section i - overview...(which is a ccna). course outlines are reviewed every year and for the past 3...

31
SECTION I - OVERVIEW 1) a) In spring 2001, Coconino Community College began to develop curriculum that would teach freshman and sophomore students the technical skills necessary to complete a Career and Technical Education in Network Engineering with either one or two years of study. An extensive examination for existing instruction from a wide variety of national and local sources was conducted. More locally, the Flagstaff Medical Center, City of Flagstaff, County of Coconino, WL Gore, Northern Arizona University and some local small businesses were consulted for program content and employment potential. b) To provide qualified personnel to help satisfy the shortage of information technology workers To enhance the vocational/technical mission of the campus To offer programs to provide students with greater earning potential To collaborate with state and local industry to more effectively provide graduates with the necessary skills in information technology These program objectives are within the mission of the institution. They speak directly to the needs of workforce development, welfare reform, and School-to-Work initiatives that are of utmost importance locally and nationally. Remarkable opportunities for articulation and dual credit agreements exist with these new programs. c) N/A This program is designed to specific work force development. There is no general education courses required. 2) The CIS Department Chair oversees the program. The Cisco Coordinator is a full time employee whose job responsibilities are to recruit new local academies from Northern Arizona high schools, support, and help them to grow their local program. The coordinator is required to teach 12 credit hours in the classroom and spend 6 credit hours doing Cisco Coordinating. This includes training each instructor to understand the curriculum as well as deliver it with effectiveness. 3) a) Our Cisco Coordinator meets with the community, receives input and after analyzing the input accesses programmatic changes and goes to the Department Chair to determine what actions to take. continues to speak to high schools in our area as more high schools keep calling and showing an interest in becoming Local Cisco Academies. Our Coordinator realizes the potential of many students articulating and transferring credit from the high schools to matriculate into our Cisco program. In addition he has gone out into the community to speak to the traditional-aged student sector, county and city agencies are excited for this program as a means of serving their needs locally. Also our local small and large businesses have already begun sending employees to our Cisco classes. b) Historically and currently many of the small and medium businesses, including the city, county, and other governmental agencies send their employees to take our Cisco courses and have succeed in obtaining their CCNA nationwide approved certificates. 4) Pass rates for all CISCO classes from 2003 to 2009: CIS 140 (84.7%), CIS 150 (83%), CIS 160 (98%), and CIS 170 (80%). Pass rates have been relatively static however, the Cisco Coordinator regularly adopts effective approaches to curriculum and delivery such as but not limited to the following: Professional development tools, real world approaches, regular updates in curriculum, more hands-on with contemporary equipment, and a larger remodeled room.

Upload: others

Post on 19-Jun-2020

0 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: SECTION I - OVERVIEW...(which is a CCNA). Course outlines are reviewed every year and for the past 3 years we have modified all 4 semesters of our Cisco classes based on corporate

SECTION I - OVERVIEW

1) a) In spring 2001, Coconino Community College began to develop curriculum that would teach

freshman and sophomore students the technical skills necessary to complete a Career and Technical

Education in Network Engineering with either one or two years of study. An extensive examination for

existing instruction from a wide variety of national and local sources was conducted. More locally, the

Flagstaff Medical Center, City of Flagstaff, County of Coconino, WL Gore, Northern Arizona

University and some local small businesses were consulted for program content and employment

potential.

b)

• To provide qualified personnel to help satisfy the shortage of information technology workers

• To enhance the vocational/technical mission of the campus

• To offer programs to provide students with greater earning potential

• To collaborate with state and local industry to more effectively provide graduates with the

necessary skills in information technology

These program objectives are within the mission of the institution. They speak directly to the needs of workforce development, welfare reform, and School-to-Work initiatives that are of utmost importance locally and nationally. Remarkable opportunities for articulation and dual credit agreements exist with these new programs. c) N/A – This program is designed to specific work force development. There is no general education courses required.

2) The CIS Department Chair oversees the program. The Cisco Coordinator is a full time employee whose job responsibilities are to recruit new local academies from Northern Arizona high schools, support, and help them to grow their local program. The coordinator is required to teach 12 credit hours in the classroom and spend 6 credit hours doing Cisco Coordinating. This includes training each instructor to understand the curriculum as well as deliver it with effectiveness.

3) a) Our Cisco Coordinator meets with the community, receives input and after analyzing the input

accesses programmatic changes and goes to the Department Chair to determine what actions to take.

continues to speak to high schools in our area as more high schools keep calling and showing an interest

in becoming Local Cisco Academies. Our Coordinator realizes the potential of many students

articulating and transferring credit from the high schools to matriculate into our Cisco program. In

addition he has gone out into the community to speak to the traditional-aged student sector, county and

city agencies are excited for this program as a means of serving their needs locally. Also our local small

and large businesses have already begun sending employees to our Cisco classes.

b) Historically and currently many of the small and medium businesses, including the city, county, and

other governmental agencies send their employees to take our Cisco courses and have succeed in

obtaining their CCNA nationwide approved certificates.

4) Pass rates for all CISCO classes from 2003 to 2009: CIS 140 (84.7%), CIS 150 (83%), CIS 160 (98%),

and CIS 170 (80%). Pass rates have been relatively static however, the Cisco Coordinator regularly

adopts effective approaches to curriculum and delivery such as but not limited to the following:

Professional development tools, real world approaches, regular updates in curriculum, more hands-on

with contemporary equipment, and a larger remodeled room.

Page 2: SECTION I - OVERVIEW...(which is a CCNA). Course outlines are reviewed every year and for the past 3 years we have modified all 4 semesters of our Cisco classes based on corporate

5) The Cisco program is creating partnerships with local businesses by creating internships for our

students. It has been integrated with the CAVIAT Central Program. The goal of this program is to give

high school juniors and seniors the opportunity of earning college credit towards the CCNA certificate.

6) CCC remodeled several rooms to be used as a high tech computer classroom with the ability to offer the

latest and greatest business technology. This has been accomplished by purchasing the newest computer

equipment to teach our students real world technology. An example of the equipment is replacing our

routers and switchers ever several years. The Cisco Coordinator also has created a large mobile wiring

wall for students to hands-on wiring.

Page 3: SECTION I - OVERVIEW...(which is a CCNA). Course outlines are reviewed every year and for the past 3 years we have modified all 4 semesters of our Cisco classes based on corporate

SECTION II – TEACHING AND LEARNING

1) Program area: Cisco

2) Please find Attachment II at the end of this document for curriculum documents for the Cisco Program.

How are program requirements and information communicated?

Open

houses

Schedule/

Catalog

Program

Brochure/Guide

Small groups: (advisor,

group advising, other)

Other: describe

Prospective Students X X X Advisors, Instructors,

Word of mouth

Employers X X X Community Advisory

Council, Chair and Cisco

Coordinator visit

employers on their site

Chair and Cisco

Coordinator do

visits at the

employers site

Advisors/Counselors X X Small group advising,

one on one discussions

Admissions/Recruiters X X On-site visits at as many

High Schools as possible

Regular contact

through site

visits and phone

calls

3) Program is taught at the Lone Tree and 4th

Street campuses. Also at several high school sites around

Northern Arizona

4) Classes are offered during both the Day and Evening hours depending upon the semester to meet the

needs of the various student demographic groups.

5)

6)

Courses Semester 10th day enrollment FTSE/45th day

enrollment

Successful

Completers

(A,B,C,S)

Unsuccessful

Completers

(D,F,U,W)

CISCO Network

Academy Semester 1 201 175 151 23

CISCO Network

Academy Semester 2 70 68 56 6

The requirement to be admitted to this program is general knowledge of computers and/or consent of

instructor. A student entering this program needs to possess general understanding of software and

hardware in order to be successful in this program. Students without this knowledge are advised to take

our Introduction to Computer Information Systems to prepare our students for success in this program.

The criterion for this program is evaluated every year.

Page 4: SECTION I - OVERVIEW...(which is a CCNA). Course outlines are reviewed every year and for the past 3 years we have modified all 4 semesters of our Cisco classes based on corporate

CISCO Network

Academy Semester 3 34 30 14 14

CISCO Network

Academy Semester 4 21 20 18 8

7)

Year Enrollment Completers

1. 2006-2007 41 41

2. 2007-2008 52 43

3. 2008-2009 65 54

8) Identical to Question 7

Year Enrollment Completers

1.

2.

3.

9) This program has no degree or certificate attached to it.

10)

11)

Enrollment Caps: 15 for all courses

In order for the students of this program to be successful, the class size is important. There is a lot of

high tech material to cover in a rapid period of time. Moreover, the ratio of student hands-on to hardware

availability is designed for quality student access and skill/knowledge retention. Therefore, the instructor

must have time to cover the material in a professional manner and then be available for all the students

to help them individually learn the material. Without time for the instructor to help each individual

student, they may struggle with the advanced technology and not succeed. Currently we are evaluating

if it would be feasible to raise the cap to 20 with the intensive hands-on part of the class.

