, comparing and
contrasting the hybrid topologies, Independent Monitoring
7. Speaking/ Writing: Topologies
• Teacher divides the class in two groups, describing the
advantages and disadvantages of topologies. Written work
• Students structure comparative essay using thesis Groups
statement and concluding paragraph
8. Speaking: Problem solving – choosing the right job Less
candidate Independent
• Students read the job ad and about the 3 applicants. Monitoring
They decide who is the best applicant.
• The resources could also be used as the basis of a role play.
Students should be encouraged to use indirect questions.
43
English for Skills Course Outline 18 Weeks SW 2013
Reading Activity
What is Tree Topology?
Tree Topology integrates the characteristics of Star and Bus Topology. Earlier we saw how in
Physical Star network Topology, computers (nodes) are connected by each other through central
hub. And we also saw in Bus Topology, work station devices are connected by the common cable
called Bus. After understanding these two
network configurations, we can understand
tree topology better. In Tree Topology, the
number of Star networks are connected
using Bus. This main cable seems like a main
stem of a tree, and other star networks as
the branches. It is also called Expanded
Star Topology. Ethernet protocol is
commonly used in this type of topology.
The diagram below will make it clear.
Let’s discuss the advantages and
disadvantages of Tree Topology now.
(Source: http://www.ianswer4u.com/2012/01/tree-topology-advantages-and.html#axzz2.QSmLpW43)
44
English for Skills Course Outline 18 Weeks
Course Outline SW 2013
In Ring Topology, all the nodes are connected to each-other in such a way that they
make a closed loop. Each workstation is connected to two other components on either
side, and it communicates with these two adjacent neighbours. Data travels around the
network, in one direction. Sending and receiving of data takes place by the help of TOKEN.
Token Passing (in brief) : Token contains a piece of information which along with data is sent by
the source computer. This token then passes to next node, which checks if the signal is intended
to it. If yes, it receives it and passes the empty to into the network, otherwise passes token along
with the data to next node. This process continues until the signal reaches its intended destination.
The nodes with token are the ones only
allowed to send data. Other nodes have
to wait for an empty token to reach
them. This network is usually found in
offices, schools and small buildings
(Source: http://www.ianswer4u.com/2012/01/tree-topology-advantages-and.html#axzz2.QSmLpW43)
45
English for Skills Course Outline 18 Weeks SW 2013
Reading Activity
Circle the right answer:
5. Which network topology has terminators to prevent signals from bouncing back
and forth?
A. Star network
B. Ring network
C. Bus network
7. Which network will stop working if there is a problem with the central cable?
A. Bus network
B. All networks
C. Star network
D. Ring network
Verbs Nouns
Access
Connect
Direction
Failure
Implement
Transmission
Attach
Collection
Arrange
Noun Formation
Some nouns can be derived from other words by adding a suffix. Some of the common
noun endings are:
fail failure perform performance
initiate initiative store storage
recruit recruitment train training
refer reference promote promotion
47
English for Skills Course Outline 18 Weeks SW 2013
(Source: http://www.canswer4u.com/2012/05/hybrid-topology-advantages-and.html#axzz2QSmLpW43)
2) Scalable: It’s easy to increase the size of network by adding new components, without
disturbing existing architecture.
1) Complexity of Design: One of the biggest drawback of hybrid topology is its design. It’s
not easy to design this type of architecture and its a tough job for designers. Configuration
and installation process needs to be very efficient.
2) Costly Hub: The hubs used to connect two distinct networks, are very expensive. These
hubs are different from usual hubs as they need to be intelligent enough to work with
different architectures and should be function even if a part of network is down.
48
Course Outline
English for Skills Course Outline 18 Weeks SW 2013
3) Costly Infrastructure: As hybrid architectures are usually larger in scale, they require a lot
of cables, cooling systems, sophisticate network devices, etc.
Case study
Draw the hybrid topology for the following specification
a) with a star backbone and three bus networks .at each bus three workstations are connected
show the hub ,drop line and taps.
b) with a star backbone and two ring networks, at each ring network three stations are
connected. Show the hub and repeater.
Give the benefits and drawbacks of this network architecture.
1. Draw hybrid topology with a star backbone and three ring network?
Homework
Use this scheme to name the elements that form the mix topology
50
English for Skills Course
Course Outline
Outline 18 Weeks SW 2013
Learning objectives: By the end of the lesson students will be better able to:
USE OF COPPER
Reading Activity
Copper has been used in electric wiring since the invention of the electromagnet and
the telegraph in the 1820s. The invention of the telephone in 1876 created further demand for
copper wire as an electrical conductor.
Today, despite competition from other materials, copper remains the preferred electrical
conductor in nearly all categories of electrical wiring. For example, copper wire is used in power
generation, power transmission, power distribution, telecommunications, electronics circuitry,
and countless types of electrical equipment. Aside from electrical conductors, other important
electrical applications for copper include electrical contacts and resistors. Electrical wiring in
buildings is the most important market for the copper industry. Roughly half of all copper mined
is used to manufacture electrical wire and cable conductors.
(Source: http://en.wikipedia.org/wiki/Copper_wire_and_cable)
Identify the part of speech of the underlined words and then look their meaning up in the
dictionary. Make sentences with the words.
Adjective formation: Complete the job reference below with the correct form
of the word in brackets
(Adapted from: Strutt, Market Leader: Business Grammar and Usage, 2000)
53
English for Skills Course Outline 18 Weeks SW 2013
TYPES OF CABLES
Reading Activity
Shielding cables
Shielding cables are encased in foil or wire mesh. The wires inside the shielding are mostly
decoupled from external electric fields. Simple shielding is not too effective against low-
frequency magnetic fields, resulting, for example, in a magnetic “hum” from a nearby power
transformer.
Coaxial cables
Coaxial cables reduce low-frequency magnetic transmission and pickup. They consist of two or
more wires that are wrapped concentrically and separated by a dielectric insulation material.
The term, coaxial, was coined because the centre conductor and the outer conductor, or shield,
form concentric cylinders. This causes voltages induced by a magnetic field between the shield
and the core conductor to consist of two nearly equal magnitudes which cancel out each
other. The centre conductor of a coaxial cable may be a single strand or it may be stranded.
Common conductor materials used in coaxial cables include copper, tinned or silver plated
copper, copper-clad steel, and copper-clad aluminium. Less frequently, aluminium is used as
an alternate inner conductor. The outer conductor is typically made from a woven copper
wire mesh braid shield layer, or less frequently, aluminium foil. This layer also gives the wire
protection from interference. The cables are insulated with a flexible, tubular insulating
layer made from polyethylene (PE), polypropylene (PP), fluorinated ethylene propylene (FEP)
or polytetrafluoroethylene (PTFE).
The advantage of coaxial design is that the electric and magnetic fields are confined to
the dielectric with little leakage outside the shield. Conversely, electric and magnetic fields
outside the cable are largely kept from causing interference to signals inside the cable. This
property makes coaxial cable a good choice for carrying weak signals that cannot tolerate
interference from the environment or for higher power signals that must not be allowed to
radiate or couple into adjacent structures or circuits.
