section i - overview...(which is a ccna). course outlines are reviewed every year and for the past 3...
TRANSCRIPT
![Page 1: SECTION I - OVERVIEW...(which is a CCNA). Course outlines are reviewed every year and for the past 3 years we have modified all 4 semesters of our Cisco classes based on corporate](https://reader034.vdocuments.us/reader034/viewer/2022042319/5f090a727e708231d424f265/html5/thumbnails/1.jpg)
SECTION I - OVERVIEW
1) a) In spring 2001, Coconino Community College began to develop curriculum that would teach
freshman and sophomore students the technical skills necessary to complete a Career and Technical
Education in Network Engineering with either one or two years of study. An extensive examination for
existing instruction from a wide variety of national and local sources was conducted. More locally, the
Flagstaff Medical Center, City of Flagstaff, County of Coconino, WL Gore, Northern Arizona
University and some local small businesses were consulted for program content and employment
potential.
b)
• To provide qualified personnel to help satisfy the shortage of information technology workers
• To enhance the vocational/technical mission of the campus
• To offer programs to provide students with greater earning potential
• To collaborate with state and local industry to more effectively provide graduates with the
necessary skills in information technology
These program objectives are within the mission of the institution. They speak directly to the needs of workforce development, welfare reform, and School-to-Work initiatives that are of utmost importance locally and nationally. Remarkable opportunities for articulation and dual credit agreements exist with these new programs. c) N/A – This program is designed to specific work force development. There is no general education courses required.
2) The CIS Department Chair oversees the program. The Cisco Coordinator is a full time employee whose job responsibilities are to recruit new local academies from Northern Arizona high schools, support, and help them to grow their local program. The coordinator is required to teach 12 credit hours in the classroom and spend 6 credit hours doing Cisco Coordinating. This includes training each instructor to understand the curriculum as well as deliver it with effectiveness.
3) a) Our Cisco Coordinator meets with the community, receives input and after analyzing the input
accesses programmatic changes and goes to the Department Chair to determine what actions to take.
continues to speak to high schools in our area as more high schools keep calling and showing an interest
in becoming Local Cisco Academies. Our Coordinator realizes the potential of many students
articulating and transferring credit from the high schools to matriculate into our Cisco program. In
addition he has gone out into the community to speak to the traditional-aged student sector, county and
city agencies are excited for this program as a means of serving their needs locally. Also our local small
and large businesses have already begun sending employees to our Cisco classes.
b) Historically and currently many of the small and medium businesses, including the city, county, and
other governmental agencies send their employees to take our Cisco courses and have succeed in
obtaining their CCNA nationwide approved certificates.
4) Pass rates for all CISCO classes from 2003 to 2009: CIS 140 (84.7%), CIS 150 (83%), CIS 160 (98%),
and CIS 170 (80%). Pass rates have been relatively static however, the Cisco Coordinator regularly
adopts effective approaches to curriculum and delivery such as but not limited to the following:
Professional development tools, real world approaches, regular updates in curriculum, more hands-on
with contemporary equipment, and a larger remodeled room.
![Page 2: SECTION I - OVERVIEW...(which is a CCNA). Course outlines are reviewed every year and for the past 3 years we have modified all 4 semesters of our Cisco classes based on corporate](https://reader034.vdocuments.us/reader034/viewer/2022042319/5f090a727e708231d424f265/html5/thumbnails/2.jpg)
5) The Cisco program is creating partnerships with local businesses by creating internships for our
students. It has been integrated with the CAVIAT Central Program. The goal of this program is to give
high school juniors and seniors the opportunity of earning college credit towards the CCNA certificate.
6) CCC remodeled several rooms to be used as a high tech computer classroom with the ability to offer the
latest and greatest business technology. This has been accomplished by purchasing the newest computer
equipment to teach our students real world technology. An example of the equipment is replacing our
routers and switchers ever several years. The Cisco Coordinator also has created a large mobile wiring
wall for students to hands-on wiring.
![Page 3: SECTION I - OVERVIEW...(which is a CCNA). Course outlines are reviewed every year and for the past 3 years we have modified all 4 semesters of our Cisco classes based on corporate](https://reader034.vdocuments.us/reader034/viewer/2022042319/5f090a727e708231d424f265/html5/thumbnails/3.jpg)
SECTION II – TEACHING AND LEARNING
1) Program area: Cisco
2) Please find Attachment II at the end of this document for curriculum documents for the Cisco Program.
How are program requirements and information communicated?
Open
houses
Schedule/
Catalog
Program
Brochure/Guide
Small groups: (advisor,
group advising, other)
Other: describe
Prospective Students X X X Advisors, Instructors,
Word of mouth
Employers X X X Community Advisory
Council, Chair and Cisco
Coordinator visit
employers on their site
Chair and Cisco
Coordinator do
visits at the
employers site
Advisors/Counselors X X Small group advising,
one on one discussions
Admissions/Recruiters X X On-site visits at as many
High Schools as possible
Regular contact
through site
visits and phone
calls
3) Program is taught at the Lone Tree and 4th
Street campuses. Also at several high school sites around
Northern Arizona
4) Classes are offered during both the Day and Evening hours depending upon the semester to meet the
needs of the various student demographic groups.
5)
6)
Courses Semester 10th day enrollment FTSE/45th day
enrollment
Successful
Completers
(A,B,C,S)
Unsuccessful
Completers
(D,F,U,W)
CISCO Network
Academy Semester 1 201 175 151 23
CISCO Network
Academy Semester 2 70 68 56 6
The requirement to be admitted to this program is general knowledge of computers and/or consent of
instructor. A student entering this program needs to possess general understanding of software and
hardware in order to be successful in this program. Students without this knowledge are advised to take
our Introduction to Computer Information Systems to prepare our students for success in this program.
The criterion for this program is evaluated every year.
![Page 4: SECTION I - OVERVIEW...(which is a CCNA). Course outlines are reviewed every year and for the past 3 years we have modified all 4 semesters of our Cisco classes based on corporate](https://reader034.vdocuments.us/reader034/viewer/2022042319/5f090a727e708231d424f265/html5/thumbnails/4.jpg)
CISCO Network
Academy Semester 3 34 30 14 14
CISCO Network
Academy Semester 4 21 20 18 8
7)
Year Enrollment Completers
1. 2006-2007 41 41
2. 2007-2008 52 43
3. 2008-2009 65 54
8) Identical to Question 7
Year Enrollment Completers
1.
2.
3.
9) This program has no degree or certificate attached to it.
10)
11)
Enrollment Caps: 15 for all courses
In order for the students of this program to be successful, the class size is important. There is a lot of
high tech material to cover in a rapid period of time. Moreover, the ratio of student hands-on to hardware
availability is designed for quality student access and skill/knowledge retention. Therefore, the instructor
must have time to cover the material in a professional manner and then be available for all the students
to help them individually learn the material. Without time for the instructor to help each individual
student, they may struggle with the advanced technology and not succeed. Currently we are evaluating
if it would be feasible to raise the cap to 20 with the intensive hands-on part of the class.
Students seem to not take Semesters 3 and 4 which are the last 2 semesters of the program. We believe
the cause for this is the student has enough knowledge after completing the first two semesters
successfully to get a decent paying job without completing semesters 3 and 4. The types of students we
get in this program are generally working part-time or full-time in some computer technology field and
need to gather more information related to their job. In addition, it is understood that as the economy
tightens there are more applicants than jobs. This explains the most recent increase up to 89%
enrollment from CIS 150 to CIS 160 in 2009.
![Page 5: SECTION I - OVERVIEW...(which is a CCNA). Course outlines are reviewed every year and for the past 3 years we have modified all 4 semesters of our Cisco classes based on corporate](https://reader034.vdocuments.us/reader034/viewer/2022042319/5f090a727e708231d424f265/html5/thumbnails/5.jpg)
12)
13)
14)
15)
16)
17)
18)
19)
The national corporation, Cisco, writes and updates their curriculum about every 2 years. The regional
and local academies (which we are) are required to use their curriculum. We review our curriculum
every year to make sure it meets the standards of our community needs.
There is a national/professional credential available to completers of this program. Over the last three
years, 95% of the completers of this program have sat for the exam and earned their national credential
(which is a CCNA).
Course outlines are reviewed every year and for the past 3 years we have modified all 4 semesters of
our Cisco classes based on corporate and college needs.
Our class syllabi have been reviewed and modified every semester year for the last 9 2 years.
As far as curriculum changes being made over the last three years, Cisco themselves have revamped the
curriculum to meet the current technology standards of the business world.
We have begun to offer the first two semesters of Cisco to junior and senior high school students.
When they complete each of these courses they immediately earn college credit since the Cisco
Networking Academy Program (CNAP) started in 2001. Since that time CCC has established dual-
enrollment credit when they complete each class. Cisco courses are included in our AAS Network
Engineering Degree which articulates to a BAS at NAU.
The CNAP is a three tiered program designed to meet the needs and qualities of business that required a well-qualified employee. The Cisco Coordinator receives guidance from a Cisco Authorized Training
Center (the top tier) and its general over-reaching management is performed by the CIS Dept Chair.
CCC is a Regional Cisco Networking Academy which provides support and guidance to Local
Academies throughout northern Arizona. CCC is approved as a Regional Academy by Cisco due to
signing an IGA which states CCC will follow program guidelines.
Due to the difficulty of getting community members all together to have a meeting we have decided to
visit them at their place of business. This is an ongoing project that is a constant throughout the year.
