...NT2640 IP Networking INSTRUCTOR GUIDE Onsite Credit hours: 4.5 Contact /Instructional hours: 34 Theory, 22 Lab Prerequisite: NT1210 Introduction to Networking or equivalent Course Revision Table Change Date Updated Section Change Description Change Rationale Implementation Quarter 07/18/2011 All New Curriculum New Curriculum September 2011 02/19/2013 All Updated labs across the course to map the 2nd edition of lab manual Immediately 02/27/2013 Midterm and Final Examination Answer Keys Added examination keys Immediately 03/18/2013 Answer Keys for Midterm and Final Updated some answers to address the accuracy March 2013 04/19/2013 Assignment labels on Pages 43, 52, 61, 78, 87, 97, 106 and 132. Added labels to identify additional assignments in affected units Clarification of additional assignments March 2013 Table of Contents COURSE OVERVIEW 5 Catalog Description 5 Goals and Expectations 5 Learning Objectives and Outcomes 6 Career Impact 6 INSTRUCTIONAL RESOURCES 7 Required Resources 7 Additional Resources 7 COURSE MANAGEMENT 9 Technical Requirements 9 Test Administration and Processing 9 Replacement of Learning Assignments 10 Communication and Student Support 10 Academic Integrity 10 GRADING 11 COURSE DELIVERY 13 Instructional Approach 13 Methodology 13 Facilitation Strategies 14 UNIT PLANS 15 Unit 1: The TCP/IP Model, LANs, WANs, and IP Networks 15 Unit 2: TCP/IP Network, Transport...
Words: 22068 - Pages: 89
...Technical Institute NT1210 Introduction to Networking Onsite Course SYLLABUS Credit hours: 4.5 Contact/Instructional hours: 56 (34 Theory Hours, 22 Lab Hours) Prerequisite(s) and/or Corequisite(s): Prerequisites: NT1110 Computer Structure and Logic or equivalent Course Description: This course serves as a foundation for the study of computer networking technologies. Concepts in data communications, such as signaling, coding and decoding, multiplexing, circuit switching and packet switching, OSI and TCP/IP models, LAN/WAN protocols, network devices and their functions, topologies and capabilities are discussed. Industry standards and the development of networking technologies are surveyed in conjunction with a basic awareness of software and hardware components used in typical networking and internetworking environments Introduction to Networking Syllabus Where Does This Course Belong? This course is required for the associate program in Network System Administration and the associate program in Electrical Engineering Technology. The following diagrams demonstrate how this course fits in each program. Associate Program in Network Systems Administration NT2799 NSA Capstone Project NT2580 Introduction to Information Security NT2670 Email and Web Services NT2640 IP Networking PT2520 Database Concepts NT1330 Client-Server Networking II NT1230 Client-Server Networking I NT1430 Linux Networking PT1420 Introduction to Programming NT1110...
Words: 4400 - Pages: 18
...Technical Institute NT1210 Introduction to Networking Onsite Course SYLLABUS Credit hours: 4.5 Contact/Instructional hours: 56 (34 Theory Hours, 22 Lab Hours) Prerequisite(s) and/or Corequisite(s): Prerequisites: NT1110 Computer Structure and Logic or equivalent Course Description: This course serves as a foundation for the study of computer networking technologies. Concepts in data communications, such as signaling, coding and decoding, multiplexing, circuit switching and packet switching, OSI and TCP/IP models, LAN/WAN protocols, network devices and their functions, topologies and capabilities are discussed. Industry standards and the development of networking technologies are surveyed in conjunction with a basic awareness of software and hardware components used in typical networking and internetworking environments Introduction to Networking Syllabus Where Does This Course Belong? This course is required for the associate program in Network System Administration and the associate program in Electrical Engineering Technology. The following diagrams demonstrate how this course fits in each program. Associate Program in Network Systems Administration NT2799 NSA Capstone Project NT2580 Introduction to Information Security NT2670 Email and Web Services NT2640 IP Networking PT2520 Database Concepts NT1330 Client-Server Networking II NT1230 Client-Server Networking I NT1430 Linux Networking PT1420 Introduction to Programming NT1110...
