110CIS265A90374249254420411CIS265W10 by jianglifang

VIEWS: 3 PAGES: 20

									                                        Pierce College - Course CIS 265
                                       Data Communications and Networks
                                                  5 Credits

    Instructor:       Ciaran Bloomer
    Office Hours:
    E-mail Address:   cbloomer@pierce.ctc.edu

    Web Sites:        http://134.39.117.3


    Overview:         This course teaches students, through lectures, discussions, demonstrations, textbook
                      exercises, and labs, the skills and knowledge necessary to help prepare them to take and
                      pass the CompTIA Network+ (N10-004) exam


    Objectives:       Upon successful completion of this course the student will, in each of the networking areas
                      listed below, be able to:
                      1. Network Technologies
                         Explain the function of common networking protocols
                         Identify commonly used TCP and UDP default ports
                         Identify the following address formats
                         Given a scenario, evaluate the proper use of the following addressing technologies and
                           addressing schemes
                         Identify common IPv4 and IPv6 routing protocols
                         Explain the purpose and properties of routing
                         Compare the characteristics of wireless communication standards

                      2. Network Media and Topologies
                         Categorize standard cable types and their properties
                         Identify common connector types
                         Identify common physical network topologies
                         Given a scenario, differentiate and implement appropriate wiring standards
                         Categorize WAN technology types and properties
                         Categorize LAN technology types and properties
                         Explain common logical network topologies and their characteristics
                         Install components of wiring distribution

                      3. Network Devices
                         Install, configure and differentiate between common network devices
                         Identify the functions of specialized network devices
                         Explain the advanced features of a switch
                         Implement a basic wireless network

                      4. Network Management
                         Explain the function of each layer of the OSI model
                         Identify types of configuration management documentation
                         Given a scenario, evaluate the network based on configuration management
                           documentation
                         Conduct network monitoring to identify performance and connectivity issues using the
                           following:
                         Explain different methods and rationales for network performance optimization
                         Given a scenario, implement the following network troubleshooting methodology




CIS 265 Data Communications and Networks                                                                    Page 1
                                                                                                 Course Outline


                        Given a scenario, troubleshoot common connectivity issues and select an appropriate
                         solution

                     5. Network Tools
                        Given a scenario, select the appropriate command line interface tool and interpret the
                          output to verify functionality
                        Explain the purpose of network scanners
                        Given a scenario, utilize the appropriate hardware tools

                     6. Network Security
                        Explain the function of hardware and software security devices
                        Explain common features of a firewall
                        Explain the methods of network access security
                        Explain methods of user authentication
                        Explain issues that affect device security
                        Identify common security threats and mitigation techniques

    Grading:           Final grades are determined through a weighted average of midterm and final
                       examinations, review questions and laboratory assignments. Your final grade in the
                       course will be based on the following:

                                Laboratory assignments     25%
                                Review Questions           25%
                                Midterm examination        25%
                                Final examination          25%
                                                           100%

    Assignments:       Lab assignments: You should keep a screen capture of the final screen for each
                       lab you perform. A single word document file containing these screen captures
                       should be emailed to the instructor no later than Wednesday March 10.

                       Chapter quizzes must be submitted by the deadline, except in extraordinary
                       circumstances. The assignments may be downloaded from the department web
                       server at: http://134.39.117.3 by clicking on the course number and name.
                       Completed assignments should be emailed to the instructor. The subject line of
                       the email must include the Course Number (CNE231) and the word ‘Assignment’.


    Book:              Title:       CompTIA Network+ Certification Kit: (Exam: N10-004)
                       Edition:     2nd
                       Author:      Todd Lammle, Bill Ferguson, and Toby Skandier
                       Publisher:   Sybex
                       ISBN 13:     978-0-470-43097-2
                       Date:        May 4, 2009
                       Required:    Yes




CIS 265 Data Communications and Networks                                                                    Page 2
                                                                                                                                        Course Outline


    Date                              Activity                                                Labs and Chapter Quizzes
 Mon Jan 4    Chapter 1: Introduction to Networks                 Chapter 1 Quiz (Due Jan 20)
                                                                  Lab 1, Using Network Monitor
                                                                      Many of the lab exercises manual require you to use the Network Monitor
                                                                      application included with Windows Server 2003 to capture traffic from your
                                                                      workgroup network so you must install and learn to use it now so that it is
                                                                      available to you in subsequent labs. Because you will use Network Monitor
                                                                      frequently throughout the course, it is crucial that you develop the skills
                                                                      needed to use it effectively during this first lab.