![Page 6: SECTION I - OVERVIEW...(which is a CCNA). Course outlines are reviewed every year and for the past 3 years we have modified all 4 semesters of our Cisco classes based on corporate](https://reader034.vdocuments.us/reader034/viewer/2022042319/5f090a727e708231d424f265/html5/thumbnails/6.jpg)
20)
21)
22)
23)
Student credit
hours
Fall _2008_
Student credit
hours
Spring _2009
Student credit
hours
Fall _____
Student credit
hours
Spring _____
Student credit
hours
Fall _____
Student
credit hours
Spring _____
Full time
Faculty
8 12, 2 CIS 140,
1 CIS 160 12
Full time
overload N/A
Part time
faculty N/A
All Cisco classes are taught using PC’s that have access to the Internet to review and take exams
once per week. Students learn to use Routers and Switches which help with connectivity. So in
summary, the entire classroom experience uses technology developing the much needed real-world
hands-on experiences.
Internships have created positive relationships with CCC’s community. Some of the internal strengths of
this program is it offers the opportunity for Information Technology staff to keep current with the
technology they are supporting here at the college at little or no cost to the college. Also, we have an
instructor who has all the knowledge in Cisco and other related technology fields the college would ever
need. He has spent a lot of his own money to obtain all the national standard certificates there are in this
program.
1) Local Cisco programs serve the needs of students of Northern Arizona
2) Positive feedback from community businesses
3) The willingness of the Cisco Coordinator to be flexible to meet variable needs of the program
I believe it is time to do a thorough review of the Course Outlines for this program. It has been very
difficult for the Cisco Coordinator and Department Chair to schedule an appointment due to their multiple
responsibilities for CCC. We are going to make a point to meet together this spring to accomplish
modifying the curriculum according to the needs of our business community.
![Page 7: SECTION I - OVERVIEW...(which is a CCNA). Course outlines are reviewed every year and for the past 3 years we have modified all 4 semesters of our Cisco classes based on corporate](https://reader034.vdocuments.us/reader034/viewer/2022042319/5f090a727e708231d424f265/html5/thumbnails/7.jpg)
24)
25)
26)
27)
1) Advertise our Cisco program to the general population in Coconino County
2) Meet with the different businesses who may be interested in the Cisco program or
other programs we have to offer here at CCC
3) Educate any of the businesses who are interested in our Cisco program and
demonstrate how this technology could be beneficial for their company.
If we can accomplish the above three opportunities, we could see our Cisco program
grow and encourage the businesses to send their employees to our school to either be
trained using the Cisco technology or upgrade their Cisco skills.
Also, if we are successful in accomplishing this, I could see the businesses asking
what other programs we offer here at CCC.
1) There is another school in Flagstaff that offers a similar networking program without the well-known high
level of quality and support of Cisco Systems. Their networking program is to design the Cisco program in
which students can finish the program in a year as opposed to the two years it takes here at CCC.
2) Since almost everyone has access to the Internet we are in competition from other Universities and/or two
year schools that may offer this program on line.
3) Some of the larger corporations send their employees to Phoenix and other out of state educational sites that
teach the Cisco program at a highly accelerated pace of 1 40+ hour week called “Boot camps”.
4) Needs to continue supporting current academies and recruiting new ones which is a difficult task due to the
expanse of land in Coconino County.
Bill, our Cisco Coordinator has attended many professional development workshops and classes. Such as but
not limited to: Professional development provided by the CATC, Project Management Professional training,
and Institute of cultural Affairs training: Focused Conversation, Consensus Workshop, Action Planning, and
Strategic Planning. Also, Bill has attended the excellent Professional Development workshops of CCC.
1) Actually, one of the recommendations was try and incorporate a way to address the way prospective
employees should dress and respond during interviews which was the number one recommendation
2) Information Technology Resume developments
3) Project management overview and techniques.
![Page 8: SECTION I - OVERVIEW...(which is a CCNA). Course outlines are reviewed every year and for the past 3 years we have modified all 4 semesters of our Cisco classes based on corporate](https://reader034.vdocuments.us/reader034/viewer/2022042319/5f090a727e708231d424f265/html5/thumbnails/8.jpg)
28)
29)
30)
Evaluation of Program Review Report
Competitiveness
1) At the end of every school year we do a thorough review of the Cisco program by reviewing and
modifying any instruction methods if we think it meets the needs of the community.
2)
a. The program’s strengths are that the community businesses are educated and respect the
program. This is accomplished by our Coordinator and Department Chair by doing site visits at the
various businesses and then reviewing their needs and attempting to implement some of them as we
move from semester to semester. Because of our ability to be flexible to meet the needs of area
businesses, and because of our lower costs, as well as our reputation for quality, this program is
highly competitive with other entities offering similar classes.
b. The weaknesses to the program are accomplishing our goal of having higher enrollments in all 4
semesters’ classes.
1) We have yet been able to figure how to implement the number one recommendation. We have spoken to
the business department. They have the LDR 115, Workplace Ethics, and had begun looking to see if we
could incorporate this into one of our OIS courses but OIS has now been retired. So we are looking at other
options.
Our Cisco Coordinator reviews his program every semester by evaluating the Cisco on-line final exams for
each semester to observe how his students do and then makes the modifications needed to help the students
become more successful by changing his approach to presenting the material. The benefit of smaller classes
allows the Cisco Coordinator to emphasize unique teaching/guiding and leadership elements for each
individual students based on online exam scores.
One item of future aspirations is to continue to add local academies around Northern Arizona. This is being
done by marketing to the high schools and actually setting up meetings with the Principals and the teacher with
the interest and background in the technology to teach the Cisco courses.
![Page 9: SECTION I - OVERVIEW...(which is a CCNA). Course outlines are reviewed every year and for the past 3 years we have modified all 4 semesters of our Cisco classes based on corporate](https://reader034.vdocuments.us/reader034/viewer/2022042319/5f090a727e708231d424f265/html5/thumbnails/9.jpg)
Teaching and Learning
1) The Cisco Coordinator provides all the advising and mentoring of the students in his program by
counseling each individual throughout the semester. He spends many hours helping his students
be successful.
2) The curriculum we use is created by Cisco Corporation, the number one networking business in
the world.
3) Classes are capped at a low enrollment due to the many hands-on projects in the curriculum,
which gives the instructor time to work closely with each student.
4) The program meets the requirements of the certification it offers.
Faculty and Staff
1) The Cisco Coordinator spends many, many hours supporting his local academies by traveling to
their sites to make sure they have the current hardware and software in place to teach the students
successfully. The hardware used in the classroom at CCC is always up-to-date and used throughout
the semesters with hands-on lessons.
2) We encourage the IT staff to take our classes to keep up with the new technology that they use to
support CCC.
3) The program has one of the most knowledgeable instructors around the state.
Leadership
1) The department chair is in constant communication with the coordinator of the program and makes
any necessary changes immediately when appropriate.
2) When scheduling Cisco classes for each semester, the chair communicates with all department
chairs to make sure there are no room conflicts. If there are any conflicts, the chair works this out
with the other chair(s).
3) The Cisco program has in place CNAP that is a three tiered program designed to meet the needs
and qualities of businesses and has a built in long range plan which includes a basic annual strategic
plan that is used by the Coordinator and Chair.
College Support
1) The program does a good job currently creating the greatest possible synergy throughout the
College
2) The College has been supporting this program with great enthusiasm and confidence.
3) The classroom used for this program was specifically created to set a high standard of delivering
the greatest and latest technology.
4) The College has provided great support by creating a full time Cisco Coordinator who teaches the
classes and supports the program.
5) The program requires the students to do research and write papers using our sufficient library and
by having access to the internet.
Plans, Goals, and Resources Allocation
![Page 10: SECTION I - OVERVIEW...(which is a CCNA). Course outlines are reviewed every year and for the past 3 years we have modified all 4 semesters of our Cisco classes based on corporate](https://reader034.vdocuments.us/reader034/viewer/2022042319/5f090a727e708231d424f265/html5/thumbnails/10.jpg)
1) The goals of the program are to meet community businesses, listen to what their needs are and
implement them when feasible.
2) Same as above answer
3) The program makes sure that it can purchase the best technology to allow all the students to
succeed and have the best education so they can be the best candidate for a job in technology.
4) The Cisco program has a balance of resources and instructors.
5) The program is successfully meeting its current goals but there is always room for reaching out for
new opportunities.
6) There are no additional resources needed at this time.
7) The resources needed to meet the program’s goals are in place and do not need to be
redistributed to meet the College goals
Recommendations for Program Improvement
We will evaluate our program through our yearly program assessment. We will obtain the
Institutional Resource numbers to observe how many students are completing the program
successfully.
The Cisco Coordinator and Department Chair will continue to advertise the program at the
Movie theater in town. The Coordinator will continue attending functions, such as the
Chamber of Commerce mixers and making site visits to community businesses. He will keep
going to high schools in Coconino County to create new partnerships with CCC and create
local Cisco academies.
