Upload
oliver-bc-sanchez
View
40
Download
1
Embed Size (px)
DESCRIPTION
Session plan for Network Administration
Citation preview
SESSION PLAN
Learning Outcome/s:
LO 1 Identify the benefits of computer networks and how they functionLO 2 Identify common threats to a network and threat-mitigation methodsLO 3 Identify and compare the Open System Interconnection (OSI) and TCP/IP layered models that control host-to-host communicationsLO 4 Describe IP address classification and how a host can obtain an addressLO 5 Describe the process that TCP uses to establish a reliable connectionLO 6 Describe the host-to-host packet delivery processLO 7 Describe how Ethernet operates at Layer 1 and Layer 2 of the OSI modelLO 8 Explain how to connect to an Ethernet LAN
A. INTRODUCTIONWhen you are building a network, the tasks and components can sometimes be overwhelming. The key to understanding how to build a computer network lies in understanding the foundations of network communications. The key to building a complex network involves gaining an understanding of the physical and logical components of a simple point-to-point network. To become proficient in networking, you must gain knowledge of why networks are built and the protocols used in modern network designs. This activity explores the basics of networking and provides a solid foundation on which to build a comprehensive knowledge of networking technology.
B. LEARNING ACTIVITIESLO 1 Identify the benefits of computer networks and how they functionLearning Content Methods Presentation Practice FeedbackWhat is a Network?
Sector: Information and Communication Technology
Qualification Title: Network Administration
Unit of Competency: Build a Simple Network
Module Title: Building a Simple Network
LectureOral PresentationGroup discussion
Read Chapter 1 page 4 on what is a network
Answer Oral Questionning
Answer Written Exam
Compare answer to Evidence Plan
Compare answer to Written Exam
Interpreting a Network Diagram
Network User Applications
Characteristics of a Network
Physical Versus Logical Topologies
Bus Topology
Star and Extended-Star Topologies
Ring Topologies
Mesh and Partial-Mesh Topologies
Connection to the Internet
Common physical Components of a Network
Read Chapter 1 on Page 5 re. common components of a network
Read Chapter 1 on Page 6 re. interpreting a network diagram
Resource-Sharing Functions and Benefits Read Chapter 1 on Page 7 re.
resource-sharing and benefits
Read Chapter 1 on Page 9 re. network user applications
The Impact of User Applications on the Network
Read Chapter 1 on Page 10 re. the impact of user application on the networkRead Chaper 1 on Page 11 re. characterictics of network
Read Chapter 1 on Page 12-13 re. physical vs. logical topologiesRead Chapter 1 on Page 14 re. bus topology
Read Chapter 1 on Page 15 re. Star and Extended Star Topologies
Read Chapter 1 on Page 17 re. Ring Topologies
Read Chapter 1 on Page 18 re. Mesh and Partial-Mesh Topologies
Read Chapter 1 on Page 20 re. Connection to the Internet
LO 2 Identify common threats to a network and threat-mitigation methodsSecuring the Network
Need for Network Security
Mitigating Common Threats
LO 3 Identify and compare the Open System Interconnection (OSI) and TCP/IP layered models that control host-to-host communicationsOSI Reference Model
Data Communications Process
LectureOral PresentationGroup discussion
Read Chapter 1 of Page 21 re. importance of securing the network
Answer Oral Questionning
Answer Written Exam
Compare answer to Evidence Plan
Compare answer to Written Exam
Read Chapter 1 of Page 22-24 about the needs for securing the network
Balancing Network Security Requirements
Read Chapter 1 of Page 25 about balancing network security requirements
Adversaries, Hacker Motivations, and Classes of Attack
Read Chapter 1 page 26 about Adversaries, Hackers, Motivations, and Classess of Attacks
Read Chapter 1 of Page 28-30 about Mitigation
LectureOral PresentationGroup discussion