 Wed Jan 6    Chapter 2: The Open Systems Interconnection         Chapter 2 Quiz (Due Jan 20)
                       Specifications

 Mon Jan 11   Chapter 3: Networking Topologies, Connectors, and   Chapter 3 Quiz (Due Jan 20)
                       Wiring Standards                           Lab 2, Understanding Network Components

 Wed Jan 13   Chapter 4: The Current Ethernet Specifications      Chapter 4 Quiz (Due Jan 20)
                                                                  Lab 3, Building a Network

 Mon Jan 18   Martin Luther King Day, No Classes

 Wed Jan 20   Chapter 5: Networking Devices                       Chapter 1-4 Quizzes Due
                                                                  Chapter 5 Quiz (Due Feb 8)

 Mon Jan 25   Chapter 6: Introduction to Internet Protocol (IP)   Chapter 6 Quiz (Due Feb 8)
                                                                  Lab 4, Analyzing Ethernet Traffic
                                                                      Although Active Directory Directory service is not directly related to the study
                                                                      of data-link layer protocols and Ethernet, Exercise 4-1, “Installing Active
                                                                      Directory,” and Exercise 4-2, “Joining a Domain,” call for you to install Active
                                                                      Directory and join a server to your newly created domain. Active Directory will
                                                                      be required for labs later in the course. If you miss this lab session, you must
                                                                      complete these first two exercises before you proceed to the later labs. In
                                                                      Exercise 4-4, “Analyzing Ethernet Addresses,” you will require access to the
                                                                      list of organizationally unique identifiers (OUIs) published by the Institute of
                                                                      Electrical and Electronics Engineers (IEEE) so you can look up the OUIs of the
                                                                      network interface adapters in your computers and determine their
                                                                      manufacturers. The IEEE maintains a search engine for OUIs on its Web site at
                                                                      standards.ieee.org/regauth/oui/index.shtml.

 Wed Jan 27   Chapter 7: IP Addressing                            Chapter 7 Quiz (Due Feb 8)



CIS 265 Data Communications and Networks                                                                                                        Page 3
                                                                                                                                          Course Outline


    Date                             Activity                                                  Labs and Chapter Quizzes

 Mon Feb 1    Chapter 8: IP Subnetting, Troubleshooting IP, And   Chapter 8 Quiz (Due Feb 8)
                       Introduction to NAT                        Lab 5, Network Layer Protocols
                                                                      For these labs your group will need a unique network address that will be
                                                                      provided by the instructor. In a later lab all the student workgroup networks
                                                                      will be connected to the classroom network by routers, so you must use the
                                                                      address provided, not make up an address of your own.

 Wed Feb 3    Chapter 9: Introduction to IP Routing               Chapter 9 Quiz (Due Feb 24)

 Mon Feb 8    Chapter 10: Routing Protocols                       Chapter 5-8 Quizzes Due
                                                                  Chapter 10 Quiz (Due Feb 24)
                                                                  Lab 6, Transport Layer Protocols
                                                                      In Exercise 6-2, “Calculating IP Addresses,” you calculate the IP addresses
                                                                      your workgroup computers will use and record them in Table 6-1. The mask
                                                                      and addresses calculated during this lab and Lab 5 are used by the workgroup
                                                                      network computers throughout the rest of the course, and subsequent labs
                                                                      require all students to supply the results of these calculations. So you must
                                                                      submit a copy of this table at the conclusion of Lab 6 so that they will be
                                                                      available during future lab sessions in case some students fail to bring their
                                                                      materials to class.

