Premium Essay

Nt2640

In:

Submitted By Aunix
Words 2573
Pages 11
ITT Technical Institute

NT2640 IP Networking Onsite Course

SYLLABUS

Credit hours: 4.5 Contact/Instructional hours: 56 (34 Theory Hours, 22 Lab Hours) Prerequisite(s) and/or Corequisite(s): Prerequisites: NT1210 Introduction to Networking or equivalent Course Description: This course explores network design and implementation by applying the TCP/IP protocols to provide connectivity and associated services. Planning and deployment of network addressing structures, as well as router and switch configurations, are also examined.

IP Networking

Syllabus

Where Does This Course Belong?
This course is required in the associate degree program in Network Systems Administration and associate degree in Mobile Communications Technology. The following diagrams indicate how this course relates to other courses in respective programs: Network Systems Administration

NT2799 NSA Capstone Project

NT2580 Introduction to Information Security

NT2670 Email and Web Services

NT2640 IP Networking

PT2520 Database Concepts

NT1330 Client-Server Networking II

NT1230 Client-Server Networking I

NT1430 Linux Networking

PT1420 Introduction to Programming

NT1110 Computer Structure and Logic

NT1201 Introduction to Networking

NT1310 Physical Networking

CO2520 Communications

SP2750 Group Theories

EN1420 Composition II

EN1320 Composition I

GS1140 Problem Solving Theory

GS1145 Strategies for the Technical Professional

MA1210 College Mathematics I

MA1310 College Mathematics II

Networking Technology Courses

Programming Technology Courses

General Education/ General Studies

1

Date: 7/18/2011

IP Networking

Syllabus

Mobile Communications Technology
MC2799 MCT Capstone Project

NT2640 IP Networking

MC2560 Mobile Wireless Communication I

MC2660 Mobile Wireless Communication II

MC2665 Mobile

Similar Documents

Premium Essay

Nt2640

...NT2640 IP Networking INSTRUCTOR GUIDE Onsite Credit hours: 4.5 Contact /Instructional hours: 34 Theory, 22 Lab Prerequisite: NT1210 Introduction to Networking or equivalent Course Revision Table Change Date Updated Section Change Description Change Rationale Implementation Quarter 07/18/2011 All New Curriculum New Curriculum September 2011 02/19/2013 All Updated labs across the course to map the 2nd edition of lab manual Immediately 02/27/2013 Midterm and Final Examination Answer Keys Added examination keys Immediately 03/18/2013 Answer Keys for Midterm and Final Updated some answers to address the accuracy March 2013 04/19/2013 Assignment labels on Pages 43, 52, 61, 78, 87, 97, 106 and 132. Added labels to identify additional assignments in affected units Clarification of additional assignments March 2013 Table of Contents COURSE OVERVIEW 5 Catalog Description 5 Goals and Expectations 5 Learning Objectives and Outcomes 6 Career Impact 6 INSTRUCTIONAL RESOURCES 7 Required Resources 7 Additional Resources 7 COURSE MANAGEMENT 9 Technical Requirements 9 Test Administration and Processing 9 Replacement of Learning Assignments 10 Communication and Student Support 10 Academic Integrity 10 GRADING 11 COURSE DELIVERY 13 Instructional Approach 13 Methodology 13 Facilitation Strategies 14 UNIT PLANS 15 Unit 1: The TCP/IP Model, LANs, WANs, and IP Networks 15 Unit 2: TCP/IP Network, Transport...

Words: 22068 - Pages: 89

Premium Essay

Nt2640

...Unit 4 Labs [pic] Detailed Lab Step Answers: 38 Answers Step 3. | | |1 and 192.168.16.01/24 | | | | | Step 5. |Show IP route connected command/ see no connection routes | | | | | | | Step 6: |172.30.10.2 / has no IP address admin down | | | | ...

