Prerequisites: Students must have basic knowledge and skills in

advertisement
Networking Basics
This course will prepare the student in the area of networking for the small office, home
office (SOHO) market, and prepare him or her with the ability to work in small
businesses or organizations using networks that have fewer than 100 nodes. Preparation
will be given the student for performing the following tasks: install and configure Cisco
switches and routers in multiprotocol internetworks using LAN and WAN interfaces;
provide Level 1 troubleshooting service; improve network performance and security;
perform entry-level tasks in the planning, design, installation, operation, and
troubleshooting of Ethernet and TCP/IP networks. Upon completion of this course,
students will be able to perform tasks related to the following: networking mathematics,
terminology, and models; networking media such as copper, optical, and wireless; testing
and cabling LANs and WANs; Ethernet Operation and 10/100/1000/10 G versions of
Ethernet; Ethernet, Switching; IP addressing and subnetting; and IP, TCP, UDP, and
application layer protocols. The course has been designed to require lab activities as well
as covering curriculum content. This course is an important first step toward achieving
Cisco Certified Network Associate (CCNA) certification.
Prerequisites: Students must have basic knowledge and skills in computer hardware and
software systems. This is a very rigorous, technical computer course offering. Students
should have passed Algebra I and Physical Science with a grade of “C” or better.
Table of Contents
Introduction to Computers and Applications ...........................................2
Personal Computer Software ...................................................................2
Connecting to the Network ......................................................................3
Connecting to the Internet Using An Internet Service Provider ..............4
Network Addressing ................................................................................5
Network Services .....................................................................................6
Wireless Technology ...............................................................................6
Basic Security ..........................................................................................7
Troubleshooting Your Network ...............................................................7
Acronyms .................................................................................................9
Developed May 2007
Networking Basics
Page 1
Networking Basics
Content Guideline
(The student will be able to . . .)
Unit One
Introduction to Computers and Applications
1.
2.
3.
4.
5.
Describe the purpose/functionality of the PC and applications including Internet
applications.
a. Identify the multiple uses of a computer.
b. Identify common types and classifications of applications.
Compare and contrast different types of computing devices.
a. Identify the different types of computers.
b. Describe the features of a server, desktop, and workstation and how they are
used.
c. Describe the different types of portable devices and how they are used.
Explain the digital representation of common forms of data.
a. Explain how any information can be represented digitally.
b. Convert approximately between bits and bytes, bytes and kilobytes, kilobytes
and megabytes, and megabytes and gigabytes.
c. Demonstrate familiarity with other relevant binary information.
Determine appropriate components and peripheral devices to meet requirements.
a. Determine the requirements for a computer purchase.
b. Describe the purpose of and select the type of motherboard.
c. Describe the purpose of and select the processor.
d. Describe the purpose of RAM and determine RAM requirements.
e. Describe the purpose of adapter cards and determine AC requirements.
f. Describe the purpose of storage devices and determine storage requirements.
g. Describe the purpose of peripheral devices and determine peripheral device
requirements.
h. Describe the purpose of UPS and surge protectors and why they are important.
Install, verify, and upgrade computer components and peripherals.
a. Describe computer repair and safety best practices.
b. Install components and verify operation.
c. Install peripheral devices and verify operation.
Unit Two
Personal Computer Software
1.
Explain the function of an OS.
a. Describe the purpose of an OS.
b. Identify common operating systems.
c. Describe the features and hardware requirements of Windows XP.
d. Describe the features and hardware requirements for Linux.
Developed May 2007
Networking Basics
Page 2
2.
3.
e. Describe how to select an operating system.
Perform a simulated installation of an operating system.
a. Describe and select an installation method for an operating system.
b. Describe how to complete a pre-installation checklist for installing an operating
system.
c. Prepare your computer to participate in the network.
d. Describe the purpose of naming scheme.
e. Describe how to plan for multiple devices on a network.
f. Install the operating system.
Explain the purpose of and install application patches.
a. Describe the purpose of a patch.
b. Identify how patches are applied.
c. Identify the source of patches.