 Wed Feb 10   Chapter 11: Switching and Virtual LANs (VLANs)      Chapter 11 Quiz (Due Feb 24)

 Mon Feb 15   Presidents’ Day, No Classes                         Lab 7, TCP/IP
                                                                      In the initial configuration for each workgroup, Computerxx, which has two
                                                                      network interface adapters, is connected both to the classroom network and to
                                                                      the students’ workgroup network. Computerxx can therefore access both
                                                                      networks, but Computeryy can’t because Computerxx isn’t configured to
                                                                      function as a router. In this lab you configure the Routing and Remote Access
                                                                      Service (RRAS) on Computerxx to route traffic between the two networks so
                                                                      that Computeryy can access not only the classroom network but also the other
                                                                      student workgroup networks in the classroom. The internetwork connectivity
                                                                      provided by RRAS on Computerxx will be essential to some of the labs later in
                                                                      the course, so it is important that this lab be completed successfully, so ask for
                                                                      help if you are having difficulties. Because other labs in the course use
                                                                      different RRAS configurations, it will also be necessary for you to reset RRAS
                                                                      later and reconfigure the service to the configuration defined in this lab.
                                                                      Some of the exercises in this lab depend on the progress of the other



CIS 265 Data Communications and Networks                                                                                                           Page 4
                                                                                                                                   Course Outline


    Date                             Activity                                               Labs and Chapter Quizzes
                                                                  workgroups in the classroom. For example, Computerxx on one student
                                                                  network might be ready to route traffic to the classroom network and will
                                                                  therefore be able to access the Server01 cis265server computer. However, the
                                                                  workgroup’s Computerxx won’t be able to access the Computeryy on another
                                                                  workgroup network until the other workgroup has a functioning router as well.
                                                                  It is also possible for delays to occur while Routing Information Protocol (RIP)
                                                                  information propagates to the various routers in the classroom. Be prepared
                                                                  wait if your network communications tests are not immediately successful and
                                                                  perhaps direct them to a workgroup that has already completed its exercises and
                                                                  is also ready for internetwork testing.
                                                                  Lab Challenge 7-1, “Creating Static Routes,” requires you to disable RIP on
                                                                  Computerxx and create static routes that perform the same functions as the RIP
                                                                  routes. At the end of this challenge you should remove the static routes you
                                                                  created and reinstall RIP.

 Wed Feb 17   Chapter 12: Wireless Technologies               Chapter 12 Quiz (Due Due Feb 24)

 Mon Feb 22   Chapter 13: Authentication and Access Control   Chapter 13 Quiz (Due Due Mar 10)
                                                              Lab 8, Networking Software

 Wed Feb 24   Chapter 14: Network Threats and Mitigation      Chapter 9-12 Quizzes Due
                                                              Chapter 14 Quiz (Due Due Mar 10)

 Mon Mar 1    Chapter 15: Physical and Hardware Security      Chapter 15 Quiz (Due Due Mar 10)
                                                              Lab 9, Network Security and Availability

                                                              Lab 10, Remote Network Access
                                                                  In this lab you configure RRAS to permit virtual private network (VPN)
                                                                  connections. In examining the VPN traffic, you get the opportunity to study the
                                                                  Point-to-Point Protocol (PPP) connection establishment process, even though
                                                                  the PPP messages appear within the VPN tunnel. Do not forget that the PPP
                                                                  communications are the same during a standard Remote Access Service (RAS)
                                                                  connection, even though they are not enclosed within the VPN tunnel. In
                                                                  Exercise 10-6, “Reconfiguring RRAS,” you restore RRAS to the state it was
                                                                  left in at the end of Lab 7, with the service able to route local area network
                                                                  (LAN) traffic between the workgroup and classroom networks. You must
                                                                  complete this exercise before proceeding to Lab 11.