Words: 4400 - Pages: 18
...Syllabus NT1210 Introduction to Networking SYLLABUS Credit hours: 4.5 Contact/Instructional hours: 56 (34 Theory, 22 Lab) Prerequisite: NT1110 Computer Structure and Logic or equivalent © ITT Educational Services, Inc. All Rights Reserved. -1- 05/08/2013 Introduction to Networking SYLLABUS COURSE SUMMARY COURSE DESCRIPTION This course serves as a foundation for the study of computer networking technologies. Concepts in data communications, such as signaling, coding and decoding, multiplexing, circuit switching and packet switching, OSI and TCP/IP models, LAN/WAN protocols, network devices and their functions, topologies and capabilities are discussed. Industry standards and the development of networking technologies are surveyed in conjunction with a basic awareness of software and hardware components used in typical networking and internetworking environments. MAJOR INSTRUCTIONAL AREAS 1. Networking fundamentals 2. The OSI model and its use in networking 3. LANs, WANs, MANs and their implementation 4. Physical layer fundamentals 5. Basics of the data link layer 6. The functions of TCP/IP 7. IP addressing, subnetting, and supernetting 8. Diagramming the physical components that comprise a network 9. Logic created by the interconnectivity of network components 10. Applying network security 11. Future developments in networking COURSE OBJECTIVES 1. Explain key networking concepts and terminology. 2. Identify the advances...
Words: 4795 - Pages: 20
...CTI BEDFORDVIEW ITNT121 Assignment Networking Bradley Barker RJMMLYX21 9/12/2017 Networking Assignment Contents Question 1 1 Question 2 5 Question 3 42 marks 8 Bibliography 11 Question 1 Scenario Read the scenario below and answer the questions that follow: 1.1 You have been hired as a network expert to design and configure this network. Design an appropriate IP addressing scheme for Big Data College. For each subnet provide the following: (8 marks) a. Subnet address b. First IP address c. Last IP address d. Broadcast address Subnet Address First host Last Host Broadcast Lab 1 218.35.50.0 218.35.50.1 218.35.50.62 218.35.50.63 Lab 2 218.35.50.64 218.35.50.65 218.35.50.126 218.35.50.127 Lab 3 218.35.50.128 218.35.50.129 218.35.50.190 218.35.50.191...
Words: 824 - Pages: 4
...ITT TECHNICAL INSTITUTE NT1210 Introduction to Networking Onsite Course GRADED ASSIGNMENTS Graded Assignment Requirements Retain all handouts issued in every unit, as well as any assignment, research, or lab documents you prepare as part of assignments and labs. Some may be used more than once in different units. NOTE: Always check with your instructor for specific due dates of assignments. Graded Assignments Unit 1 Assignment 1: Computer Basics Review Course Objectives and Learning Outcomes Identify the major needs and major stakeholders for computer networks and network applications. Describe how digital devices store data. Describe the differences between input and output devices. Assignment Requirements In the Chapter Review Activities at the end of Chapter 1 in the Odom textbook (answers can be found in the textbook): Respond to the multiple-choice questions. Complete the List the Words inside Acronyms table. Required Resources Odom textbook Computer with word processing software Internet access Printer Submission Requirements: Submit your responses as a typed document using Arial or Times New Roman 12-point font, double-spaced. Label your assignment Unit 1 Assignment 1. Unit 2 Assignment 1: Identifying Network Topologies Course Objectives and Learning Outcomes * Identify the major needs and major stakeholders for computer networks and network applications. * Identify the classifications of networks and how they are...