![Page 11: SECTION I - OVERVIEW...(which is a CCNA). Course outlines are reviewed every year and for the past 3 years we have modified all 4 semesters of our Cisco classes based on corporate](https://reader034.vdocuments.us/reader034/viewer/2022042319/5f090a727e708231d424f265/html5/thumbnails/11.jpg)
ATTACHMENT II
COCONINO COMMUNITY COLLEGE
COURSE OUTLINE
Prepared by : Bill Branch, Dave Bowmen October, 03, 2001
Revised by: Dave Bowmen Spring 2004
A. Identification:
1. Subject Area: Computer Information Systems
2. Course Number: CIS 140
3. Course Title: Cisco Networking Academy Semester I
4. Credit Hrs: 4
5. Catalog Description:
This is the first of four semester courses designed to provide students with classroom and laboratory experience in current
and emerging networking technology that will empower them to enter employment or further education and training in the
computer networking field. A task analysis of current industry standards and occupational analysis was used to develop the
content. Instruction includes, safety, networking, network terminology and protocols, network standards, local-area networks
(LANs), wide-area networks (WANs), Open System Interconnection (OSI) models, cabling, cabling tools, routers, router
programming, Ethernet, Internet Protocol (IP) addressing, and network standards. Particular emphasis is given to the use of
decision-making and problem-solving techniques in applying science, mathematics, communication, and social-studies
concepts to solve networking problems. In addition, instruction and training are provided in the proper care, maintenance,
and use of networking software, tools, and equipment and all local, state, and federal safety, building, and environmental
codes and regulations. Prior computer knowledge strongly recommended. Four lecture. May be taken for S/U credit.
B. Course Goals:
To provide students with hands on experience in data network cabling, cable codes and regulations. Furthermore, the class will
provide the logical background for understanding, design, and implementation of small to medium of data networks. This first
semester of the Cisco Networking Academy will help students enter the data networking world.
C. Course Outcomes:
Students will:
1. Identify the Basics of Computer Hardware
2. Identify the Basics of Computer Software
3. Determine Binary Numbers
4. Describe Basic Networking Terminology
5. Identify Digital Bandwidth
6. Describe General Model of Communication
7. Describe the OSI Reference Model
8. Compare the OSI Model and the TCP/IP Model
9. Identify Basic LAN Devices
10. Describe the Evolution of Network Devices
11. Sketch Building LANs
12. Define the Basics of Electricity
13. Operate the Basics of Digital Multimeters
14. Identify the Basics of Signals and Noise in Communications Systems
15. Describe the Basics of Encoding Networking Signals
16. Recognize the Most Common LAN Media
17. Classify Cable Specification and Termination
18. Demonstrate Making and Testing Cable
19. Classify Layer 1 Components and Devices
20. Describe Collisions and Collision Domains in Shared Layer Environments
21. Identify the Basic Topologies Used in Networking
22. Describe LAN Standards
23. Determine Hexadecimal Numbers
24. Describe Framing
25. Identify the Basics of Token Ring
26. Identify the Basics of Fiber Distributed Data Interface (FDDI)
![Page 12: SECTION I - OVERVIEW...(which is a CCNA). Course outlines are reviewed every year and for the past 3 years we have modified all 4 semesters of our Cisco classes based on corporate](https://reader034.vdocuments.us/reader034/viewer/2022042319/5f090a727e708231d424f265/html5/thumbnails/12.jpg)
27. Describe Ethernet and IEEE 802.3
28. Determine Layer 2 Devices
29. Classify the Effects of Layer 2 Devices on Data Flow
30. Identify the Basic Ethernet 10Base-T Troubleshooting
31. Identify the Basic Network Design and Documentation
32. Define Planning Structured Cabling: Wiring Closet Specifications
33. Define Planning Structured Cabling: Identifying Potential Wiring Closets
34. Define Planning Structured Cabling: Selection Practice
35. Define Planning Structured Cabling: Horizontal and Backbone Cabling
36. Define Planning Structured Cabling: Electricity and Grounding
37. Define Planning Structured Cabling: Cabling and Grounding
38. Define Design Practice No. 1: Wiring Plan for Ethernet Star Topology LAN
39. Define Design Practice No. 2: Multiple Earth Ground Problems
40. Define Network Power Supply Issues: Power Line Problems
41. Define Network Power Supply Issues: Surge Suppressors and Uninterruptible Power Supply (UPS) Functions
42. Describe Project Planning
43. Perform RJ-45 Jack and Outlet Installation
44. Identify the Basics of Cable Installation
45. Structured Cable Run Installation
46. Identify the Basics of Wiring Closets and Patch Panels
47. Describe Wiring closet
48. Determine the Range of Equipment for Testing Structured Cabling Projects
49. Describe Importance of a Network Layer
50. Define the Path Determination
51. Describe IP Address within the IP Header
52. Describe IP Address Classes
53. Define the Reserved Address Space
54. Identify the Basics of Subnetting
55. Determine the needs for Creating a Subnet
56. Determine Layer 3 Devices
57. Describe Network-to-Network Communications
58. Define the Advanced ARP Concepts
59. Describe Routable Protocols
60. Describe Routing Protocols
61. Define Other Network Layer Services
62. Define ARP Tables
63. Classify Interior Gateway Protocols (IGP) and Exterior Gateway Protocol (EGP)
64. Protocol Analyzer Software
65. Describe The Transport Layer
66. Describe The Session Layer
67. Describe The Presentation Layer
68. Identify the Basics of the Application Layer
69. Describe Domain Name System
70. Describe Network Applications
71. Perform Application Layer Examples
D. Course Content:
Will include: 1. Major components of a personal computer
2. Information flow in an idealized computer
3. The relationship of NICs to PCs
4. The installation of a NIC in a PC
5. PC components versus laptop components
6. Lab: Configuring network settings required to connect a PC to a network
7. Lab: Verify Web browser configuration
8. Troubleshooting lab: hardware and software
9. Binary numbers represent alphanumeric data
10. Bits and bytes
11. The Base 10 (decimal) number system
12. The Base 2 (binary) number system
13. Converting decimal numbers to binary numbers
14. Converting binary numbers to decimal numbers
15. Networks and networking
16. Data networks
17. Data networking solutions
18. Local area networks
19. Wide area networks
20. Digital bandwidth measurements
21. Three analogies to describe digital bandwidth
![Page 13: SECTION I - OVERVIEW...(which is a CCNA). Course outlines are reviewed every year and for the past 3 years we have modified all 4 semesters of our Cisco classes based on corporate](https://reader034.vdocuments.us/reader034/viewer/2022042319/5f090a727e708231d424f265/html5/thumbnails/13.jpg)
22. Media bandwidth differences
23. Data throughput in relation to digital bandwidth
24. Data transfer calculation
25. The importance of bandwidth
26. Using layers to analyze problems in a flow of materials
27. Source, destination, and data packets
28. Media
29. Protocol
30. The evolution of ISO networking standards
31. The purpose of the OSI reference model
32. The names of the seven layers of the OSI reference model
33. Descriptions of the seven layers of the OSI reference model
34. Encapsulation
35. Names for data at each layer of the OSI model
36. The importance of the TCP/IP reference model
37. Names and descriptions of the layers of the TCP/IP reference model
38. TCP/IP protocol graph
39. Comparison of the OSI model and the TCP/IP model
40. Use of the OSI and the TCP/IP models in the curriculum
41. The teaching topology
42. LAN devices in a topology
43. NICs
44. Media
45. Repeaters
46. Hubs
47. Bridges
48. Switches
49. Routers
50. Clouds
51. Network segments
52. Evolution of network devices
53. Milestones in the history of networking
54. Evolution of networking devices and the OSI layers
55. Basics of Data Flow Through LANs
56. Encapsulation and packets review
57. Packet flow through Layer 1 devices
58. Packet flow through Layer 2 devices
59. Packet flow through Layer 3 devices
60. Packet flow through clouds and through Layer 1-7 devices
61. A data packet's path through all seven layers of a LAN
62. Readiness to build a small network
63. Lab: Building a simple network
64. A helium atom
65. Creating stable atoms
66. Static electricity
67. Electrical current including insulators, conductors, and semiconductors
68. Electrical measurement terms
69. Analogy for voltage, resistance, and current
70. Graphing AC and DC voltage
71. Constructing a simple series electrical current
72. Purpose of grounding networking equipment
73. Safe handling and use of the multimeter
74. Using a multimeter to make resistance measurements
75. Using a multimeter to make voltage measurements
76. Measuring simple series circuit
77. Constructing a simple electrical communication system
78. Comparing analog and digital signals
79. Using digital signals to build analog signals
80. Representing one bit on a physical medium
81. Network signal propagation
82. Network attenuation
83. Network reflection
84. Noise
85. Dispersion, jitter, and latency
86. Collision
87. Messages in terms of bits
88. Historical examples of encoding
89. Modulation and encoding
90. STP
91. UTP
![Page 14: SECTION I - OVERVIEW...(which is a CCNA). Course outlines are reviewed every year and for the past 3 years we have modified all 4 semesters of our Cisco classes based on corporate](https://reader034.vdocuments.us/reader034/viewer/2022042319/5f090a727e708231d424f265/html5/thumbnails/14.jpg)
92. Coaxial cable
93. Optical fiber
94. Wireless communication
95. Purpose of LAN media specifications
96. TIA/EIA standards
97. Explain the details of TIA/TIA-568-A
98. Networking media and terminations
99. Testing Ethernet 10Base-T patch cables with a cable tester
100. Making and testing Ethernet 10Base-T straight-through patch cable
101. Making and testing Ethernet 10Base-T console patch cable
102. Making and testing Ethernet 10Base-T crossover cable
103. Features of an advanced cable tester
104. Cable identification experiments using an advanced cable tester
105. Length experiments using an advanced cable tester
106. Ethernet 10Base-T
107. Connectors
108. Cabling
109. Jacks
110. Patch panels
111. Transceivers
112. Repeaters
113. Multiport repeaters (hubs)
114. OSI Layer 1 components and devices
115. Shared media environment
116. Collisions and collision domains
117. Signals in a collision
118. Collisions as natural functions of shared media environments and collision domains
119. Shared access as a collision domain
120. Repeaters and collision domains
121. Hubs and collision domains
122. Hubs and repeaters as causes of collision domains
123. The four repeater rule
124. Segmenting collision domains
125. Network topologies
126. Linear bus network topology
127. Ring network topology
128. Dual ring network topology
129. Star network topology
130. Extended star network topology
131. Tree network topology
132. Irregular network topology
133. Complete (mesh) network topology
134. Cellular network topology
135. Layer 2
136. Comparing OSI Layer 1 and 2 with various LAN standards
137. Comparing the IEEE model with the OSI model