Students seem to not take Semesters 3 and 4 which are the last 2 semesters of the program. We believe

the cause for this is the student has enough knowledge after completing the first two semesters

successfully to get a decent paying job without completing semesters 3 and 4. The types of students we

get in this program are generally working part-time or full-time in some computer technology field and

need to gather more information related to their job. In addition, it is understood that as the economy

tightens there are more applicants than jobs. This explains the most recent increase up to 89%

enrollment from CIS 150 to CIS 160 in 2009.

Page 5: SECTION I - OVERVIEW...(which is a CCNA). Course outlines are reviewed every year and for the past 3 years we have modified all 4 semesters of our Cisco classes based on corporate

12)

13)

14)

15)

16)

17)

18)

19)

The national corporation, Cisco, writes and updates their curriculum about every 2 years. The regional

and local academies (which we are) are required to use their curriculum. We review our curriculum

every year to make sure it meets the standards of our community needs.

There is a national/professional credential available to completers of this program. Over the last three

years, 95% of the completers of this program have sat for the exam and earned their national credential

(which is a CCNA).

Course outlines are reviewed every year and for the past 3 years we have modified all 4 semesters of

our Cisco classes based on corporate and college needs.

Our class syllabi have been reviewed and modified every semester year for the last 9 2 years.

As far as curriculum changes being made over the last three years, Cisco themselves have revamped the

curriculum to meet the current technology standards of the business world.

We have begun to offer the first two semesters of Cisco to junior and senior high school students.

When they complete each of these courses they immediately earn college credit since the Cisco

Networking Academy Program (CNAP) started in 2001. Since that time CCC has established dual-

enrollment credit when they complete each class. Cisco courses are included in our AAS Network

Engineering Degree which articulates to a BAS at NAU.

The CNAP is a three tiered program designed to meet the needs and qualities of business that required a well-qualified employee. The Cisco Coordinator receives guidance from a Cisco Authorized Training

Center (the top tier) and its general over-reaching management is performed by the CIS Dept Chair.

CCC is a Regional Cisco Networking Academy which provides support and guidance to Local

Academies throughout northern Arizona. CCC is approved as a Regional Academy by Cisco due to

signing an IGA which states CCC will follow program guidelines.

Due to the difficulty of getting community members all together to have a meeting we have decided to

visit them at their place of business. This is an ongoing project that is a constant throughout the year.

Page 6: SECTION I - OVERVIEW...(which is a CCNA). Course outlines are reviewed every year and for the past 3 years we have modified all 4 semesters of our Cisco classes based on corporate

20)

21)

22)

23)

Student credit

hours

Fall _2008_

Student credit

hours

Spring _2009

Student credit

hours

Fall _____

Student credit

hours

Spring _____

Student credit

hours

Fall _____

Student

credit hours

Spring _____

Full time

Faculty

8 12, 2 CIS 140,

1 CIS 160 12

Full time

overload N/A

Part time

faculty N/A

All Cisco classes are taught using PC’s that have access to the Internet to review and take exams

once per week. Students learn to use Routers and Switches which help with connectivity. So in

summary, the entire classroom experience uses technology developing the much needed real-world

hands-on experiences.

Internships have created positive relationships with CCC’s community. Some of the internal strengths of

this program is it offers the opportunity for Information Technology staff to keep current with the

technology they are supporting here at the college at little or no cost to the college. Also, we have an

instructor who has all the knowledge in Cisco and other related technology fields the college would ever

need. He has spent a lot of his own money to obtain all the national standard certificates there are in this

program.

1) Local Cisco programs serve the needs of students of Northern Arizona

2) Positive feedback from community businesses

3) The willingness of the Cisco Coordinator to be flexible to meet variable needs of the program

I believe it is time to do a thorough review of the Course Outlines for this program. It has been very

difficult for the Cisco Coordinator and Department Chair to schedule an appointment due to their multiple

responsibilities for CCC. We are going to make a point to meet together this spring to accomplish

modifying the curriculum according to the needs of our business community.

Page 7: SECTION I - OVERVIEW...(which is a CCNA). Course outlines are reviewed every year and for the past 3 years we have modified all 4 semesters of our Cisco classes based on corporate

24)

25)

26)

27)

1) Advertise our Cisco program to the general population in Coconino County

2) Meet with the different businesses who may be interested in the Cisco program or

other programs we have to offer here at CCC

3) Educate any of the businesses who are interested in our Cisco program and

demonstrate how this technology could be beneficial for their company.

If we can accomplish the above three opportunities, we could see our Cisco program

grow and encourage the businesses to send their employees to our school to either be

trained using the Cisco technology or upgrade their Cisco skills.

Also, if we are successful in accomplishing this, I could see the businesses asking

what other programs we offer here at CCC.

1) There is another school in Flagstaff that offers a similar networking program without the well-known high

level of quality and support of Cisco Systems. Their networking program is to design the Cisco program in

which students can finish the program in a year as opposed to the two years it takes here at CCC.

2) Since almost everyone has access to the Internet we are in competition from other Universities and/or two

year schools that may offer this program on line.

3) Some of the larger corporations send their employees to Phoenix and other out of state educational sites that

teach the Cisco program at a highly accelerated pace of 1 40+ hour week called “Boot camps”.

4) Needs to continue supporting current academies and recruiting new ones which is a difficult task due to the

expanse of land in Coconino County.

Bill, our Cisco Coordinator has attended many professional development workshops and classes. Such as but

not limited to: Professional development provided by the CATC, Project Management Professional training,

and Institute of cultural Affairs training: Focused Conversation, Consensus Workshop, Action Planning, and

Strategic Planning. Also, Bill has attended the excellent Professional Development workshops of CCC.

1) Actually, one of the recommendations was try and incorporate a way to address the way prospective

employees should dress and respond during interviews which was the number one recommendation

2) Information Technology Resume developments

3) Project management overview and techniques.

Page 8: SECTION I - OVERVIEW...(which is a CCNA). Course outlines are reviewed every year and for the past 3 years we have modified all 4 semesters of our Cisco classes based on corporate

28)

29)

30)

Evaluation of Program Review Report

Competitiveness

1) At the end of every school year we do a thorough review of the Cisco program by reviewing and

modifying any instruction methods if we think it meets the needs of the community.

2)

a. The program’s strengths are that the community businesses are educated and respect the

program. This is accomplished by our Coordinator and Department Chair by doing site visits at the

various businesses and then reviewing their needs and attempting to implement some of them as we

move from semester to semester. Because of our ability to be flexible to meet the needs of area

businesses, and because of our lower costs, as well as our reputation for quality, this program is

highly competitive with other entities offering similar classes.

b. The weaknesses to the program are accomplishing our goal of having higher enrollments in all 4

semesters’ classes.

1) We have yet been able to figure how to implement the number one recommendation. We have spoken to

the business department. They have the LDR 115, Workplace Ethics, and had begun looking to see if we

could incorporate this into one of our OIS courses but OIS has now been retired. So we are looking at other

options.

Our Cisco Coordinator reviews his program every semester by evaluating the Cisco on-line final exams for

each semester to observe how his students do and then makes the modifications needed to help the students

become more successful by changing his approach to presenting the material. The benefit of smaller classes

allows the Cisco Coordinator to emphasize unique teaching/guiding and leadership elements for each

individual students based on online exam scores.

One item of future aspirations is to continue to add local academies around Northern Arizona. This is being

done by marketing to the high schools and actually setting up meetings with the Principals and the teacher with

the interest and background in the technology to teach the Cisco courses.

Page 9: SECTION I - OVERVIEW...(which is a CCNA). Course outlines are reviewed every year and for the past 3 years we have modified all 4 semesters of our Cisco classes based on corporate

Teaching and Learning

1) The Cisco Coordinator provides all the advising and mentoring of the students in his program by

counseling each individual throughout the semester. He spends many hours helping his students

be successful.

2) The curriculum we use is created by Cisco Corporation, the number one networking business in

the world.

3) Classes are capped at a low enrollment due to the many hands-on projects in the curriculum,

which gives the instructor time to work closely with each student.

4) The program meets the requirements of the certification it offers.

Faculty and Staff

1) The Cisco Coordinator spends many, many hours supporting his local academies by traveling to

their sites to make sure they have the current hardware and software in place to teach the students

successfully. The hardware used in the classroom at CCC is always up-to-date and used throughout

the semesters with hands-on lessons.

2) We encourage the IT staff to take our classes to keep up with the new technology that they use to

support CCC.

3) The program has one of the most knowledgeable instructors around the state.

Leadership

1) The department chair is in constant communication with the coordinator of the program and makes

any necessary changes immediately when appropriate.

2) When scheduling Cisco classes for each semester, the chair communicates with all department

chairs to make sure there are no room conflicts. If there are any conflicts, the chair works this out

with the other chair(s).

3) The Cisco program has in place CNAP that is a three tiered program designed to meet the needs

and qualities of businesses and has a built in long range plan which includes a basic annual strategic

plan that is used by the Coordinator and Chair.

College Support

1) The program does a good job currently creating the greatest possible synergy throughout the

College

2) The College has been supporting this program with great enthusiasm and confidence.

3) The classroom used for this program was specifically created to set a high standard of delivering

the greatest and latest technology.

4) The College has provided great support by creating a full time Cisco Coordinator who teaches the

classes and supports the program.

5) The program requires the students to do research and write papers using our sufficient library and

by having access to the internet.