Words: 1716 - Pages: 7

Free Essay

Nt2640

...Employ automated tools to continuously monitor workstations, servers, and mobile devices for active, up-to-date anti-malware protection with anti-virus, anti-spyware, personal firewalls, and host-based IPS functionality. All malware detection events should be sent to enterprise anti-malware administration tools and event log servers. The endpoint security solution should include zero-day protection such as network behavioral heuristics. Employ anti-malware software and signature auto-update features or have administrators manually push updates to all machines on a daily basis. After applying an update, automated systems should verify that each system has received its signature update. Configure laptops, workstations, and servers so that they will not auto-run content from USB tokens (i.e., "thumb drives"), USB hard drives, CDs/DVDs, Firewire devices, external serial advanced technology attachment devices, mounted network shares, or other removable media. If the devices are not required for business use, they should be disabled. Configure systems so that they conduct an automated anti-malware scan of removable media when it is inserted. All e-mail attachments entering the organization's e-mail gateway should be scanned and blocked if they contain malicious code or file types unneeded for the organization's business. This scanning should be done before the e-mail is placed in the user's inbox. This includes e-mail content filtering and web content filtering. Apply anti-virus...

Words: 279 - Pages: 2

Free Essay

Nt2640

...NT1430 Linux Networking STUDENT COPY: Assignment 1 for All Units Assignment 1 for All Units: Chapter Exercises (NT1430.GA1) Learning Objectives and Outcomes Each unit exercise covers the Learning Objectives and Outcomes for that unit. You can review those objectives and outcomes in your syllabus. Assignment Requirements Type out answers for the end-of-chapter exercise questions indicated in the list below for each unit. You will be graded on accuracy and completeness. Required Resources Sobell, M. G. (2012). A practical guide to Fedora and Red Hat Enterprise Linux. (6 ed.). Upper Saddle River, NJ: Prentice Hall. th Submission Requirements Submit your word-processed answers to your instructor at the beginning of the next class after the assignment. Units 1-10 Chapter Exercises Unit 1 § § § § Unit 2 § § Unit 3 § § § Unit 4 § § Sobell, Chapter 14, p. 582, Exercises 1-5 Sobell, Chapter 10, p. 403, Exercise 1 Sobell, Chapter 7, pp. 251, Exercises 1, 3, 4, 8 Sobell, Chapter 9, pp. 356, Exercises 1, 2, 3, 4, 5, 6, 8 Sobell, Chapter 9, pp. 357, Advanced Exercises 10, 11 Sobell, Chapter 5, p. 182, Exercises 1, 3, 4, 8, 10 Sobell, Chapter 6, p. 221, Exercises 1, 2, 3, 4, 6 Chapter 1, pp. 20-21, Exercises 1, 4 Chapter 2, p. 53, Exercise 1 Chapter 3, p. 86, Exercises 1, 4, 8 Chapter 11, p. 498, Exercises 1, 3, 7 © ITT Educational Services, Inc. All Rights Reserved. -118- Change Date: 05/30/2012 NT1430 Linux Networking STUDENT COPY: Assignment 1 for All...

Words: 403 - Pages: 2

Premium Essay

Nt2640

...EIGRP Vs OSPF EIGRP - Is an advanced distance-vector routing protocol, with optimizations to minimize both the unstable route incurred after topology changes, as well as the use of bandwidth and processing power in the router. Routers supporting EIGRP will automatically redistribute route information to IGRP neighbors by converting the 32 bit EIGRP metric to the 24 bit IGRP metric. Most of the routing optimizations are based on the Diffusing Update Algorithm (DUAL) work from SRI, which guarantees loop-free operation and provides a mechanism for fast convergence. IGRP is created by Cisco. OSPF - Open Shortest Path First (OSPF) is a link-state routing protocol for IP networks.   It uses a link state routing algorithm and falls into the group of interior routing protocols, operating within a single autonomous system (AS). OSPF is the most widely used interior gateway protocol (IGP) in large enterprise networks. OSPF is a trusted Cisco course-plotting method that creates managing big systems achievable. OSPF represents "Open Least Route 1st. inch this smallest journey would be the one particular with the cheapest. OSPF uses a metric to look for the volume of over head it'd price tag to be able to post info spanning a presented interface. This course-plotting criterion makes use of this specific metric to choose the most efficient journey in between resource and getaway. Determining your metric, or maybe price tag, yourself can be executed simply using a basic working out...