Read Chapter 1 of Page 31-36 about Understanding Host-to-Host Communication Model
Answer Oral Questionning
Answer Written Exam
Compare answer to Evidence Plan
Compare answer to Written Exam
Read Chapter 1 of Page 36-38 about Data Communication Process
Peer-to-Peer Communication
The TCP/IP Protocol Stack
OSI Model Versus TCP/IP Stack
LO 4 Describe IP address classification and how a host can obtain an addressIP Network Addressing
LO 5 Describe the process that TCP uses to establish a reliable connectionThe Transport Layer
TCP/IP Applications
Transport Layer Functionality
LO 6 Describe the host-to-host packet delivery process
Read Chapter 1 of Page 39 about Peer-to-Peer Communications
Read Chapter 1 of Page 40 about TCP/IP Protocol Stack
Read Chapter 1 of Page 41 about OSI Model vs TCP/IP Stack
LectureOral PresentationGroup discussionGroup workAssignments
Read Chapter 1 of Page 44-59 about Understanding TCP/IP's Internet Layer
Answer Oral Questionning
Answer Written Exam
Compare answer to Evidence Plan
Compare answer to Written Exam
LectureOral PresentationGroup discussion
Read Chapter 1 of Page 63-66 about Transport Layer
Answer Oral Questionning
Answer Written Exam
Compare answer to Evidence Plan
Compare answer to Written Exam
Read Chapter 1 of Page 67-68 about TCP/IP Application
Read Chapter 1 of Page 69-83 about Functionality of a Transport Layer
Layer 1 Devices and Their Functions
Layer 2 Devices and Their Functions
Layer 2 Addressing
Layer 3 Devices and Their Functions
Layer 3 Addressing
ARP Table
Host-to-Host Packet Delivery
Function of the Default Gateway
LO 7 Describe how Ethernet operates at Layer 1 and Layer 2 of the OSI model
LectureOral PresentationGroup discussion
Read Chapter 1 of Page 84 about Layer 1 Devices & Functions
Answer Oral Questionning
Answer Written Exam
Compare answer to Evidence Plan
Compare answer to Written Exam
Read Chapter 1 of Page 85 about Layer 2 Devices & Functions
Read Chapter 1 of Page 86 about Layer 2 Addressing
Read Chapter 1 of Page 86 about Layer 3 Devices & Functions
Read Chapter 1 of Page 86 about Layer 3 Addressing
Mapping Layer 2 Addressing to Layer 3 Addressing
Read Chapter 1 of Page 87 about Mapping Layer 2 & 3 Addressing
Read Chapter 1 of Page 88 about ARP Table
Read Chapter 1 of Page 89-98 about Host-to-Host Delivery
Read Chapter 1 of Page 98 about Default Gateway
Using Common Host Tools to Determine the Path Between Two Hosts Across a Network
Read Chapter 1 of Page 99 about Common Tools
The Definition of a LAN
Components of a LAN
Functions of a LAN
How Big Is a LAN
Ethernet
Ethernet LAN Standards
The Role of CSMA/CD in Ethernet
Ethernet Frames
Ethernet Frame Addressing
Ethernet Addresses
LectureOral PresentationGroup discussion
Read Chapter 1 of 104 about Defining the LAN
Answer Oral Questionning
Answer Written Exam
Compare answer to Evidence Plan
Compare answer to Written Exam
Read Chapter 1 of Page 105 about Components of LAN
Read Chapter 1 of Page 106 about Function of LAN
Read Chapter 1 of Page 107 about How Big is LAN
Read Chapter 1 of Page 108 about Ethernet
Read Chapter 1 of Page 108 about Ethernet Standards
Read Chapter 1 of Page 109-111 about the Role of CSMA/CD
Read Chapter 1 of Page 111 about Ethernet Frames
Read Chapter 1 of Page 112 about Ethernet Frame Addressing
Read Chapter 1 of Page 113 about Ethernet Addresses
MAC Addresses and Binary-Hexadecimal Numbers
Read Chapter 1 of Page 113 about MAC Address & Binary-Hexadecimal Numbers
LO 8 Explain how to connect to an Ethernet LANEthernet Network Interface Cards
Connection Media
Unshielded Twisted-Pair Cable
UTP Implementation
LectureOral PresentationGroup discussion
Read Chapter 1 of Page 115 about Connecting to an Ethernet LAN
Answer Oral Questionning
Answer Written Exam
Compare answer to Evidence Plan
Compare answer to Written Exam
Ethernet Media and Connection Requirements
Read Chapter 1 of Page 116 about Ethernet Media & Connection Requirements
Read Chapter 1 of Page 116 about Connection Media