Plans, Goals, and Resources Allocation

Page 10: SECTION I - OVERVIEW...(which is a CCNA). Course outlines are reviewed every year and for the past 3 years we have modified all 4 semesters of our Cisco classes based on corporate

1) The goals of the program are to meet community businesses, listen to what their needs are and

implement them when feasible.

2) Same as above answer

3) The program makes sure that it can purchase the best technology to allow all the students to

succeed and have the best education so they can be the best candidate for a job in technology.

4) The Cisco program has a balance of resources and instructors.

5) The program is successfully meeting its current goals but there is always room for reaching out for

new opportunities.

6) There are no additional resources needed at this time.

7) The resources needed to meet the program’s goals are in place and do not need to be

redistributed to meet the College goals

Recommendations for Program Improvement

We will evaluate our program through our yearly program assessment. We will obtain the

Institutional Resource numbers to observe how many students are completing the program

successfully.

The Cisco Coordinator and Department Chair will continue to advertise the program at the

Movie theater in town. The Coordinator will continue attending functions, such as the

Chamber of Commerce mixers and making site visits to community businesses. He will keep

going to high schools in Coconino County to create new partnerships with CCC and create

local Cisco academies.

Page 11: SECTION I - OVERVIEW...(which is a CCNA). Course outlines are reviewed every year and for the past 3 years we have modified all 4 semesters of our Cisco classes based on corporate

ATTACHMENT II

COCONINO COMMUNITY COLLEGE

COURSE OUTLINE

Prepared by : Bill Branch, Dave Bowmen October, 03, 2001

Revised by: Dave Bowmen Spring 2004

A. Identification:

1. Subject Area: Computer Information Systems

2. Course Number: CIS 140

3. Course Title: Cisco Networking Academy Semester I

4. Credit Hrs: 4

5. Catalog Description:

This is the first of four semester courses designed to provide students with classroom and laboratory experience in current

and emerging networking technology that will empower them to enter employment or further education and training in the

computer networking field. A task analysis of current industry standards and occupational analysis was used to develop the

content. Instruction includes, safety, networking, network terminology and protocols, network standards, local-area networks

(LANs), wide-area networks (WANs), Open System Interconnection (OSI) models, cabling, cabling tools, routers, router

programming, Ethernet, Internet Protocol (IP) addressing, and network standards. Particular emphasis is given to the use of

decision-making and problem-solving techniques in applying science, mathematics, communication, and social-studies

concepts to solve networking problems. In addition, instruction and training are provided in the proper care, maintenance,

and use of networking software, tools, and equipment and all local, state, and federal safety, building, and environmental

codes and regulations. Prior computer knowledge strongly recommended. Four lecture. May be taken for S/U credit.

B. Course Goals:

To provide students with hands on experience in data network cabling, cable codes and regulations. Furthermore, the class will

provide the logical background for understanding, design, and implementation of small to medium of data networks. This first

semester of the Cisco Networking Academy will help students enter the data networking world.

C. Course Outcomes:

Students will:

1. Identify the Basics of Computer Hardware

2. Identify the Basics of Computer Software

3. Determine Binary Numbers

4. Describe Basic Networking Terminology

5. Identify Digital Bandwidth

6. Describe General Model of Communication

7. Describe the OSI Reference Model

8. Compare the OSI Model and the TCP/IP Model

9. Identify Basic LAN Devices

10. Describe the Evolution of Network Devices

11. Sketch Building LANs

12. Define the Basics of Electricity

13. Operate the Basics of Digital Multimeters

14. Identify the Basics of Signals and Noise in Communications Systems

15. Describe the Basics of Encoding Networking Signals

16. Recognize the Most Common LAN Media

17. Classify Cable Specification and Termination

18. Demonstrate Making and Testing Cable

19. Classify Layer 1 Components and Devices

20. Describe Collisions and Collision Domains in Shared Layer Environments

21. Identify the Basic Topologies Used in Networking

22. Describe LAN Standards

23. Determine Hexadecimal Numbers

24. Describe Framing

25. Identify the Basics of Token Ring

26. Identify the Basics of Fiber Distributed Data Interface (FDDI)

Page 12: SECTION I - OVERVIEW...(which is a CCNA). Course outlines are reviewed every year and for the past 3 years we have modified all 4 semesters of our Cisco classes based on corporate

27. Describe Ethernet and IEEE 802.3

28. Determine Layer 2 Devices

29. Classify the Effects of Layer 2 Devices on Data Flow

30. Identify the Basic Ethernet 10Base-T Troubleshooting

31. Identify the Basic Network Design and Documentation

32. Define Planning Structured Cabling: Wiring Closet Specifications

33. Define Planning Structured Cabling: Identifying Potential Wiring Closets

34. Define Planning Structured Cabling: Selection Practice

35. Define Planning Structured Cabling: Horizontal and Backbone Cabling

36. Define Planning Structured Cabling: Electricity and Grounding

37. Define Planning Structured Cabling: Cabling and Grounding

38. Define Design Practice No. 1: Wiring Plan for Ethernet Star Topology LAN

39. Define Design Practice No. 2: Multiple Earth Ground Problems

40. Define Network Power Supply Issues: Power Line Problems

41. Define Network Power Supply Issues: Surge Suppressors and Uninterruptible Power Supply (UPS) Functions

42. Describe Project Planning

43. Perform RJ-45 Jack and Outlet Installation

44. Identify the Basics of Cable Installation

45. Structured Cable Run Installation

46. Identify the Basics of Wiring Closets and Patch Panels

47. Describe Wiring closet

48. Determine the Range of Equipment for Testing Structured Cabling Projects

49. Describe Importance of a Network Layer

50. Define the Path Determination

51. Describe IP Address within the IP Header

52. Describe IP Address Classes

53. Define the Reserved Address Space

54. Identify the Basics of Subnetting

55. Determine the needs for Creating a Subnet

56. Determine Layer 3 Devices

57. Describe Network-to-Network Communications

58. Define the Advanced ARP Concepts

59. Describe Routable Protocols

60. Describe Routing Protocols

61. Define Other Network Layer Services

62. Define ARP Tables

63. Classify Interior Gateway Protocols (IGP) and Exterior Gateway Protocol (EGP)

64. Protocol Analyzer Software

65. Describe The Transport Layer

66. Describe The Session Layer

67. Describe The Presentation Layer

68. Identify the Basics of the Application Layer

69. Describe Domain Name System

70. Describe Network Applications

71. Perform Application Layer Examples

D. Course Content:

Will include: 1. Major components of a personal computer

2. Information flow in an idealized computer

3. The relationship of NICs to PCs

4. The installation of a NIC in a PC

5. PC components versus laptop components

6. Lab: Configuring network settings required to connect a PC to a network

7. Lab: Verify Web browser configuration

8. Troubleshooting lab: hardware and software

9. Binary numbers represent alphanumeric data

10. Bits and bytes

11. The Base 10 (decimal) number system

12. The Base 2 (binary) number system

13. Converting decimal numbers to binary numbers

14. Converting binary numbers to decimal numbers

15. Networks and networking

16. Data networks

17. Data networking solutions

18. Local area networks

19. Wide area networks

20. Digital bandwidth measurements

21. Three analogies to describe digital bandwidth

Page 13: SECTION I - OVERVIEW...(which is a CCNA). Course outlines are reviewed every year and for the past 3 years we have modified all 4 semesters of our Cisco classes based on corporate

22. Media bandwidth differences

23. Data throughput in relation to digital bandwidth

24. Data transfer calculation

25. The importance of bandwidth

26. Using layers to analyze problems in a flow of materials

27. Source, destination, and data packets

28. Media

29. Protocol

30. The evolution of ISO networking standards

31. The purpose of the OSI reference model

32. The names of the seven layers of the OSI reference model

33. Descriptions of the seven layers of the OSI reference model

34. Encapsulation

35. Names for data at each layer of the OSI model

36. The importance of the TCP/IP reference model

37. Names and descriptions of the layers of the TCP/IP reference model

38. TCP/IP protocol graph

39. Comparison of the OSI model and the TCP/IP model

40. Use of the OSI and the TCP/IP models in the curriculum

41. The teaching topology

42. LAN devices in a topology

43. NICs

44. Media

45. Repeaters

46. Hubs

47. Bridges

48. Switches

49. Routers

50. Clouds

51. Network segments

52. Evolution of network devices

53. Milestones in the history of networking

54. Evolution of networking devices and the OSI layers

55. Basics of Data Flow Through LANs

56. Encapsulation and packets review

57. Packet flow through Layer 1 devices

58. Packet flow through Layer 2 devices

59. Packet flow through Layer 3 devices

60. Packet flow through clouds and through Layer 1-7 devices

61. A data packet's path through all seven layers of a LAN

62. Readiness to build a small network

63. Lab: Building a simple network

64. A helium atom

65. Creating stable atoms

66. Static electricity

67. Electrical current including insulators, conductors, and semiconductors

68. Electrical measurement terms

69. Analogy for voltage, resistance, and current

70. Graphing AC and DC voltage

71. Constructing a simple series electrical current

72. Purpose of grounding networking equipment

73. Safe handling and use of the multimeter

74. Using a multimeter to make resistance measurements

75. Using a multimeter to make voltage measurements

76. Measuring simple series circuit

77. Constructing a simple electrical communication system

78. Comparing analog and digital signals

79. Using digital signals to build analog signals

80. Representing one bit on a physical medium

81. Network signal propagation

82. Network attenuation

83. Network reflection

84. Noise

85. Dispersion, jitter, and latency

86. Collision

87. Messages in terms of bits

88. Historical examples of encoding

89. Modulation and encoding

90. STP

91. UTP

Page 14: SECTION I - OVERVIEW...(which is a CCNA). Course outlines are reviewed every year and for the past 3 years we have modified all 4 semesters of our Cisco classes based on corporate