(Source: http://en.wikipedia.org/wiki/User:Enviromet/Subpage_5_-_Copper_in_wire_and_cable
#Shielding_cables)
54
Course Outline
English for Skills Course Outline 18 Weeks SW 2013
Exercise: Name the parts of the cable by using words in the box.
Writing Activity
Describing objects
When you describe objects you can use a variety of adjectives.
Opinion adjectives go before fact adjectives. When there are two or more fact
adjectives in a sentence, they usually go in the following order.
Copper; silver; aluminium; Chinese; large; twisted; fluorescent; light; magnetic; electric; weak;
flexible; tubular; red; old; heavy; interesting; oval; red; Albanian; ceramic; wooden; square; plastic;
leather; large; small.
Writing Activity
Describe at least two cables
55
English for Skills Course Outline 18 Weeks SW 2013
CABLE CATEGORIES
Cable is the medium through which information usually moves from one network device to
another. There are several types of cable which are commonly used with LANs. In some cases,
a network will utilize only one type of cable, other networks will use a variety of cable types.
The type of cable chosen for a network is related to the network’s topology, protocol, and
size. Understanding the characteristics of different types of cable and how they relate to other
aspects of a network is necessary for the development of a successful network.
The following sections discuss the types of cables used in networks and other related topics.
• Unshielded Twisted Pair (UTP) Cable
• Shielded Twisted Pair (STP) Cable
• Coaxial Cable
• Fibber Optic Cable
• Cable Installation Guides
• Wireless LANs
• Unshielded Twisted Pair (UTP) Cable
Twisted pair cabling comes in two varieties:
shielded and unshielded. Unshielded twisted
pair (UTP) is the most popular and is generally
the best option for school networks.
Unshielded twisted pair The quality of UTP may vary from telephone-
grade wire to extremely high-speed cable. The
cable has four pairs of wires inside the jacket. Each pair is twisted with a different number of
twists per inch to help eliminate interference from adjacent pairs and other electrical devices.
The tighter the twisting, the higher the supported transmission rate and the greater the cost per
foot. The EIA/TIA (Electronic Industry Association/Telecommunication Industry Association) has
established standards of UTP and rated six categories of wire (additional categories are emerging).
(Source: http://fcit.usf.edu/network/chap4/chap4.htm)
56
English for Skills Course
CourseOutline
Outline 18 Weeks SW 2013
Vocabulary exercise
Match the words in bold to their definitions, then make sentences of your own with the words.
Metal in the form of thin thread/ to protect something from danger or hurt/an object or a piece
of equipment to do a particular job/ interruption of a radio signal by another signal on a similar
wave-length/a number of computers and other devices that are connected together so that
equipment and information can be shared/bent or turned so that the original shape is lost/ very
likely to be influenced, harmed or affected by sb or sth/ an object that joins together two or
more things.
Pair work: Match Cable category with the speed and usage
Reading Activity
Cees Links
Green Peak: Founder & Chief Executive Officer
Cees [“case”] Links is a pioneer of the wireless data industry, a
visionary leader bringing the world of mobile computing and
continuous networking together. Under his responsibility, the
first wireless LANs were developed which ultimately became
house-hold technology integrated into the PCs and notebooks
we are all familiar with. He also pioneered the development
of access points, home networking routers and hotspot base
stations, all widely used today. Cees started his career at NCR
Computers where he was responsible for the development
and launch of the world’s first wireless LAN product in 1990,
a major innovation at that time. He directly closed a deal
with Apple Computer in 1999 that ignited the growth of the
wireless LAN industry. Though this deal, wireless LANs went on
to become a standard notebook feature.
(Source: www.greenpeak.com/company/Management.html)
The first and the second column of this table should be filled in as a pre reading activity and the
third column should be completed as an after reading activity.
57
English for Skills Course Outline 18 Weeks SW 2013
58
CourseOutline
English for Skills Course Outline 18 Weeks SW 2013
Read the text and fill in the gaps with an appropriate word.
Compare answers with a partner.
In the 1950s, there were four television networks in the United States. Because (1) ___the
frequencies allotted to television, the signals could only be received in a “line of sight” from the
transmitting antenna. People living (2) ___ remote areas, especially remote mountainous areas,
couldn’t see the programs that were already becoming an important part of U.S. culture.
(3) _____1948, people living in remote valleys in Pennsylvania solved (4)_______ reception
problems by putting antennas on hills and running cables to their houses. These days, the same
technology once used (5)______ remote hamlets and select cities allows viewers all over the
country (6)_______ access a wide variety of programs and channels that meet their individual
needs and desires. By the early 1990s, cable television (7) ______ reached nearly half the
homes in the United States.
Today, U.S. cable systems deliver hundreds of channels to some 60 million homes, while also
providing a growing number of people with high-speed Internet access. Some cable systems
even let you make telephone calls and receive new programming technologies! Cable television
brings you so much information and such a wide range of programs, from educational (8)
_______ inspirational ones.
The earliest cable systems were strategically placed by antennas with very long cables connecting
them to subscribers’ television sets. Because the signal from the antenna became weaker as it
travelled (9)________ the length of cable, cable providers had (10)______ insert amplifiers at
regular intervals to boost the strength of the signal and make (11)______ acceptable for viewing.
Limitations in these amplifiers were a significant issue for cable system designers in the next
three decades.
In a cable system, the signal might have gone through 30 or 40 amplifiers before reaching your
house, one every 1,000 feet or so. With each amplifier, you would get noise and distortion. Plus,
if one of the amplifiers failed, you lost the picture. Cable got a reputation (12) ______ not having
the best quality picture and for not being re liable. In the late 1970s, cable television would find
a solution (13) _____ the amplifier problem. By then, they had also developed technology that
allowed them to add more programming to cable service.
(Source: http://www.howstuffworks.com/cable-tv.htm)
So+adjective/adverb Such+a/an+adjective+noun
It`s so hot today! It`s such a nice day.
You drive so quickly! He`s such an awful driver!
He eats so much! There is such a lot of information.
We often use So/such .... that to express a consequence
60
English for Skills Course Outline 18 Weeks SW 2013
Match the sentences. Then write one sentence with so or such (a/an).
1 He ran the company badly. A He does not know what to do with it all.
61
CourseOutline
English for Skills Course Outline 18 Weeks SW 2013
COAXIAL CABLE
Reading
Coaxial cabling has a single copper conductor at its centre. A plastic layer provides insulation
between the center conductor and a braided metal shield. The metal shield helps to block any
outside interference from fluorescent lights, motors, and other computers.
Vocabulary Exercise
1. ...........conductor
2. ............layer
3. ...........metal shield
4. ............pair cable.
5. ..........interference
6. ...........bus network
Students listen to a video on how to prepare a coaxial cable, then they are divided into groups
and each group is given different questions to be answered.
For example:
What are the tools used in the video?
What things should be kept in mind while preparing coaxial cable?
What was the little tip about?