Read Chapter 1 of Page 118 about UTP Cable
Read Chapter 1 of Page 119 about UTP Implementation
SESSION PLAN
Learning Outcome/s:
LO 1 Identify switched LAN technology solutions to Ethernet networking issuesLO 2 Describe the host-to-host packet delivery process through a switchLO 3 Describe the features and functions of the Cisco IOS Software command-line interface (CLI)LO 4 Start an access layer switch and use the CLI to configure and monitor the switchLO 5 Enable physical, access, and port-level security on a switchLO 6 List the ways in which an Ethernet LAN can be optimizedLO 7 Describe methods of troubleshooting switch issues
A. INTRODUCTIONThis chapter describes the various types of Ethernet LAN topologies, details the challenges of shared LANs and how those challenges are solved with switched LAN technology, and describes ways in which LANs can be optimized.
B. LEARNING ACTIVITIESLO 1 Identify switched LAN technology solutions to Ethernet networking issuesLearning Content Methods Presentation Practice Feedback
Sector: Information and Communication Technology
Qualification Title: Network Administration
Unit of Competency: Ethernet LANs
Module Title: Understanding the Challemges of Shared LANs
Ethernet LAN Segments
Extending a LAN Segment
Collisions
Collision Domains
LO 2 Describe the host-to-host packet delivery process through a switchLayer 2 Addressing
Layer 3 Addressing
Host-to-Host Packet Delivery
LO 3 Describe the features and functions of the Cisco IOS Software command-line interface (CLI)
LectureOral PresentationGroup discussion
Read Chapter 2 of Page 139-140 about Challenges of Shared LANs
Answer Oral Questionning
Answer Written Exam
Compare answer to Evidence Plan
Compare answer to Written Exam
Read Chapter 2 of Page 141 about Extending LAN Segment
Read Chapter 2 of Page 141 about the Collisions
Read Chapter 2 of Page 142 aboutCollision Domains
LectureOral PresentationGroup discussion
Read Chapter 2 of Page 144 about Addressing in Layer 2
Answer Oral Questionning
Answer Written Exam
Compare answer to Evidence Plan
Compare answer to Written Exam
Read Chapter 2 of Page 145 about Addressing in Layer 3
Read Chapter 2 of Page 145 about Host-to-Host Packet Delivery
Configuring Network Devices
External Configuration Sources
Entering the EXEC Modes
Keyboard Help in the CLI
Enhanced Editing Commands
Command History
LO 4 Start an access layer switch and use the CLI to configure and monitor the switch
Cisco IOS Software Features and Functions
LectureOral PresentationSimulation ActivitiesDemonstrationLaboaratory Work
Read Chapter 2 of Page 151 about Cisco IOS Features and Functions
Trainer will demonstrate the use and functions of IOS Commands
Answer Oral Questionning
Answer Written Exam
Compare answer to Evidence Plan
Compare answer to Written Exam
Read Chapter of Page 152 about Configuring Network Devices
Perform Task Sheet 2-1
Evaluate work based on Perfomance Checklist 2-1
Read Chapter of Page 153 of Page 153 about External Configuration Source
Cisco IOS Command-Line Interface Functions
Read Chapter 2 of Page 154 about IOS Command Line
Read Chapter 2 of Page 155 about EXEC Mode
Read Chapter 2 of Page 156-158 about Help in CLI
Read Chapter 2 of Page 159 about Editing Commands
Read Chapter 2 of Page 160 about Command History
Switch LED Indicators
Logging In to the Switch
MAC Address Table Management
LO 5 Enable physical, access, and port-level security on a switch
Physical Startup of the Catalyst Switch
LectureOral PresentationSimulation ActivitiesDemonstrationLaboaratory Work
Read Chapter 2 of Page 163 about Starting a Catalyst Switch
Answer Oral Questionning
Answer Written Exam
Perform Initial Catalyst Switch Startup on Page 163
Compare answer to Evidence Plan
Compare answer to Written Exam
Evaluate work based on Page 163
Read Chapter 2 of Page 164 about Switch LED
Viewing Initial Bootup Output from the Switch
Read Chapter 2 of Page 166-167 about Initial Bootup