138. Logical Link Control (LLC)
139. MAC sublayers
140. LLC as one of four concepts of Layer 2
141. Hexadecimal numbers as MAC addresses
142. Basic hexadecimal (hex) numbering
143. Converting decimal numbers to hexadecimal numbers
144. Converting hexadecimal numbers to decimal numbers
145. Methods for working with hexadecimal and binary numbers
146. MAC Addressing
147. Data link layer MAC identifiers
148. MAC address and NICs
149. How the NIC uses MAC addresses
150. Layer 2 address encapsulation and decapsulation
151. Limitations of MAC addressing
152. Why framing is necessary
153. Frame format diagram
154. Three analogies for frames
155. A generic frame format
156. Frame start fields
157. Address fields
158. Length/type fields
159. Data fields
160. Frame error problems and solutions
161. Stop frame field
![Page 15: SECTION I - OVERVIEW...(which is a CCNA). Course outlines are reviewed every year and for the past 3 years we have modified all 4 semesters of our Cisco classes based on corporate](https://reader034.vdocuments.us/reader034/viewer/2022042319/5f090a727e708231d424f265/html5/thumbnails/15.jpg)
162. Media Access Control (MAC)
163. Definition of MAC
164. Three analogies for MAC
165. Deterministic MAC protocols
166. Non-deterministic MAC protocols
167. Three specific technical implementations and their MACs
168. Overview of Token Ring and its variants
169. Token Ring frame format
170. Token Ring MAC
171. Token Ring signaling
172. Token Ring media and physical topologies
173. Overview of FDDI and its variants
174. FDDI format
175. FDDI MAC
176. FDDI signaling
177. FDDI media
178. Comparing Ethernet and IEEE 802.3
179. Ethernet family tree
180. Ethernet frame format
181. Ethernet MAC
182. Ethernet signaling
183. Ethernet 10Based-T media and topologies
184. NICs
185. NIC Layer 2 operations
186. Bridges
187. Bridge Layer 2 operations
188. Switches
189. Switch Layer 2 operations
190. Ethernet LAN segmentation
191. Bridge segmentation of a collision domain
192. Switch segmentation of a collision domain
193. Router segmentation of a collision domain
194. Teaching topology segmentation by bridges, switches, and routers
195. Troubleshooting workstations
196. Network Inspector discovery lab
197. Network Inspector problem log lab
198. Network Inspector frame statistics
199. General design process
200. Network design issues
201. General network design process
202. Network design documents
203. Overview of wiring closet selection
204. Size
205. Environmental specifications
206. Walls, floors, and ceilings
207. Temperature and humidity
208. Lighting fixtures and power outlets
209. Room and equipment access
210. Cable access and support
211. Topology as floor plan
212. Selecting potential locations
213. Determining number of wiring closets
214. Identification practice
215. Catchment area problems
216. MDF location in multi-story building
217. Example of where you would use multiple wiring closets
218. Cabling for MDF and IDF connections
219. Backbone cabling media
220. TIA/EIA 568-A requirements for backbone cabling
221. Maximum distance for backbone cabling
222. Differences between AC and DC
223. AC line noise
224. Electrostatic discharge
225. Grounding electrical current in computer equipment
226. Purpose of grounding computer equipment
227. Safety ground connections
228. Safety ground connection problems
229. Causes of ground potential problems
230. Networking devices and dangerous circuits
231. Faulty ground wiring problems
![Page 16: SECTION I - OVERVIEW...(which is a CCNA). Course outlines are reviewed every year and for the past 3 years we have modified all 4 semesters of our Cisco classes based on corporate](https://reader034.vdocuments.us/reader034/viewer/2022042319/5f090a727e708231d424f265/html5/thumbnails/16.jpg)
232. Avoiding potentially dangerous circuits between buildings
233. How fiber optic cable can prevent electrical shocks
234. Reasons for using UTP for backbone cabling between buildings
235. Power problem classifications
236. Normal mode and common mode
237. Typical power line problems
238. Sources of surges and spikes
239. Surge and spike damage
240. Surge and spike solutions
241. Sag and brownout solutions
242. Oscillation solution
243. Surge suppressors: networking device locations
244. Surge suppressors: for power panel locations
245. UPS: for certain LAN devices
246. UPS: for certain electrical problems
247. UPS: components
248. UPS: differences in UPS features
249. UPS: description and operation
250. Network installation safety procedures
251. Network documentation
252. Network installation teams
253. Work flow
254. Scheduling materials flow
255. TIA/EIA-568-aA standards
256. RJ-45 jack
257. Two methods for mounting an RJ-45 jack
258. Surface-mounting an RJ-45 jack
259. Advantages of surface-mounting an RJ-45 jack
260. Factors to consider before flush-mounting an RJ-45 jack
261. Preparing a drywall surface for a flush-mounted jack
262. Preparing a plaster surface for a flush-mounted jack
263. Preparing a wood surface for a flush-mounted jack
264. Flush mounting a jack in a wall
265. Procedure for placing the copper wires into a jack
266. Procedure for punching wires down into a jack
267. Installing RJ-45 jack and outlet
268. Basics of installing UTP cable
269. Documenting cable runs
270. TIA/EIA-606 specifications for labeling cable
271. Types of labels
272. Preparing cable for routing and labeling
273. Labeling cable ends
274. Easiest procedure for routing cable
275. Mounting cable in raceway
276. Running cable through existing raceway
277. Personal safety precautions before installing cable
278. Building safety
279. Supporting horizontal cabling
280. Stringing cable in an attic, or room with a dropped ceiling
281. Fishing cable from above a wall
282. Fishing cable from below a wall
283. Stringing, Running, and Mounting Cable
284. Installation tasks
285. Reason for MDFs and IDFs
286. Patch panel
287. Structure of a patch panel
288. Laying wires in a patch panel
289. Punch tools
290. Mounting a patch panel
291. Procedures for testing cable already installed
292. Network operation testing
293. Cable testing equipment
294. Tests performed by cable testers
295. Cable testers and distance measurements
296. TDRs (time domain reflectometers)
297. Wire maps
298. Split pairs
299. Signal attenuation
300. Causes of near-end crosstalk
301. Problem detected by a noise level test
![Page 17: SECTION I - OVERVIEW...(which is a CCNA). Course outlines are reviewed every year and for the past 3 years we have modified all 4 semesters of our Cisco classes based on corporate](https://reader034.vdocuments.us/reader034/viewer/2022042319/5f090a727e708231d424f265/html5/thumbnails/17.jpg)
302. Using a cable tester to locate sources of outside interference
303. Cable testing procedures
304. Identifiers
305. Segmentation and autonomous systems
306. Communication between separate networks
307. Layer 3 network devices
308. Path determination
309. Network layer addressing
310. Layer 3 and computer mobility
311. Comparing flat and hierarchical addressing
312. Network layer datagrams
313. Network layer fields
314. IP header source and destination fields
315. IP address as a 32-bit binary number
316. IP address component fields
317. IP address classes
318. IP address as decimal numbers
319. Binary and decimal conversion review
320. Converting decimal IP addresses to binary equivalents
321. Converting binary IP addresses to decimal equivalents
322. Reserved Address Space
323. Purposes for network IDS and broadcast addresses
324. Network ID
325. Network ID analogy
326. Broadcast address analogy
327. Hosts for classes of IP addresses
328. Classical IP addressing
329. Subnetwork
330. Purpose for subnetting
331. Subnet mask
332. Boolean operation: AND, OR, and NOT
333. Performing the AND function
334. Range of bits needed to create subnets
335. Determining subnet mask size
336. Computing subnet mask and IP address
337. Computing hosts per subnetwork
338. Boolean AND operation
339. IP configuration on a network diagram
340. Host/subnet schemes
341. Private addresses
342. Routers
343. Layer 3 addresses
344. Unique network numbers
345. Router interface/port
346. Methods for assigning an IP address
347. DHCP initialization sequence
348. Function of the address resolution protocol (ARP)
349. ARP operation within a subnet
350. Default gateway
351. Problems with sending data to nodes on different subnets
352. Names and descriptions of the layers of the TCP/IP reference model
353. How ARP sends data to remote networks
354. Proxy ARP
355. Four Layer 3 flowcharts
356. Routed protocols
357. Other routed protocols
358. Routable and non-routable protocols
359. Characteristics of s routable protocol
360. Examples of routing protocols
361. Definition of routing protocol
362. Routing encapsulation sequence
363. Multi-protocol routing
364. Connectionless network services
365. Connection-oriented network services
366. Comparing connectionless and connection-oriented network processes
367. IP and transport layer
368. Internetworking devices that have ARP tables
369. Comparing router ARP tables with ARP tables kept by other networking devices
370. Other router table addresses
371. ARP requests and ARP replies
![Page 18: SECTION I - OVERVIEW...(which is a CCNA). Course outlines are reviewed every year and for the past 3 years we have modified all 4 semesters of our Cisco classes based on corporate](https://reader034.vdocuments.us/reader034/viewer/2022042319/5f090a727e708231d424f265/html5/thumbnails/18.jpg)
372. Proxy ARP
373. Indirect routing
374. Routed protocols and routing protocols
375. GPs and EGPs
376. RIP
377. IGRP and EIGRP
378. OSPF
379. How routers recognize networks
380. Examples of static routing
381. Example of dynamic routing
382. How routers use RIP to route data through a network
383. Using protocol analyzer software for ARPs and broadcasts
384. Purpose of the transport layer
385. Layer 4 protocols
386. Comparing TCP and IP
387. TCP and UDP
388. TCP
389. UDP segment format
390. TCP Connection Methods
391. Port numbers
392. Three-way handshake/open connection
393. The session layer overview
394. The session layer in terms of analogies
395. Dialogue control
396. Dialogue separation
397. Layer 5 protocols
398. The presentation layer functions and standards
399. File formats
400. Data encryption and compression
401. Application processes
402. Direct network applications
403. Indirect network support
404. Making and breaking a connection
405. Problems with using IP addresses
406. The domain name server
407. Internet applications
408. E-mail message
409. DNS function
410. Telnet
411. File transfer protocol
412. Hypertext transfer protocol
COCONINO COMMUNITY COLLEGE
COURSE OUTLINE
Prepared by : Bill Branch, Dave Bowmen October, 03, 2001
A. Identification:
1. Subject Area: Computer Information Systems
2. Course Number: CIS 150
3. Course Title: Cisco Networking Academy Semester 2
4. Credit Hrs: 4
5. Catalog Description: The Cisco Networking Academy Program consists of four semesters. The program is designed to teach students the skills they
will need to design, build, and maintain small to medium size networks. This provides them with the opportunity to enter the
workforce and/or further their education and training in the computer networking field. Prerequisite: CIS 140. Four Lecture.