63
CourseOutline
English for Skills Course Outline18 Weeks SW 2013
unshielded twisted pair utp cable; shielded twisted pair stp cable ; coaxial cable; fibber
optic cable; cable installation guides; wireless lans; shielded twisted pair utp cable
64
English for Skills Course Outline 18 Weeks SW 2013
History
In 1880 Alexander Graham Bell and his assistant Charles Sumner Tainter created a very early
precursor to fibber-optic communications, the Photo phone, at Bell’s newly established Volta
Laboratory in Washington, D.C. Bell considered it his most important invention. The device allowed
for the transmission of sound on a beam of light. On June 3, 1880, Bell conducted the world’s
first wireless telephone transmission between two buildings, some 213 meters apart. Due to its
use of an atmospheric transmission medium, the Photo phone would not prove practical until
advances in laser and optical fibber technologies permitted the secure transport of light. The
Photo phone’s first practical use came in military communication systems many decades later.
In the late 1990s through 2000, industry promoters, and research companies such as KMI, and
RHK predicted massive increases in demand for communications bandwidth due to increased
use of the Internet, and commercialization of various bandwidth-intensive consumer services,
such as video on demand. Internet protocol data traffic was increasing exponentially, at a
faster rate than integrated circuit complexity had increased under Moore’s Law. From the bust
of the dot-com bubble through 2006, however, the main trend in the industry has been the
consolidation of firms and off-shoring of manufacturing to reduce costs. Companies such
as Verizon and AT&T have taken advantage of fibber-optic communications to deliver a variety
of high-throughput data and broadband services to consumers’ homes.
(Source: https://classes.lt.unt.edu/.../FiberOpticBackbone.docx)
Reading Activity
Fibre Optic Cabling
Fibber optic cabling consists of a centre glass core surrounded by several layers of protective
materials. It transmits light rather than electronic signals eliminating the problem of electrical
interference. This makes it ideal for certain environments that contain a large amount of electrical
interference. It has also made it the standard for connecting networks between buildings, due to
its immunity to the effects of moisture and lighting.
Fibber optic cable has the ability to transmit signals over much longer distances than coaxial
and twisted pair. It also has the capability to carry information at vastly greater speeds. This
capacity broadens communication possibilities to include services such as video conferencing
and interactive services. The cost of fibber optic cabling is comparable to copper cabling;
however, it is more difficult to install and modify. 10BaseF refers to the specifications for fibber
optic cable carrying Ethernet signals.
The centre core of fibber cables is made from glass or plastic fibbers (see fig 5). A plastic coating then
cushions the fibber centre, and Kevlar fibbers help to strengthen the cables and prevent breakage.
The outer insulating jacket made of Teflon or PVC. There are two common types of fibber cables
-- single mode and multimode. Multimode cable has
a larger diameter; however, both cables provide high
bandwidth at high speeds. Single mode can provide
more distance, but it is more expensive.
Fibber optic cable
65
English for Skills Course Outline 18 Weeks SW 2013
Mini test
Exercise: Choose the words to fit in the gap:
1. Transmission media are usually categorized as _______.
• guided or unguided
• fixed or unfixed
• determinate or indeterminate
• metallic or non-metallic
2. ______ cable consists of an inner copper core and a second conducting outer sheath.
• Twisted pair
• Coaxial
• Fibber Optic
• Shielded Twisted Pair
3. In fibber optics, the signal is _______ waves.
• Light
• Radio
• Infrared
• Very low frequency
4. In an optical fibber, the inner core is _______ the cladding.
• denser than
• less dense than
• the same density as
• another name for
66
English for Skills Course Outline 18 Weeks SW 2013
67
English for Skills Course Outline 18 Weeks SW 2013
Introduction
The aim of this report is to make recommendations for improving the Health and
Safety of employees of JJB & Co. This report was requested by the Managing
Director on 14/02/13.
Main Findings
A study was made of all job-related illnesses during the past year. For example, it
was found that a number of cases of symptoms of Repetitive Strain Injury (RSI)
had been reported by the company physiotherapist. Other injuries were caused by
poor furniture and equipment. In addition, poor ventilation makes the workplace
uncomfortable. Many members of staff were not aware of health and safety
procedures. Meetings were held with union representatives and office managers to
discuss what could be done.
Recommendations
Conclusion
At present many health and safety regulations are being broken. The action
needed on these issues has been found to be urgent and, as a result, the above
recommendations should be acted upon as soon as possible.
68
English for Skills Course Outline 18 Weeks SW 2013
(Order of report)
To: Ms Renoir, Managing Director
Introduction
The aim of this report is to make recommendations for improving the Health and
Safety of employees of JJB & Co. This report was requested by the Managing Director
on 14/03/13.
Main Findings
A study was made of all job-related illnesses during the past year. For example, it
was found that a number of cases of symptoms of Repetitive Strain Injury (RSI)
had been reported by the company physiotherapist. Other injuries were caused by
poor furniture and equipment. In addition, poor ventilation makes the workplace
uncomfortable. Many members of staff were not aware of health and safety
procedures. Meetings were held with union representatives and office managers to
discuss what could be done.
Recommendations
1. The safety regulations should be clearly displayed in the company’s canteen and
main offices.
2. New staff should be made aware of the company’s safety regulations and policy.
In particular, they should be advised to take frequent breaks from computer
screens.
3. Staff should be taught how to position themselves, their chairs, desks and
equipment.
4. The health and safety committee should be responsible for training staff to use
office equipment.
5. Ventilation and air-filtering systems need to be maintained on a regular basis.
6. The union suggested that furniture and equipment should be replaced. In
particular:
a. Old-fashioned screens should be replaced
b. Office lighting should be checked
c. Chairs with full back supports are essential
Conclusion
At present many health and safety regulations are being broken. The action
needed on these issues has been found to be urgent and, as a result, the above
recommendations should be acted upon as soon as possible.
69
English for Skills Course Outline 18 Weeks SW 2013
Read the Language Review below and then underline all the examples of the passive and
the use of it in the report.
Language Review
When writing in a formal style (e.g. reports) we often choose an impersonal style by using the
passive and beginning sentences with it.
It was agreed that the number of lap tops for student-use should be increased.
70
English for Skills Course Outline 18 Weeks SW 2013
Introduction
The aim of this report is to make recommendations for improving the Health and
Safety of employees of JJB & Co. This report was requested by the Managing Director
on 14/03/13.
Main Findings
A study was made of all job-related illnesses during the past year. For example, it
was found that a number of cases of symptoms of Repetitive Strain Injury (RSI)
had been reported by the company physiotherapist. Other injuries were caused by
poor furniture and equipment. In addition, poor ventilation makes the workplace
uncomfortable. Many members of staff were not aware of health and safety
procedures. Meetings were held with union representatives and office managers to
discuss what could be done.
Recommendations
1. The safety regulations should be clearly displayed in the company’s canteen and
main offices.
2. New staff should be made aware of the company’s safety regulations and policy.
In particular, they should be advised to take frequent breaks from computer
screens.
3. Staff should be taught how to position themselves, their chairs, desks and
equipment.
4. The health and safety committee should be responsible for training staff to use
office equipment.
5. Ventilation and air-filtering systems need to be maintained on a regular basis.
6. The union suggested that furniture and equipment should be replaced. In
particular:
a. Old-fashioned screens should be replaced
b. Office lighting should be checked
c. Chairs with full back supports are essential
Conclusion
At present many health and safety regulations are being broken. The action
needed on these issues has been found to be urgent and, as a result, the above
recommendations should be acted upon as soon as possible.