Perform Switch Configuration on Page 167
Evaluate work based on Page 167
Read Chapter 2 of Page 168 about Switch Logging
Configuring a Switch from the Command Line
Read Chapter 2 of Page 169 about Configuring Switch from CLI
Perform Switch Configuration on Page 169
Evaluate work based on Page 169
Showing the Switch Initial Startup Status
Read Chapter 2 of Page 170 about Switch Initial Startup Status
Perform Switch Configuration on Page 171-172
Evaluate work based on Page 171-172
Read Chapter 2 of Page 173 about Mac Address Table Management
Physical and Environmental Threats
Configuring Password Security
Configuring the Login Banner
Telnet Versus SSH Access
Port Security Configuration
Securing Unused Ports
LO 6 List the ways in which an Ethernet LAN can be optimizedMicrosegmentation
LectureOral PresentationSimulation ActivitiesDemonstrationLaboaratory Work
Read Chapter 2 of Page 175 about Physical and Environmental Threats
Answer Oral Questionning
Answer Written Exam
Compare answer to Evidence Plan
Compare answer to Written Exam
Read Chapter 2 of Page 175-177 about Configuring Security
Perform Password Security Configuration on Page 175-177
Compare Configuration on Page 175-177
Read Chapter 2 of Page 177 about Login Banner
Perform Steps on Page 177
Evaluate results on Page 177
Read Chapter 2 of Page 178 about Telnet vs SSH
Perform Step on Page 178
Compare results on Page 178
Read Chapter 2 of Page 178-181 about Port Security Configuration
Perform steps on Page 179-181
Evalaute results on Page 179-181
Read Chapter 2 of Page 182 about Securing Unused Ports
LectureOral PresentationSimulation ActivitiesDemonstrationLaboaratory Work
Read Chapter 2 of Page 182 about Microsegmentation
Answer Oral Questionning
Answer Written Exam
Perform Task Sheet 2-2
Compare answer to Evidence Plan
Compare answer to Written Exam
Evaluate work based on Perfomance Sheet 2-2
Duplex Communication
LO 7 Describe methods of troubleshooting switch issuesUsing a Layered Approach
Read Chapter 2 of Page 183-186 about Duplex Communication
Perform Duplex Configuration on Page 185-186
Evaluate results on Page 185-186
Need for Different Media Rates in an Enterprise Network
Read Chapter 2 of Page 187 about Different Media Rates
Physical Redundancy in an Ethernet LAN
Read Chapter 2 of Page 187-189 about Physical Redundancy
Loop Resolution with Spanning Tree Protocol (STP)
Read Chapter 2 of Page 190 about Loop Resolution
Performa Task Sheet 2-3
Evaluate answer based on Performance Sheet 2-3
LectureOral PresentationSimulation ActivitiesDemonstrationLaboaratory Work
Read Chapter 2 of Page 192 about the Layered Approach
Answer Oral Questionning
Answer Written Exam
Compare answer to Evidence Plan
Compare answer to Written Exam
Identifying and Resolving Media Issues
Read Chapter 2 of Page 192 about Resolving Media Issues
Perform Configuration based on Page 192-193
Evaluate Result based on Page 192-193
Identifying and Resolving Common Access Port Issues
Read Chapter 2 of Page 194 about Common Port Issues
Identifying and Resolving Common Configuration Issues
Read Chapter 2 of Page 194 about Resolving Common Configuration Issues
SESSION PLAN
Learning Outcome/s:
LO 1 Describe the function of routing in the network modelLO 2 Convert a decimal number into a binary number and a binary number into decimal formatLO 3 Describe how IP constructs network addressesLO 4 Start a router and use the CLI to configure and monitor the routerLO 5 Implement a basic configuration for a Cisco routerLO 6 Describe the packet flow from one host to another through a routerLO 7 Implement basic router securityLO 8 Describe basic SDM featuresLO 9 Use SDM to enable a DHCP server on the routerLO 10 Remotely access a router using Telnet and SSH
A. INTRODUCTIONModule 3, “LAN Connections,” looks at how a router provides connectivity between the different networks in an internetwork. This module also describesIP addressing number conversion and basic routing configuration skills.