Words: 16182 - Pages: 65
...ITT TECHNICAL INSTITUTE NT1210 Introduction to Networking Onsite Course GRADED ASSIGNMENTS Graded Assignment Requirements Retain all handouts issued in every unit, as well as any assignment, research, or lab documents you prepare as part of assignments and labs. Some may be used more than once in different units. NOTE: Always check with your instructor for specific due dates of assignments. Graded Assignments Unit 1 Assignment 1: Computer Basics Review Course Objectives and Learning Outcomes * Identify the major needs and major stakeholders for computer networks and network applications. * Describe how digital devices store data. * Describe the differences between input and output devices. Assignment Requirements In the Chapter Review Activities at the end of Chapter 1 in the Odom textbook (answers can be found in the textbook): * Respond to the multiple-choice questions. * Complete the List the Words inside Acronyms table. Required Resources * Odom textbook * Computer with word processing software * Internet access * Printer Submission Requirements: Submit your responses as a typed document using Arial or Times New Roman 12-point font, double-spaced. Label your assignment Unit 1 Assignment 1. Unit 2 Assignment 1: Identifying Network Topologies Course Objectives and Learning Outcomes * Identify the major needs and major stakeholders for computer networks and network applications. * Identify the...
Words: 16043 - Pages: 65
...ITT TECHNICAL INSTITUTE NT1210 Introduction to Networking Onsite Course GRADED ASSIGNMENTS Graded Assignment Requirements Retain all handouts issued in every unit, as well as any assignment, research, or lab documents you prepare as part of assignments and labs. Some may be used more than once in different units. NOTE: Always check with your instructor for specific due dates of assignments. Graded Assignments Unit 1 Assignment 1: Computer Basics Review Course Objectives and Learning Outcomes * Identify the major needs and major stakeholders for computer networks and network applications. * Describe how digital devices store data. * Describe the differences between input and output devices. Assignment Requirements In the Chapter Review Activities at the end of Chapter 1 in the Odom textbook (answers can be found in the textbook): * Respond to the multiple-choice questions. * Complete the List the Words inside Acronyms table. Required Resources * Odom textbook * Computer with word processing software * Internet access * Printer Submission Requirements: Submit your responses as a typed document using Arial or Times New Roman 12-point font, double-spaced. Label your assignment Unit 1 Assignment 1. Unit 2 Assignment 1: Identifying Network Topologies Course Objectives and Learning Outcomes * Identify the major needs and major stakeholders for computer networks and network applications. * Identify the...
Words: 16043 - Pages: 65
...Syllabus College of Information Systems & Technology NTC/362 Version 1 Fundamentals of Networking Copyright © 2013 by University of Phoenix. All rights reserved. Course Description This course provides a foundation in the basic telecommunications and networking technologies fundamental to the industry and to the broad field of telecommunications. Analog, digital, and radio frequency technologies are covered. Also covered in this course is an introduction to the OSI protocol model, network-switching systems, basics of wireless communications, and network security. Policies Faculty and students/learners will be held responsible for understanding and adhering to all policies contained within the following two documents: · University policies: You must be logged into the student website to view this document. · Instructor policies: This document is posted in the Course Materials forum. University policies are subject to change. Be sure to read the policies at the beginning of each class. Policies may be slightly different depending on the modality in which you attend class. If you have recently changed modalities, read the policies governing your current class modality. Course Materials Goleniewski, L. (2007). Telecommunications essentials. (2nd ed.) Boston, MA: Pearson. Panko, R. R., & Panko, J. L. (2011). Business data networks and telecommunication (8th ed.) Upper Saddle River, NJ: Prentice Hall All electronic materials...