Unit Three
Connecting to the Network
1. Explain the concept of networking and the benefits of networks.
a. Define the term network and identify various types of networks.
b. Describe the benefits and impacts of computer networking.
c. Define the high level components of an information network.
d. Describe the roles of computers on a network.
e. Differentiate between logical and physical topologies, and explain how networks
are represented graphically.
2. Explain the concept of communication protocols.
a. Use various analogies between human and computer communications to explain
the concept of a protocol.
b. Explain the concept of human communication in terms of source, channel, and
destination.
c. Explain the need for rules and protocols in order for communications to occur.
d. Explain the concept of encoding in relation to human communication.
e. Explain the concept of formatted message and encapsulation in relation to human
communication.
f. Explain that messages have finite unit sizes in relation to human communication.
g. Explain the concept of timing in communication in relation to human
communication.
h. Explain standard message patterns in relation to human communication.
i. Relate human communications concepts to the term “protocol.”
3. Explain how communication occurs across a local Ethernet network.
a. Explain communication on a local Ethernet network.
b. Explain that devices on a local network must share common protocols to
communicate (Communicating by the Rules).
c. Identify the importance of standardization in computer communication protocols.
d. Identify the source, destination and channel in an Ethernet network.
e. Describe basic characteristics of Ethernet for communicating across the channel.
f. Describe the need for a hierarchical design in an Ethernet network.
Developed May 2007
Networking Basics
Page 3
g. Explain the purpose of a logical network address.
h. Describe characteristics and devices associated with access and distribution.
4. Describe access layer devices and communication methods on a local Ethernet
network.
a. Describe access layer networking devices and communication methods used to
connect local Ethernet networks.
b. Describe the purpose of the access layer and how it is used within an Ethernet
network.
c. Describe the function of a hub.
d. Describe the function of a switch.
e. Describe the use of broadcast messaging for communication on a local Ethernet
network.
f. Describe the need for both the MAC and IP address within an Ethernet network.
g. Describe ARP and how it is used.
5. Describe distribution layer devices and communication methods across networks.
a. Describe the reasons for expanding your network with a distribution layer.
b. Describe the function of routers.
c. Explain the concept of the gateway router.
d. Differentiate between the rules governing communications within a single local
network and between multiple local networks.
e. Describe the concept of a LAN.
f. Describe implications of adding hosts to a local network versus a remote
network.
g. Describe how the router keeps track of multiple networks using routing and ARP
tables.
h. Use a packet tracer.
6. Plan, implement, and verify a local network.
a. Plan and document the building of a small home or small business Ethernet
network.
b. Build a virtual model of a small home or small business network.
c. Describe the function of multifunction devices.
d. Explain the components and interfaces of a small home or small business
network ISR.
e. Connect and properly document the network installation.
f. Configure your PCs to participate in the local network.
g. Perform simple workgroup tasks.
Unit Four
Connecting to the Internet Using An Internet Service Provider
1. Explain “what is the Internet?” and how we connect to the Internet.
a. Define an ISP and its purpose.
b. Describe how you connect to the Internet through the ISP and the ISP’s
relationship to the Internet.
c. Identify and describe different connection options of an ISP.
d. Identify and describe the levels of service offered by an ISP.
Developed May 2007
Networking Basics
Page 4
2. Explain how information is sent across the Internet through an ISP.
a. Define and explain that the most important protocol of the Internet is the IP.
b. Explain IP address management as the responsibility of ISPs.
c. Explain how ISP NOC handles packets from your home network.
d. Describe how data travels within the Internet.
3. Describe and identify the components of an ISP NOC.
a. Identify and describe the concept of the Internet cloud.
b. Identify and describe the network devices used within the ISP to connect to the
Internet cloud.
c. Physical requirements of a home network versus an ISP NOC (cloud).
4. Identify the different types of cables and connectors for connecting the devices in a
NOC. (Note: Be sure to include autosense, different pinout for Gb, what ships with
device.)
a. Identify and describe common types of cables.
b. Describe twisted pair cables, common terminations and when they are used.
c. Describe optical fiber cables, common terminations and when they are used.