Spring Only.
B. Course Goals:
To build on previous knowledge from Cisco Networking Academy Semester 1. This will allow students to go beyond installing
and understanding data cable networks to working with networking devices on a very basic level. Skills include understanding
and configuring routers and switches for small to medium networks.
C. Course Outcomes:
The student will:
1. Describe The OSI Model
![Page 19: SECTION I - OVERVIEW...(which is a CCNA). Course outlines are reviewed every year and for the past 3 years we have modified all 4 semesters of our Cisco classes based on corporate](https://reader034.vdocuments.us/reader034/viewer/2022042319/5f090a727e708231d424f265/html5/thumbnails/19.jpg)
2. Relate the concept of a LAN
3. Describe TCP/IP Addressing
4. Identify the Host Layer (the Upper 4 Layers of the OSI Model)
5. Relate the concept of a WANs
6. Classify the WANs and Routers
7. Demonstrate the Router User Interface
8. Classify the Using The Router Interface and Interface Modes
9. Identify the Router Components
10. Demonstrate the Router Show Commands
11. Locate a Router's Network Neighbors
12. Demonstrate Basic Networking Testing
13. Demonstrate Router Boot Sequence and Setup Mode
14. Locate a System Configuration Dialog
15. Locate the Router Configuration Files
16. Demonstrate Router Configuration Modes
17. Identify the Configuration methods
18. Identify the The Basics of IOS Versions
19. Describe the Bootstrap Options in Software
20. Practice IOS Naming and Software Image Backup
21. Demonstrate Configuring a Router from the CLI after Start-up Config has been Erased
22. Identify the The TCP/IP Protocol Suite
23. Describe 2 Layer 3 Concepts
24. Demonstrate IP addressing and subletting
25. Interpret the Role of DNS in Router Configurations
26. Demonstrate the Verifying of an Address Configuration
27. Demonstrate the Assigning New Subnet Numbers to the Topology
28. Describe Routing Basics
29. Describe Why Routing Protocols are Necessary
30. Identify the Distance-Vector Routing
31. Identify the Link-State Routing
32. Describe the Context of Different Routing Protocols
33. Demonstrate Initial Router Configuration
34. Classify the Interior and Exterior Routing Protocols
35. Identify RIP
36. Identify IGRP
37. Describe The Session Layer
D. Course Content:
Will include: 1. Layered networked model
2. The OSI layered model functions
3. Peer-to-peer communications
4. Five steps of data encapsulation 5. LAN devices and technologies
6. Ethernet and IEEE 802.3 standards
7. Carrier sense multiple access with collision detection
8. Logical (IP) addressing
9. MAC addressing 10. CP/IP environment
11. Subnetworks
12. Application, presentation and session layers
13. Transport layer
14. Transport layer functions
15. WANs and devices
16. WAN standards
17. WAN technologies
18. Router Basics
19. The function of a router in a WAN
20. Semester 2 lab topology
21. User and privileged modes
22. User mode command list
23. Privileged-mode command list
24. User router help functions
25. Using IOS editing commands
26. Using IOS command history
27. Lab: Router user interface
28. Lab: Router user interface modes
29. External router configuration sources
30. External router configuration compoments
![Page 20: SECTION I - OVERVIEW...(which is a CCNA). Course outlines are reviewed every year and for the past 3 years we have modified all 4 semesters of our Cisco classes based on corporate](https://reader034.vdocuments.us/reader034/viewer/2022042319/5f090a727e708231d424f265/html5/thumbnails/20.jpg)
