Networking Basics This course will prepare the student in the area of networking for the small office, home office (SOHO) market, and prepare him or her with the ability to work in small businesses or organizations using networks that have fewer than 100 nodes. Preparation will be given the student for performing the following tasks: install and configure Cisco switches and routers in multiprotocol internetworks using LAN and WAN interfaces; provide Level 1 troubleshooting service; improve network performance and security; perform entry-level tasks in the planning, design, installation, operation, and troubleshooting of Ethernet and TCP/IP networks. Upon completion of this course, students will be able to perform tasks related to the following: networking mathematics, terminology, and models; networking media such as copper, optical, and wireless; testing and cabling LANs and WANs; Ethernet Operation and 10/100/1000/10 G versions of Ethernet; Ethernet, Switching; IP addressing and subnetting; and IP, TCP, UDP, and application layer protocols. The course has been designed to require lab activities as well as covering curriculum content. This course is an important first step toward achieving Cisco Certified Network Associate (CCNA) certification. Prerequisites: Students must have basic knowledge and skills in computer hardware and software systems. This is a very rigorous, technical computer course offering. Students should have passed Algebra I and Physical Science with a grade of “C” or better. Table of Contents Introduction to Computers and Applications ...........................................2 Personal Computer Software ...................................................................2 Connecting to the Network ......................................................................3 Connecting to the Internet Using An Internet Service Provider ..............4 Network Addressing ................................................................................5 Network Services .....................................................................................6 Wireless Technology ...............................................................................6 Basic Security ..........................................................................................7 Troubleshooting Your Network ...............................................................7 Acronyms .................................................................................................9 Developed May 2007 Networking Basics Page 1 Networking Basics Content Guideline (The student will be able to . . .) Unit One Introduction to Computers and Applications 1. 2. 3. 4. 5. Describe the purpose/functionality of the PC and applications including Internet applications. a. Identify the multiple uses of a computer. b. Identify common types and classifications of applications. Compare and contrast different types of computing devices. a. Identify the different types of computers. b. Describe the features of a server, desktop, and workstation and how they are used. c. Describe the different types of portable devices and how they are used. Explain the digital representation of common forms of data. a. Explain how any information can be represented digitally. b. Convert approximately between bits and bytes, bytes and kilobytes, kilobytes and megabytes, and megabytes and gigabytes. c. Demonstrate familiarity with other relevant binary information. Determine appropriate components and peripheral devices to meet requirements. a. Determine the requirements for a computer purchase. b. Describe the purpose of and select the type of motherboard. c. Describe the purpose of and select the processor. d. Describe the purpose of RAM and determine RAM requirements. e. Describe the purpose of adapter cards and determine AC requirements. f. Describe the purpose of storage devices and determine storage requirements. g. Describe the purpose of peripheral devices and determine peripheral device requirements. h. Describe the purpose of UPS and surge protectors and why they are important. Install, verify, and upgrade computer components and peripherals. a. Describe computer repair and safety best practices. b. Install components and verify operation. c. Install peripheral devices and verify operation. Unit Two Personal Computer Software 1. Explain the function of an OS. a. Describe the purpose of an OS. b. Identify common operating systems. c. Describe the features and hardware requirements of Windows XP. d. Describe the features and hardware requirements for Linux. Developed May 2007 Networking Basics Page 2 2. 3. e. Describe how to select an operating system. Perform a simulated installation of an operating system. a. Describe and select an installation method for an operating system. b. Describe how to complete a pre-installation checklist for installing an operating system. c. Prepare your computer to participate in the network. d. Describe the purpose of naming scheme. e. Describe how to plan for multiple devices on a network. f. Install the operating system. Explain the purpose of and install application patches. a. Describe the purpose of a patch. b. Identify how patches are applied. c. Identify the source of patches. Unit Three Connecting to the Network 1. Explain the concept of networking and the benefits of networks. a. Define the term network and identify various types of networks. b. Describe the benefits and impacts of computer networking. c. Define the high level components of an information network. d. Describe the roles of computers on a network. e. Differentiate between logical and physical topologies, and explain how networks are represented graphically. 