Words: 2225 - Pages: 9
...BSISS Project The following diagram demonstrates how this course fits in the program: IS4799 NT2799 IS4670 ISC Capstone Project Capstone ProjectCybercrime Forensics NSA NT2580 NT2670 Introduction to Information Security IS4680 IS4560 NT2580 NT2670 Email and Web Services Hacking and Introduction to Security Auditing for Compliance Countermeasures Information Security Email and Web Services NT1230 NT1330 Client-Server Client-Server Networking I Networking II IS3230 IS3350 NT1230 NT1330 Issues Client-Server Client-Server SecurityContext in Legal Access Security Networking I Networking II NT1110 NT1210 Structure and Introduction to ComputerLogic Networking IS3120 IS3110 NT1210 Network Risk Management in Introduction to General Education / General Studies NT2580 NT2799 Communications Information Technology Introduction to Information Security NSANetworking Capstone Project IS4550 NT2640 Security Policies and Implementation IP NT2640 Networking IP Networking PT2520...
Words: 2305 - Pages: 10
...Chapter 1.0 1.1 1 1.2 1.3 1.4 1.5 1.6 1.7 1.8 1.9 2.0 2.1 2.2 2.3 2.4 2.5 2.6 Network Concepts (21 percent) Compare the layers of the OSI and TCP/IP models: OSI model (Layer 1 – Physical, Layer 2 – Data link, Layer 3 – Network, Layer 4 – Transport, Layer 5 – Session, Layer 6 – Presentation, Layer 7 – Application); TCP/IP model (Network Interface Layer, Internet Layer, Transport Layer, Application Layer [Also described as: Link Layer, Internet Layer, Transport Layer, Application Layer]) Classify how applications, devices, and protocols relate to the OSI model layers: MAC address; IP address; EUI-64; Frames; Packets; Switch; Router; Multilayer switch; Hub; Encryption devices; Cable; NIC; Bridge Explain the purpose and properties of IP addressing: Classes of addresses (A, B, C and D, Public vs. Private); Classless (CIDR); IPv4 vs. IPv6 (formatting); MAC address format; Subnetting; Multicast vs. unicast vs. broadcast; APIPA Explain the purpose and properties of routing and switching: EIGRP; OSPF; RIP; Link state vs. distance vector vs. hybrid; Static vs. dynamic; Routing metrics (Hop counts, MTU, bandwidth, Costs, Latency); Next hop; Spanning-Tree Protocol; VLAN (802.1q); Port mirroring; Broadcast domain vs. collision domain; IGP vs. EGP; Routing tables; Convergence (steady state) Identify common TCP and UDP default ports: SMTP – 25; HTTP – 80; HTTPS – 443; FTP – 20, 21; TELNET – 23; IMAP – 143; RDP – 3389; SSH – 22; DNS – 53; DHCP – 67, 68 Explain the function of common networking protocols:...
Words: 680 - Pages: 3
...Kelsie Imaduddin WAN Technology and Application Week 1 Homework Assignment 1.1 Vocab Exercise: Matching 13. o 14. x 15. u 16. b 17. e 18. p 19. g 20. i 21. c 22. k 23. s 24. m 13. o 14. x 15. u 16. b 17. e 18. p 19. g 20. i 21. c 22. k 23. s 24. m 1. n 2. h 3. v 4. j 5. q 6. r 7. i 8. a 9. i 10. w 11. d 12. f Concept Questions: 1. The most important function of the router is to direct the traffic of data across a network. It allow for the user to control the movement and flow of the data. Forwarding the data on it next destination is the destination is available, even filtering out certain data in some instances. 2. A default gateway in computer networking is the node that is assumed to know how to forward packets on to other networks. Typically in a TCP/IP network, nodes such as servers, workstations and network devices each have a defined default route setting, (pointing to the default gateway), defining where to send packets for IP addresses for which they can determine no specific route. The gateway is by definition a router. 3. In a WAN link the DTE is the local router handling traffic on the LAN. The DCE is the modem connecting to the telco and also provides the clock rate. These two devices together allow connection to the WAN 4. A router is a device that transfers and deciphers data between two networks. It identify traffic coming into and sending it where is needs to go. It was control the traffic heading out to the next device in the data’s path...