B. LEARNING ACTIVITIESLO 1 Describe the function of routing in the network modelLearning Content Methods Presentation Practice Feedback
Sector: Information and Communication Technology
Qualification Title: Network Administration
Unit of Competency: LAN Connections
Module Title: Connections Through LANs
Exploring the Functions of Routing
Routers
Path Determination
Routing Tables
Dynamic Routing Protocols
LO 2 Convert a decimal number into a binary number and a binary number into decimal formatDecimal and Binary Systems
Powers of 2
Decimal-to-Binary Conversion
LectureOral PresentationGroup discussion
Read Chapter 4 of Page 237-238 about the Function of a Router
Answer Oral Questionning
Answer Written Exam
Compare answer to Evidence Plan
Compare answer to Written Exam
Read Chapter 4 of Page 238 about Routers
Read Chapter 4 of Pge 239 about Path Determination
Read Chapter 4 of Page 240-241 about Routing Tables
Static, Dynamic, Directly Connected, and Default Routes
Read Chapter 4 of Page 242 about Statis, Dynamic, Directly Connected, & Default Routes
Read Chapter 4 of Page 242-244 about Dynamic Routing
LectureOral PresentationSimulation ActivitiesDemonstrationLaboaratory Work
Read Chapter 4 of Page 246-249 about Number System
Answer Oral Questionning
Answer Written Exam
Perform Calculation on Page 247-249
Compare answer to Evidence Plan
Compare answer to Written Exam
Compare Answer on Page 247-249
Read Chapter 4 of Page 249 about Powers of 2
Read Chapter 4 of Page 250 about Decimal-to-Binary Conversion
Performa calculation based on Page 250-251
Compare answer on Page 250
Binary-to-Decimal Conversion Read Chapter 4 of Page 251 about Binary-to-Decimal Conversion
Performa calculation based on Page 251-252
Compare answer on Page 251
LO 3 Describe how IP constructs network addressesSubnetworks
How End Systems Use Subnet Masks
How Routers Use Subnet Masks
Mechanics of Subnet Mask Operation
Applying Subnet Mask Operation
Class C Example
Class B Example
LectureOral PresentationSimulation ActivitiesDemonstrationLaboaratory Work
Read Chapter 4 of Page 252 about Subnetworks
Answer Oral Questionning
Answer Written Exam
Perform Calculation on Page 255
Compare answer to Evidence Plan
Compare answer to Written Exam
Compare Answer on Page 255
Computing Usable Subnetworks and Hosts
Read Chapter 4 of Page 255 about Computing Usable Subnetwork & Hosts
Perform Calculation on Page 255-258
Compare answer on Page 255-258
Read Chapter 4 of Page 258 about End System Using Subnet Masks
Read Chapter 4 of Page 259-260 about How Routers Use Subnet Masks
Read Chapter 4 of Page 261-262 about Mechanics of Subnet Masks
Perform calculation based on Page 262-263
Compare results on Page 262-263
Read Chapter 4 of Page 263 about Subnet Mask Operation
Perform calculations on Page 263-264
Compare results on Page 263-264
Determining the Network Addressing Scheme
Read Chapter 4 of Page 264 about Network Addressing Scheme
Perform calculations on Page 264-265
Compare results on Page 264-265
Read Chapter 4 of Page 265-266 about Example of Class C
Perform calculations based on Page 265-266
Compare answer on Page 267
Read Chapter 4 of Page 267 about Example of Class B
