Course Syllabus COURSE IDENTIFICATION Course Prefix/Number: ETEC 205 Course Title: CISCO Networking III Division: Applied Science Division Program: Computer Information Systems Credit Hours: 3 Initiation/Revised Date: Fall 2004 Assessment Goal per Outcome(s) 70% CLASSIFICATION OF INSTRUCTION Vocational COURSE DESCRIPTION This is the third of four semester courses designed to provide students the skills they will need to design, build, and maintain small to medium size networks. This provides them with the opportunity to enter the workforce and/or further their education and training in the computer networking field. Courses must be taken in sequence. PREREQUISITES AND/OR COREQUISITES CISCO Networking I and II. A++ certification, Microsoft Office skills; introductory programming or multimedia courses; and/or introductory electronics courses are helpful, but not required. TEXTS *The official list of textbooks and materials for this course are found on Inside NC. Multimedia Text from Cisco Networking Academy COURSE OUTCOMES Upon completion of CISCO Networking III students will be able to perform tasks related to the following and to competently: 1. Identify the OSI Reference Model and the problems it solves. 2. Explain the physical layer of the OSI reference model.
3. Explain the Data Link Layer of the OSI Reference Model. 4. Identify routing and the different classes of routing protocols. 5. Describe the transport layer of the OSI reference model. 6. Define various LAN communication problems. 7. Define full-duplex transmitting, the Ethernet standard, and LAN segmentation. 8. Describe switching and VLANs. 9. Explain the spanning-tree protocol. 10. Define VLANs. 11. Analyze segmentation with switching architecture. 12. Define VLAN implementation. 13. Examine the benefits of VLANS. 14. Define LAN Network design goals and components. 15. Explain network design methodology. 16. Define layer 1 design. 17. Define layer 2 design. 18. Define layer 3 design. 19. Describe the network layer basics. 20. Interpret routed and routing protocols. 21. Define IP routing protocols. 22. Define IGRP operation. 23. Explain access control lists (ACLs). 24. Describe ACL configuration tasks. 25. Define standard ACLs. 26. Explain extended ACLs. 27. Define named ACLs. 28. Explain using ACLs with protocols. 29. Explain placing ACLs. 30. Describe planning structured cabling: identifying potential wiring closets. 31. Explain network performance. 32. Define server administration. 33. Explain network troubleshooting. COURSE COMPETENCIES 1. Identify the OSI Reference Model and the problems it solves. a. Describe the layered network model: the OSI reference model. b. List the OSI model layers. c. Demonstrate peer-to-peer communication. 2. Explain the physical layer of the OSI reference model. a. Identify three categories of Ethernet. b. List three varieties of 10 MBPS Ethernet. 3. Explain the Data Link Layer of the OSI Reference Model. a. Examine lock analogy for NICs. b. Describe data transport across the physical link connecting hosts, routers, and other devices.
c. Define network layer functions. d. Identify layer 3 protocols of the TCP/IP stack. e. Define network and subnetwork addresses in the IP. f. Demonstrate path determination in the contexts of packets and routers. g. Analyze why layer 3 addresses must contain both path and host information. h. List types of ICMP messages. i. Demonstrate the ping command. j. Define ARP. 4. Identify routing and the different classes of routing protocols. a. Describe routing in a mixed LAN-media environment. b. Describe two basic operations a router performs. c. Explain static and dynamic routes. d. Describe default route. e. Identify routed and routing protocols. f. List information that routers use to perform their basic functions. g. Describe IP routing protocols. h. Explain network convergence. i. Explain distance-vector routing. j. Compare and contrast distance vector and link-state routing. k. Demonstrate enabling an IP routing process. l. Complete configuring RIP. 5. Describe the transport layer of the OSI reference model. a. Explain routing in a mixed LAN-media environment. b. Describe layer 4 segmentation. c. Define the three-way handshake. d. Explain why a buffer is used in data communications. e. Define windowing. f. Explain reliability via acknowledgment. 6. Define various LAN communication problems. a. Identify factors putting pressure on network performance. b. List elements of Ethernet/802.3 network c. Describe half-duplex Ethernet. d. Identify network congestion. e. Explain network latency. f. Explain Ethernet 10Base T transmission time. g. List the benefits of using repeaters. 7. Define full-duplex transmitting, the Ethernet standard, and LAN segmentation. a. Define full-duplex Ethernet. b. Define LAN segmentation. c. Explain LAN segmentation with bridges. d. Explain the pros and cons of LAN segmentation with routers. e. Explain the pros and cons of LAN segmentation with switches. 8. Describe switching and VLANs. a. Describe the two basic operations of a switch. b. Explain Ethernet switch latency. c. Describe layer 2 and layer 3 switching.