(Note: Careful about depth – not a lot of homes and SMBs use fiber.)
d. Describe coax cable, common terminations and when they are used.
5. Construct and terminate twisted pair cables and determine type of cable needed.
a. Define cable standards and their purpose.
b. Identify and describe the cross-over and straight through cable pinouts and color
codes.
c. Describe how to terminate cables.
d. Describe how to punch down wires to patch panel and wall jacks.
e. Describe how to test cable termination and functionality.
f. Describe cabling best practices.
Unit Five
Network Addressing
1. Describe the purpose of an IP address and subnet mask and how they are used on the
Internet.
a. Review the purpose of the IP address.
b. Describe the structure of an IP address.
c. Identify and describe the parts of the IP address and their purpose.
d. Describe a subnet mask and its purpose.
2. Describe the types of IP Addresses available.
a. Describe the classes of IP address and the default subnet mask.
b. Describe private and public addressing and when each is used.
c. Differentiate between unicast, broadcast, multicast addresses.
d. Describe the interaction of unicast, broadcast, and multicast IP addresses to MAC
addresses.
3. Describe the methods of obtaining an IP Address.
a. Review the methods of assigning an IP Address.
b. Describe where the DHCP services are located.
c. Configure and verify DCHP range on the GUI-based home-ISR.
Developed May 2007
Networking Basics
Page 5
4. Describe IP network boundaries and the purpose of NAT on a home network.
a. Describe the boundaries of a network and the purpose of default gateway.
b. Describe addresses assigned by the ISP vs. ISR assigned.
c. Describe the purpose and function of NAT.
d. Describe the use of NAT on a home or small business network using an ISR.
Unit Six
Network Services
1. Compare and contrast clients and servers and their interaction over the network.
a. Review the client/server relationship.
b. Identify common services available within a client/server relationship.
c. Differentiate between connectionless versus connection-oriented protocols.
d. Describe the function of a port.
2. Describe the type of interactions of Internet applications.
a. Describe DNS and its purpose.
b. Describe the interaction between a web client and a web server.
c. Describe the interaction between an FTP client and an FTP server.
d. Describe the interaction between email clients and email servers.
e. Describe the interaction of IM/peer-to-peer clients and servers.
f. Describe the interaction of voice clients and servers.
3. Describe the purpose of a layered model to illustrate the interaction of various
protocols.
a. Describe how different protocols interact on a host.
b. Describe protocol operation when sending a message.
c. Describe protocol operation when receiving a message.
d. Describe models that represent protocol stacks.
Unit Seven
Wireless Technology
1. Describe wireless technology.
a. Describe the various wireless technologies and the devices that use them.
b. Describe the benefits and limitations of wireless technology.
c. Define wireless networks and their boundaries.
2. Describe the various components and structure of a wireless LAN.
a. Identify and describe wireless LAN standards.
b. Identify and describe common wireless LAN components.
c. Identify and describe common wireless modes and the importance of the SSID.
d. Describe wireless channels and their purpose.
3. Describe wireless security issues and mitigation strategies.
a. Describe the external wireless LAN attackers and how they attack.
b. Describe the issue of an internal attack and why a wireless LAN is susceptible.
c. Describe authentication and its purpose.
d. Describe encryption and its purpose on a wireless network.
e. Describe traffic filtering and its purpose.
Developed May 2007
Networking Basics
Page 6
f. Describe the step necessary to secure an access point.
4. Configure an integrated wireless access point and wireless client.
a. Plan for a wireless implementation.
b. Configure an integrated wireless access point using security best practices.
c. Configure a wireless client.
d. Describe backup and restore configuration options and their purpose.
e. Identify current version of firmware and describe how to update the firmware.
Unit Eight
Basic Security
1. Identify and describe the various networking threats.
a. Describe major risks of network intrusion.
b. Define the sources of network intrusion.
c. Describe social engineering and phishing.
2. Describe the methods of attack.
a. Describe virus, worms, and Trojan horses.
b. Describe DOS and brute force attacks.
c. Describe spyware, tracking cookies, adware, and pop-ups.
d. Describe spam.