71
English for Skills Course Outline 18 Weeks SW 2013
The Task:
You work for the company IT Maestro which provides IT support to small businesses. One of its
clients, ABS Enterprises, has recently had a large number of its employees being off work due
to problems commonly related to poor computer health and safety. These are:
- upper limb disorder
- eye strain,
- headaches
- stress & fatigue.
Your manager, at IT Maestro, has asked you to write a report for ABS Enterprises
recommending changes the company should make to try and improve its employees’ sickness
record.
72
English for Skills Course Outline 18 Weeks SW 2013
Learning objectives: By the end of the lesson students will be better able to:
1. Identify and describe functions of switches, repeaters, bridges and routers (SOHO & Enterprise routers)
2. Demonstrate basic knowledge on networks by asking for and giving advice
3. Use a range of phrasal verbs commonly used in telephone conversations
4. Use narrative tenses to speak about technological developments
5. Use adverbs of frequency and manner with greater accuracy
6. Listen for specific information
7. Extract and summarize key information from a text
Reading Activity
Read the text about switches, hubs and repeaters. Choose from the sentences (A-D) the one
which fits each gap (1-4).
A. Repeaters are used to establish Ethernet network.
B. Switches provide these functions by using various link-layer protocols.
C. The purpose of these hubs is to preserve the space in an operation room or office.
D. A hub provides the signal amplification required to allow a segment to be extended
a greater distance.
Switches: LAN switches are an expansion of the concept in LAN bridging, which controls data
flow, handles transmission errors, provides physical addressing, and manages access to the
physical medium. (1) - ( ) LAN switches can link four, six, ten or more networks together. A
store-and-forward switch, on the other hand, accepts and analyses the entire packet before
forwarding it to its destination.
Switches are dedicated, active and smart devices they work much more efficiently than the
other network devices. Switches are used to build micro segments in the network.
Hubs/Repeaters are used to connect together two or more network segments of any media
type. In larger design, signal quality begins to deteriorate as segment exceeds their maximum
length. (2)-( )
There are three broad categories of hubs if we compare them on technical bases. Passive hubs,
active hubs and intelligent hubs are three kinds of hubs most frequently used. Hubs are not
often preferably used because they are considered passive devices, which do not respond to
the electrical signals. Such hubs which are not capable of regenerating electrical signals to
efficiently transfer data packets are known as Passive hubs. Multi port repeaters which can
amplify the electric signals to deliver packet of data are known as active hubs. When active hubs
are developed more to be used by companies they are known as intelligent hubs. (3)- ( ) Various
hubs are set one over the other to allow enough space for the human working. Intelligent hubs
can also back up media and multiple protocols.
Repeater is a powerful network device which is used to regenerate the signals, when they travel
over a longer distance, so that the strength of the signal remains the same. (4)-( ) A repeater
exists as the first layer of the OSI layer that is physical layer. Repeaters are used for cables which
cover the needs of the 100 meters long cable. Repeaters are used to get signals from optical
fibbers, copper cables and coaxial cables. The repeaters have been developed to perform more
important uses such as to regenerate the microwaves from a satellite; such repeaters are named
as transponders. Hence repeaters are capable of carrying electric as well as light signals.
74
English for Skills Course Outline 18 Weeks SW 2013
HISTORY
Reading OF SWITCHES
Activity
Reading Activity
For many years, all long distance calls began with a call to an
operator sitting at a toll (long-distance) switchboard. Until
the 1920s, that operator wrote down the calling information
provided by the customer, and then told the customer that he
or she would be called back once the party was on the line. The
operator then passed the information to another operator, who
would look up the route that the call should take, and then build
up the circuit one link at a time by connecting to operators at
switchboards along the route. A typical call took seven minutes
to set up. Once operators established a circuit, it was dedicated
to that conversation until the end of the call.
1-_______The first major improvement was the Combined Line
and Recording (CLR) method, introduced in 1926. Now, the first
operator the customer spoke to was the one who built up the
circuit and placed the call. For the first time, most calls were
completed while the customer stayed on line. The average call
completion time dropped to 2.1 minutes. International operator, New York, 1936. This operator
was in charge of all calls intended for ships at sea.
In 1929, AT&T network engineers implemented the first national General Toll Switching Plan. It
established a hierarchical, national network with eight interconnected regional centers across
the country. More than 140 primary centers, at least one in each state, connected to the regional
centers. More than 2,000 toll offices throughout the country provided connections between the
primary centers and every local exchange in the country. Additional circuits provided direct
connections between centers with substantial direct traffic. These additional circuits also provided
alternate back-up routes. Operators no longer had to rely on massive route books to determine
call paths. Now operators sent calls up (and then back down) an established hierarchical chain.
A single, nationwide structure provided a solid basis for future planning and expansion as traffic
grew. With some modifications, notably the
addition of sectional centers in the 1950s,
AT&T continued to rely on this hierarchical
network until the 1980s.
2-________Automation came to long distance
switching when AT&T installed the first No. 4
crossbar switch in Philadelphia in 1943. Now
a single operator built up the needed circuit
by dialling a series of routing codes to instruct
this automatic electromechanical switch.
Dialled routing codes soon gave way to the
familiar area codes, which the switch itself
75
English for Skills Course Outline 18 Weeks SW 2013
could translate into the needed routing information. AT&T soon modified the switch to handle
customer-dialled long distance calls; the modified design became the No. 4A crossbar switch. No.
4A crossbar switches and direct-distance dialling spread to subscribers across the country during
through the 1950s. Call-completion time dropped to 10-20 seconds.
3-__________Switching technology leapt forward in 1976 with the installation of the initial AT&T
4ESS switch in Chicago. The 4ESS was simultaneously the world’s first digital electronic switch
and a powerful computer. Common channel signalling followed in 1977. Now the information
needed to set up a call travelled over a separate digital network from the call itself. With a
separate signalling network, call completion time dropped to 1-2 seconds.
Electronic switching and common channel signalling brought new flexibility to the network, and
made possible advanced services such as enhanced 800 service and software-defined networks
(in the latter, customers could use a portion of the AT&T network as the virtual equivalent of a
private line network).
Additional 4ESS installations followed rapidly. By 1980, AT&T had 53 of the new switches in the
network, and by 1984, 100. Few of the older 4A crossbar switches remained. Through the separate
signalling network, all of the 4ESS switches were in direct contact with one another, and could
search for available circuits in real time. Hierarchical routing gave way to dynamic non-hierarchical
routing, where the 4ESS switches themselves could choose the best path between two points.
An AT&T technician replaces a circuit board in a digital interface frame of a 4ESS switch, Los
Angeles, 1980. As a digital switch, the 4ESS was ready when the rise of fiber-optic transmission
transformed the AT&T network into an all-digital system between the mid-1980s and the early
1990s. Calling volumes climbed steadily, increasing from 37.5 million calls per average business
day in 1984 to 300 million 15 years later.
4- ______Over those 15 years the character of the traffic began to evolve from voice to data. In the
1990s, data traffic increasingly adhered to new formats — packet switching, frame relay, asynchronous
transfer mode (ATM) and Internet protocol — routed via newer technologies rather than over the
switched voice network. In 1999, AT&T installed its 145th and last 4ESS switch in Atlanta.