 Wed Mar 3    Chapter 16: Wide Area Networks                  Chapter 16 Quiz (Due Due Mar 10)



CIS 265 Data Communications and Networks                                                                                                    Page 5
                                                                                                                                  Course Outline


    Date                             Activity                                         Labs and Chapter Quizzes

 Mon Mar 8     Chapter 17: Command-Line Tools            Chapter 17 Quiz (Due Due Mar 17)
                                                         Lab 11, Network Troubleshooting Tools
                                                             In Exercise 11-4, “Creating a Performance Alert,” you use the Performance
                                                             console to create an alert that is triggered when the number of bytes passing
                                                             over the workgroup network exceeds 10,000 per second. This value is typically
                                                             sufficient for a network running at 10 megabits per second (Mbps) to not
                                                             trigger the alert until you execute the Ping command. As our networks are
                                                             running at 100 Mbps, you might have to increase the alert value to prevent it
                                                             from triggering prematurely.
                                                             In Exercise 11-5, “Using Tracert.exe,” you use the Tracert.exe utility to test
                                                             connectivity to another workgroup network in the classroom. The ability to
                                                             complete this exercise successfully is therefore dependent on the other
                                                             workgroup’s functionality. If the other workgroup’s router isn’t functioning
                                                             properly, the Tracert test will fail. If you have trouble connecting to a particular
                                                             workgroup, thrn try another, where the RRAS router has been appropriately
                                                             reconfigured at the end of Lab 10.

 Wed Mar 10    Chapter 18: Software and Hardware Tools   Chapter 18 Quiz (Due Due Mar 17)


 Mon Mar 15    Chapter 19: Network Troubleshooting       Lab 12, Network Troubleshooting Procedures
               Chapter 20: Management, Monitoring, and   Chapter 19 Quiz (Due Due Mar 17)
                        Optimization                     Chapter 20 Quiz (Due Due Mar 17)

 Mar 17 - 19   Final Exam                                Chapter 17-20 Quizzes Due




                                                                                                                               Ciaran Bloomer
                                                                                                                               November 2009




CIS 265 Data Communications and Networks                                                                                                   Page 6
                                                                          Course Outline



               Skills Being Measured on CompTIA Network+ Exam (N10-004)


1.0 Network Technologies
1.1 Explain the function of common networking protocols
       TCP
       FTP
       UDP
       TCP/IP suite
       DHCP
       TFTP
       DNS
       HTTP(S)
       ARP
       SIP (VoIP)
       RTP (VoIP)
       SSH
       POP3
       NTP
       IMAP4
       Telnet
       SMTP
       SNMP2/3
       ICMP
       IGMP
       TLS

1.2 Identify commonly used TCP and UDP default ports
TCP ports
        FTP – 20, 21
        SSH – 22
        TELNET – 23
        SMTP – 25
        DNS – 53
        HTTP – 80
        POP3 – 110
        NTP – 123



CIS 265 Data Communications and Networks                                         Page 7
                                                                                                                Course Outline


         IMAP4 – 143
         HTTPS – 443

UDP ports
      TFTP – 69
      DNS – 53
      BOOTPS/DHCP – 67
      SNMP – 161

1.3 Identify the following address formats
        IPv6
        IPv4
        MAC addressing

1.4 Given a scenario, evaluate the proper use of the following addressing technologies and addressing schemes
Addressing Technologies
        Subnetting
        Classful vs. classless (e.g. CIDR, Supernetting)
        NAT
        PAT
        SNAT
        Public vs. private
        DHCP (static, dynamic APIPA)

Addressing schemes
       Unicast
       Multicast
       Broadcast

1.5 Identify common IPv4 and IPv6 routing protocols
Link state
         OSPF
         IS-IS

Distance vector
        RIP
        RIPv2
        BGP

Hybrid



CIS 265 Data Communications and Networks                                                                               Page 8
                                                                             Course Outline


           EIGRP

1.6 Explain the purpose and properties of routing
       IGP vs. EGP
       Static vs. dynamic
       Next hop
       Understanding routing tables and how they pertain to path selection
       Explain convergence (steady state)

1.7 Compare the characteristics of wireless communication standards

• 802.11 a/b/g/n
        Speeds
        Distance
        Channels
        Frequency

• Authentication and encryption
        WPA
        WEP
        RADIUS
        TKIP


2.0 Network Media and Topologies

2.1 Categorize standard cable types and their properties
Type:

• CAT3, CAT5, CAT5e, CAT6

• STP, UTP

• Multimode fiber, single-mode fiber

• Coaxial
        RG-59
        RG-6

• Serial



CIS 265 Data Communications and Networks                                            Page 9
                                                                                 Course Outline