31. RAM for working storage in the router
32. Router modes
33. Examining router status by using router status commands
34. The show running-config and show startup-config commands
35. The show interfaces, show version and show protocols commands
36. Router Show Commands
37. Gaining Access to Other Routers by Using Cisco Discovery Protocol (CDP)
38. Showing CDP neighbor entries
39. A CDP configuration example
40. Showing CDP entries for a device and CDP neighbors
41. Lab: CDP Neighbors
42. Testing process that uses the OSI model
43. Testing the application layer by using telnet
44. Testing the network layer using the ping command
45. Testing the network layer with the trace command
46. Testing network layer with the show ip route command.
47. Using the show interfaces serial command to test the physical and data link layers
48. The show interfaces and clear counters commands
49. Checking real-time traffic with debug
50. Router startup routine
51. Router startup sequence
52. Commands related to router startup
53. Using the setup command
54. Setting up global parameters
55. Setting up interface parameters
56. Setting up script review and use
57. Router configuration file information
58. Working with Release 11.x configuration files
59. Working with pre-Release 11.0 configuration files
60. Using the copy running-config tftp and copy tftp running-config commands
61. Describe using NVRAM with Release 11.x.
62. Using NVRAM with Pre-11.0 IOS software
63. Using router configuration modes
64. Global configuration modes
65. Configuring routing protocols
66. Interface configuration commands
67. Configuring a specific interface
68. Release 11.x configuration methods
69. Pre-Release 11.0 configuration methods
70. Password configuration methods
71. Router identification configuration
72. Configuration Labs
73. Cisco Configmaker
74. Router config. web browser 75. Locating the Cisco IOS software
76. Configuration register values
77. The show version command
78. Boot system commands
79. Preparing for the use of TFTP
80. The show flash command.
81. Cisco's IOS naming conventions
82. The copy flash tftp command.
83. The copy tftp flash command.
84. How to load a software image backup
85. Router configuration process
86. Router password recovery procedure on 1600 and 2500 series routers
87. Individual Router Config. 88. The Internet TCP/IP protocols and the OSI model
89. NTCP/IP protocol stack and the application layer
90. NTCP/IP protocol stack and the transport layer
91. TCP and UDP segment format
92. TCP and UDP port numbers
93. TCP three-way handshake/open connection
94. TCP simple acknowledgment and windowing
95. TCP/IP and the Internet Layer
96. Diagram the IP Datagram
97. Internet Control Message Protocol (ICMP)
98. How ARP works
99. How RARP works
![Page 21: SECTION I - OVERVIEW...(which is a CCNA). Course outlines are reviewed every year and for the past 3 years we have modified all 4 semesters of our Cisco classes based on corporate](https://reader034.vdocuments.us/reader034/viewer/2022042319/5f090a727e708231d424f265/html5/thumbnails/21.jpg)
100. The purpose of IP address
101. The role of host address on a routed network
102. The role of broadcast addresses on a routed network
103. The assignment of router interface and network IP addresses
104. The IP address command
105. The IP host command
106. Describe the IP name-server command
107. How to enable and disable DNS on a router
108. Show hosts command
109. Verification commands
110. The telenet and ping commands
111. The trace command
112. Path determination
113. How routers route packets from source to destination
114. Network and host addressing
115. Path selection and packet switching
116. Routed versus routing protocol
117. Network-layer protocol operations
118. Multiprotocol routing
119. Static versus dynamic routes
120. Why use a static route
121. How a default route is used
122. Why dynamic routing is necessary
123. Dynamic routing operations
124. How distances on network paths are determined by various metrics
125. Three classes of routing protocols
126. Time to convergence
127. Distance-vector routing basics
128. How distance-vector protocols exchange routing tables
129. How topology changes propagate through the network of routers
130. The problem of routing loops
131. The problem of counting to infinity
132. The solution of defining a maximum
133. The solution of split horizon
134. The solution of hold-down timers
135. Link-state routing basics
136. How link-state protocols exchange routing tables
137. How topology changes propagate through the network of routers
138. Two link-state concerns
139. Unsynchronized link-state advertisements (LSAs) leading to inconsistent path decisions
140. amongst routers
141. Distance-vectors versus link-state routing protocols
142. Hybrid routing protocols
143. LAN-to-LAN routing
144. CLAN-to-WAN routing
145. Path selection and switching of multiple protocols and media
146. Setup mode
147. The initial IP routing table
148. How a router learns about destinations
149. The ip route command
150. Using the ip route command
151. The ip default-network command
152. Using the ip default-network command
153. Autonomous system
154. Interior versus exterior routing protocols
155. Interior IP routing protocols
156. IP routing configuration tasks
157. Using the router and network commands
158. Key elements of RIP
159. Using router rip and network commands to enable RIP
160. Enabling RIP on an IP-addressed network
161. Monitoring of IP packet flow using the show ip protocol command
162. The show ip route command
163. Key characteristics of IGRP
164. Using router igrp and network commands to enable IGRP
165. Enabling IGRP on an IP-addressed network
166. Monitoring IP packet flow using the show ip protocol command
167. The show ip interfaces command
168. The show ip route command
169. The debug ip rip command
![Page 22: SECTION I - OVERVIEW...(which is a CCNA). Course outlines are reviewed every year and for the past 3 years we have modified all 4 semesters of our Cisco classes based on corporate](https://reader034.vdocuments.us/reader034/viewer/2022042319/5f090a727e708231d424f265/html5/thumbnails/22.jpg)
170. The session layer overview
171. The session layer in terms of analogies
172. Dialogue control
173. Dialogue separation
174. Layer 5 protocol
COCONINO COMMUNITY COLLEGE
COURSE OUTLINE
Prepared by : Bill Branch, Dave Bowmen October, 03, 2001
A. Identification:
1. Subject Area: Computer Information Systems
2. Course Number: CIS 160
3. Course Title: Cisco Networking Academy Semester 3
4. Credit Hrs: 4
5. Catalog Description: The Cisco Networking Academy Program consists of four semesters. The program is designed to teach students the skills they
will need to design, build, and maintain small to medium size networks. This provides them with the opportunity to enter the
workforce and/or further their education and training in the computer networking field. Prerequisite: CIS 150 Four Lecture. Fall
only.
B. Course Goals:
To build on previous knowledge from Cisco Networking Academy Semesters 1 and 2. This will allow students to go beyond
installing and understanding data cable networks to working with networking devices on a more detailed yet basic level. Skills
include understanding and configuring routers and switches for small to medium networks.
C. Course Outcomes:
Students will:
1. Describe the OSI Reference Model and the Problems It Solves
2. Describe the Physical Layer of the OSI Reference Model
3. Describe the Data Link Layer of the OSI Reference Model
4. Classify Routing and the Different Classes of Routing Protocols
5. Describe the The Transport Layer of the OSI Reference Model
6. Identify the Various LAN Communication Problems
7. Classify Full-Duplex Transmitting, the Ethernet Standard, and LAN Segmentation
8. Identify the Switching and VLANs
9. Describe the The Spanning-Tree Protocol
10. Practice VLANs
11. Practice Segmentation with Switching Architecture
12. Practice VLAN Implementation
13. Describe the Benefits of VLANs
14. Identify the LAN Network Design Goals and Components
15. Practice Network Design Methodology
16. Sketch Layer 1 Design
17. Sketch Layer 2 Design
18. Sketch Layer 3 Design
19. Describe the Network Layer Basics
20. Classify Routed and Routing Protocols
21. Identify the IP Routing Protocols
22. Practice IGRP Operation
23. Practice Access Control Lists (ACLs)
24. Describe the ACL Configuration Tasks
25. Identify the Standard ACLs
26. Identify the Extended ACLs
27. Identify the Named ACLs
28. Practice Using ACLs with Protocols
29. Practice Placing ACLs
30. Practice Verifying ACLs
31. Describe the Cisco Routers in Netware Networks
32. Identify Novell Encapsulation
33. Identify Novell Routing
34. Identify Novell IPX Configuration
35. Classify Monitoring and Managing an IPX Network
36. Practice Network Documentation
![Page 23: SECTION I - OVERVIEW...(which is a CCNA). Course outlines are reviewed every year and for the past 3 years we have modified all 4 semesters of our Cisco classes based on corporate](https://reader034.vdocuments.us/reader034/viewer/2022042319/5f090a727e708231d424f265/html5/thumbnails/23.jpg)
37. Practice Network Security
38. Define Planning Structured Cabling: Identifying Potential Wiring Closets
39. Identify the Network Performance
40. Practice Server Administration
41. Practice Network Troubleshooting
D. Course Content:
Will include: 1. 3
2. The layered network model: the OSI Reference Model
3. The OSI Model layers
4. Peer-to-peer communication
5. Three categories of Ethernet
6. Three varieties of 10 Mbps Ethernet
7. Lock analogy for NICs
8. Data transport across the physical link connecting hosts, routers, and other devices
9. Network Layer Functions
10. Layer 3 protocols of the TCP/IP stack
11. Network and subnetwork addresses in the IP
12. Path determination in the contexts of packets and routers
13. Why Layer 3 addresses must contain both path and host information
14. Types of ICMP messages
15. ping command
16. ARP
17. Routing in a mixed LAN-media environment
18. Two basic operations a router performs
19. Static and dynamic routes
20. Default route
21. Routed and routing protocols
22. Information that routers use to perform their basic functions
23. IP routing protocols
24. Network convergence
25. Distance-vector routing
26. Link-state routing
27. Distance-vector and link-state routing
28. Enabling an IP routing process
29. Configuring RIP
30. Routing in a mixed LAN-media environment
31. Layer 4 segmentation
32. The three-way handshake
33. Why is a buffer used in data communications
34. Windowing
35. Explain reliability via acknowledgment
36. Factors putting pressure on network performance
37. Elements of Ethernet/802.3 networks
38. Half-duplex Ethernet
39. Network congestion
40. Network latency
41. Ethernet 10BaseT transmission time
42. The benefits of using repeaters
43. Full-duplex Ethernet
44. LAN segmentation
45. LAN segmentation with bridges
46. The pros and cons of LAN segmentation with routers
47. The pros and cons of LAN segmentation with switches
48. Describe the two basic operations of a switch
49. Ethernet switch latency
50. Layer 2 and Layer 3 switching
51. Microsegmentation
52. How a switch learns addresses
53. Benefits of LAN switching
54. Symmetric and asymmetric switching
55. Memory buffering
56. Two switching methods
57. How to set up VLANs
58. Overview of the Spanning-Tree Protocol
59. Describe the five Spanning-Tree Protocol states
60. Existing Shared LAN Configurations
61. Grouping geographically separate users into networkwide virtual topologies
![Page 24: SECTION I - OVERVIEW...(which is a CCNA). Course outlines are reviewed every year and for the past 3 years we have modified all 4 semesters of our Cisco classes based on corporate](https://reader034.vdocuments.us/reader034/viewer/2022042319/5f090a727e708231d424f265/html5/thumbnails/24.jpg)
62. Differences between traditional switched LANs and VLANs
63. The transport of VLANs across backbones
64. The role of routers in VLANs
65. How frames are used in VLANs
66. The relationship between ports, VLANs, and broadcasts
67. Why port-centric VLANs make an administrator's job easier
68. Static VLAN
69. Dynamic VLAN
70. ow VLANs make adds, moves, and changes easier
71. How VLANs help control broadcast activity
72. How VLANs can improve network security
73. How VLANs can save money
74. LAN Design goals
75. Critical components of LAN Design
76. The function and placement of servers when designing a network
77. Intranet
78. Why contention is an issue with Ethernet
79. How broadcast domains relate to segmentation
80. The difference between bandwidth and broadcast domains
81. Gathering and analyzing requirements
82. Factors that affect network availability
83. Physical topologies used in networking
84. Designing the Layer 1 topology: signaling method, medium type, and maximum length
85. Diagramming a standards-based Ethernet cable run from the workstation to the HCC, including
86. distances
87. HCC, VCC, MDF, IDF and POP
88. 10BaseT and 100BaseT Ethernet.