2. Explain the concept of communication protocols. a. Use various analogies between human and computer communications to explain the concept of a protocol. b. Explain the concept of human communication in terms of source, channel, and destination. c. Explain the need for rules and protocols in order for communications to occur. d. Explain the concept of encoding in relation to human communication. e. Explain the concept of formatted message and encapsulation in relation to human communication. f. Explain that messages have finite unit sizes in relation to human communication. g. Explain the concept of timing in communication in relation to human communication. h. Explain standard message patterns in relation to human communication. i. Relate human communications concepts to the term “protocol.” 3. Explain how communication occurs across a local Ethernet network. a. Explain communication on a local Ethernet network. b. Explain that devices on a local network must share common protocols to communicate (Communicating by the Rules). c. Identify the importance of standardization in computer communication protocols. d. Identify the source, destination and channel in an Ethernet network. e. Describe basic characteristics of Ethernet for communicating across the channel. f. Describe the need for a hierarchical design in an Ethernet network. Developed May 2007 Networking Basics Page 3 g. Explain the purpose of a logical network address. h. Describe characteristics and devices associated with access and distribution. 4. Describe access layer devices and communication methods on a local Ethernet network. a. Describe access layer networking devices and communication methods used to connect local Ethernet networks. b. Describe the purpose of the access layer and how it is used within an Ethernet network. c. Describe the function of a hub. d. Describe the function of a switch. e. Describe the use of broadcast messaging for communication on a local Ethernet network. f. Describe the need for both the MAC and IP address within an Ethernet network. g. Describe ARP and how it is used. 5. Describe distribution layer devices and communication methods across networks. a. Describe the reasons for expanding your network with a distribution layer. b. Describe the function of routers. c. Explain the concept of the gateway router. d. Differentiate between the rules governing communications within a single local network and between multiple local networks. e. Describe the concept of a LAN. f. Describe implications of adding hosts to a local network versus a remote network. g. Describe how the router keeps track of multiple networks using routing and ARP tables. h. Use a packet tracer. 6. Plan, implement, and verify a local network. a. Plan and document the building of a small home or small business Ethernet network. b. Build a virtual model of a small home or small business network. c. Describe the function of multifunction devices. d. Explain the components and interfaces of a small home or small business network ISR. e. Connect and properly document the network installation. f. Configure your PCs to participate in the local network. g. Perform simple workgroup tasks. Unit Four Connecting to the Internet Using An Internet Service Provider 1. Explain “what is the Internet?” and how we connect to the Internet. a. Define an ISP and its purpose. b. Describe how you connect to the Internet through the ISP and the ISP’s relationship to the Internet. c. Identify and describe different connection options of an ISP. d. Identify and describe the levels of service offered by an ISP. Developed May 2007 Networking Basics Page 4 2. Explain how information is sent across the Internet through an ISP. a. Define and explain that the most important protocol of the Internet is the IP. b. Explain IP address management as the responsibility of ISPs. c. Explain how ISP NOC handles packets from your home network. d. Describe how data travels within the Internet. 3. Describe and identify the components of an ISP NOC. a. Identify and describe the concept of the Internet cloud. b. Identify and describe the network devices used within the ISP to connect to the Internet cloud. c. Physical requirements of a home network versus an ISP NOC (cloud). 4. Identify the different types of cables and connectors for connecting the devices in a NOC. (Note: Be sure to include autosense, different pinout for Gb, what ships with device.) a. Identify and describe common types of cables. b. Describe twisted pair cables, common terminations and when they are used. c. Describe optical fiber cables, common terminations and when they are used. (Note: Careful about depth – not a lot of homes and SMBs use fiber.) d. Describe coax cable, common terminations and when they are used. 5. Construct and terminate twisted pair cables and determine type of cable needed. a. Define cable standards and their purpose. b. Identify and describe the cross-over and straight through cable pinouts and color codes. c. Describe how to terminate cables. d. Describe how to punch down wires to patch panel and wall jacks. e. Describe how to test cable termination and functionality. f. Describe cabling best practices. Unit Five Network Addressing 1. Describe the purpose of an IP address and subnet mask and how they are used on the Internet. a. Review the purpose of the IP address. b. Describe the structure of an IP address. c. Identify and describe the parts of the IP address and their purpose. d. Describe a subnet mask and its purpose. 