Words: 361 - Pages: 2

Premium Essay

Nt2640

...1. Cut-through frame processing by a switch allows the switch to discard frames that fail the FCS check. - False 2. When a switch receives an Ethernet frame to a destination MAC address which is not in the devices MAC address table the switch applies the following logic - Floods the Ethernet frame out all interfaces except the received interface 3. Which of the following correctly describes the collision domain design trade-offs? - Single collision domain requires all devices on a segment to share the available bandwidth 4. When setting local cisco switchport to initiate the negotiation of a trunk link with the remote switch, the administrative mode is referred to as - Dynamic desirable 5. Which component of IPv6 neighbor discovery replaces the capabilities of ARP? - Neighbor solicitation 6. Which of the UTP cabling is required to connect to hosts back-to-back? - Cross-over 7. Which type of ICMP message will be rerouted to host by a remote router if that router does not have a route to a network? - Destination Unreachable – Code Network Unreachable 8. Which Cisco IOS show command aids in the troubleshooting of routing protocols by displaying information on which protocols is enabled and as well as passive interfaces? - Show ip protocols 9. IPv6 broadcast addresses are used in a similar manner to IPv4 broadcast addresses. - False 10. Inverse ARP in Frame Relay provides - mapping of Layer 3 addresses and the layer 2 addresses 11. Which one of the following is...

Words: 1118 - Pages: 5

Free Essay

Nt2640 Cisco Routers

...NT2640 Cisco Routers Richard P Walsh 11/24/2015 Cisco routers come in various series and models. Each series and model has different purposes and performance levels for the tasks required of them. For the purpose of this report, I chose 1 model from the 3 main series. The first is the Cisco 1861, then the Cisco 2811, & finally the Cisco 3845 The Cisco 1861 is an Integrated Service Router, that has an integrated, managed Ethernet switch, and has eight 10/100 PoE ports. It is an All-in-One unified communications solution, which integrates voice, data, security, and video into one platform. The Cisco 1861 can be easily expanded by attaching a Cisco recommended Catalyst Portfolio of switches. The Cisco 1861 eliminates the cost of adding multiple servers and provides a lower price solution that is easy to set up and manage. Cisco IOS Software security feature is also an option that can be activated with hardware-based encryption on the motherboard and provides a variety of security features such as a Firewall, IP Security, and an Advanced Encryption Standard, just to name a few. This router is highly recommended for SBMs and small branch enterprises consisting of eight to fifteen employees. Some of the specifications are; DRAM * Cisco IOS Software – 256 MB * Voice Messaging – 512 MB Compact Flash Memory * Cisco IOS Software – 128 MB * Voice Messaging – 1 GB, Compact Flash Onboard Ethernet Ports * 1 10/100 Fast Ethernet * 8 10/100-Mbps LAN ...

Words: 561 - Pages: 3

Premium Essay

Nt2640 Midterm

...NTNT2640 IP Networking Midterm Люда Григорашенко Fri Apr 25 17:29:25 CDT 2014 Which two of the following are Layer 2 protocols commonly used in WANs? PPP and HDLC Which of the following describes a collision domain? Devices connected to an Ethernet hub Which of the following protocol operates at the OSI model Transport Layer?  UDP What process is used by a DNS server to add a UDP header to the contents of a DNS query response, followed by adding an IP header, and then adding a data link header and trailer is an example of what? Data Encapsulation  The term autonomous system (AS) refers to the collection of metrics for routes to a particular network. False Given the 5 bits of a subnet mask for the host portion of an IP addresses are available? 30 The interface type at the demark for a DS1/T1 circuit at is ____. RJ-48 Given the following routing table on a router, which next hop will the router select given the IP packet with the destination address of: 19.48.254.3 Router 2 Which address below belongs to the Class A network range? 126.254.1.45 Which of the following dynamic routing protocols is an exterior gateway protocol? BGP Out of the following which does a router normally use when making a decision about routing an IP packet? Destination IP Adress How many bits comprise the network portion of a Class C address? 24 A broadcast address is an address that only a single host listens to on the network. False How many usable host addresses are available...

Words: 791 - Pages: 4

Premium Essay

Nt2640 Project Paper

...Kelly Keys NT2640 Fri. Night Project Paper 1. Routing tables and how the router will perform a route lookup: a. Routing Table Format- A routing table is used by TCP/IP network routers to calculate the destinations of messages it is responsible for forwarding. The table is a small in-memory database managed by the router's built-in hardware and software. Each IP address identifies a remote router (or other network gateway) that the local router is configured to recognize. For each IP address, the routing table additionally stores a network mask and other data that specifies the destination IP address ranges that remote device will accept. Home network routers utilize a very small routing table because they simply forward all outbound traffic to the Internet Service Provider (ISP) gateway which takes care of all other routing steps. Home router tables typically contain ten or fewer entries. By comparison, the largest routers at the core of the Internet backbone must maintain the full Internet routing table that exceeds 100,000 entries and growing as the Internet expands. b. Routing Lookup Mechanism- c. Classful vs. Classless Routing- Classful Routing, which is sometimes called a classful network. If you are using a classful routing protocol then all of your networks are in different classes and are separated by a router. Remember that the useable IPv4 address ranges are divided into classes. Class A 1-126, Class B 128-191, and Class C 192-223. So when we talk about...