• Plenum vs. Non-plenum

Properties:
        Transmission speeds
        Distance
        Duplex
        Noise immunity (security, EMI)
        Frequency

2.2 Identify common connector types
        RJ-11
        J-45
        BNC
        SC
        ST
        LC
        RS-232

2.3 Identify common physical network topologies
        Star
        esh
        Bus
        Ring
        Point to point
        Point to multipoint
        Hybrid

2.4 Given a scenario, differentiate and implement appropriate wiring standards
        568A
        68B
        Straight vs. cross-over
        Rollover
        Loopback




CIS 265 Data Communications and Networks                                               Page 10
                                                     Course Outline



2.5 Categorize WAN technology types and properties
Type:
        Frame relay
        1/T1
        ADSL
        SDSL
        VDSL
        Cable modem
        Satellite
        E3/T3
        OC-x
        Wireless
        ATM
        SONET
        MPLS
        ISDN BRI
        ISDN PRI
        POTS
        PSTN

Properties
        Circuit switch
        Packet switch
        Speed
        Transmission media
        Distance

2.6 Categorize LAN technology types and properties
Types:
        Ethernet
        0BaseT
        100BaseTX
        100BaseFX
        1000BaseT
        1000BaseX
        10GBaseSR
        10GBaseLR
        10GBaseER
        10GBaseSW
        10GBaseLW


CIS 265 Data Communications and Networks                   Page 11
                                                                          Course Outline


       10GBaseEW
       10GBaseT

Properties
        CSMA/CD
        Broadcast
        Collision
        Bonding
        Speed
        Distance

2.7 Explain common logical network topologies and their characteristics
       Peer to peer
       lient/server
       VPN
       VLAN

2.8 Install components of wiring distribution
        Vertical and horizontal cross connects
        atch panels
        66 block
        MDFs
        IDFs
        25 pair
        100 pair
        110 block
        Demarc
        Demarc extension
        Smart jack
        Verify wiring installation
        Verify wiring termination


3.0 Network Devices

3.1 Install, configure and differentiate between common network devices
        Hub
        Repeater
        Modem
        NIC


CIS 265 Data Communications and Networks                                        Page 12
                                                            Course Outline


         Media converters
         Basic switch
         Bridge
         Wireless access point
         Basic router
         Basic firewall
         Basic DHCP server

3.2 Identify the functions of specialized network devices
        Multilayer switch
        Content switch
        DS/IPS
        Load balancer
        Multifunction network devices
        DNS server
        Bandwidth shaper
        Proxy server
        CSU/DSU

3.3 Explain the advanced features of a switch
       PoE
       Spanning tree
       LAN
       Trunking
       Port mirroring
       Port authentication

3.4 Implement a basic wireless network

• Install client

• Access point placement

• Install access point
          Configure appropriate encryption
          Configure channels and frequencies
          Set ESSID and beacon

• Verify installation




CIS 265 Data Communications and Networks                          Page 13
                                                                                                                                  Course Outline


4.0 Network Management

4.1 Explain the function of each layer of the OSI model
       Layer 1 – physical
       Layer 2 – data link
       Layer 3 – network
       Layer 4 – transport
       Layer 5 – session
       Layer 6 – presentation
       Layer 7 – application

4.2 Identify types of configuration management documentation
        Wiring schematics
        Physical and logical network diagrams
        Baselines
        Policies, procedures and configurations
        Regulations

4.3 Given a scenario, evaluate the network based on configuration management documentation
        Compare wiring schematics, physical and logical network diagrams, baselines, policies and procedures and configurations to network
        devices and infrastructure
        Update wiring schematics, physical and logical network diagrams, configurations and job logs as needed

4.4 Conduct network monitoring to identify performance and connectivity issues using the following:
       Network monitoring utilities (e.g. packet sniffers, connectivity software, load testing, throughput testers)
       System logs, history logs, event logs

4.5 Explain different methods and rationales for network performance optimization
Methods:
       QoS
       Traffic shaping
       Load balancing
       High availability
       Caching engines
       Fault tolerance