3. Describe the different security applications.
a. Define common security procedures.
b. Describe how updates and patches relate to security issues.
c. Describe anti-virus software.
d. Describe anti-spyware software.
e. Describe firewall applications.
f. Install and update security application software.
4. Describe attack mitigation strategies.
a. Describe how a firewall is used to protect against an attack.
b. Describe how to protect against spam.
c. Describe how to protect against viruses, worms, and Trojan horses.
d. Describe security best practices.
e. Describe a virus hoax and the importance of an incident report.
Unit Nine
Troubleshooting Your Network
1. Describe the troubleshooting process.
a. Identify and describe troubleshooting methodology.
b. Describe approaches to troubleshooting.
c. Describe troubleshooting best practices.
d. Describe the need for documentation.
2. Identify and describe common hardware issues.
a. Describe common physical problems and how they are detected.
b. Describe the purpose of LED indicators and their meaning.
c. Describe cabling and connection issues.
Developed May 2007
Networking Basics
Page 7
3. Describe how software utilities are used to verify TCP/IP connectivity.
a. Identify and describe software utilities for troubleshooting.
b. Describe and use ipconfig.
c. Describe and use ping.
d. Describe and use tracert.
e. Describe and use netstat.
f. Describe and use nslookup.
4. Describe common wireless problems.
a. Describe wireless troubleshooting best practices.
b. Identify and describe radio issues with a wireless network.
c. Identify and describe association and authentication issues within a wireless
network.
5. Verify and troubleshoot ISR connectivity.
a. Describe how to examine the connectivity between the router and ISP.
b. Describe how to examine the DHCP bindings.
6. Interact with the ISP helpdesk.
a. Describe common sources of help and the role of a helpdesk.
b. Describe how to gather information about a problem.
c. Describe how to interact with the helpdesk.
7. Utilize the troubleshooting process to identify and solve common problems
(simulations should be made available).
Developed May 2007
Networking Basics
Page 8
ACRONYMS
Acronym
AC
ACK
ACL
ACPI
ACT
ADSL
AGP
AMD
AMR
APIPA
APM
ARP
ASR
AT
ATA
ATAPI
ATM
ATX
BIOS
BNC
BRI
BTX
CCD
CD
CDP
CD-ROM
CD-RW
CDFS
CLI
CMOS
CNR
COM1
CPU
CRIMM
CRT
DAC
DB-25
DB-9
DC
DDOS
DDR
Developed May 2007
Spelled Out
alternating current
acknowledgement of message
access control list
advanced configuration and power interface
activity
asymmetrical digital subscriber line
accelerated graphics port
advanced micro devices
audio modem riser
automatic private internet protocol addressing
advanced power management
address resolution protocol
automated system recovery
advanced technology
advanced technology attachment
advanced technology attachment packet interface
asynchronous transfer mode
advanced technology extended
basic input/output system
Bayonet-Neill-Concelman or British Navel Connector
basic rate interface
balanced technology extended
charged coupled device
compact disc
Cisco discovery protocol
compact disc-read-only memory
compact disc-rewritable
compact disc file system
command line interface
complementary metal-oxide semiconductor
communication network riser
communication port 1
central processing unit
continuity-rambus inline memory module
cathode-ray tube
discretionary access control
serial communications D-shell connector, 25 pins
9 pin D shell connector
direct current
distributed denial of service
double data-rate
Networking Basics
Page 9
DDR RAM
DDR SDRAM
DFS
DHCP
DIMM
DIN
DIP
DLT
DLP
DMA
DNS
DOS
DPMS
DRAM
DSL
DVD
DVD-RAM
DVD-ROM
DVD-R
DVD-RW
DVI
ECC
ECP
EEPROM
EFS
EGP
EIDE
EISA
EMI
EMP
EPROM
EPP
ERD
ESD
ESDI
EVGA
EVDO
FAT
FAT12
FAT16
FAT32
FDD
FERPA
Fn
FPM
Developed May 2007
double data-rate random access memory
double data-rate synchronous dynamic random access
memory
distributed file system
dynamic host configuration protocol
dual inline memory module
Deutsche Industrie Norm
dual inline package
digital linear tape
digital light processing