89. Elements of a logical topology diagram
90. Common Layer 2 devices and their impact on network domains
91. Asymmetric switching
92. The effect microsegmentation can have on a network
93. Determining the number of cable runs and drops
94. Determining the size of collision domains in hubbed and switched networks
95. Diagramming hub placement in a standards-based extended star topology
96. Migrating a network from 10 Mbps to 100 Mbps
97. Using routers as the basis for Layer 3 network design
98. How VLANs can create smaller broadcast domains
99. Explain how a router provides structure to a network
100. Why large, scalable LANs need to incorporate routers
101. Diagramming a standards-based LAN that uses routers
102. Logical and physical network maps
103. Explain path determination
104. Path determination
105. The operation of routing tables
106. Metrics
107. Router forwarding decisions
108. Routing protocols
109. Multiprotocol routing
110. Differentiating one routing protocol from another
111. Describe five goals of routing protocols
112. Routing loops
113. Static and dynamic routing
114. Classifications of routing protocols
115. IP routing configuration: choosing a routing protocol
116. IGRPs metrics
117. Differentiating amongst interior system and exterior routes
118. Write out a correct command sequence for enabling IGRP on a router
119. Describe three features of IGRP which enhance its stability
120. IGRP metrics and routing updates
121. The maximum hop count of IGRP
122. What are ACLs
123. Reasons to create ACLs
124. Testing packets with ACLs
125. How ACLs work
126. Flowchart of the ACL test matching process
127. Creating ACLs
128. The purpose and function of wildcard mask bits
129. The any command
130. The host command
131. What are standard ACLs
![Page 25: SECTION I - OVERVIEW...(which is a CCNA). Course outlines are reviewed every year and for the past 3 years we have modified all 4 semesters of our Cisco classes based on corporate](https://reader034.vdocuments.us/reader034/viewer/2022042319/5f090a727e708231d424f265/html5/thumbnails/25.jpg)
132. Writing a valid standard ACL command using all available parameters
133. How to verify access control lists
134. Writing a standard ACL to permit traffic from a source network
135. Writing a standard ACL to deny a specific host
136. Writing a standard ACL to deny a specific subnet
137. What are extended ACLs
138. Extended ACL parameters
139. UDP and TCP port numbers
140. Writing an ACL for denying FTP on an Ethernet interface
141. Writing an ACL which denies Telnet out of an Ethernet port and permits all other traffic
142. Configuring named ACLs
143. The deny command
144. The permit command
145. Protocols for which ACLs can be created
146. Rule: "Putting the ACL as close as possible to the source of the traffic denied"
147. Using ACLs in firewall routers
148. A firewall architecture to protect you from intruders
149. How to verify ACLs and interpret the output
150. The Novell IPX protocol suite
151. IPX features
152. IPX addressing
153. NetWare Ethernet encapsulation terms
154. The IOS encapsulation names for Ethernet, FDDI, and Token Ring
155. The IPX packet format
156. Novell RIP
157. Service advertising protocol
158. Get nearest Server protocol
159. Novell Configuration Tasks
160. Writing a valid IOS command sequence to assign IPX network numbers to interfaces
161. Writing a valid IOS command for monitoring and troubleshooting IPX
162. Writing a valid IOS command for monitoring the status of an IPX interface
163. Writing a valid IOS command sequence to monitor IPX routing tables
164. Writing a valid IOS command sequence for monitoring Novell IPX servers
165. Writing a valid IOS command to monitor IPX traffic, and describe some of the field options for
166. that command
167. Writing a valid IOS command for troubleshooting IPX routing
168. Writing a valid IOS command for troubleshooting IPX SAP
169. Using the privileged IPX ping command
170. Using the user IPX IPX ping command
171. Cut sheet diagrams
172. MDF & IDF layouts
173. Server and workstation configuration details
174. Software listings
175. Maintenance records
176. Security measures
177. User policies
178. Network access
179. Data recovery
180. Backup operations
181. Redundancy techniques
182. Static, dust, dirt, and heat
183. Power conditioning
184. EMI and FRI
185. Software viruses
186. Network baseline, updates, and change verification
187. Peer-to-peer
188. Client-server
189. Network control
190. Scientific method
191. Analyze network troubleshooting
COCONINO COMMUNITY COLLEGE
COURSE OUTLINE
Prepared by : Bill Branch, Dave Bowmen October, 03, 2001
![Page 26: SECTION I - OVERVIEW...(which is a CCNA). Course outlines are reviewed every year and for the past 3 years we have modified all 4 semesters of our Cisco classes based on corporate](https://reader034.vdocuments.us/reader034/viewer/2022042319/5f090a727e708231d424f265/html5/thumbnails/26.jpg)
A. Identification:
1. Subject Area: Computer Information Systems
2. Course Number: CIS 170
3. Course Title: Cisco Networking Academy Semester 4
4. Credit Hrs: 4
5. Catalog Description: The Cisco Networking Academy Program consists of four semesters. The program is designed to teach students the skills they
will need to design, build, and maintain small to medium size networks. This provides them with the opportunity to enter the
workforce and/or further their education and training in the computer networking field. Prerequisite: CIS 160. Four Lecture.
Spring only. .
B. Course Goals:
To build on previous knowledge from Cisco Networking Academy Semesters 1,2 and 3. This will allow students to go beyond
installing and understanding data cable networks to working with networking devices on a more detailed yet basic level. Skills
include understanding and configuring routers and switches for small to medium networks.
C. Course Outcomes/Competencies:
Students will:
1. Demonstrate LAN Switching
2. Identify Virtual LANs
3. Sketch a LAN Design
4. Identify Routing Protocols
5. Describe Access Control Lists
6. Define IPX Routing
7. Define WAN Technology
8. Identify WAN Devices
9. Describe How WANs Relate to the OSI Model
10. Describe WAN Encapsulation Formats
11. Identify WAN Link Options
12. Define WAN Communication
13. Demonstrate The First Steps in WAN Design
14. Identify and Select Networking Capabilities
15. Define PPP
16. Describe PPP Session Establishment
17. Describe PPP Authentications
18. Define ISDN
19. Identify How ISDN Relates to the OSI Model
20. Identify ISDN Uses
21. Classify ISDN Services: BRI and PRI
22. Demonstrate ISDN Configuration Tasks
23. Demonstrate Dial On Demand Routing
24. Describe Frame Relay Technology
25. Demonstrate LMI: Cisco's Implementation of Frame Relay
26. Identify LMI Features
27. Describe Frame Relay Subinterfaces
28. Demonstrate The Configuration of Basic Frame Relay
29. Demonstrate The Administrative Side of Network Management
30. Demonstrate Monitoring the Network
31. Demonstrate Troubleshooting Networks
32. Describe Basic Networking Knowledge
33. Identify the Physical Layer
34. Identify the Network Layer
35. Identify the Transport Layer
36. Describe TCP/IP Fundamentals
37. Describe TCP/IP Suite: Utilities
38. Demonstrate Remote Connectivity
39. Demonstrate Security
40. Demonstrate Maintaining and Supporting the Network
41. Demonstrate Troubleshooting the Network
42. Identify the OSI Model
43. Demonstrate Creating Subnets
Demonstrate Router Commands
D. Course Content:
Will include: 1. Congestion and bandwidth
2. Why segment LANs?
![Page 27: SECTION I - OVERVIEW...(which is a CCNA). Course outlines are reviewed every year and for the past 3 years we have modified all 4 semesters of our Cisco classes based on corporate](https://reader034.vdocuments.us/reader034/viewer/2022042319/5f090a727e708231d424f265/html5/thumbnails/27.jpg)
3. Segmentation with LAN switches
4. LAN switching overview
5. How a LAN switch learns addresses
6. Symmetric switching
7. Asymmetric switching
8. Two switching methods
9. Introduction to VLANs
10. Frame filtering
11. Frame tagging
12. VLANs establish broadcast domains
13. Port-centric virtual LANs
14. Static VLANs
15. Dynamic VLANs
16. LAN design goals
17. Design methodology
18. What problem are you trying to solve?
19. Developing a LAN topology
20. Developing Layer 1 LAN topology
21. Extended star topology
22. Developing Layer 2 LAN topology
23. Layer 2 switching
24. Layer 3 router for segmentation
25. Server placement
26. Dynamic routing operations
27. Representing distance with metrics
28. Classes of routing protocols
29. One issue: time to convergence
30. Distance vector concept
31. Interior or exterior routing protocols
32. Interior IP routing protocols
33. IGRP overview
34. IGRP configuration
35. IGRP configuration example
36. What are access lists
37. How access lists work
38. A list of tests: deny or permit
39. How to identify access lists
40. Testing packets with access lists
41. How to use wildcard mask bits
42. How to use the wildcard any
43. How to use the wildcard host
44. Where to place IP access lists
45. Cisco routers in NetWare networks
46. Novell NetWare protocol suite
47. Novell IPX addressing
48. Cisco encapsulation names
49. Novell uses RIP for routing
50. SAP service advertisements
51. GNS get nearest server protocol
52. Novell IPX configuring tasks
53. Verifying IPX operation
54. WAN services
55. CPE, demarc, "last-mile", CO switch, and toll network
56. WAN virtual circuits
57. WAN line types
58. Fundamental WAN devices
59. Routers and switches on a WAN
60. Modems on a WAN
61. CSU/DSUs on a WAN
62. ISDN terminal adapters on a WAN
63. Organizations that deal with WAN standards
64. WAN physical layer standards
65. WAN data link encapsulations.
66. Serial line frame fields
67. PPP
68. HDLC
69. Two basic WAN link options
70. Dedicated lines
71. Leased lines
72. Packet-switched connections
![Page 28: SECTION I - OVERVIEW...(which is a CCNA). Course outlines are reviewed every year and for the past 3 years we have modified all 4 semesters of our Cisco classes based on corporate](https://reader034.vdocuments.us/reader034/viewer/2022042319/5f090a727e708231d424f265/html5/thumbnails/28.jpg)