92. Coaxial cable

93. Optical fiber

94. Wireless communication

95. Purpose of LAN media specifications

96. TIA/EIA standards

97. Explain the details of TIA/TIA-568-A

98. Networking media and terminations

99. Testing Ethernet 10Base-T patch cables with a cable tester

100. Making and testing Ethernet 10Base-T straight-through patch cable

101. Making and testing Ethernet 10Base-T console patch cable

102. Making and testing Ethernet 10Base-T crossover cable

103. Features of an advanced cable tester

104. Cable identification experiments using an advanced cable tester

105. Length experiments using an advanced cable tester

106. Ethernet 10Base-T

107. Connectors

108. Cabling

109. Jacks

110. Patch panels

111. Transceivers

112. Repeaters

113. Multiport repeaters (hubs)

114. OSI Layer 1 components and devices

115. Shared media environment

116. Collisions and collision domains

117. Signals in a collision

118. Collisions as natural functions of shared media environments and collision domains

119. Shared access as a collision domain

120. Repeaters and collision domains

121. Hubs and collision domains

122. Hubs and repeaters as causes of collision domains

123. The four repeater rule

124. Segmenting collision domains

125. Network topologies

126. Linear bus network topology

127. Ring network topology

128. Dual ring network topology

129. Star network topology

130. Extended star network topology

131. Tree network topology

132. Irregular network topology

133. Complete (mesh) network topology

134. Cellular network topology

135. Layer 2

136. Comparing OSI Layer 1 and 2 with various LAN standards

137. Comparing the IEEE model with the OSI model

138. Logical Link Control (LLC)

139. MAC sublayers

140. LLC as one of four concepts of Layer 2

141. Hexadecimal numbers as MAC addresses

142. Basic hexadecimal (hex) numbering

143. Converting decimal numbers to hexadecimal numbers

144. Converting hexadecimal numbers to decimal numbers

145. Methods for working with hexadecimal and binary numbers

146. MAC Addressing

147. Data link layer MAC identifiers

148. MAC address and NICs

149. How the NIC uses MAC addresses

150. Layer 2 address encapsulation and decapsulation

151. Limitations of MAC addressing

152. Why framing is necessary

153. Frame format diagram

154. Three analogies for frames

155. A generic frame format

156. Frame start fields

157. Address fields

158. Length/type fields

159. Data fields

160. Frame error problems and solutions

161. Stop frame field

Page 15: SECTION I - OVERVIEW...(which is a CCNA). Course outlines are reviewed every year and for the past 3 years we have modified all 4 semesters of our Cisco classes based on corporate

162. Media Access Control (MAC)

163. Definition of MAC

164. Three analogies for MAC

165. Deterministic MAC protocols

166. Non-deterministic MAC protocols

167. Three specific technical implementations and their MACs

168. Overview of Token Ring and its variants

169. Token Ring frame format

170. Token Ring MAC

171. Token Ring signaling

172. Token Ring media and physical topologies

173. Overview of FDDI and its variants

174. FDDI format

175. FDDI MAC

176. FDDI signaling

177. FDDI media

178. Comparing Ethernet and IEEE 802.3

179. Ethernet family tree

180. Ethernet frame format

181. Ethernet MAC

182. Ethernet signaling

183. Ethernet 10Based-T media and topologies

184. NICs

185. NIC Layer 2 operations

186. Bridges

187. Bridge Layer 2 operations

188. Switches

189. Switch Layer 2 operations

190. Ethernet LAN segmentation

191. Bridge segmentation of a collision domain

192. Switch segmentation of a collision domain

193. Router segmentation of a collision domain

194. Teaching topology segmentation by bridges, switches, and routers

195. Troubleshooting workstations

196. Network Inspector discovery lab

197. Network Inspector problem log lab

198. Network Inspector frame statistics

199. General design process

200. Network design issues

201. General network design process

202. Network design documents

203. Overview of wiring closet selection

204. Size

205. Environmental specifications

206. Walls, floors, and ceilings

207. Temperature and humidity

208. Lighting fixtures and power outlets

209. Room and equipment access

210. Cable access and support

211. Topology as floor plan

212. Selecting potential locations

213. Determining number of wiring closets

214. Identification practice

215. Catchment area problems

216. MDF location in multi-story building

217. Example of where you would use multiple wiring closets

218. Cabling for MDF and IDF connections

219. Backbone cabling media

220. TIA/EIA 568-A requirements for backbone cabling

221. Maximum distance for backbone cabling

222. Differences between AC and DC

223. AC line noise

224. Electrostatic discharge

225. Grounding electrical current in computer equipment

226. Purpose of grounding computer equipment

227. Safety ground connections

228. Safety ground connection problems

229. Causes of ground potential problems

230. Networking devices and dangerous circuits

231. Faulty ground wiring problems

Page 16: SECTION I - OVERVIEW...(which is a CCNA). Course outlines are reviewed every year and for the past 3 years we have modified all 4 semesters of our Cisco classes based on corporate

232. Avoiding potentially dangerous circuits between buildings

233. How fiber optic cable can prevent electrical shocks

234. Reasons for using UTP for backbone cabling between buildings

235. Power problem classifications

236. Normal mode and common mode

237. Typical power line problems

238. Sources of surges and spikes

239. Surge and spike damage

240. Surge and spike solutions

241. Sag and brownout solutions

242. Oscillation solution

243. Surge suppressors: networking device locations

244. Surge suppressors: for power panel locations

245. UPS: for certain LAN devices

246. UPS: for certain electrical problems

247. UPS: components

248. UPS: differences in UPS features

249. UPS: description and operation

250. Network installation safety procedures

251. Network documentation

252. Network installation teams

253. Work flow

254. Scheduling materials flow

255. TIA/EIA-568-aA standards

256. RJ-45 jack

257. Two methods for mounting an RJ-45 jack

258. Surface-mounting an RJ-45 jack

259. Advantages of surface-mounting an RJ-45 jack

260. Factors to consider before flush-mounting an RJ-45 jack

261. Preparing a drywall surface for a flush-mounted jack

262. Preparing a plaster surface for a flush-mounted jack

263. Preparing a wood surface for a flush-mounted jack

264. Flush mounting a jack in a wall

265. Procedure for placing the copper wires into a jack

266. Procedure for punching wires down into a jack

267. Installing RJ-45 jack and outlet

268. Basics of installing UTP cable

269. Documenting cable runs

270. TIA/EIA-606 specifications for labeling cable

271. Types of labels

272. Preparing cable for routing and labeling

273. Labeling cable ends

274. Easiest procedure for routing cable

275. Mounting cable in raceway

276. Running cable through existing raceway

277. Personal safety precautions before installing cable

278. Building safety

279. Supporting horizontal cabling

280. Stringing cable in an attic, or room with a dropped ceiling

281. Fishing cable from above a wall

282. Fishing cable from below a wall

283. Stringing, Running, and Mounting Cable

284. Installation tasks

285. Reason for MDFs and IDFs

286. Patch panel

287. Structure of a patch panel

288. Laying wires in a patch panel

289. Punch tools

290. Mounting a patch panel

291. Procedures for testing cable already installed

292. Network operation testing

293. Cable testing equipment

294. Tests performed by cable testers

295. Cable testers and distance measurements

296. TDRs (time domain reflectometers)

297. Wire maps

298. Split pairs

299. Signal attenuation

300. Causes of near-end crosstalk

301. Problem detected by a noise level test

Page 17: SECTION I - OVERVIEW...(which is a CCNA). Course outlines are reviewed every year and for the past 3 years we have modified all 4 semesters of our Cisco classes based on corporate