Today, data services drive the network. In 2000, the volume of data traffic on the network
surpassed the volume of voice traffic. Even the word “switching” is giving way, to the broader
term “connectivity,” in recognition that much traffic today gets routed over systems designed
to direct data flows rather than voice. And this data travels in packets, mixed with other traffic,
rather than over the dedicated circuits that have carried voices since the 19th century.
(Source: http://www.corp.att.com/history/nethistory/switching.html)
Reading
Bridges: The bridge function is to connect separate homogeneous networks. Bridges map the
Ethernet address of the nodes residing on each network segment and allow only necessary
traffic to pass through the bridge. Bridging has historically referred to propagation of data across
a device without traversing a network stack, such as TCP/IP. Two bridged networks could be
treated as parts of a single subnet under Internet Protocol (IP). A wireless bridge is a hardware
component used to connect two or more network segments (LANs or parts of a LAN) which are
physically and logically (by protocol) separated. It does not necessarily always need to be a
hardware device, as some operating systems (such as Windows, Linux, Mac OS X and FreeBSD)
provide software to bridge different protocols. Many wireless routers and wireless access points
offer either a “bridge” mode or a “repeater” mode, both of which perform a similar common
function, the difference being the bridge mode connects two different protocol types and the
repeater mode relays the same protocol type. Wireless bridge devices work in pairs (point-to-
point), one on each side of the “bridge”. However, there can be many simultaneous “bridges”
using one central device (point to multipoint).
Routers: Routing achieved commercially popularity in the mid – 1980s – at a time when large-
scale Internetworking began to replace the fairly simple, homogeneous environments. Routing
is the act of moving information across an Internetwork from a source to a destination. It is
often contrasted with bridging, which perform a similar function. Routers use information within
each packet to route it from one LAN to another, and communicate with each other and share
information that allows them to determine the best route through a complex network of many
LANs.
Types of Routers
Routers are of many kinds depending on the need of the enterprises, individuals and official
use. Largest routers such as Cisco CRS-1 and Juniper T-1600 are used to set up network of
large organizations and even of the ISPs. Routers can be divided into three broad categories
depending upon the need of the network. First of their kind are internet connectivity routers,
are large multipurpose routers. When a router is placed at the boundary of an ISP and when
they communicate with the large autonomous router and external router, it is called edge router
When two border gateway protocols speaks to each other via ASes, it is called an inter provider
border router.
A router that provides sufficient support to the LAN, by becoming an integral part of the LAN is
called core router. Second important kind of routers is SOHO routers. When a router is inserted
to make connection to a DSL or other networks for a small geographical area it is known as
SOHO connectivity. Third of its types are enterprise routers. Enterprise routers have further
three branches access, distribution and core routers. Low cost SOHO routers are placed at the
branch offices for simple routing operations; they are termed as access routers. Distribution
routers collect a flow of data from several routers and bring it to main location. Distribution
routers increase the efficiency of large networks such as WAN. Core routers are used to connect
the dispersed network routers in order to achieve high bandwidth.
(Source: http://freewimaxinfo.com/network-routers.html)
77
English for Skills Course Outline 18 Weeks SW 2013
ROUTERS HISTORY
Reading Activity
Read the following text about Routers History and decide whether the follow-
ing sentences are TRUE or FALSE. Find information in the text to justify your
choice.
• IMP stands for International message processor.
• International network Working Group was set up in 1972.
• The first multiprotocol routers were independently created by Virginia Strazisar
at BBN in 1981.
• Modern high-speed routers are highly specialized computers with extra software.
• The first Xerox routers became operational in 1991.
• Modern Internet routers that handle both IPv4 and IPv6 are multiprotocol,
but are simpler devices than routers processing AppleTalk.
• Major router operating systems, such as those from Juniper Networks and
Extreme Networks, are extensively modified versions of Unix software.
The very first device that had fundamentally the same functionality as a router does today, was
the Interface Message Processor (IMP); IMPs were the devices that made up the ARPANET, the
first packet network. The idea for a router (called “gateways” at the time) initially came about
through an international group of computer networking researchers called the International
Network Working Group (INWG). Set up in 1972 as an informal group to consider the technical
issues involved in connecting different networks, later that year it became a subcommittee of
the International Federation for Information Processing.
The idea was explored in more detail, with the intention to produce a prototype system, as part
of two contemporaneous programs. One was the initial DARPA-initiated program, which created
the TCP/IP architecture in use today. The other was a program at Xerox PARC to explore new
networking technologies, which produced the PARC Universal Packet system, due to corporate
intellectual property concerns it received little attention outside Xerox for years.
Sometime after early 1974 the first Xerox routers became operational. The first true IP router was
developed by Virginia Strazisar at BBN, as part of that DARPA-initiated effort, during 1975-1976.
By the end of 1976, three PDP-11-based routers were in service in the experimental prototype
Internet. The first multiprotocol routers were independently created by staff researchers
at MIT and Stanford in 1981; the Stanford router was done by William Yeager, and the MIT one
by Noel Chiappa; both were also based on PDP-11s. Modern Internet routers that handle both
IPv4 and IPv6 are multiprotocol, but are simpler devices than routers processing AppleTalk,
DECnet, IP, and Xerox protocols.
From the mid-1970s and in the 1980s, general-purpose mini-computers served as routers.
Modern high-speed routers are highly specialized computers with extra hardware added to
speed both common routing functions, such as packet forwarding, and specialized functions
such as IPsec encryption. There is substantial use of Linux and Unix software based machines,
running open source routing code, for research and other applications. Cisco’s operating system
was independently designed. Major router operating systems, such as those from Juniper
Networks and Extreme Networks, are extensively modified versions of Unix software.
(Source: http://routers-works.blogspot.com/2007/10/routers-history-very-first-device-that.html)
Telephone Activity
Can you add other expressions to the boxes below?
78
English for Skills Course Outline 18 Weeks SW 2013
Stating the reason for a call Asking for repetition Ending a call
Thanks for your call. Bye now
I’m ringing to ... Sorry, I didn’t quite catch that.
(informal)
Telephone Activity
Can you add other expressions to the boxes below? Suggested answers
Stating the reason for a call Asking for repetition Ending a call
I’m ringing to ... Sorry, I didn’t quite catch that. Thanks for your call. Bye now.
I’m ringing about ... (informal)
I’m phoning because ... Could you repeat that, please? Thank you for your call
I was wondering if you could tell / Thank you very much.
me ... Could you speak up a little? Goodbye. (formal)
GATEWAY
A gateway is a network point that acts as an entrance to another network. On the Internet,
a node or stopping point node or a host (end-point) node. Both the computers of Internet users
and the computers that serve pages to users are host nodes, while the nodes that connect the
networks in between are gateways. For example, the computers that control traffic between
company networks or the computers used by internet service providers (ISPs) to connect users
to the internet are gateway nodes.
In the network for an enterprise, a computer server acting as a gateway node is often also
acting as a proxy server and a firewall server. A gateway is often associated with both a router,
which knows where to direct a given packet of data that arrives at the gateway, and a switch,
which furnishes the actual path in and out of the gateway for a given packet.
On an IP network, clients should automatically send IP packets with a destination outside a
given subnet mask to a network gateway. A subnet mask defines the IP range of a private
network. For example, if a private network has a base IP address of 192.168.0.0 and has a subnet
mask of 255.255.255.0, then any data going to an IP address outside of 192.168.0.X will be sent
to that network’s gateway. While forwarding an IP packet to another network, the gateway might
or might not perform Network Address Translation.
