Please enable JavaScript to use CodeHS

Standards Framework

for California Networking Pathway


Standards in this Framework

Standard Description
B1.1 Define the terminology used in the design, assembly, configuration, and implementation of networks.
B1.2 List the fundamental elements of the major networking models established by the industry standards of recognized organizations: the Open System Interconnect (OSI) or transmission-control/Internet protocol (TCP/IP) models.
B1.3 Identify and explain how data, voice, and video/communications are carried through the most common network media.
B1.4 List the characteristics, advantages, and disadvantages of the various networking presentation functions, data formatting, data encryption, and data compression.
B1.5 Explain the characteristics of networking hardware and applications and the methods to deploy them.
B1.6 Design and document data/communication systems networks.
B2.1 Use appropriate wiring and wireless standards and plan, install, and maintain media (copper, fiber, and wireless) for a variety of network systems.
B2.2 Demonstrate standard procedures and practices for safely using tools and working safely around the electrical environment in various networking systems.
B2.3 Test and maintain wired and wireless network communications components and systems.
B3.1 Identify and describe the functions of various network devices, including network connectivity hardware.
B3.2 Describe the differences between various network environments: peer-to-peer, client-server, thin client, virtualized, internetworks, intranets, and extranets.
B3.3 Distinguish between the topologies and protocols of local area networks and those of wide area networks.
B3.4 Confirm operating parameters, apply test procedures, make necessary adjustments, and assemble the components of a network system or subsystem.
B3.5 Configure the major addressing and routing protocols used in networking.
B3.6 Implement a functional wired and wireless network, including the installation and configuration of components, software, and plug-ins.
B3.7 Evaluate, select, and deploy a variety of network architectures, information and communication technologies, and protocols.
B4.1 Identify and use network tools to troubleshoot and verify network availability and performance.
B4.2 Identify common customer policies and procedures, including those for management of incidents.
B4.3 Identify the implications of major protocols and international standards and their impact on network management.
B4.4 Apply appropriate technologies to improve network performance for data, voice, and video transmission.
B4.5 Apply the proper security patches, updates, and procedures necessary to maintain and support a network.
B4.6 Use common help-desk tools and resources, such as incident tracking, knowledge database, and staffing to administer and manage a network.
B4.7 Apply known effective methods of disseminating information and instruction to users.
B4.8 Use project management skills and tools for managing and maintaining various types of networks.
B4.9 Analyze network system interdependencies and constraints.
B5.1 Classify and use various electronic components, symbols, abbreviations, and media common to network topology diagrams.
B5.2 Interpret, organize, and communicate complex network diagrams by using information collected from detailed drawings.
B6.1 Identify and document the appropriate uses of networking services, products, and applications.
B6.2 Evaluate the features of communications software products in terms of their appropriateness to organizational tasks.
B6.3 Configure compatible systems across various platforms and types of media.
B7.1 Describe the effective management of human, financial, and communications resources from the standpoints of the user and the provider.
B7.2 Diagram physical and logical layouts of networks that support information and communication technologies.
B7.3 Evaluate emerging products, services, and business models in relation to the creation, setup, and management of networks that support information and communication technologies.
B7.4 Evaluate, create, and process voice, video, and data transmissions.
B8.1 Identify and define command network security threats: hackers, crackers, viruses, worms, and Trojan horses.
B8.2 Describe the importance of classifying appropriate monitoring devices and procedures for quick identification and prevention of security violations.
B8.3 List the policies and procedures for routine administration, such as user agreement, incident reporting, and recovery for users.
B8.4 Identify common potential risks and entrance points, including internal and external risks, and the tools used to neutralize them: firewalls; monitoring; and antivirus, spyware, and spam protection.
B8.5 Identify and apply common techniques for disaster prevention and recovery.