Reasons:

    • Latency sensitivity



CIS 265 Data Communications and Networks                                                                                                Page 14
                                                                                                   Course Outline


    • High bandwidth applications
        VoIP
        Video applications

    • Uptime


4.6 Given a scenario, implement the following network troubleshooting methodology
        Information gathering – identify symptoms and problems
        Identify the affected areas of the network
        Determine if anything has changed
        Establish the most probable cause
        Determine if escalation is necessary
        Create an action plan and solution identifying potential effects
        Implement and test the solution
        Identify the results and effects of the solution
        Document the solution and the entire process

4.7 Given a scenario, troubleshoot common connectivity issues and select an appropriate solution
Physical issues:
        Cross talk
        Near End crosstalk
        Attenuation
        Collisions
        Shorts
        Open
        Impedance mismatch (echo)
        Interference

Logical issues:

    • Port speed

    • Port duplex mismatch

    • Incorrect VLAN

    • Incorrect IP address

    • Wrong gateway



CIS 265 Data Communications and Networks                                                                 Page 15
                                                     Course Outline



    • Wrong DNS

    • Wrong subnet mask

Issues that should be identified but escalated:
        Switching loop
        Routing loop
        Route problems
        Proxy arp
        Broadcast storms

Wireless Issues:
       Interference (bleed, environmental factors)
       Incorrect encryption
       Incorrect channel
       Incorrect frequency
       ESSID mismatch
       Standard mismatch (802.11 a/b/g/n)
       Distance
       Bounce
       Incorrect antenna placement




CIS 265 Data Communications and Networks                   Page 16
                                                                                                                            Course Outline


5.0 Network Tools

5.1 Given a scenario, select the appropriate command line interface tool and interpret the output to verify functionality
        Traceroute
        Ipconfig
        fconfig
        Ping
        Arp ping
        Arp
        Nslookup
        Hostname
        Dig
        Mtr
        Route
        Nbtstat
        Netstat


5.2 Explain the purpose of network scanners
       Packet sniffers
       Intrusion detection software
       Intrusion prevention software
       Port scanners

5.3 Given a scenario, utilize the appropriate hardware tools
        Cable testers
        Protocol analyzer
        Certifiers
        TDR
        TDR
        Multimeter
        Toner probe
        Butt set
        Punch down tool
        Cable stripper
        Snips
        Voltage event recorder
        Temperature monitor




CIS 265 Data Communications and Networks                                                                                          Page 17
                                                                     Course Outline


6.0 Network Security

6.1 Explain the function of hardware and software security devices
       Network based firewall
       Host based firewall
       IDS
       PS
       VPN concentrator

6.2 Explain common features of a firewall
         Application layer vs. network layer
         Stateful vs. stateless
         Scanning services
         Content filtering
         Signature identification
         Zones
6.3 Explain the methods of network access security
Filtering:

• ACL
        MAC filtering
        IP filtering

• Tunneling and encryption
        SSL VPN
        PN
        L2TP
        PPTP
        IPSEC

• Remote access
       RAS
       RDP
       PPPoE
       PPP
       VNC
       ICA

6.4 Explain methods of user authentication



CIS 265 Data Communications and Networks                                   Page 18
                                                                 Course Outline


• PKI

• Kerberos

• AAA
         RADIUS
         TACACS+

• Network access control
        802.1x

• CHAP

• MS-CHAP

• EAP

6.5 Explain issues that affect device security

• Physical security

• Restricting local and remote access

• Secure methods vs. unsecure methods
        SSH, HTTPS, SNMPv3, SFTP, SCP
        TELNET, HTTP, FTP, RSH, RCP, SNMPv1/2

6.6 Identify common security threats and mitigation techniques
Security threats
        DoS
        Viruses
        Worms
        Attackers
        Man in the middle
        murf
        Rogue access points
        Social engineering (phishing)

Mitigation techniques
         Policies and procedures



CIS 265 Data Communications and Networks                               Page 19
                                           Course Outline


       User training
       Patches and updates




CIS 265 Data Communications and Networks         Page 20

								
To top