Words: 3788 - Pages: 16

Premium Essay

Nt2640 Lab 4.1

...ICND1 Skill Builders Part 3: IP Addressing, Routing, and WANs Lab 5: Connected Routes Overview In this lab, you’ll learn how to use and interpret the show ip route connected command. You’ll begin with R1’s interfaces fully configured. R2’s interfaces are partially configured and both are shut down. You’ll bring them up and see the effects. Topology S0/0/0 R1 Fa0/0 S0/0/1 R2 Fa0/0 Fa0/11 SW1 Fa0/1 Fa0/1 SW2 Fa0/2 PC1 PC2 Figure 1 Network Topology for This Lab Detailed Lab Steps Step 1. Step 2. Connect to R1 from the simulator user interface; use password ciscopress. Enter privileged exec mode by issuing the enable command; use password ciscopress. page 1 © 2009 Pearson Education, Inc. All rights reserved. This publication is protected by copyright. Step 3. Issue the show ip route connected command and view the output. How many connected routes do you see? Which ones are they? 0 Step 4. Connect to R2 from the simulator user interface and enter privileged exec mode using the enable command. All passwords are ciscopress. Repeat Step 3 on R2. How many connected routes do you see? Which ones are they? 0 Step 5. Step 6. Use the show ip interface brief command. Is there an IP address listed for interface S0/0/1? Interface Fa0/0? yes no Routers cannot add a connected route to the routing table unless the interface is in an “up and up” state. The following steps enable R2’s two interfaces: Step 7. Move into interface...

Words: 647 - Pages: 3

Premium Essay

Nt2640 Week 4

...Chapter 11 Answer the following review questions. 1. Imagine that you have configured the enable secret command, followed by the enable password command, from the console. You log out of the switch and log back in at the console. Which command defines the password that you had to enter to access privileged mode? d. The password command, if it’s configured 2. An engineer had formerly configured a Cisco router to allow Telnet access so that the switch expected a password of mypassword from the Telnet user. The engineer then changed the configuration to support Secure Shell. Which of the following commands could have been part of the new configuration? C. A transport input ssh command in vty config mode 3. The following command was copied and pasted into configuration mode when a user was telnetted into a Cisco router: Banner login this is the login banner Which of the following are true about what occurs the next time a user logs in from the console? D. The banner text “Login banner configured, no text defined” is displayed. 4. Which of the following features would you typically expect to be associated with the router CLI, but not with the switch CLI? C. The ip address dhcp command 5. You just bought two Cisco routers for use in a lab, connecting each router to a different LAN switch with their Fa0/0 interfaced. You also connected the two routers’ serial interfaces using a back-to-back cable. Which of the following steps is not required to be able to forward...

Words: 1179 - Pages: 5

Premium Essay

Nt2640 Unit 2 Discussion

...IP Addressing & Routing Activity Name: _ Overview: As part of your assigned readings and material covered in your class lectures, you have learned the basics of IP addressing and routing. This in-class exercise will reinforce those concepts by having you determine if a host is on the same subnet as another host. Then using a simple routing table, you will select the most appropriate route for the router to select given the destination IP address. Resources: Textbook Lecture materials and notes Section 1 – IP Addressing and Subnet Assignment 1. Given the IP host address of 192.168.12.233 with the default class mask, which other host is on my directly connected network? a. 192.168.14.234 b. 192.168.11.230 c. 192.168.12.1 d. 192.168.12.257 e. None of the above 2. Given the IP host address of 10.28.2.45 with the default class mask, which other host is on my directly connected network? f. 10.29.2.48 g. 10.28.244.254 h. 10.1.34.44.89 i. 10.238.1.54 j. All of the above 3. Given the IP host address of 172.16.200.93 with the default class mask, which other host is on my directly connected network? k. 172.16.4.94 l. 172.15.3.66 m. 172.18.5.111 n. 172.45.100.230 o. All of the above 4. Given the IP host address of 129.01.20.43 with the default class mask, which other host is on my directly connected network? p. 129.02.88.122 q....