d. Identify microsegmentation. e. Explain how a switch learns addresses. f. Analyze the benefits of LAN switching. g. Compare and contrast symmetric and asymmetric switching. h. Define memory buffering. i. Describe two switching methods. j. Demonstrate how to set up VLANs. 9. Explain the spanning-tree protocol. a. Describe overview of the Spanning-Tree protocol. b. Describe the five Spanning-Tree states. 10. Define VLANs. a. Describe existing shared LAN configurations. 11. Analyze segmentation with switching architecture. a. Demonstrate grouping geographically separate users into networkwide virtual topologies. b. Compare differences between traditional switched LANs and VLANs. c. Explain the transport of VLANs across backbones. d. Define the role of routers in VLANs. e. Define how frames are used in VLANs. 12. Define VLAN implementation. a. Explain the relationship between ports, VLANs and broadcasts. b. Explain why port-centric VLANs make an administrator s job easier. c. Describe static VLAN. d. Describe dynamic VLAN. 13. Examine the benefits of VLANS. a. Explain how VLANs make adds, moves, and changes easier. b. Identify how VLANs help control broadcast activity. c. Identify VLANs can improve network security. d. Describe how VLANs can save money. 14. Define LAN Network design goals and components. a. List LAN design goals. b. Distinguish critical components of LAN design. c. Interpret the function and placement of servers when designing a network intranet. d. Explain why contention is an issue with Ethernet. e. Define how broadcast domains relate to segmentation. f. Compare the difference between bandwidth and broadcast domains. 15. Explain network design methodology. a. Indicate gathering and analyzing requirements. b. List factors that affect network availability. c. Describe physical topologies used in networking. 16. Define layer 1 design. a. Describe designing the Layer 1 topology: signaling method, medium type, and maximum length. b. Perform diagramming a standards-based Ethernet cable run from the workstation to the HCC, including distances. c. Define HCC, VCC, MDF, IDF, and POP.
d. Define 10BaseT and 100BaseT Ethernet. e. Describe elements of a logical topology diagram. 17. Define layer 2 design. a. Explain common 2 Layer devices and their impact on network domains. b. Describe asymmetric switching. c. Define the effect microsegmentation can have on a network. d. Determine the number of cable runs and drops. e. Determine the size of collision domains in hubbed and switched networks. f. Diagramming hub placement in a standards-based extended star topology. g. Describe migrating a network from 10 Mbps to 100 Mbps. 18. Define layer 3 design. a. Demonstrate using routers as the basis for Layer 3 network design. b. Define how LANS can create smaller broadcast domains. c. Explain how a router provides structure to a network. d. Explain why large, scalable LANs need to incorporate routers. e. Diagram a standards-based LAN that uses routers. f. Interpret logical and physical network maps. 19. Describe the network layer basics. a. Explain path determination. b. Perform path determination. c. Explain the operation of routing tables. d. Compute metrics. e. Identify router forwarding decisions. 20. Interpret routed and routing protocols. a. Define routing protocols. b. Distinguish multiprotocol routing. 21. Define IP routing protocols. a. Differentiate one routing protocol from another. b. Describe five goals of routing protocols. c. Define routing loops. d. Compare and contrast static and dynamic routing. e. List classifications of routing protocols. f. Demonstrate IP routing configurations: choosing a routing protocol. 22. Define IGRP operation. a. Explain IGRPs metrics. b. Differentiate amongst interior system and exterior routes. c. Write out a correct command sequence for enabling IGRP on a router. d. Describe three features of IGRP which enhance its stability. e. Interpret IGRP metrics and routing updates. f. Define the maximum hop count of IGRP. 23. Explain access control lists (ACLs). a. Define ACLs. b. List reasons to create ACLs. c. Perform testing packets with ACLs. d. Describe how ACLs work. e. Demonstrate flowchart of the ACL test matching process.