Perform calculation on Page 267-268
Compare answer on Page 268
Class A Example
LO 4 Start a router and use the CLI to configure and monitor the routerInitial Startup of a Cisco Router
Initial Setup of a Cisco Router
Logging In to the Cisco Router
LO 5 Implement a basic configuration for a Cisco routerCisco Router Configuration Modes
Read Chapter 4 of Page 268 about Example of Class A
Perform calculation based on Page 268-269
Compare answer on Page 270
LectureOral PresentationSimulation ActivitiesDemonstrationLaboaratory Work
Read Chapter 4 of Page 271 about Initial Startup of a Cisco Router
Answer Oral Questionning
Answer Written Exam
Perform steps on Page 271
Compare answer to Evidence Plan
Compare answer to Written Exam
Evaluate answer on Page 271-272
Read Chapter 4 of Page 272-278 about Initial Setup of a Cisco Router
Perform activities on Page 272-278
Compare answer based on Page 272-278
Read Chapter 4 of Page 279 about Cisco Router Logging
Perform steps on Page 280
Compare result based on Page 280
Showing the Router Initial Startup Status
Read Chapter 4 of Page 282 about Cisco Router Initial Startup Status
LectureOral PresentationSimulation ActivitiesDemonstrationLaboaratory Work
Read Chapter 4 of Page 283 about Configuration Modes
Answer Oral Questionning
Answer Written Exam
Perform steps on Page 285
Compare answer to Evidence Plan
Compare answer to Written Exam
Evaluate result on Page 285
Configuring a Cisco Router from the CLI
Read Chapter 4 of Page 285 about Configuring Cisco Router from CLI
Perform Step on Page 286
Evaluate result on Page 286
Configuring Cisco Router Interfaces
Verifying the Interface Configuration
LO 6 Describe the packet flow from one host to another through a routerLayer 2 Addressing
Layer 3 Addressing
Host-to-Host Packet Delivery
Using the show ip arp Command
Using Common Cisco IOS Tools
LO 7 Implement basic router securityPhysical and Environmental Threats
Read Chapter 4 of Page 287 about Configuring Cisco Router Interface
Perform steps on Page 287-288
Evaluate result on Page 287-288
Configuring the Cisco Router IP Address
Read Chapter 4 of Page 288 about Cisco Router IP Address
Perform steps on Page 288
Evaluate result on Page 288
Read Chapter 4 of Page 289 about Verifying Interface Configuration
Perform steps on Page 289
Evaluate results on Page 289-293
LectureOral PresentationGroup discussionDemonstration
Read Chapter 4 of Page 295 about Layer 2 Addressing
Answer Oral Questionning
Answer Written Exam
Compare answer to Evidence Plan
Compare answer to Written Exam
Read Chapter 4 of Page 295 about Layer 3 Addressing
Read Chapter 4 of Page 295 about Host-to-Host Packet Delivery
Read Chapter 4 of Page 302 about IP ARP Tool
Read Chapter 4 of Page 304 about Cisco IOS Tools
LectureOral PresentationSimulation ActivitiesDemonstrationLaboaratory Work
Read Chapter 4 of Page 305-306 about Physical and Environmental Threats
Answer Oral Questionning
Answer Written Exam
Compare answer to Evidence Plan
Compare answer to Written Exam
Configuring Password Security
Configuring the Login Banner
Telnet and SSH Access
LO 8 Describe basic SDM featuresCisco SDM Overview
More Link
Configuration Overview
Cisco SDM Wizards