A gateway is an essential feature of most routers, although other devices (such as any PC or
server) can function as a gateway. A gateway may contain devices such as protocol translators,
impedance matching devices, rate converters, fault isolators, or signal translators as necessary
to provide system interoperability. It also requires the establishment of mutually acceptable
administrative procedures between both networks.
Most computer operating systems use the terms described above. Microsoft Windows, however,
describes this standard networking feature as Internet Connection Sharing, which acts as a gateway,
offering a connection between the Internet and an internal network. Such a system might also act
as a DHCP server. Dynamic Host Configuration Protocol (DHCP) is a protocol used by networked
devices (clients) to obtain various parameters necessary for the clients to operate in an Internet
Protocol (IP) network. By using this protocol, system administration workload greatly decreases,
and devices can be added to the network with minimal or no manual configurations.
(Source: http://wiki.answers.com/Q/What_is_a_gateway)
traffic the amount of vehicles moving along roads, or the amount of aircraft, trains or ships
moving along a route Network traffic or data traffic is data in a network
firewall a device or program that stops people getting access to a computer without
permission while it is connected to the Interne a wall to prevent the spread of a fire
track a route or path between one place and another, or the direction in which something
is moving
data track one of the circular magnetic paths on a magnetic disk that serve as a
guide for writing and reading data
Vocabulary Exercise:
1. Fill in: protocol, rate, signal, computer, impedance, fault, network, internet
2. Make sentences based on the text using the phrases.
1. ........................service providers
2. .......................server
3. ........................gateway
4. ........................translators
5. ........................matching devices
6. ........................converters
7. ........................isolators
8. ......................translators
1. Students are given the words and definitions cut up on laminated cards. In pairs they
match the word with the definition.
2. Students then either use dictionaries to find out the non-computer meaning of the
words, or they are given the definitions and have to match these to the words.
3. Or the words/definitions could be used as a form of bingo game. Students are given a
bingo card with the words on them. The teacher reads out the computer definitions and
/ or non-computer definitions and the students cross off the words.
4. Or the teacher could put students into small groups and ask them to write down the
computer and / or non-computer meaning of the words. The group with the highest
number of correct answers is the winner.
Non-Computer Definitions
BILL GATES
Reading
85
English for Skills Course Outline 18 Weeks SW 2013
NETWORK ADAPTER
Network FDDI
adapter
Ten
Base T
A network adapter, also known as a network interface card or NIC, is the device that enables
you to send and receive data to and from your computer. This adapter might be integrated into
the motherboard or act as a separate device that connects to a PCI slot or USB port. An adapter
can connect to the network by cable (wired) or by air (wireless). Network adapters also have a
software component known as a driver; this
usually includes a properties page that can
be accessed in the operating system.
The network controller implements the
electronic circuitry required to communicate
using a specific physical layer and data
link layer standard such as Ethernet, Wi-
Fi or Token Ring. This provides a base for
a full network protocol stack, allowing
communication among small groups of computers on the same LAN and large-scale network
communications through routable protocols, such as IP.
Every Ethernet network controller has a unique 48-bit serial number called a MAC address,
which is stored in read-only memory. Every computer on an Ethernet network must have at least
one controller.
10-Base T
• Limitations in the ability of coaxial cable to carry data over its single core triggered the creation
of a new networking standard in 1987 called 10-base T. 10-base T transmitted data over twisted
pairs of telephone cables, using the twists to minimize interference and cross-talk. By using
multiple wire pairs, the standard was able to transmit data at much higher data rates than was
possible with coaxial cable. 10-base T network adapters were common in the 1990s.
100-Base T
• 100-base T network adapters took advantage of advances in network cabling technology
that allowed much faster data transfer speeds over twisted pairs of wire designed for
very low interference and cross-talk. 100-base T is also known as “fast Ethernet.”
Gigabit Ethernet
• Modern data communication, especially between servers, has pushed bandwidth
requirements much higher. In the late 1990s, a new protocol called “gigabit Ethernet” was
introduced. With the installation of a gigabit Ethernet card, sometimes called 1000-base
T or other permutations of the 1000-base name schema, computers increase available
networking bandwidth 10 times. Gigabit Ethernet is capable of transmitting 1,000 mbps
of data over standard networking cables.
FDDI
• Ethernet and token ring networks have distance limitations on cables. In cases where
data needs to be sent over a long distance, in some cases miles, a fiber data digital
interface (FDDI) adapter can be installed in a computer. An FDDI adapter converts data
to optical pulses and transmits them over fiber optic lines. FDDI is a 100 mbps distributed
network that uses a token ring-type architecture. FDDI frames can easily re-encapsulate
Ethernet data for retransmission over great distances.
(Source: http://www.ehow.com/about_5250468_history-network-interface-card.html)
87
English for Skills Course Outline 18 Weeks SW 2013
2. In Playboy magazine in February 1985: “If you want to live your life in a creative way, as an
artist, you have to not look back too much. You have to be willing to take whatever you’ve done
and whoever you were and throw them away.”
3. At the Apple Worldwide Developers Conference, May 1997: “I’m actually as proud of the
things we haven’t done as the things I have done. Innovation is saying no to 1,000 things.”
4. Talking about work at the Stanford University’s Commencement address on June 12, 2005:
“Your work is going to fill a large part of your life, and the only way to be truly satisfied is to do
what you believe is great work. And the only way to do great work is to love what you do. If you
haven’t found it yet, keep looking. Don’t settle.”
88
English for Skills Course Outline 18 Weeks SW 2013
5. Talking about him being fired from Apple at the Stanford University’s Commencement Speech
2005: “I didn’t see it then, but it turned out that getting fired from Apple was the best thing
that could have ever happened to me. The heaviness of being successful was replaced by the
lightness of being a beginner again, less sure about everything. It freed me to enter one of the
most creative periods of my life.[...] It was awful tasting medicine, but I guess the patient needed
it. Sometimes life hits you in the head with a brick. Don’t lose faith.”
6. Steve Jobs gave an interview in “60 minutes” in 2003 in which he shared that his business
model was inspired by The Beatles: “My model for business is The Beatles: They were four guys
that kept each other’s negative tendencies in check; they balanced each other. And the total was
greater than the sum of the parts. Great things in business are not done by one person, they are
done by a team of people.”
7. In an interview to Business Week in 1998: “That’s been one of my mantras - focus and simplicity.
Simple can be harder than complex: You have to work hard to get your thinking clean to make it
simple. But it’s worth it in the end, because once you get there, you can move mountains.”
8. In a statement to The New York Times, 2003: “[Design is] not just what it looks like and feels
like. Design is how it works.”
9. On being the richest man in an interview to The Wall Street Journal in 1993 “Being the richest
man in the cemetery doesn’t matter to me... Going to bed at night saying we’ve done something
wonderful... that’s what matters to me.”