302. Using a cable tester to locate sources of outside interference

303. Cable testing procedures

304. Identifiers

305. Segmentation and autonomous systems

306. Communication between separate networks

307. Layer 3 network devices

308. Path determination

309. Network layer addressing

310. Layer 3 and computer mobility

311. Comparing flat and hierarchical addressing

312. Network layer datagrams

313. Network layer fields

314. IP header source and destination fields

315. IP address as a 32-bit binary number

316. IP address component fields

317. IP address classes

318. IP address as decimal numbers

319. Binary and decimal conversion review

320. Converting decimal IP addresses to binary equivalents

321. Converting binary IP addresses to decimal equivalents

322. Reserved Address Space

323. Purposes for network IDS and broadcast addresses

324. Network ID

325. Network ID analogy

326. Broadcast address analogy

327. Hosts for classes of IP addresses

328. Classical IP addressing

329. Subnetwork

330. Purpose for subnetting

331. Subnet mask

332. Boolean operation: AND, OR, and NOT

333. Performing the AND function

334. Range of bits needed to create subnets

335. Determining subnet mask size

336. Computing subnet mask and IP address

337. Computing hosts per subnetwork

338. Boolean AND operation

339. IP configuration on a network diagram

340. Host/subnet schemes

341. Private addresses

342. Routers

343. Layer 3 addresses

344. Unique network numbers

345. Router interface/port

346. Methods for assigning an IP address

347. DHCP initialization sequence

348. Function of the address resolution protocol (ARP)

349. ARP operation within a subnet

350. Default gateway

351. Problems with sending data to nodes on different subnets

352. Names and descriptions of the layers of the TCP/IP reference model

353. How ARP sends data to remote networks

354. Proxy ARP

355. Four Layer 3 flowcharts

356. Routed protocols

357. Other routed protocols

358. Routable and non-routable protocols

359. Characteristics of s routable protocol

360. Examples of routing protocols

361. Definition of routing protocol

362. Routing encapsulation sequence

363. Multi-protocol routing

364. Connectionless network services

365. Connection-oriented network services

366. Comparing connectionless and connection-oriented network processes

367. IP and transport layer

368. Internetworking devices that have ARP tables

369. Comparing router ARP tables with ARP tables kept by other networking devices

370. Other router table addresses

371. ARP requests and ARP replies

Page 18: SECTION I - OVERVIEW...(which is a CCNA). Course outlines are reviewed every year and for the past 3 years we have modified all 4 semesters of our Cisco classes based on corporate

372. Proxy ARP

373. Indirect routing

374. Routed protocols and routing protocols

375. GPs and EGPs

376. RIP

377. IGRP and EIGRP

378. OSPF

379. How routers recognize networks

380. Examples of static routing

381. Example of dynamic routing

382. How routers use RIP to route data through a network

383. Using protocol analyzer software for ARPs and broadcasts

384. Purpose of the transport layer

385. Layer 4 protocols

386. Comparing TCP and IP

387. TCP and UDP

388. TCP

389. UDP segment format

390. TCP Connection Methods

391. Port numbers

392. Three-way handshake/open connection

393. The session layer overview

394. The session layer in terms of analogies

395. Dialogue control

396. Dialogue separation

397. Layer 5 protocols

398. The presentation layer functions and standards

399. File formats

400. Data encryption and compression

401. Application processes

402. Direct network applications

403. Indirect network support

404. Making and breaking a connection

405. Problems with using IP addresses

406. The domain name server

407. Internet applications

408. E-mail message

409. DNS function

410. Telnet

411. File transfer protocol

412. Hypertext transfer protocol

COCONINO COMMUNITY COLLEGE

COURSE OUTLINE

Prepared by : Bill Branch, Dave Bowmen October, 03, 2001

A. Identification:

1. Subject Area: Computer Information Systems

2. Course Number: CIS 150

3. Course Title: Cisco Networking Academy Semester 2

4. Credit Hrs: 4

5. Catalog Description: The Cisco Networking Academy Program consists of four semesters. The program is designed to teach students the skills they

will need to design, build, and maintain small to medium size networks. This provides them with the opportunity to enter the

workforce and/or further their education and training in the computer networking field. Prerequisite: CIS 140. Four Lecture.

Spring Only.

B. Course Goals:

To build on previous knowledge from Cisco Networking Academy Semester 1. This will allow students to go beyond installing

and understanding data cable networks to working with networking devices on a very basic level. Skills include understanding

and configuring routers and switches for small to medium networks.

C. Course Outcomes:

The student will:

1. Describe The OSI Model

Page 19: SECTION I - OVERVIEW...(which is a CCNA). Course outlines are reviewed every year and for the past 3 years we have modified all 4 semesters of our Cisco classes based on corporate

2. Relate the concept of a LAN

3. Describe TCP/IP Addressing

4. Identify the Host Layer (the Upper 4 Layers of the OSI Model)

5. Relate the concept of a WANs

6. Classify the WANs and Routers

7. Demonstrate the Router User Interface

8. Classify the Using The Router Interface and Interface Modes

9. Identify the Router Components

10. Demonstrate the Router Show Commands

11. Locate a Router's Network Neighbors

12. Demonstrate Basic Networking Testing

13. Demonstrate Router Boot Sequence and Setup Mode

14. Locate a System Configuration Dialog

15. Locate the Router Configuration Files

16. Demonstrate Router Configuration Modes

17. Identify the Configuration methods

18. Identify the The Basics of IOS Versions

19. Describe the Bootstrap Options in Software

20. Practice IOS Naming and Software Image Backup

21. Demonstrate Configuring a Router from the CLI after Start-up Config has been Erased

22. Identify the The TCP/IP Protocol Suite

23. Describe 2 Layer 3 Concepts

24. Demonstrate IP addressing and subletting

25. Interpret the Role of DNS in Router Configurations

26. Demonstrate the Verifying of an Address Configuration

27. Demonstrate the Assigning New Subnet Numbers to the Topology

28. Describe Routing Basics

29. Describe Why Routing Protocols are Necessary

30. Identify the Distance-Vector Routing

31. Identify the Link-State Routing

32. Describe the Context of Different Routing Protocols

33. Demonstrate Initial Router Configuration

34. Classify the Interior and Exterior Routing Protocols

35. Identify RIP

36. Identify IGRP

37. Describe The Session Layer

D. Course Content:

Will include: 1. Layered networked model

2. The OSI layered model functions

3. Peer-to-peer communications

4. Five steps of data encapsulation 5. LAN devices and technologies

6. Ethernet and IEEE 802.3 standards

7. Carrier sense multiple access with collision detection

8. Logical (IP) addressing

9. MAC addressing 10. CP/IP environment

11. Subnetworks

12. Application, presentation and session layers

13. Transport layer

14. Transport layer functions

15. WANs and devices

16. WAN standards

17. WAN technologies

18. Router Basics

19. The function of a router in a WAN

20. Semester 2 lab topology

21. User and privileged modes

22. User mode command list

23. Privileged-mode command list

24. User router help functions

25. Using IOS editing commands

26. Using IOS command history

27. Lab: Router user interface

28. Lab: Router user interface modes

29. External router configuration sources

30. External router configuration compoments

Page 20: SECTION I - OVERVIEW...(which is a CCNA). Course outlines are reviewed every year and for the past 3 years we have modified all 4 semesters of our Cisco classes based on corporate

31. RAM for working storage in the router

32. Router modes

33. Examining router status by using router status commands

34. The show running-config and show startup-config commands

35. The show interfaces, show version and show protocols commands

36. Router Show Commands

37. Gaining Access to Other Routers by Using Cisco Discovery Protocol (CDP)

38. Showing CDP neighbor entries

39. A CDP configuration example

40. Showing CDP entries for a device and CDP neighbors

41. Lab: CDP Neighbors

42. Testing process that uses the OSI model

43. Testing the application layer by using telnet

44. Testing the network layer using the ping command

45. Testing the network layer with the trace command

46. Testing network layer with the show ip route command.

47. Using the show interfaces serial command to test the physical and data link layers

48. The show interfaces and clear counters commands

49. Checking real-time traffic with debug

50. Router startup routine

51. Router startup sequence

52. Commands related to router startup

53. Using the setup command

54. Setting up global parameters

55. Setting up interface parameters

56. Setting up script review and use

57. Router configuration file information

58. Working with Release 11.x configuration files

59. Working with pre-Release 11.0 configuration files

60. Using the copy running-config tftp and copy tftp running-config commands

61. Describe using NVRAM with Release 11.x.

62. Using NVRAM with Pre-11.0 IOS software

63. Using router configuration modes

64. Global configuration modes

65. Configuring routing protocols

66. Interface configuration commands

67. Configuring a specific interface

68. Release 11.x configuration methods

69. Pre-Release 11.0 configuration methods

70. Password configuration methods

71. Router identification configuration

72. Configuration Labs

73. Cisco Configmaker

74. Router config. web browser 75. Locating the Cisco IOS software

76. Configuration register values

77. The show version command

78. Boot system commands

79. Preparing for the use of TFTP

80. The show flash command.

81. Cisco's IOS naming conventions

82. The copy flash tftp command.

83. The copy tftp flash command.

84. How to load a software image backup

85. Router configuration process

86. Router password recovery procedure on 1600 and 2500 series routers

87. Individual Router Config. 88. The Internet TCP/IP protocols and the OSI model

89. NTCP/IP protocol stack and the application layer

90. NTCP/IP protocol stack and the transport layer

91. TCP and UDP segment format

92. TCP and UDP port numbers

93. TCP three-way handshake/open connection

94. TCP simple acknowledgment and windowing

95. TCP/IP and the Internet Layer

96. Diagram the IP Datagram

97. Internet Control Message Protocol (ICMP)

98. How ARP works

99. How RARP works

Page 21: SECTION I - OVERVIEW...(which is a CCNA). Course outlines are reviewed every year and for the past 3 years we have modified all 4 semesters of our Cisco classes based on corporate