Words: 620 - Pages: 3
...ITECH1002 Assignment 1 Lecturer’s Name: Sanjay Jha ATMC Sydney Assignment has to be submitted online on Moodle on or before the due date. SUBJECT CODE: ITECH1004 SUBJECT TITLE: NETWORK OPERATING SYSTEM ASSIGNMENT NUMBER AND TITILE: 1- NETWORKING ASSIGNMENT WORD COUNT (IF APPLICABLE): 3274 DUE WEEK: WEEK-6 LAB/TUTORIAL GROUP: LAB 2 LECTURER: SANJAY JHA TUTOR: SANJAY JHA STUDENT ID (FedUni): 30314027 STUDENT FAMILY NAME: KIRAN STUDENT GIVEN NAMES: RIJAL I declare that this assignment is my individual work. I have not worked collaboratively nor have I copied from any other student’s work or from any other source except where due acknowledgement is made explicitly in the text, nor has any part been written for me by another person. I realize that the penalties may ensure for late submission or any other breaches of assignment rules. 1 20 December 2015 ITECH1002 Assignment 1 Lecturer’s Name: Sanjay Jha Kiran Rijal Student ID: 30314027 Contents 1. INTRODUCTION ................................................................................................................... 3 1.1 VIRTUALIZATION .................................................................................................................... 3 1.2 NUMBER SYSTEM .................................................................................................................. 3 CONVERSION .....................................................
Words: 3418 - Pages: 14
...GENERAL SIR JOHN KOTELAWALA DEFENCE UNIVERsity | Assignment 01 | Advanced Network and Security | | ICT/12/0121 WMIL Wasalage | 9/23/2013 | | Abstract This document contains a detailed explanation about the ISO OSI Reference Model used in networking and it also contains details about the networking devices used in setting up LANs & WANs. Abstract This document contains a detailed explanation about the ISO OSI Reference Model used in networking and it also contains details about the networking devices used in setting up LANs & WANs. Acknowledgement I would like to express my special thanks of gratitude to Mrs. Punsisi Premaratne who gave me this opportunity to do this project in the networking field. Secondly i would like to thank my parents and friends who helped me a lot in finalizing this project within the limited time frame. Acknowledgement I would like to express my special thanks of gratitude to Mrs. Punsisi Premaratne who gave me this opportunity to do this project in the networking field. Secondly i would like to thank my parents and friends who helped me a lot in finalizing this project within the limited time frame. Table of Contents Abstract 01 Acknowledgement 02 Table of Content 03 List of Figures 04 1.0 Introduction to ISO OSI Reference Model 05 1.1 Physical Layer 07 1.2 Data Link Layer 08 1.3 Network Layer 10 1.4 Transport Layer 11 ...
Words: 5991 - Pages: 24
...Static secure MAC addresses-These are manually configured by using the switchport port-security mac-address mac-address interface configuration command, stored in the address table, and added to the switch running configuration. Dynamic secure MAC addresses-These are dynamically configured, stored only in the address table, and removed when the switch restarts. Sticky secure MAC addresses-These are dynamically configured, stored in the address table, and added to the running configuration. If these addresses are saved in the configuration file, when the switch restarts, the interface does not need to dynamically reconfigure them. You can configure an interface to convert the dynamic MAC addresses to sticky secure MAC addresses and to add them to the running configuration by enabling sticky learning. To enable sticky learning, enter the switchport port-security mac-address sticky interface configuration command. When you enter this command, the interface converts all the dynamic secure MAC addresses, including those that were dynamically learned before sticky learning was enabled, to sticky secure MAC addresses. The interface adds all the sticky secure MAC addresses to the running configuration. The sticky secure MAC addresses do not automatically become part of the configuration file, which is the startup configuration used each time the switch restarts. If you save the sticky secure MAC addresses in the configuration file, when the switch restarts, the interface does not need...
Words: 9957 - Pages: 40