24. Describe ACL configuration tasks. a. Create ACLs. b. Describe the purpose and function of wildcard mask bits. c. Define the any command. d. Define the host command. 25. Define standard ACLs. a. Name what are standard ACLs. b. Write a valid standard ACL command using all available parameters. c. Demonstrate how to verify access control lists. d. Write a stand ACL to permit traffic from a source network. e. Write a standard ACL to deny a specific host. f. Write a standard ACL to deny a specific subnet. 26. Explain extended ACLs. a. Name what are extended ACLs. b. Define extended ACL parameters. c. Distinguish UDP and TCP port numbers. d. Write an ACL for denying FTP on an Ethernet interface. e. Write an ACL which denies Telnet out of an Ethernet port and permits all other traffic. 27. Define named ACLs. a. Perform configuring named ACLs. b. Explain the deny command. c. Explain the permit command. 28. Interpret using ACLs with protocols. a. Define protocols for which ACLs can be created. 29. Explain placing ACLs. a. Explain the rule: Putting the ACL as close as possible to the source of the traffic denied 30. Describe planning structured cabling: identifying potential wiring closets. a. Explain static, dust, dirt and heat. b. Explain power conditioning. c. Define EMI and FRI. d. Describe software viruses. 31. Explain network performance. a. Define network baseline, updates, and change verification. 32. Define server administration. a. Explain peer-to-peer. b. Define client-server. c. Explain network control. 33. Explain network troubleshooting. a. Define scientific method. b. Analyze network troubleshooting. COURSE OUTLINE
Unit I Unit II Unit III Unit IV Unit V Unit VI Unit VII Objectives #1 5: OSI Reference Model, physical layer, data link layer, routing, transport layer Objectives #6 9: LAN, Ethernet standard, VLANs, spanning-tree protocol Objectives #10 13: VLAN s, segmentation, implementation Objectives #14 18: LAN goals, design methodology, layer 1, layer 2, layer 3 design Objectives #19 22: Layer basics, routing protocols, IP, IGRP Objectives #23-28: ACLs, configuration, standard ACLs, extended ACLs, named ACLs, protocols Objectives #29 33: ACLs placement, cabling, performance, administration, troubleshooting INSTRUCTIONAL METHODS Lecture, discussions, demonstrations, assigned readings, and computerized applications STUDENT REQUIREMENTS AND METHOD OF EVALUATION To successfully complete the course students must master basic content, lab skills, documentation skills, people skills, and achieve awareness and access. Grading % Comments Skill Exams *P/F Mastery of skills: Configuring switches and routers; configuring IGRP, Access Lists, & IPX on routers. Homework 10% Practice problems and designs Journal 10% Document all laboratory and project work completely Oral Exams 20% Oral exam where students explain how the Threaded Case Study Learning objectives are met by their individual designs. Exams 20% Computerized exams Final Exam 30% Comprehensive written, oral, and lab practical exam Portfolio 10% Deliverables for Threaded Case Study (TCS). *Pass/Fail GRADING SCALE A = 90-100% B= 80-89% C= 70-79% D= 60-69% F <60% ASSESSMENT OF STUDENT GAIN Assessment of the student s gain will be measured by comparing the students knowledge base at the beginning and end of the semester. This will be done by giving each student an objective pre-test
covering the course contents at the beginning of the semester and administering the same instrument as a post-test at the conclusion of the course. A comparison will then be made. Attendance Policy Absences that occur due to students participating in official college activities are excused except in those cases where outside bodies, such as the State Board of Nursing, have requirements for minimum class minutes for each student. Students who are excused will be given reasonable opportunity to make up any missed work or receive substitute assignments from the instructor and should not be penalized for the absence. Proper procedure should be followed in notifying faculty in advance of the student s planned participation in the event. Ultimately it is the student s responsibility to notify the instructor in advance of the planned absence. Unless students are participating in a school activity or are excused by the instructor, they are expected to attend class. If a student s absences exceed one-hundred (100) minutes per credit hour for the course or, in the case of on-line or other non-traditional courses, the student is inactive for one-eighth of the total course duration, the instructor has the right, but is not required, to withdraw a student from the course. Once the student has been dropped for excessive absences, the registrar s office will send a letter to the student, stating that he or she has been dropped. A student may petition the chief academic officer for reinstatement by submitting a letter stating valid reasons for the absences within one week of the registrar s notification. If the student is reinstated into the class, the instructor and the registrar will be notified. Academic Integrity NCCC expects every student to demonstrate ethical behavior with regard to academic pursuits. Academic integrity in coursework is a specific requirement. Definitions, examples, and possible consequences for violations of Academic Integrity, as well as the appeals process, can be found in the College Catalog, Student Handbook, and/or Code of Student Conduct and Discipline. Cell Phone Policy Student cell phones and pagers must be turned off during class times. Faculty may approve an exception for special circumstances. ADVISORY COUNCIL INVOLVEMENT The Industrial Engineering Technology program maintains a Board of Reference for this vocational component. The coordinator communicates with the Board on a regular basis concerning issues or problems that occur and meets with the group one or two times each year.
VOCATIONAL/CAREER COURSE DOCUMENTATION This course is one course from the approved program in vocational Industrial Engineering Technology education. It is taken by students in transfer programs, students preparing for electronics, computer networking, or technical positions, as well as other student and business owners. NOTE Information and statements in this document are subject to change at the discretion of NCCC. Changes will be published in writing and made available to students. NOTE: If you are a student with a disability who may need accommodation(s) under the Americans with Disabilities Act (ADA), please notify the Dean of Student Development, Chanute Campus, Student Union, 620-431-2820, Ext. 213., or the Dean, Ottawa Campus, 785-242-2607 ext 312, as soon as possible. You will need to bring your documentation for review in order to determine reasonable accommodations, and then we can assist you in arranging any necessary accommodations.