100. The purpose of IP address

101. The role of host address on a routed network

102. The role of broadcast addresses on a routed network

103. The assignment of router interface and network IP addresses

104. The IP address command

105. The IP host command

106. Describe the IP name-server command

107. How to enable and disable DNS on a router

108. Show hosts command

109. Verification commands

110. The telenet and ping commands

111. The trace command

112. Path determination

113. How routers route packets from source to destination

114. Network and host addressing

115. Path selection and packet switching

116. Routed versus routing protocol

117. Network-layer protocol operations

118. Multiprotocol routing

119. Static versus dynamic routes

120. Why use a static route

121. How a default route is used

122. Why dynamic routing is necessary

123. Dynamic routing operations

124. How distances on network paths are determined by various metrics

125. Three classes of routing protocols

126. Time to convergence

127. Distance-vector routing basics

128. How distance-vector protocols exchange routing tables

129. How topology changes propagate through the network of routers

130. The problem of routing loops

131. The problem of counting to infinity

132. The solution of defining a maximum

133. The solution of split horizon

134. The solution of hold-down timers

135. Link-state routing basics

136. How link-state protocols exchange routing tables

137. How topology changes propagate through the network of routers

138. Two link-state concerns

139. Unsynchronized link-state advertisements (LSAs) leading to inconsistent path decisions

140. amongst routers

141. Distance-vectors versus link-state routing protocols

142. Hybrid routing protocols

143. LAN-to-LAN routing

144. CLAN-to-WAN routing

145. Path selection and switching of multiple protocols and media

146. Setup mode

147. The initial IP routing table

148. How a router learns about destinations

149. The ip route command

150. Using the ip route command

151. The ip default-network command

152. Using the ip default-network command

153. Autonomous system

154. Interior versus exterior routing protocols

155. Interior IP routing protocols

156. IP routing configuration tasks

157. Using the router and network commands

158. Key elements of RIP

159. Using router rip and network commands to enable RIP

160. Enabling RIP on an IP-addressed network

161. Monitoring of IP packet flow using the show ip protocol command

162. The show ip route command

163. Key characteristics of IGRP

164. Using router igrp and network commands to enable IGRP

165. Enabling IGRP on an IP-addressed network

166. Monitoring IP packet flow using the show ip protocol command

167. The show ip interfaces command

168. The show ip route command

169. The debug ip rip command

Page 22: SECTION I - OVERVIEW...(which is a CCNA). Course outlines are reviewed every year and for the past 3 years we have modified all 4 semesters of our Cisco classes based on corporate

170. The session layer overview

171. The session layer in terms of analogies

172. Dialogue control

173. Dialogue separation

174. Layer 5 protocol

COCONINO COMMUNITY COLLEGE

COURSE OUTLINE

Prepared by : Bill Branch, Dave Bowmen October, 03, 2001

A. Identification:

1. Subject Area: Computer Information Systems

2. Course Number: CIS 160

3. Course Title: Cisco Networking Academy Semester 3

4. Credit Hrs: 4

5. Catalog Description: The Cisco Networking Academy Program consists of four semesters. The program is designed to teach students the skills they

will need to design, build, and maintain small to medium size networks. This provides them with the opportunity to enter the

workforce and/or further their education and training in the computer networking field. Prerequisite: CIS 150 Four Lecture. Fall

only.

B. Course Goals:

To build on previous knowledge from Cisco Networking Academy Semesters 1 and 2. This will allow students to go beyond

installing and understanding data cable networks to working with networking devices on a more detailed yet basic level. Skills

include understanding and configuring routers and switches for small to medium networks.

C. Course Outcomes:

Students will:

1. Describe the OSI Reference Model and the Problems It Solves

2. Describe the Physical Layer of the OSI Reference Model

3. Describe the Data Link Layer of the OSI Reference Model

4. Classify Routing and the Different Classes of Routing Protocols

5. Describe the The Transport Layer of the OSI Reference Model

6. Identify the Various LAN Communication Problems

7. Classify Full-Duplex Transmitting, the Ethernet Standard, and LAN Segmentation

8. Identify the Switching and VLANs

9. Describe the The Spanning-Tree Protocol

10. Practice VLANs

11. Practice Segmentation with Switching Architecture

12. Practice VLAN Implementation

13. Describe the Benefits of VLANs

14. Identify the LAN Network Design Goals and Components

15. Practice Network Design Methodology

16. Sketch Layer 1 Design

17. Sketch Layer 2 Design

18. Sketch Layer 3 Design

19. Describe the Network Layer Basics

20. Classify Routed and Routing Protocols

21. Identify the IP Routing Protocols

22. Practice IGRP Operation

23. Practice Access Control Lists (ACLs)

24. Describe the ACL Configuration Tasks

25. Identify the Standard ACLs

26. Identify the Extended ACLs

27. Identify the Named ACLs

28. Practice Using ACLs with Protocols

29. Practice Placing ACLs

30. Practice Verifying ACLs

31. Describe the Cisco Routers in Netware Networks

32. Identify Novell Encapsulation

33. Identify Novell Routing

34. Identify Novell IPX Configuration

35. Classify Monitoring and Managing an IPX Network

36. Practice Network Documentation

Page 23: SECTION I - OVERVIEW...(which is a CCNA). Course outlines are reviewed every year and for the past 3 years we have modified all 4 semesters of our Cisco classes based on corporate

37. Practice Network Security

38. Define Planning Structured Cabling: Identifying Potential Wiring Closets

39. Identify the Network Performance

40. Practice Server Administration

41. Practice Network Troubleshooting

D. Course Content:

Will include: 1. 3

2. The layered network model: the OSI Reference Model

3. The OSI Model layers

4. Peer-to-peer communication

5. Three categories of Ethernet

6. Three varieties of 10 Mbps Ethernet

7. Lock analogy for NICs

8. Data transport across the physical link connecting hosts, routers, and other devices

9. Network Layer Functions

10. Layer 3 protocols of the TCP/IP stack

11. Network and subnetwork addresses in the IP

12. Path determination in the contexts of packets and routers

13. Why Layer 3 addresses must contain both path and host information

14. Types of ICMP messages

15. ping command

16. ARP

17. Routing in a mixed LAN-media environment

18. Two basic operations a router performs

19. Static and dynamic routes

20. Default route

21. Routed and routing protocols

22. Information that routers use to perform their basic functions

23. IP routing protocols

24. Network convergence

25. Distance-vector routing

26. Link-state routing

27. Distance-vector and link-state routing

28. Enabling an IP routing process

29. Configuring RIP

30. Routing in a mixed LAN-media environment

31. Layer 4 segmentation

32. The three-way handshake

33. Why is a buffer used in data communications

34. Windowing

35. Explain reliability via acknowledgment

36. Factors putting pressure on network performance

37. Elements of Ethernet/802.3 networks

38. Half-duplex Ethernet

39. Network congestion

40. Network latency

41. Ethernet 10BaseT transmission time

42. The benefits of using repeaters

43. Full-duplex Ethernet

44. LAN segmentation

45. LAN segmentation with bridges

46. The pros and cons of LAN segmentation with routers

47. The pros and cons of LAN segmentation with switches

48. Describe the two basic operations of a switch

49. Ethernet switch latency

50. Layer 2 and Layer 3 switching

51. Microsegmentation

52. How a switch learns addresses

53. Benefits of LAN switching

54. Symmetric and asymmetric switching

55. Memory buffering

56. Two switching methods

57. How to set up VLANs

58. Overview of the Spanning-Tree Protocol

59. Describe the five Spanning-Tree Protocol states

60. Existing Shared LAN Configurations

61. Grouping geographically separate users into networkwide virtual topologies

Page 24: SECTION I - OVERVIEW...(which is a CCNA). Course outlines are reviewed every year and for the past 3 years we have modified all 4 semesters of our Cisco classes based on corporate

62. Differences between traditional switched LANs and VLANs

63. The transport of VLANs across backbones

64. The role of routers in VLANs

65. How frames are used in VLANs

66. The relationship between ports, VLANs, and broadcasts

67. Why port-centric VLANs make an administrator's job easier

68. Static VLAN

69. Dynamic VLAN

70. ow VLANs make adds, moves, and changes easier

71. How VLANs help control broadcast activity

72. How VLANs can improve network security

73. How VLANs can save money

74. LAN Design goals

75. Critical components of LAN Design

76. The function and placement of servers when designing a network

77. Intranet

78. Why contention is an issue with Ethernet

79. How broadcast domains relate to segmentation

80. The difference between bandwidth and broadcast domains

81. Gathering and analyzing requirements

82. Factors that affect network availability

83. Physical topologies used in networking

84. Designing the Layer 1 topology: signaling method, medium type, and maximum length

85. Diagramming a standards-based Ethernet cable run from the workstation to the HCC, including

86. distances

87. HCC, VCC, MDF, IDF and POP

88. 10BaseT and 100BaseT Ethernet.