direct memory access
domain name service or domain name server
disk operating system or denial of service
display power management signaling
dynamic random access memory
digital subscriber line
digital video disc or digital versatile disc
digital video disc-random access memory
digital video disc-read only memory
digital video disc-recordable
digital video disc-rewritable
digital visual interface
error correction code
extended capabilities port
electrically erasable programmable read-only memory
encrypting file system
exterior gateway protocol
enhanced integrated drive electronics
extended industry standard architecture
electromagnetic interference
electromagnetic pulse
erasable programmable read-only memory
enhanced parallel port
emergency repair disk
electrostatic discharge
enhanced small device interface
extended video graphics adapter/array
evolution data optimized or evolution data only
file allocation table
12-bit file allocation table
16-bit file allocation table
32-bit file allocation table
floppy disk drive
Family Educational Rights and Privacy Act
Function (referring to the function key on a laptop)
fast page-mode
Networking Basics
Page 10
FRU
FTP
FQDN
GB
GDI
GHz
GUI
GPRS
GSM
HAL
HCL
HDD
HDMi
HPFS
HTML
HTTP
HTTPS
I/O
ICMP
ICS
ICR
IDE
IDS
IEEE
IGP
IGRP
IIS
IMAP
IOS
IP
IPCONFIG
IPP
IPSEC
IPX
IPX/SPX
IR
IrDA
IRQ
ISA
ISDN
ISO
ISP
KB
LAN
LBA
LC
Developed May 2007
field replaceable unit
file transfer protocol
fully qualified domain name
gigabyte
graphics device interface
gigahertz
graphical user interface
general packet radio system
global system for mobile communications
hardware abstraction layer
hardware compatibility list
hard disk drive
high definition media interface
high performance file system
hypertext markup language
hypertext transfer protocol
hypertext transfer protocol over secure sockets layer
input/output
internet control message protocol
internet connection sharing
intelligent character recognition
integrated drive electronics
intrusion detection system
Institute of Electrical and Electronics Engineers
interior gateway protocol
interior gateway routing protocol
Internet Information Services
internet mail access protocol
Internet operating system
internet protocol
internet protocol configuration
internet printing protocol
internet protocol security
internetwork packet exchange
internetwork packet exchange/sequenced packet exchange
infrared
Infrared Data Association
interrupt request
industry standard architecture
integrated services digital network
Industry Standards Organization
internet service provider
kilobyte
local area network
logical block addressing
Lucent connector
Networking Basics
Page 11
LCD
LDAP
LED
LIP or LiPoly
Li-on
LPD/LPR
LPT
LPT1
LPX
LVD
MAC
MAN
MAPI
Mb
MB
MBR
MBSA
MCR
MFD
MFP
MHz
MicroDIMM
MIDI
MIME
MLI
MMC
MMX
MOTD
MP3
MPEG
MSCONFIG
MSDS
MUI
NAS
NAT
NetBIOS
NetBEUI
NFS
NIC
NiCd
NiMH
NLI
NLX
NNTP
NTFS
NTLDR
Developed May 2007
liquid crystal display
lightweight directory access protocol
light emitting diode
lithium-ion polymer
lithium-ion
line printer daemon / line printer remote
line printer terminal
line printer terminal 1
low profile extended
low voltage differential
media access control
metropolitan area network
messaging application programming interface
megabit
megabyte
master boot record
Microsoft Baseline Security Analyzer
multivariant curve resolution
multi-function device
multi-function product
megahertz
micro dual inline memory module
musical instrument digital interface
multipurpose internet mail extension
multiple link interface
Microsoft management console
multimedia extensions
message of the day
Moving Picture Experts Group Layer 3 Audio
Moving Picture Experts Group
Microsoft configuration
material safety data sheet
multilingual user interface
network-attached storage
network address translation
networked basic input/output system
networked basic input/output system extended user interface
network file system
network interface card
nickel cadmium
nickel metal hydride
not logged in or natural language interface
new low-profile extended
network news transfer protocol