2. Describe the types of IP Addresses available. a. Describe the classes of IP address and the default subnet mask. b. Describe private and public addressing and when each is used. c. Differentiate between unicast, broadcast, multicast addresses. d. Describe the interaction of unicast, broadcast, and multicast IP addresses to MAC addresses. 3. Describe the methods of obtaining an IP Address. a. Review the methods of assigning an IP Address. b. Describe where the DHCP services are located. c. Configure and verify DCHP range on the GUI-based home-ISR. Developed May 2007 Networking Basics Page 5 4. Describe IP network boundaries and the purpose of NAT on a home network. a. Describe the boundaries of a network and the purpose of default gateway. b. Describe addresses assigned by the ISP vs. ISR assigned. c. Describe the purpose and function of NAT. d. Describe the use of NAT on a home or small business network using an ISR. Unit Six Network Services 1. Compare and contrast clients and servers and their interaction over the network. a. Review the client/server relationship. b. Identify common services available within a client/server relationship. c. Differentiate between connectionless versus connection-oriented protocols. d. Describe the function of a port. 2. Describe the type of interactions of Internet applications. a. Describe DNS and its purpose. b. Describe the interaction between a web client and a web server. c. Describe the interaction between an FTP client and an FTP server. d. Describe the interaction between email clients and email servers. e. Describe the interaction of IM/peer-to-peer clients and servers. f. Describe the interaction of voice clients and servers. 3. Describe the purpose of a layered model to illustrate the interaction of various protocols. a. Describe how different protocols interact on a host. b. Describe protocol operation when sending a message. c. Describe protocol operation when receiving a message. d. Describe models that represent protocol stacks. Unit Seven Wireless Technology 1. Describe wireless technology. a. Describe the various wireless technologies and the devices that use them. b. Describe the benefits and limitations of wireless technology. c. Define wireless networks and their boundaries. 2. Describe the various components and structure of a wireless LAN. a. Identify and describe wireless LAN standards. b. Identify and describe common wireless LAN components. c. Identify and describe common wireless modes and the importance of the SSID. d. Describe wireless channels and their purpose. 3. Describe wireless security issues and mitigation strategies. a. Describe the external wireless LAN attackers and how they attack. b. Describe the issue of an internal attack and why a wireless LAN is susceptible. c. Describe authentication and its purpose. d. Describe encryption and its purpose on a wireless network. e. Describe traffic filtering and its purpose. Developed May 2007 Networking Basics Page 6 f. Describe the step necessary to secure an access point. 4. Configure an integrated wireless access point and wireless client. a. Plan for a wireless implementation. b. Configure an integrated wireless access point using security best practices. c. Configure a wireless client. d. Describe backup and restore configuration options and their purpose. e. Identify current version of firmware and describe how to update the firmware. Unit Eight Basic Security 1. Identify and describe the various networking threats. a. Describe major risks of network intrusion. b. Define the sources of network intrusion. c. Describe social engineering and phishing. 2. Describe the methods of attack. a. Describe virus, worms, and Trojan horses. b. Describe DOS and brute force attacks. c. Describe spyware, tracking cookies, adware, and pop-ups. d. Describe spam. 3. Describe the different security applications. a. Define common security procedures. b. Describe how updates and patches relate to security issues. c. Describe anti-virus software. d. Describe anti-spyware software. e. Describe firewall applications. f. Install and update security application software. 4. Describe attack mitigation strategies. a. Describe how a firewall is used to protect against an attack. b. Describe how to protect against spam. c. Describe how to protect against viruses, worms, and Trojan horses. d. Describe security best practices. e. Describe a virus hoax and the importance of an incident report. Unit Nine Troubleshooting Your Network 1. Describe the troubleshooting process. a. Identify and describe troubleshooting methodology. b. Describe approaches to troubleshooting. c. Describe troubleshooting best practices. d. Describe the need for documentation. 2. Identify and describe common hardware issues. a. Describe common physical problems and how they are detected. b. Describe the purpose of LED indicators and their meaning. c. Describe cabling and connection issues. Developed May 2007 Networking Basics Page 7 3. Describe how software utilities are used to verify TCP/IP connectivity. a. Identify and describe software utilities for troubleshooting. b. Describe and use ipconfig. c. Describe and use ping. d. Describe and use tracert. e. Describe and use netstat. f. Describe and use nslookup. 