89. Elements of a logical topology diagram

90. Common Layer 2 devices and their impact on network domains

91. Asymmetric switching

92. The effect microsegmentation can have on a network

93. Determining the number of cable runs and drops

94. Determining the size of collision domains in hubbed and switched networks

95. Diagramming hub placement in a standards-based extended star topology

96. Migrating a network from 10 Mbps to 100 Mbps

97. Using routers as the basis for Layer 3 network design

98. How VLANs can create smaller broadcast domains

99. Explain how a router provides structure to a network

100. Why large, scalable LANs need to incorporate routers

101. Diagramming a standards-based LAN that uses routers

102. Logical and physical network maps

103. Explain path determination

104. Path determination

105. The operation of routing tables

106. Metrics

107. Router forwarding decisions

108. Routing protocols

109. Multiprotocol routing

110. Differentiating one routing protocol from another

111. Describe five goals of routing protocols

112. Routing loops

113. Static and dynamic routing

114. Classifications of routing protocols

115. IP routing configuration: choosing a routing protocol

116. IGRPs metrics

117. Differentiating amongst interior system and exterior routes

118. Write out a correct command sequence for enabling IGRP on a router

119. Describe three features of IGRP which enhance its stability

120. IGRP metrics and routing updates

121. The maximum hop count of IGRP

122. What are ACLs

123. Reasons to create ACLs

124. Testing packets with ACLs

125. How ACLs work

126. Flowchart of the ACL test matching process

127. Creating ACLs

128. The purpose and function of wildcard mask bits

129. The any command

130. The host command

131. What are standard ACLs

Page 25: SECTION I - OVERVIEW...(which is a CCNA). Course outlines are reviewed every year and for the past 3 years we have modified all 4 semesters of our Cisco classes based on corporate

132. Writing a valid standard ACL command using all available parameters

133. How to verify access control lists

134. Writing a standard ACL to permit traffic from a source network

135. Writing a standard ACL to deny a specific host

136. Writing a standard ACL to deny a specific subnet

137. What are extended ACLs

138. Extended ACL parameters

139. UDP and TCP port numbers

140. Writing an ACL for denying FTP on an Ethernet interface

141. Writing an ACL which denies Telnet out of an Ethernet port and permits all other traffic

142. Configuring named ACLs

143. The deny command

144. The permit command

145. Protocols for which ACLs can be created

146. Rule: "Putting the ACL as close as possible to the source of the traffic denied"

147. Using ACLs in firewall routers

148. A firewall architecture to protect you from intruders

149. How to verify ACLs and interpret the output

150. The Novell IPX protocol suite

151. IPX features

152. IPX addressing

153. NetWare Ethernet encapsulation terms

154. The IOS encapsulation names for Ethernet, FDDI, and Token Ring

155. The IPX packet format

156. Novell RIP

157. Service advertising protocol

158. Get nearest Server protocol

159. Novell Configuration Tasks

160. Writing a valid IOS command sequence to assign IPX network numbers to interfaces

161. Writing a valid IOS command for monitoring and troubleshooting IPX

162. Writing a valid IOS command for monitoring the status of an IPX interface

163. Writing a valid IOS command sequence to monitor IPX routing tables

164. Writing a valid IOS command sequence for monitoring Novell IPX servers

165. Writing a valid IOS command to monitor IPX traffic, and describe some of the field options for

166. that command

167. Writing a valid IOS command for troubleshooting IPX routing

168. Writing a valid IOS command for troubleshooting IPX SAP

169. Using the privileged IPX ping command

170. Using the user IPX IPX ping command

171. Cut sheet diagrams

172. MDF & IDF layouts

173. Server and workstation configuration details

174. Software listings

175. Maintenance records

176. Security measures

177. User policies

178. Network access

179. Data recovery

180. Backup operations

181. Redundancy techniques

182. Static, dust, dirt, and heat

183. Power conditioning

184. EMI and FRI

185. Software viruses

186. Network baseline, updates, and change verification

187. Peer-to-peer

188. Client-server

189. Network control

190. Scientific method

191. Analyze network troubleshooting

COCONINO COMMUNITY COLLEGE

COURSE OUTLINE

Prepared by : Bill Branch, Dave Bowmen October, 03, 2001

Page 26: SECTION I - OVERVIEW...(which is a CCNA). Course outlines are reviewed every year and for the past 3 years we have modified all 4 semesters of our Cisco classes based on corporate

A. Identification:

1. Subject Area: Computer Information Systems

2. Course Number: CIS 170

3. Course Title: Cisco Networking Academy Semester 4

4. Credit Hrs: 4

5. Catalog Description: The Cisco Networking Academy Program consists of four semesters. The program is designed to teach students the skills they

will need to design, build, and maintain small to medium size networks. This provides them with the opportunity to enter the

workforce and/or further their education and training in the computer networking field. Prerequisite: CIS 160. Four Lecture.

Spring only. .

B. Course Goals:

To build on previous knowledge from Cisco Networking Academy Semesters 1,2 and 3. This will allow students to go beyond

installing and understanding data cable networks to working with networking devices on a more detailed yet basic level. Skills

include understanding and configuring routers and switches for small to medium networks.

C. Course Outcomes/Competencies:

Students will:

1. Demonstrate LAN Switching

2. Identify Virtual LANs

3. Sketch a LAN Design

4. Identify Routing Protocols

5. Describe Access Control Lists

6. Define IPX Routing

7. Define WAN Technology

8. Identify WAN Devices

9. Describe How WANs Relate to the OSI Model

10. Describe WAN Encapsulation Formats

11. Identify WAN Link Options

12. Define WAN Communication

13. Demonstrate The First Steps in WAN Design

14. Identify and Select Networking Capabilities

15. Define PPP

16. Describe PPP Session Establishment

17. Describe PPP Authentications

18. Define ISDN

19. Identify How ISDN Relates to the OSI Model

20. Identify ISDN Uses

21. Classify ISDN Services: BRI and PRI

22. Demonstrate ISDN Configuration Tasks

23. Demonstrate Dial On Demand Routing

24. Describe Frame Relay Technology

25. Demonstrate LMI: Cisco's Implementation of Frame Relay

26. Identify LMI Features

27. Describe Frame Relay Subinterfaces

28. Demonstrate The Configuration of Basic Frame Relay

29. Demonstrate The Administrative Side of Network Management

30. Demonstrate Monitoring the Network

31. Demonstrate Troubleshooting Networks

32. Describe Basic Networking Knowledge

33. Identify the Physical Layer

34. Identify the Network Layer

35. Identify the Transport Layer

36. Describe TCP/IP Fundamentals

37. Describe TCP/IP Suite: Utilities

38. Demonstrate Remote Connectivity

39. Demonstrate Security

40. Demonstrate Maintaining and Supporting the Network

41. Demonstrate Troubleshooting the Network

42. Identify the OSI Model

43. Demonstrate Creating Subnets

Demonstrate Router Commands

D. Course Content:

Will include: 1. Congestion and bandwidth

2. Why segment LANs?

Page 27: SECTION I - OVERVIEW...(which is a CCNA). Course outlines are reviewed every year and for the past 3 years we have modified all 4 semesters of our Cisco classes based on corporate

3. Segmentation with LAN switches

4. LAN switching overview

5. How a LAN switch learns addresses

6. Symmetric switching

7. Asymmetric switching

8. Two switching methods

9. Introduction to VLANs

10. Frame filtering

11. Frame tagging

12. VLANs establish broadcast domains

13. Port-centric virtual LANs

14. Static VLANs

15. Dynamic VLANs

16. LAN design goals

17. Design methodology

18. What problem are you trying to solve?

19. Developing a LAN topology

20. Developing Layer 1 LAN topology

21. Extended star topology

22. Developing Layer 2 LAN topology

23. Layer 2 switching

24. Layer 3 router for segmentation

25. Server placement

26. Dynamic routing operations

27. Representing distance with metrics

28. Classes of routing protocols

29. One issue: time to convergence

30. Distance vector concept

31. Interior or exterior routing protocols

32. Interior IP routing protocols

33. IGRP overview

34. IGRP configuration

35. IGRP configuration example

36. What are access lists

37. How access lists work

38. A list of tests: deny or permit

39. How to identify access lists

40. Testing packets with access lists

41. How to use wildcard mask bits

42. How to use the wildcard any

43. How to use the wildcard host

44. Where to place IP access lists

45. Cisco routers in NetWare networks

46. Novell NetWare protocol suite

47. Novell IPX addressing

48. Cisco encapsulation names

49. Novell uses RIP for routing

50. SAP service advertisements

51. GNS get nearest server protocol

52. Novell IPX configuring tasks

53. Verifying IPX operation

54. WAN services

55. CPE, demarc, "last-mile", CO switch, and toll network

56. WAN virtual circuits

57. WAN line types

58. Fundamental WAN devices

59. Routers and switches on a WAN

60. Modems on a WAN

61. CSU/DSUs on a WAN

62. ISDN terminal adapters on a WAN

63. Organizations that deal with WAN standards

64. WAN physical layer standards

65. WAN data link encapsulations.

66. Serial line frame fields

67. PPP

68. HDLC

69. Two basic WAN link options

70. Dedicated lines

71. Leased lines

72. Packet-switched connections

Page 28: SECTION I - OVERVIEW...(which is a CCNA). Course outlines are reviewed every year and for the past 3 years we have modified all 4 semesters of our Cisco classes based on corporate