LO 9 Use SDM to enable a DHCP server on the routerUnderstanding DHCP
Read Chapter 4 of Page 306 about Password Security
Read Chapter 4 of Page 307 about Login Banner
Read Chapter 4 of Page 307 about Telnet & SSH
Perform IOS Commands on Page 308
Evaluate results on Page 308
LectureOral PresentationSimulation ActivitiesDemonstrationLaboaratory Work
Read Chapter 4 of Page 309 about Cisco SDM
Answer Oral Questionning
Answer Written Exam
Compare answer to Evidence Plan
Compare answer to Written Exam
Configuring Your Router to Support Cisco SDM
Read Chapter 4 of Page 311 about Configuring Cisco SDM
Perform activities on Page 311-312
Evaluate results on Page 311-312
Read Chapter 4 of Page 314 about Links
Read Chapter 4 of Page 314 about Configuration Overview
Read Chapter 4 of Page 316 about Cisco SDM Wizards
LectureOral PresentationGroup discussion
Read Chapter 4 of Page 317-318 about DHCP
Answer Oral Questionning
Answer Written Exam
Compare answer to Evidence Plan
Compare answer to Written Exam
Monitoring DHCP Server Functions
Using a Cisco Router as a DHCP Server
Read Chapter 4 of Page 319 about DHCP Server
Using Cisco SDM to Enable the DHCP Server Function
Read Chapter 4 of Page 319 about Using SDM as DHCP Server
Read Chapter 4 of Page 321 about Monitoring DHCP Server
LO 10 Remotely access a router using Telnet and SSH
Closing a Telnet Session
Alternate Connectivity Tests
Establishing a Telnet or SSH Connection
LectureOral PresentationSimulation ActivitiesDemonstrationLaboaratory Work
Read Chapter 4 of Page 323 about Telnet or SSH Connection
Answer Oral Questionning
Answer Written Exam
Perform activity on Page 323
Compare answer to Evidence Plan
Compare answer to Written Exam
Evaluate answer on Page 323
Suspending and Resuming a Telnet Session
Read Chapter 4 of Page 325 about Telnet Session
Perform activity on Page 235-236
Evaluate answer on Page 235-236
Read Chapter 4 of Page about Closing a Telnet Session
Perform activity on Page 236
Evaluate answer on Page 236
Read Chapter 4 of Page 327 about Alternate Connectivity Tests
Perform activity on Page 237
Evaluate answer on Page 237
SESSION PLAN
When you are building a network, the tasks and components can sometimes be overwhelming. The key to understanding how to build a computer network lies in understanding the foundations of network communications. The key to building a complex network involves gaining an understanding of the physical and logical components of a simple point-to-point network. To become proficient in networking, you must gain knowledge of why networks are built and the protocols used in modern network designs. This activity explores the basics of networking and provides a solid foundation
Resources Time6hrs.Interconnecting Cisco
Network Devices Part 1 (ICND1)Multimedia ProjectorPDF FileEbookPrinter Material
3hrs.
LO 3 Identify and compare the Open System Interconnection (OSI) and TCP/IP layered models that control host-to-host communications3hrs.
Interconnecting Cisco Network Devices Part 1 (ICND1)Multimedia ProjectorPDF FileEbookPrinted Material
Interconnecting Cisco Network Devices Part 1 (ICND1)Multimedia ProjectorPDF FileEbookPrinted Material
6hrs.
3hrs.