Words: 632 - Pages: 3

Free Essay

Nt2640 Networking Protocol Numbers

...Assignment 2: Network protocols numbers 1. What organization has been given the responsibility for assigning protocol numbers? ICANN – The Internet Corporation for Assigned Names and Numbers 2. Determine the protocol numbers for the protocol names: Protocol| Number| IPv4| 4| IPv6| 41| TCP| 6| UDP| 17| ICMP| 1| VRRP| 112| IPSEC ESP| 50| L2TP| 115| OSPF| 89| EIGRP| 88| 3. Determine the correct ICMP type based on the description provided: ICMP Message Description| Type| Code*| Echo| 8| | Echo Reply| 0| | Time Exceeded| 11| 0| Port Unreachable| 3| 3| Fragmentation Needed| 3| 4| 4. What are the valid ranges of protocol numbers? 0-65535 5. What protocol number(s) is/are specified for experimentation and testing? 253 and 254 6. What organization has been given the responsibility for assigning port numbers, sometimes referred to as “Well Known Ports or Registered Ports”? IANA 7. Determine the protocol numbers for the protocol names: Port| Application / Protocol| TCP -23| telnet| TCP -443| HTTPS| UDP -53| Domain name system| UDP -123| Network time protocol| TCP -110| Post office protocol v3| TCP -25| Simple mail transfer protocol| TCP -80| HTTP| UDP -88| kerberos| TCP -22| SSH| UDP -161| Simple network management| 8. What numeric range is commonly referred to as the “well-known ports”? 0 to 1024 9. What numeric port range is commonly used by clients in a client -> server communication session? 0 to 1023 10. What do you believe would be...

Words: 282 - Pages: 2

Free Essay

Nt2640 Unit 5 Assignment 1

...EIGRP OSPF Advanced Distance Vector Link State Dual algorithm SPF/Dijkastra Routes IP, IPX, Decnet, Appletalk Routes IP Metrics: Bandwidth, Delay, Reliability, Load, MTU Size Metric: Composite Cost of each router to Destination (100,000,000/interface speed) Hop Count: 255 Hop Count: None (Limited by Network) Variable Length Subnet Masks Variable Length Subnet Masks Summarization on Network Class Address or Subnet Boundary Summarization on Network Class Address or Subnet Boundary LSA Multicast Address: 224.0.0.10 LSA Multicast Address: 224.0.0.5 and 224.0.0.6 (DR/BDR) Don't Filter! Historical Significance EIGRP: • Developed by cisco in the 90’s to improve IGRP, which had a lot of room for improvement and it also is more simpler to configure (per Cisco) Historical Significance OSPF SPF: • Shortest path (least cost), making sure that routing loops don’t occur Significance of Interoperability: • It is a huge deal in today’s time as much data gets exchanged, and considering OSPF it supports new technology while EIGRP doesn’t. Sources: http://www.networkworld.com/article/2347622/cisco-subnet/eigrp-vs-ospf.html...

Words: 311 - Pages: 2

Premium Essay

Nt2640 Ip Networking Lab 7

...Lab 7.1 routing analysis 3 Step 2. Again on each PC, ping the IP address of each PC’s respective default gateway. Record whether the ping worked or not in Table 5. Each ping to the PC has worked to the default gateway. Step 3. From each PC, ping the IP address of the other three PCs. Record the results of each ping in Table 6 with a check mark for a successful ping and an X for a failed ping. None of the PC’s pinged to the other pc’s. Step 5. From each router’s user mode command prompt, ping the IP addresses of each other router. Make notes about which IP addresses can be pinged from each router. Each router has pinged the other routers IP’s on the common LAN subnet but none of the pings worked from a router to each others routers. Step 6. Use the show ip route and show ip routes ospf commands to examine each router’s routing tables. Do any of the four routers know any routes other than connected routes? Do any of the routers know any OSPF-learned routes? None of the routers have any OSPF routes. This is one of the reasons why the PC’s cant ping the other routers. Step 7. From each router, use the show ip ospf neighbor command to discover with which other routers each router has formed a neighbor relationship. List the router pairs that have formed any kind of neighbor relationship on the lines below. None of the routers have OSPf neighbor relationships with the other routers. Step 8. From each router, use the show ip ospf interface command to list the interfaces on which...

Words: 795 - Pages: 4