4. Describe common wireless problems. a. Describe wireless troubleshooting best practices. b. Identify and describe radio issues with a wireless network. c. Identify and describe association and authentication issues within a wireless network. 5. Verify and troubleshoot ISR connectivity. a. Describe how to examine the connectivity between the router and ISP. b. Describe how to examine the DHCP bindings. 6. Interact with the ISP helpdesk. a. Describe common sources of help and the role of a helpdesk. b. Describe how to gather information about a problem. c. Describe how to interact with the helpdesk. 7. Utilize the troubleshooting process to identify and solve common problems (simulations should be made available). Developed May 2007 Networking Basics Page 8 ACRONYMS Acronym AC ACK ACL ACPI ACT ADSL AGP AMD AMR APIPA APM ARP ASR AT ATA ATAPI ATM ATX BIOS BNC BRI BTX CCD CD CDP CD-ROM CD-RW CDFS CLI CMOS CNR COM1 CPU CRIMM CRT DAC DB-25 DB-9 DC DDOS DDR Developed May 2007 Spelled Out alternating current acknowledgement of message access control list advanced configuration and power interface activity asymmetrical digital subscriber line accelerated graphics port advanced micro devices audio modem riser automatic private internet protocol addressing advanced power management address resolution protocol automated system recovery advanced technology advanced technology attachment advanced technology attachment packet interface asynchronous transfer mode advanced technology extended basic input/output system Bayonet-Neill-Concelman or British Navel Connector basic rate interface balanced technology extended charged coupled device compact disc Cisco discovery protocol compact disc-read-only memory compact disc-rewritable compact disc file system command line interface complementary metal-oxide semiconductor communication network riser communication port 1 central processing unit continuity-rambus inline memory module cathode-ray tube discretionary access control serial communications D-shell connector, 25 pins 9 pin D shell connector direct current distributed denial of service double data-rate Networking Basics Page 9 DDR RAM DDR SDRAM DFS DHCP DIMM DIN DIP DLT DLP DMA DNS DOS DPMS DRAM DSL DVD DVD-RAM DVD-ROM DVD-R DVD-RW DVI ECC ECP EEPROM EFS EGP EIDE EISA EMI EMP EPROM EPP ERD ESD ESDI EVGA EVDO FAT FAT12 FAT16 FAT32 FDD FERPA Fn FPM Developed May 2007 double data-rate random access memory double data-rate synchronous dynamic random access memory distributed file system dynamic host configuration protocol dual inline memory module Deutsche Industrie Norm dual inline package digital linear tape digital light processing direct memory access domain name service or domain name server disk operating system or denial of service display power management signaling dynamic random access memory digital subscriber line digital video disc or digital versatile disc digital video disc-random access memory digital video disc-read only memory digital video disc-recordable digital video disc-rewritable digital visual interface error correction code extended capabilities port electrically erasable programmable read-only memory encrypting file system exterior gateway protocol enhanced integrated drive electronics extended industry standard architecture electromagnetic interference electromagnetic pulse erasable programmable read-only memory enhanced parallel port emergency repair disk electrostatic discharge enhanced small device interface extended video graphics adapter/array evolution data optimized or evolution data only file allocation table 12-bit file allocation table 16-bit file allocation table 32-bit file allocation table floppy disk drive Family Educational Rights and Privacy Act Function (referring to the function key on a laptop) fast page-mode Networking Basics Page 10 FRU FTP FQDN GB GDI GHz GUI GPRS GSM HAL HCL HDD HDMi HPFS HTML HTTP HTTPS I/O ICMP ICS ICR IDE IDS IEEE IGP IGRP IIS IMAP IOS IP IPCONFIG IPP IPSEC IPX IPX/SPX IR IrDA IRQ ISA ISDN ISO ISP KB LAN LBA LC Developed May 2007 field replaceable unit file transfer protocol fully qualified domain name gigabyte graphics device interface gigahertz graphical user interface general packet radio system global system for mobile communications hardware abstraction layer hardware compatibility list hard disk drive high definition media interface high performance file system hypertext markup language hypertext transfer protocol hypertext transfer protocol over secure sockets layer input/output internet control message protocol internet connection sharing intelligent character recognition integrated drive electronics intrusion detection system Institute of Electrical and Electronics Engineers interior gateway protocol interior gateway routing protocol Internet Information Services internet mail access protocol Internet operating system internet protocol internet protocol configuration internet printing protocol internet protocol security internetwork packet exchange internetwork packet exchange/sequenced packet exchange infrared Infrared Data Association interrupt request industry standard architecture integrated services digital network Industry Standards Organization internet service provider kilobyte local area network logical block addressing Lucent connector Networking Basics Page 11 LCD LDAP LED LIP or LiPoly Li-on LPD/LPR LPT LPT1 