Interconnecting Cisco Network Devices Part 1 (ICND1)Multimedia ProjectorPDF FileEbookPrinted Material
Interconnecting Cisco Network Devices Part 1 (ICND1)Multimedia ProjectorPDF FileEbookPrinted Material
6hrs.Interconnecting Cisco Network Devices Part 1 (ICND1)Multimedia ProjectorPDF FileEbookPrinted Material
3hrs.Interconnecting Cisco Network Devices Part 1 (ICND1)Multimedia ProjectorPDF FileEbookPrinted Material
3hrs.Interconnecting Cisco Network Devices Part 1 (ICND1)Multimedia ProjectorPDF FileEbookPrinted Material
SESSION PLAN
This chapter describes the various types of Ethernet LAN topologies, details the challenges of shared LANs and how those challenges are solved with switched
Resources Time
3hrs.
3hrs.
Interconnecting Cisco Network Devices Part 1 (ICND1)Multimedia ProjectorPDF FileEbookPrinted Material
Interconnecting Cisco Network Devices Part 1 (ICND1)Multimedia ProjectorPDF FileEbookPrinted Material
3hrs.
1hr.
Interconnecting Cisco Network Devices Part 1 (ICND1)Multimedia ProjectorPDF FileEbookPrinted MaterialPacket Tracer 5.1 or higher
3hrs.
1hr.
30min.
30min.
Interconnecting Cisco Network Devices Part 1 (ICND1)Multimedia ProjectorPDF FileEbookPrinted MaterialPacket Tracer 5.1 or higher
3hrs.
30min.
30min.
30min.
30min.
3hrs.
Interconnecting Cisco Network Devices Part 1 (ICND1)Multimedia ProjectorPDF FileEbookPrinted MaterialPacket Tracer 5.1 or higher
Interconnecting Cisco Network Devices Part 1 (ICND1)Multimedia ProjectorPDF FileEbookPrinted MaterialPacket Tracer 5.1 or higher
1hr.
3hrs.
30min.
Interconnecting Cisco Network Devices Part 1 (ICND1)Multimedia ProjectorPDF FileEbookPrinted MaterialPacket Tracer 5.1 or higher
SESSION PLAN
Module 3, “LAN Connections,” looks at how a router provides connectivity between the different networks in an internetwork. This module also describes
Resources Time
3hrs.
3hrs.
30min.
Interconnecting Cisco Network Devices Part 1 (ICND1)Multimedia ProjectorPDF FileEbookPrinted Material
Interconnecting Cisco Network Devices Part 1 (ICND1)Multimedia ProjectorPDF FileEbookPrinted MaterialPacket Tracer 5.1 or higher
30min.
3hrs.
30min.
30min.
30min.
30min.
30min.
30min.
Interconnecting Cisco Network Devices Part 1 (ICND1)Multimedia ProjectorPDF FileEbookPrinted MaterialPacket Tracer 5.1 or higher
30min.
3hrs.
30min.
30min.
3hrs.
30min.
Interconnecting Cisco Network Devices Part 1 (ICND1)Multimedia ProjectorPDF FileEbookPrinted MaterialPacket Tracer 5.1 or higher
Interconnecting Cisco Network Devices Part 1 (ICND1)Multimedia ProjectorPDF FileEbookPrinted MaterialPacket Tracer 5.1 or higher
30min.
30min.
30min.
3hrs.
3hrs.
Interconnecting Cisco Network Devices Part 1 (ICND1)Multimedia ProjectorPDF FileEbookPrinted Material
Interconnecting Cisco Network Devices Part 1 (ICND1)Multimedia ProjectorPDF FileEbookPrinted MaterialPacket Tracer 5.1 or higher
30min.
3hrs.
3hrs.
Interconnecting Cisco Network Devices Part 1 (ICND1)Multimedia ProjectorPDF FileEbookPrinted MaterialPacket Tracer 5.1 or higher
Interconnecting Cisco Network Devices Part 1 (ICND1)Multimedia ProjectorPDF FileEbookPrinted Material
3hrs.
30min.
30min.
30min.
Interconnecting Cisco Network Devices Part 1 (ICND1)Multimedia ProjectorPDF FileEbookPrinted MaterialPacket Tracer 5.1 or higher