10. Talking about Death at the Stanford University commencement speech, June 2005:
“Remembering that I’ll be dead soon is the most important tool I’ve ever encountered to help
me make the big choices in life. Because almost everything -- all external expectations, all pride,
all fear of embarrassment or failure -- these things just fall away in the face of death, leaving only
what is truly important. Remembering that you are going to die is the best way I know to avoid
the trap of thinking you have something to lose. You are already naked. There is no reason not
to follow your heart. ... Stay hungry. Stay foolish.”
(Source: http://www.yesiknowthat.com/6-personal-things-you-didnt-know-steve-jobs)
Debate
The advantages and disadvantages of being successful.
The role of individual in society.
To encourage students to use appropriate language, each student could be given
several cards with themed key vocabulary. The students have to use the language
on their cards during the debate.
89
English for Skills Course Outline 18 Weeks SW 2013
90
English for Skills Course Outline 18 Weeks SW 2013
Writing Activity
You are going to apply for a job you think is the proper one for you. You have written your
CV and you also need to write a cover letter.
Write a cover letter.
(Source: http://www.bbc.co.uk/worldservice/learningenglish/business/getthatjob/
unit3coverletter/page1.shtml)
91
English for Skills Course Outline 18 Weeks SW 2013
1. ADSL
2. SMS
3. ISP
4. RFID
5. WAN
6. GIF
7. IP
8. LAN
9. JPEG
10. ICT
III. Complete the gaps in the text with a suitable word: ( 10 points/_______)
Hardware software data e-mail
A computer network is a number of computers linked together to allow them to share resources.
Networked computers can share _______, ________ and ________.
Most computer networks have at least one server. A server is a powerful computer that provides
one or more services to a network and its users. For example, file storage and ________.
92
English for Skills Course Outline 18 Weeks SW 2013
EXERCISE 1: Complete each gap in this text with a suitable word from the list.
Throughout its history, many mathematicians have 1)………………. the development of topology.
While Johann Benedict Listing is not credited with a memorable discovery in terms of the field of
2)…………….., he is still considered one of the founding fathers. This is because he gave topology its
name. While he published very little on topology, he is remembered for Vorstudien zur Topologie,
which was the first 3)………………. to use the word topologie (English: topology) to describe the field.
He is also often 3)…………….. with discovering the Möbius strip independently of August Ferdinand
Möbius
The origins of topology date back to the eighteenth century and the Königsberg Bridge Problem,
a problem of relative position without 4)………….. to distance . While this 5) is often regarded as
the birth of graph theory, it also 6)…………….. Euler’s development of the topology of networks
Königsberg, now Kaliningrad, was founded in 1255 and became a 7)……………. seaport . The city
8)……………. on the banks of the Praegel, now Pregolya, River. Citizens could use seven bridges
that 9)…………… the Praegal, but the question of whether or not one could pass through the town
and use each 10)……………. exactly once would turn out to be the catalyst in the creation of the
mathematical 11)…………… of topology. Swiss mathematician Leonhard Euler would be the one
to 12)……….. the answer was no. He determined that the graph defined by the 13)…………. of the
bridge was not what is now called a Eulerian graph This14)………….. entitled The Solution of a
Problem Related to the Geometry of Position was 15)……………… to the Academy of Sciences in St.
Petersburg in 1735 .
EXERCISE 3: Fill in the blanks with the correct form of can or be able to.
1)Laser light ……………..travel faster than an electric current.
2)In the future ,domestic appliances ……………..report any breakdowns for repair.
3)Marconi ………………send a radio signal across the Atlantic.
93
English for Skills Course Outline 18 Weeks SW 2013
4)Professor Warwick had a chip fitted into his arm which…………..open doors and switch on
computers as he approached.
5)Imagine ………………..to access the internet from a kitchen appliance.
6)Star and Ring topologies ………………be used effectively in hybrid topology.
Mark 4 5 6 7 8 9 10
points 0-10 11-16 17-22 23-28 29-33 34-37 38-40
94
English for Skills Course Outline 18 Weeks SW 2013
II. Mach the adjectives in column A with the nouns in column B and then make sentences
with these combinations.(10 points/________)
A B
Visionary LAN
commercial cable
broadband leader
Plastic technology
Bus use
Wireless signals
Signal network
electronic services
nanostructure cover
Coaxial interference
1. LAN
2. ISO
3. IP
4. DSL
5. ATM
6. LCD
7. TIA
8. UTP
9. EIA
10. STP
95
English for Skills Course Outline 18 Weeks SW 2013
IV. Write the noun for the following verbs in Table A and the adjectives for the nouns
in Table B. (20 points/_________)
A B
V. Convert these simple rules for running cables into a description in the Present
Passive. (8 points/________)
For example:
Use wire tacks or clips to anchor individual wires to the back of your cabinet.
Wire tacks or clips are used to anchor individual wires to the back of your cabinet.
1. Use Crutchfield’s CableLabels™ to clearly identify your cables.
2. Always use more cable than you need.
3. Leave plenty of slack.
4. Test every part of a network as you install it.
5. If it is necessary to run cable across the floor, cover the cable with cable protectors.
6. Label both ends of each cable.
7. Use cable ties (not tape) to keep cables in the same location together.
8. Keep excess cabling in an “S” or figure-eight shape (not in a loop) to prevent
electromagnetic interference.
VI. Complete the gaps in the text with a suitable word (15 points/________)
Coaxial cable was (1) __________ in 1929 and first (2) _______ commercially in 1941. AT&T
established its first cross-continental coaxial (3) ________ system in 1940. Coaxial cables are
96
English for Skills Course Outline 18 Weeks SW 2013
installed in underground ducts in metropolitan areas. However, in country areas, and over (4)
_______ -distance routes, the cable is buried about a meter deep along its (5) ______. Rather
larger excavations have to be made for the underground housings for the (6) _______
equipment, into which the cable is led and jointed. Coaxial cables were extensively used
in mainframe (7)________systems and were the first type of major cable used for LAN.
Coaxial (8) ______ has a single copper conductor at its center. A plastic (9) ________ provides
insulation between the center conductor and a braided metal shield. The metal (10) ________
helps to block any (11) ________ outside from fluorescent lights, motors, and other computers.
Two types of coaxial cabling are: (12)________ coaxial and thin coaxial. Thin coaxial cable has
been popular in school networks, especially linear bus (13)_______. Thick coaxial cable is also
referred to as thicket. Thick coaxial cable has an extra protective plastic cover that helps keep
(14)______________ away from the center (15) ________.
Mark 4 5 6 7 8 9 10
points 19 20-31 32-43 44-55 56-66 67-75 76-80
7 10 10 20 8 15 4 6 80
97
English for Skills Course Outline 18 Weeks SW 2013
English in Use
Section A
Read the following text. For each space (numbers 1-10) use the correct form of the word in the
right hand column.
Two of the most (1)……………………….. used passwords are ‘123456’ and ‘password’ (1) common
- very bad choices as they would be among the first to be tried by an intelligent
(2) attack
(2)……………………….. .
The ideal password is a fairly random sequence of characters, and extra length is
usually more important than a wider range of symbols. But creating your password
in this way is not always the most ‘human-friendly’ approach as you may find it (3) trick
(3)……………………….. to remember.
Instead, one of the best techniques is to choose a (4)……………………….. phrase (4) memory
containing the same number of words as the desired password length in letters
(usually this is at least eight characters) and use the first letter of each word to
create an acronym to use as your password. The (5)……………………….. phrase (5) choose
should not be well-known, and using capitals and lower case can add quite a lot
of strength, but substituting numbers for letters or adding special symbols doesn’t
(6) different
make much (6)………………………...