73. Frame Relay
74. Circuit-switched connections
75. DDR
76. ISDN
77. WAN design requirements
78. LAN/WAN integration issues
79. WAN design goals
80. The gathering requirements phase of WAN design
81. Analyzing requirements
82. WAN sensitivity testing
83. The use of the OSI model in WAN design
84. A hierarchical WAN design model
85. Three hierarchical WAN design layers
86. Three-layer design model components.
87. Core layer functions
88. Distribution layer functions
89. Access layer functions
90. One-layer network designs
91. Two-layer network designs
92. The benefits of hierarchical WAN designs
93. Server placement in WANs
94. Alternatives to dedicated WAN links
95. The need for PPP
96. PPP components
97. PPP layer functions
98. The six fields of a PPP frame
99. The four phases through which PPP establishes a point-to-point connection
100. Phase 1: link establishment and configuration negotiation
101. Phase 2: link-quality determination
102. Phase 3: network-layer protocol configuration negotiation
103. Phase 4: link termination
104. PAP
105. CHAP
106. Writing the IOS command steps to configure PPP authentication
107. Writing the IOS commands to configure CHAP authentication
108. What is ISDN
109. Basic ISDN components
110. ISDN reference points
111. ISDN switches and SPIDs
112. E, I, and Q ISDN protocols
113. ITU-T standards of the first three layers of ISDN
114. ISDN physical layer
115. ISDN data link layer
116. ISDN network layer
117. ISDN encapsulation
118. Three uses for ISDN
119. ISDN remote nodes
120. ISDN SOHO connectivity
121. ISDN BRI and ISDN PRI
122. How BRI connectivity is established
123. ISDN global and interface parameter configuration tasks
124. IOS commands to configure ISDN BRI
125. IOS commands to define an ISDN switch type
126. IOS commands pertaining to SPIDs
127. IOS commands for a complete ISDN BRI configuration
128. Describe how to confirm BRI operations
129. DDR considerations
130. IOS commands pertaining to verifying DDR operation
131. IOS commands pertaining to troubleshooting DDR operation
132. Frame Relay technology
133. Local access rate, DLCI, LMI, CIR, committed burst, excess burst, FECN, BECN, and DE
134. Frame Relay operation
135. Frame Relay DLCIs
136. The fields of the Frame Relay frame format
137. Frame Relay addressing
138. LMI operation
139. The fields of the LMI frame format
140. Global addressing
141. Multicasting and Inverse ARP
142. Frame Relay mapping
![Page 29: SECTION I - OVERVIEW...(which is a CCNA). Course outlines are reviewed every year and for the past 3 years we have modified all 4 semesters of our Cisco classes based on corporate](https://reader034.vdocuments.us/reader034/viewer/2022042319/5f090a727e708231d424f265/html5/thumbnails/29.jpg)
143. Frame Relay switching tables
144. What are Frame Relay subinterfaces?
145. Split horizon routing environments
146. The resolution of point-to-point and multipoint reachability issues
147. Writing the IOS command sequence to completely configure Frame Relay
148. The commands for verifying Frame Relay operation
149. The steps you must use to confirm that the Frame Relay line is up
150. The steps you must use to confirm Frame Relay maps
151. The steps you must use to confirm connectivity to the central site router
152. The steps you must use to configure the serial interface for a Frame Relay connection
153. The steps you must use to verify a Frame Relay configuration
154. The steps you must use to configure Frame Relay subinterfaces
155. Optional Frame Relay commands
156. What does a network look like?
157. Understanding and establishing the boundaries of the network
158. Costs of a network
159. Error report documentation
160. Why is it necessary to monitor a network?
161. Connection monitoring
162. Simple network management protocol
163. Remote monitoring (RMON)
164. Problem solving
165. Troubleshooting methods
166. Software tools
167. Star, bus, mesh, and ring topologies
168. Segments and backbones
169. The major network operating systems (NOS): Microsoft Windows NT, Novell NetWare, and
170. Unix
171. The clients that best serve specific network operating systems and their resources
172. The directory services of the major network operating systems
173. IP, IPX, and NetBEUI and associate them with their functions Internet Protocol (IP)
174. Mirroring, duplexing, striping, volumes, tape backup
175. The OSI model and the protocols, services, functions that pertain to each layer
176. Cat 3, Cat 5, fiber optic, UTP, and STP
177. 10Base2, 10Base5, 10Base-T, 100Base-T, 100Base-TX, 100BaseVG-AnyLAN
178. Full and half-duplexing, WAN and LAN; server, workstation, and host; server-based
179. networking and peer-to-peer networking; cable, NIC, and router; broadband and baseband;
180. Gateway (as both a default IP router and as a method to connect dissimilar systems or
181. protocols)
182. Troubleshooting the physical Layer when you have network problems after installing or
183. replacing a NIC
184. Hubs, MAUs, switching hubs (switches), repeaters, transceivers
185. Data Link Layer
186. Bridges, what they are and why they are used
187. The 802 specifications
188. The function and characteristics of MAC addresses
189. Routing occurs at the network layer
190. The difference between a router and a brouter
191. The difference between routable and non-routable protocols
192. The concept of default gateways and subnetworks
193. The reason for employing unique network Ids
194. The difference between static and dynamic routing
195. The distinction between connectionless and connection-orientated transport
196. Explain the purpose of name resolution
197. IP default gateways
198. DHCP, DNS, WINS, and host files
199. TCP, UDP, POP3, SMTP, SNMP, FTP, HTTP, and IP
200. Why TCP/IP is supported by every operating system and millions of hosts worldwide
201. The purpose and function of Internet Domain Name Server hierarchies (how email arrives in
202. another country)
203. Class A, B, and C addresses and their default subnet mask numbers
204. The port numbers used (for example HTTP, FTP, SMTP) for a given service
205. Proxy and why it is used
206. IP address, DNS, default gateway, IP proxy, WINS, DHCP, host name, and internet domain
207. name
208. How and when to use ARP to test, validate, and troubleshoot IP connectivity
209. How and when to use Telnet to test, validate, and troubleshoot IP connectivity
210. How and when to use NBTSTAT to test, validate, and troubleshoot IP connectivity
211. How and when to use TRACERT to test, validate, and troubleshoot IP connectivity
212. How and when to use NETSTAT to test, validate, and troubleshoot IP connectivity
![Page 30: SECTION I - OVERVIEW...(which is a CCNA). Course outlines are reviewed every year and for the past 3 years we have modified all 4 semesters of our Cisco classes based on corporate](https://reader034.vdocuments.us/reader034/viewer/2022042319/5f090a727e708231d424f265/html5/thumbnails/30.jpg)
213. How and when to use IPCONFIG/WINIPCONFIG to test, validate, and troubleshoot IP
214. connectivity
215. How and when to use FTP to test, validate, and troubleshoot IP connectivity
216. How and when to use PING to test, validate, and troubleshoot IP connectivity
217. The distinction between PPP and SLIP
218. The purpose and function of PPTP and the conditions under which it is useful
219. The attributes, advantages and disadvantages of ISDN and PSTN (POTS)
220. he modem configuration parameters which must be set (serial port IRQ, I/O address,
221. maximum port speed) for dial-up networking to function
222. The requirements for a remote connection
223. Selection of a security model (user and share levels) as a good practice to ensure network
224. security
225. The use of standard password practices and procedures as a good practice to ensure network
226. security
227. The need to employ data encryption to protect network data as a good practice to ensure
228. network security
229. The use of a firewall as a good practice to ensure network connectivity
230. Implementing Installation of the Network
231. Administrative and test accounts, passwords, IP addresses, IP configurations, relevant SOPs,
232. etc. must be obtained prior to the network implementation
233. The impact of environmental factors on computer networks
234. Common peripheral ports, external SCSI connections (esp. DB-25), print servers, hubs,
235. routers, brouters, bridges, patch panels, UPSs, NICs, and Token Ring media filters
236. The consequences of trying to install an analog modem into a digital jack
237. The uses of RJ-45 connectors may differ greatly depending on the cabling
238. Patch cables contribute to the overall length of the cabling segment
239. kinds of test documentation that are usually available regarding a vendors patches, fixes, upgrades, etc.
240. Standard backup procedures backup media storage practices
241. The need for periodic application of software patches and other fixes to the network
242. The need to install anti-virus software on the server and workstation
243. The need to frequently update virus signatures
244. Troubleshooting approach
245. Distinguish whether a problem is attributable to the operator or the system
246. A second method for determining whether a problem is attributable to the operator or the
247. system
248. The need to check the following as physical and logical indicators of trouble: link lights, power
249. lights, error displays, error logs and displays, and performance monitors
250. Given a network problem scenario, determine the problem
251. The purpose and function of common network tools including: a crossover cable, hardware
252. loopback, tone generator, tone locator (fox and hound)
253. Layer functions
254. Application layer
255. Presentation layer
256. Session layer
257. Transport layer
258. Network layer
259. Data link layer
260. Physical layer
261. Data encapsulation
262. How to create a subnet
263. Subnet planning
264. Sample problems
265. Basic router configuration
266. Testing and other basic commands
267. Configuring IPX Routing
268. Configuring standard and extended IP access lists
269. PPP encapsulation with PAP and CHAP
270. ISDN
271. Frame Relay - simple configuration
272. Frame Relay - multipoint subinterfaces configuration
273. Frame Relay - point-to-point subinterfaces configuration
274. Monitoring Frame Relay
275. Booting up the router
![Page 31: SECTION I - OVERVIEW...(which is a CCNA). Course outlines are reviewed every year and for the past 3 years we have modified all 4 semesters of our Cisco classes based on corporate](https://reader034.vdocuments.us/reader034/viewer/2022042319/5f090a727e708231d424f265/html5/thumbnails/31.jpg)