73. Frame Relay

74. Circuit-switched connections

75. DDR

76. ISDN

77. WAN design requirements

78. LAN/WAN integration issues

79. WAN design goals

80. The gathering requirements phase of WAN design

81. Analyzing requirements

82. WAN sensitivity testing

83. The use of the OSI model in WAN design

84. A hierarchical WAN design model

85. Three hierarchical WAN design layers

86. Three-layer design model components.

87. Core layer functions

88. Distribution layer functions

89. Access layer functions

90. One-layer network designs

91. Two-layer network designs

92. The benefits of hierarchical WAN designs

93. Server placement in WANs

94. Alternatives to dedicated WAN links

95. The need for PPP

96. PPP components

97. PPP layer functions

98. The six fields of a PPP frame

99. The four phases through which PPP establishes a point-to-point connection

100. Phase 1: link establishment and configuration negotiation

101. Phase 2: link-quality determination

102. Phase 3: network-layer protocol configuration negotiation

103. Phase 4: link termination

104. PAP

105. CHAP

106. Writing the IOS command steps to configure PPP authentication

107. Writing the IOS commands to configure CHAP authentication

108. What is ISDN

109. Basic ISDN components

110. ISDN reference points

111. ISDN switches and SPIDs

112. E, I, and Q ISDN protocols

113. ITU-T standards of the first three layers of ISDN

114. ISDN physical layer

115. ISDN data link layer

116. ISDN network layer

117. ISDN encapsulation

118. Three uses for ISDN

119. ISDN remote nodes

120. ISDN SOHO connectivity

121. ISDN BRI and ISDN PRI

122. How BRI connectivity is established

123. ISDN global and interface parameter configuration tasks

124. IOS commands to configure ISDN BRI

125. IOS commands to define an ISDN switch type

126. IOS commands pertaining to SPIDs

127. IOS commands for a complete ISDN BRI configuration

128. Describe how to confirm BRI operations

129. DDR considerations

130. IOS commands pertaining to verifying DDR operation

131. IOS commands pertaining to troubleshooting DDR operation

132. Frame Relay technology

133. Local access rate, DLCI, LMI, CIR, committed burst, excess burst, FECN, BECN, and DE

134. Frame Relay operation

135. Frame Relay DLCIs

136. The fields of the Frame Relay frame format

137. Frame Relay addressing

138. LMI operation

139. The fields of the LMI frame format

140. Global addressing

141. Multicasting and Inverse ARP

142. Frame Relay mapping

Page 29: SECTION I - OVERVIEW...(which is a CCNA). Course outlines are reviewed every year and for the past 3 years we have modified all 4 semesters of our Cisco classes based on corporate

143. Frame Relay switching tables

144. What are Frame Relay subinterfaces?

145. Split horizon routing environments

146. The resolution of point-to-point and multipoint reachability issues

147. Writing the IOS command sequence to completely configure Frame Relay

148. The commands for verifying Frame Relay operation

149. The steps you must use to confirm that the Frame Relay line is up

150. The steps you must use to confirm Frame Relay maps

151. The steps you must use to confirm connectivity to the central site router

152. The steps you must use to configure the serial interface for a Frame Relay connection

153. The steps you must use to verify a Frame Relay configuration

154. The steps you must use to configure Frame Relay subinterfaces

155. Optional Frame Relay commands

156. What does a network look like?

157. Understanding and establishing the boundaries of the network

158. Costs of a network

159. Error report documentation

160. Why is it necessary to monitor a network?

161. Connection monitoring

162. Simple network management protocol

163. Remote monitoring (RMON)

164. Problem solving

165. Troubleshooting methods

166. Software tools

167. Star, bus, mesh, and ring topologies

168. Segments and backbones

169. The major network operating systems (NOS): Microsoft Windows NT, Novell NetWare, and

170. Unix

171. The clients that best serve specific network operating systems and their resources

172. The directory services of the major network operating systems

173. IP, IPX, and NetBEUI and associate them with their functions Internet Protocol (IP)

174. Mirroring, duplexing, striping, volumes, tape backup

175. The OSI model and the protocols, services, functions that pertain to each layer

176. Cat 3, Cat 5, fiber optic, UTP, and STP

177. 10Base2, 10Base5, 10Base-T, 100Base-T, 100Base-TX, 100BaseVG-AnyLAN

178. Full and half-duplexing, WAN and LAN; server, workstation, and host; server-based

179. networking and peer-to-peer networking; cable, NIC, and router; broadband and baseband;

180. Gateway (as both a default IP router and as a method to connect dissimilar systems or

181. protocols)

182. Troubleshooting the physical Layer when you have network problems after installing or

183. replacing a NIC

184. Hubs, MAUs, switching hubs (switches), repeaters, transceivers

185. Data Link Layer

186. Bridges, what they are and why they are used

187. The 802 specifications

188. The function and characteristics of MAC addresses

189. Routing occurs at the network layer

190. The difference between a router and a brouter

191. The difference between routable and non-routable protocols

192. The concept of default gateways and subnetworks

193. The reason for employing unique network Ids

194. The difference between static and dynamic routing

195. The distinction between connectionless and connection-orientated transport

196. Explain the purpose of name resolution

197. IP default gateways

198. DHCP, DNS, WINS, and host files

199. TCP, UDP, POP3, SMTP, SNMP, FTP, HTTP, and IP

200. Why TCP/IP is supported by every operating system and millions of hosts worldwide

201. The purpose and function of Internet Domain Name Server hierarchies (how email arrives in

202. another country)

203. Class A, B, and C addresses and their default subnet mask numbers

204. The port numbers used (for example HTTP, FTP, SMTP) for a given service

205. Proxy and why it is used

206. IP address, DNS, default gateway, IP proxy, WINS, DHCP, host name, and internet domain

207. name

208. How and when to use ARP to test, validate, and troubleshoot IP connectivity

209. How and when to use Telnet to test, validate, and troubleshoot IP connectivity

210. How and when to use NBTSTAT to test, validate, and troubleshoot IP connectivity

211. How and when to use TRACERT to test, validate, and troubleshoot IP connectivity

212. How and when to use NETSTAT to test, validate, and troubleshoot IP connectivity

Page 30: SECTION I - OVERVIEW...(which is a CCNA). Course outlines are reviewed every year and for the past 3 years we have modified all 4 semesters of our Cisco classes based on corporate

213. How and when to use IPCONFIG/WINIPCONFIG to test, validate, and troubleshoot IP

214. connectivity

215. How and when to use FTP to test, validate, and troubleshoot IP connectivity

216. How and when to use PING to test, validate, and troubleshoot IP connectivity

217. The distinction between PPP and SLIP

218. The purpose and function of PPTP and the conditions under which it is useful

219. The attributes, advantages and disadvantages of ISDN and PSTN (POTS)

220. he modem configuration parameters which must be set (serial port IRQ, I/O address,

221. maximum port speed) for dial-up networking to function

222. The requirements for a remote connection

223. Selection of a security model (user and share levels) as a good practice to ensure network

224. security

225. The use of standard password practices and procedures as a good practice to ensure network

226. security

227. The need to employ data encryption to protect network data as a good practice to ensure

228. network security

229. The use of a firewall as a good practice to ensure network connectivity

230. Implementing Installation of the Network

231. Administrative and test accounts, passwords, IP addresses, IP configurations, relevant SOPs,

232. etc. must be obtained prior to the network implementation

233. The impact of environmental factors on computer networks

234. Common peripheral ports, external SCSI connections (esp. DB-25), print servers, hubs,

235. routers, brouters, bridges, patch panels, UPSs, NICs, and Token Ring media filters

236. The consequences of trying to install an analog modem into a digital jack

237. The uses of RJ-45 connectors may differ greatly depending on the cabling

238. Patch cables contribute to the overall length of the cabling segment

239. kinds of test documentation that are usually available regarding a vendors patches, fixes, upgrades, etc.

240. Standard backup procedures backup media storage practices

241. The need for periodic application of software patches and other fixes to the network

242. The need to install anti-virus software on the server and workstation

243. The need to frequently update virus signatures

244. Troubleshooting approach

245. Distinguish whether a problem is attributable to the operator or the system

246. A second method for determining whether a problem is attributable to the operator or the

247. system

248. The need to check the following as physical and logical indicators of trouble: link lights, power

249. lights, error displays, error logs and displays, and performance monitors

250. Given a network problem scenario, determine the problem

251. The purpose and function of common network tools including: a crossover cable, hardware

252. loopback, tone generator, tone locator (fox and hound)

253. Layer functions

254. Application layer

255. Presentation layer

256. Session layer

257. Transport layer

258. Network layer

259. Data link layer

260. Physical layer

261. Data encapsulation

262. How to create a subnet

263. Subnet planning

264. Sample problems

265. Basic router configuration

266. Testing and other basic commands

267. Configuring IPX Routing

268. Configuring standard and extended IP access lists

269. PPP encapsulation with PAP and CHAP

270. ISDN

271. Frame Relay - simple configuration

272. Frame Relay - multipoint subinterfaces configuration

273. Frame Relay - point-to-point subinterfaces configuration

274. Monitoring Frame Relay

275. Booting up the router

Page 31: SECTION I - OVERVIEW...(which is a CCNA). Course outlines are reviewed every year and for the past 3 years we have modified all 4 semesters of our Cisco classes based on corporate