There are many websites that will allow you the chance to see how
(7)……………………….. your password is, and often the site you are registering with (7) security
will offer you the chance to test the (8)……………………….. of your proposed password (8) strong
before you log on.
The Password Meter will allow you to test the strength of your chosen password
and experiment with how it can be improved by adding upper and lower case
letters as well as numbers and symbols. Password Calculator is another useful
(9)……………………….. of password strength. This intriguing site will show you how (9) indicate
(10)……………………….. your password could be hacked using a ‘brute force’ attack. By (10) quick
playing around with various characters and password lengths it’s not hard to create
a password that could take many thousands of years to crack!
98
English for Skills Course Outline 18 Weeks SW 2013
Section B
Questions 1-10: Complete the second sentence so that it has a similar meaning to the first
sentence. You must use the work in bold.
is
suggest
3. Tom and David from the IT department have disabled the firewall.
by
reduce
5. ‘Do you know how to set up the new network, Aleksander?’ asked Ermir.
if
Ermir asked Aleksander…………………………………………………………………………………. new
network.
tell
far
99
English for Skills Course Outline 18 Weeks SW 2013
8. I think you should try ordering the fibre optic cable from a different supplier.
were
as
10. Although the printers were expensive, the quality was excellent.
despite
Section C
Read the following text. For numbers 1-10 complete each space with one word only.
Network topology is the layout pattern of interconnections of the various elements (links, nodes, etc.) of a
computer network. Network topologies may (1)……………… physical or logical. Physical topology means the
physical design of a network including the devices, location and cable installation. Logical topology refers
(2)……………… how data is actually transferred in a network as opposed (3)……………… its physical design.
Topology can be considered as a virtual shape or structure of a network. This shape does not correspond
(4)……………… the actual physical design of the devices on the computer network. The computers on a
home network can be arranged (5)……………… a circle but it does not necessarily mean that it represents
a ring topology.
Any particular network topology (6)……………… determined only by the graphical mapping of the
configuration of physical and/or logical connections between nodes. The study (7)……………… network
topology uses graph theory. Distances between nodes, physical interconnections, transmission rates, and/
or signal types may differ in two networks and yet their topologies may be identical.
A local area network (LAN) is one example of a network (8)……………… exhibits (9)……………… a physical
topology and a logical topology. Any given node in the LAN has one or more links to one or more nodes in
the network and the mapping of these links and nodes in a graph results (10)……………… a geometric shape
that may be used to describe the physical topology of the network. Likewise, the mapping of the data flow
between the nodes in the network determines the logical topology of the network. The physical and logical
topologies may or may not be identical in any particular network.
(Source: http://www.princeton.edu/~achaney/tmve/wiki100k/docs/Network_topology.html -
accessed on 13/03/13)
100
English for Skills Course Outline 18 Weeks SW 2013
Section D
Read the following text. For questions 1-10 choose one word from the box below which is most
suitable for each space. Put a circle around the correct word in each box.
Case study 1
Peter (1)……………… a small website design company from a home office, and assumed he
(2)……………… be fine with home broadband instead of a business broadband package. The
(3)……………… of his business involved working locally on his own.
After (4)……………… in business for a few months he lost his Internet connection. After repeated
calls over several days, Peter was still offline. The customer service (5)……………… been outsourced
to an overseas call centre and communication was strained at (6)……………….
Consumer broadband carried no guarantees should a problem (7)………………. Providers are within
their rights (as set out in your contract with them) to fix any problems within an acceptable time
period; this could be anything from a day to several weeks.
Peter’s broadband connection was finally repaired after 14 days. If Peter had taken a business
broadband package, he could have saved time and money, (8)……………… is essential to any small
business.
Most business broadband providers operate from call centres, which could’ve helped Peter
(9)……………… his problem more (10)……………… and more efficiently.
101
English for Skills Course Outline 18 Weeks SW 2013
Section B
is
suggest
I suggest contacting/ suggest that you contact your internet service provider.
3. Tom and David from the IT department have disabled the firewall.
by
The firewall has been disabled by Tom and David from the IT department.
102
English for Skills Course Outline 18 Weeks SW 2013
Reduce
We’d have to reduce our staff unless we continued to sell more PCs.
5. ‘Do you know how to set up the new network, Aleksander?’ asked Ermir.
if
tell
‘Could you tell me where the instructions for this new printer are?’
far
8. I think you should try ordering the fibre optic cable from a different supplier.
were
If I were you I’d try ordering the fibre optic cable from a different supplier.
as
10. Although the printers were expensive, the quality was excellent.
despite
103
English for Skills Course Outline 18 Weeks SW 2013
Section C
Read the following text. For numbers 1-10 complete each space with one word only.
Network topology is the layout pattern of interconnections of the various elements (links, nodes, etc.) of
a computer network. Network topologies may be physical or logical. Physical topology means the physical
design of a network including the devices, location and cable installation. Logical topology refers to how
data is actually transferred in a network as opposed to its physical design.
Topology can be considered as a virtual shape or structure of a network. This shape does not correspond
to the actual physical design of the devices on the computer network. The computers on a home network
can be arranged in a circle but it does not necessarily mean that it represents a ring topology.
Any particular network topology is determined only by the graphical mapping of the configuration of
physical and/or logical connections between nodes. The study of network topology uses graph theory.
Distances between nodes, physical interconnections, transmission rates, and/or signal types may differ in
two networks and yet their topologies may be identical.
A local area network (LAN) is one example of a network that exhibits both a physical topology and a
logical topology. Any given node in the LAN has one or more links to one or more nodes in the network
and the mapping of these links and nodes in a graph results in a geometric shape that may be used to
describe the physical topology of the network. Likewise, the mapping of the data flow between the nodes
in the network determines the logical topology of the network. The physical and logical topologies may or
may not be identical in any particular network.
(Source: http://www.princeton.edu/~achaney/tmve/wiki100k/docs/Network_topology.html -
accessed on 13/03/13)
Section D
Case study 1
Home worker’s connection problems
Peter (1)……………… a small website design company from a home office, and assumed he
(2)……………… be fine with home broadband instead of a business broadband package. The
(3)……………… of his business involved working locally on his own.
After (4)……………… in business for a few months he lost his Internet connection. After repeated
calls over several days, Peter was still offline. The customer service (5)……………… been outsourced
to an overseas call centre and communication was strained at (6)……………….
Consumer broadband carried no guarantees should a problem (7)………………. Providers are within
their rights (as set out in your contract with them) to fix any problems within an acceptable time
period; this could be anything from a day to several weeks.
Peter’s broadband connection was finally repaired after 14 days. If Peter had taken a business
broadband package, he could have saved time and money, (8)……………… is essential to any small
business.
Most business broadband providers operate from call centres, which could have helped Peter
(9)……………… his problem more (10)……………….
104
English for Skills Course Outline 18 Weeks SW 2013
105
English for Skills Course Outline 18 Weeks SW 2013
106
English for Skills Course Outline 18 Weeks SW 2013
107
English for Skills Course Outline 18 Weeks SW 2013
108