LPX LVD MAC MAN MAPI Mb MB MBR MBSA MCR MFD MFP MHz MicroDIMM MIDI MIME MLI MMC MMX MOTD MP3 MPEG MSCONFIG MSDS MUI NAS NAT NetBIOS NetBEUI NFS NIC NiCd NiMH NLI NLX NNTP NTFS NTLDR Developed May 2007 liquid crystal display lightweight directory access protocol light emitting diode lithium-ion polymer lithium-ion line printer daemon / line printer remote line printer terminal line printer terminal 1 low profile extended low voltage differential media access control metropolitan area network messaging application programming interface megabit megabyte master boot record Microsoft Baseline Security Analyzer multivariant curve resolution multi-function device multi-function product megahertz micro dual inline memory module musical instrument digital interface multipurpose internet mail extension multiple link interface Microsoft management console multimedia extensions message of the day Moving Picture Experts Group Layer 3 Audio Moving Picture Experts Group Microsoft configuration material safety data sheet multilingual user interface network-attached storage network address translation networked basic input/output system networked basic input/output system extended user interface network file system network interface card nickel cadmium nickel metal hydride not logged in or natural language interface new low-profile extended network news transfer protocol new technology file system new technology loader Networking Basics Page 12 NWLINK OCR OEM OMR OS OSI OSR PAN PATA PC PCI PCIe PCIX PCL PCMCIA PDA PGA PGA2 PIN PKI PnP POP POP3 POST POTS PPP PPTP PRI PROM PS/2 PSTN PVC PXE QoS RAID RAM RAS RBAC RDRAM RF RFI RGB RIMM RIP RIS RISC Developed May 2007 Netware Link optical character recognition original equipment manufacturer optical mark recognition operating system operating system interconnection original equipment manufacturer service release personal area network parallel advanced technology attachment personal computer peripheral component interconnect peripheral component interconnect express peripheral component interconnect extended printer control language Personal Computer Memory Card International Association personal digital assistant pin grid array pin grid array 2 personal identification number public key infrastructure plug and play post office protocol post office protocol 3 power-on self test plain old telephone service point-to-point protocol point-to-point tunneling protocol primary rate interface programmable read-only memory Personal System/2 connector public switched telephone network permanent virtual circuit preboot execution environment quality of service redundant array of independent (or inexpensive) discs random access memory remote access service role-based access control or rule-based access control RAMBUS® dynamic random access memory radio frequency radio frequency interference red green blue RAMBUS® inline memory module routing information protocol remote installation service reduced instruction set computer Networking Basics Page 13 RJ RJ-11 RJ-45 RMA ROM RS-232 or RS-232C RTC SAN SATA SC SCSI SCSI ID SD SDRAM SEC SFC SGRAM SIMM SLI SMB SMTP SNMP SoDIMM SOHO SP SP1 SP2 SPDIF SPGA SPX SRAM SSH SSID SSL ST STP SVGA SXGA TB TCP TCP/IP TDR TFTP UART Developed May 2007 registered jack registered jack function 11 registered jack function 45 returned materials authorization read only memory recommended standard 232 real-time clock storage area network serial advanced technology attachment subscription channel small computer system interface small computer system interface identifier card secure digital card synchronous dynamic random access memory single edge connector system file checker synchronous graphics random access memory single inline memory module scalable link interface or system level integration or scanline interleave mode server message block or small to midsize business simple mail transport protocol simple network management protocol small outline dual inline memory module small office/home office service pack service pack 1 service pack 2 Sony-Philips digital interface format staggered pin grid array sequenced package exchange static random access memory secure shell service set identifier secure sockets layer straight tip shielded twisted pair super video graphics array super extended graphics array terabyte transmission control protocol transmission control protocol/internet protocol time domain reflectometer trivial file transfer protocol universal asynchronous receiver transmitter Networking Basics Page 14 UDF UDMA UDP UL UNC UPS URL USB USMT UTP UXGA VESA VFAT VGA VoIP VPN VRAM WAN WAP WEP WIFI WINS WLAN WPA WUXGA XGA ZIF ZIP Developed May 2007 user defined functions or universal disk format or universal data format ultra direct memory access user datagram protocol Underwriter’s Laboratory universal naming convention uninterruptible power supply uniform resource locator universal serial bus user state migration tool unshielded twisted pair ultra extended graphics array Video Electronics Standards Association virtual file allocation table video graphics array voice over internet protocol virtual private network video random access memory wide area network wireless application protocol wired equivalent privacy wireless fidelity windows internet name service wireless local area network wireless protected access wide ultra extended graphics array extended graphics array zero-insertion-force zigzag inline package Networking Basics Page 15