new technology file system
new technology loader
Networking Basics
Page 12
NWLINK
OCR
OEM
OMR
OS
OSI
OSR
PAN
PATA
PC
PCI
PCIe
PCIX
PCL
PCMCIA
PDA
PGA
PGA2
PIN
PKI
PnP
POP
POP3
POST
POTS
PPP
PPTP
PRI
PROM
PS/2
PSTN
PVC
PXE
QoS
RAID
RAM
RAS
RBAC
RDRAM
RF
RFI
RGB
RIMM
RIP
RIS
RISC
Developed May 2007
Netware Link
optical character recognition
original equipment manufacturer
optical mark recognition
operating system
operating system interconnection
original equipment manufacturer service release
personal area network
parallel advanced technology attachment
personal computer
peripheral component interconnect
peripheral component interconnect express
peripheral component interconnect extended
printer control language
Personal Computer Memory Card International Association
personal digital assistant
pin grid array
pin grid array 2
personal identification number
public key infrastructure
plug and play
post office protocol
post office protocol 3
power-on self test
plain old telephone service
point-to-point protocol
point-to-point tunneling protocol
primary rate interface
programmable read-only memory
Personal System/2 connector
public switched telephone network
permanent virtual circuit
preboot execution environment
quality of service
redundant array of independent (or inexpensive) discs
random access memory
remote access service
role-based access control or rule-based access control
RAMBUS® dynamic random access memory
radio frequency
radio frequency interference
red green blue
RAMBUS® inline memory module
routing information protocol
remote installation service
reduced instruction set computer
Networking Basics
Page 13
RJ
RJ-11
RJ-45
RMA
ROM
RS-232 or RS-232C
RTC
SAN
SATA
SC
SCSI
SCSI ID
SD
SDRAM
SEC
SFC
SGRAM
SIMM
SLI
SMB
SMTP
SNMP
SoDIMM
SOHO
SP
SP1
SP2
SPDIF
SPGA
SPX
SRAM
SSH
SSID
SSL
ST
STP
SVGA
SXGA
TB
TCP
TCP/IP
TDR
TFTP
UART
Developed May 2007
registered jack
registered jack function 11
registered jack function 45
returned materials authorization
read only memory
recommended standard 232
real-time clock
storage area network
serial advanced technology attachment
subscription channel
small computer system interface
small computer system interface identifier
card secure digital card
synchronous dynamic random access memory
single edge connector
system file checker
synchronous graphics random access memory
single inline memory module
scalable link interface or system level integration or scanline
interleave mode
server message block or small to midsize business
simple mail transport protocol
simple network management protocol
small outline dual inline memory module
small office/home office
service pack
service pack 1
service pack 2
Sony-Philips digital interface format
staggered pin grid array
sequenced package exchange
static random access memory
secure shell
service set identifier
secure sockets layer
straight tip
shielded twisted pair
super video graphics array
super extended graphics array
terabyte
transmission control protocol
transmission control protocol/internet protocol
time domain reflectometer
trivial file transfer protocol
universal asynchronous receiver transmitter
Networking Basics
Page 14
UDF
UDMA
UDP
UL
UNC
UPS
URL
USB
USMT
UTP
UXGA
VESA
VFAT
VGA
VoIP
VPN
VRAM
WAN
WAP
WEP
WIFI
WINS
WLAN
WPA
WUXGA
XGA
ZIF
ZIP
Developed May 2007
user defined functions or universal disk format or universal
data format
ultra direct memory access
user datagram protocol
Underwriter’s Laboratory
universal naming convention
uninterruptible power supply
uniform resource locator
universal serial bus
user state migration tool
unshielded twisted pair
ultra extended graphics array
Video Electronics Standards Association
virtual file allocation table
video graphics array
voice over internet protocol
virtual private network
video random access memory
wide area network
wireless application protocol
wired equivalent privacy
wireless fidelity
windows internet name service
wireless local area network
wireless protected access
wide ultra extended graphics array
extended graphics array
zero-insertion-force
zigzag inline package
Networking Basics
Page 15
Download