computer networking hardware operations iv › curriculum › trade-and-industrial-education ›...

34
1 Computer Networking Hardware Operations IV 8545 18 weeks / 70 hours Table of Contents Acknowledgments......................................................................................................................................... 1 Course Description........................................................................................................................................ 2 Task Essentials List....................................................................................................................................... 3 Curriculum Framework................................................................................................................................. 7 Designing a Hierarchical Network................................................................................................................ 7 Connecting to the Wide Area Network (WAN)............................................................................................ 9 Making Point-to-Point Connections............................................................................................................ 10 Making Branch Connections....................................................................................................................... 14 Creating Access Control Lists (ACLs) ....................................................................................................... 16 Securing Site-to-Site Connectivity.............................................................................................................. 18 Monitoring the Network ............................................................................................................................. 21 Ensuring Quality of Service (QoS) ............................................................................................................. 24 Exploring Network Evolution ..................................................................................................................... 25 Troubleshooting the Network ..................................................................................................................... 26 SOL Correlation by Task ............................................................................................................................ 28 Transportation Career Modules .................................................................................................................. 31 Cyber Security and Cyber Forensics Infusion Units ................................................................................... 31 Entrepreneurship Infusion Units ................................................................................................................. 31 Appendix: Credentials, Course Sequences, and Career Cluster Information ............................................. 33 Acknowledgments The components of this instructional framework were developed by

Upload: others

Post on 31-Jan-2021

2 views

Category:

Documents


0 download

TRANSCRIPT

  • 1

    Computer Networking Hardware Operations IV 8545 18 weeks / 70 hours

    Table of Contents Acknowledgments ......................................................................................................................................... 1

    Course Description ........................................................................................................................................ 2

    Task Essentials List ....................................................................................................................................... 3

    Curriculum Framework ................................................................................................................................. 7

    Designing a Hierarchical Network ................................................................................................................ 7

    Connecting to the Wide Area Network (WAN) ............................................................................................ 9

    Making Point-to-Point Connections............................................................................................................ 10

    Making Branch Connections ....................................................................................................................... 14

    Creating Access Control Lists (ACLs) ....................................................................................................... 16

    Securing Site-to-Site Connectivity.............................................................................................................. 18

    Monitoring the Network ............................................................................................................................. 21

    Ensuring Quality of Service (QoS) ............................................................................................................. 24

    Exploring Network Evolution ..................................................................................................................... 25

    Troubleshooting the Network ..................................................................................................................... 26

    SOL Correlation by Task ............................................................................................................................ 28

    Transportation Career Modules .................................................................................................................. 31

    Cyber Security and Cyber Forensics Infusion Units ................................................................................... 31

    Entrepreneurship Infusion Units ................................................................................................................. 31

    Appendix: Credentials, Course Sequences, and Career Cluster Information ............................................. 33

    Acknowledgments The components of this instructional framework were developed by

  • 2

    Peyton Chichester, Chesterfield Career and Technical Center at Courthouse, Chesterfield County Public Schools Stephanie Evers, Battlefield High School, Prince William County Public Schools James Harper, Pittsylvania Career and Technical Center, Pittsylvania County Public Schools David Houchins, N.B. Handy Company, Lynchburg Randy Woodward, Washington County Career and Technical Education Center, Washington County Public Schools

    Correlations to the Virginia Standards of Learning were reviewed and updated by

    Norma J. Bonney, Kempsville High School, Virginia Beach City Public Schools Vickie L. Inge, Mathematics Committee Member, Virginia Mathematics and Science Coalition Anne F. Markwith, New Teacher Mentor, Gloucester County Public Schools Cathy Nichols-Cocke, PhD, Fairfax High School, Fairfax County Public Schools Caroline C. Wheeler, M.T., Secondary English, Richmond

    The framework was edited and produced by the CTE Resource Center:

    Debi F. Coleman, Writer/Editor Nathan K. Pope, Writer/Editor Kevin P. Reilly, Administrative Coordinator

    J. Anthony Williams, Specialist, Trade and Industrial Education and Related Clusters Office of Career, Technical, and Adult Education

    Virginia Department of Education

    Tricia S. Jacobs, PhD, CTE Coordinator of Curriculum and Instruction Office of Career, Technical, and Adult Education

    Virginia Department of Education

    Copyright © 2017

    Course Description Suggested Grade Level: 12 Prerequisites: 8544

    This course introduces students to network design processes using two examples: a large stadium enterprise network and a medium-sized film company network. Students follow a standard design process to expand and upgrade each network, which includes requirements gathering, proof-of-concept, and project management. Lifecycle services, including upgrades, competitive

  • 3

    analyses, and system integration, are presented in the context of pre-sale support. In addition to the Packet Tracer and lab exercises found in the previous courses, there are many pen-and-paper and role-playing exercises that students complete while developing their network upgrade proposals.

    Task Essentials List • Tasks/competencies designated by plus icons ( ) in the left-hand column(s) are essential • Tasks/competencies designated by empty-circle icons ( ) are optional • Tasks/competencies designated by minus icons ( ) are omitted • Tasks marked with an asterisk (*) are sensitive.

    Task Number 8545 Tasks/Competencies

    Designing a Hierarchical Network 39

    Identify design hierarchy.

    40

    Identify hierarchical network characteristics.

    41

    Describe modules in a network design.

    42

    Explain modules of the Cisco enterprise architecture.

    Connecting to the Wide Area Network (WAN) 43

    Identify WAN topologies.

    44

    Define WAN terms.

    45

    Classify WAN access options.

    46

    Identify private WAN infrastructure technology.

    47

    Identify public WAN infrastructure terminology.

    48

    Select appropriate WAN device modules.

    Making Point-to-Point Connections

  • 4

    Task Number 8545 Tasks/Competencies

    49

    Describe the benefits of Point to Point Protocol (PPP) over High-level Data Link Control (HDLC) in a WAN.

    50

    Identify serial communication terminology.

    51

    Configure HDLC on a router serial interface.

    52

    Troubleshoot serial interfaces.

    53

    Identify PPP features and operations.

    54

    Identify the steps in the LCP link negotiation process.

    55

    Configure PPP link quality.

    56

    Configure password authentication protocol (PAP) and challenge handshake authentication protocol (CHAP) authentication.

    57

    Troubleshoot PPP with authentication.

    58

    Troubleshoot basic PPP with authentication.

    59

    Verify PPP operation using show and debug commands.

    Making Branch Connections 60

    Identify different broadband technologies.

    61

    Explain the benefits and drawbacks of teleworking.

    62

    Describe the requirements for teleworker connectivity.

    63

    Identify cable Internet access terminology.

    64

    Identify digital subscriber line (DSL) terminology.

    65

    Identify broadband wireless terminology.

    66

    Configure Point-to-Point Protocol over Ethernet (PPPoE).

  • 5

    Task Number 8545 Tasks/Competencies

    67

    Configure a router as a PPPoE client for DSL connectivity.

    Creating Access Control Lists (ACLs) 68

    Determine correct wildcard mask.

    69

    Complete an access control list operation statement.

    70

    Place standard and extended ACLs.

    71

    Configure standard IPv4 access control list.

    72

    Create an extended ACL statement.

    73

    Configure extended ACLs.

    74

    Configure IPv6 ACLs.

    75

    Troubleshoot ACL configuration and placement.

    Securing Site-to-Site Connectivity 76

    Identify the benefits of virtual private networks (VPNs).

    77

    Compare types of VPNs.

    78

    Configure VPNs.

    79

    Identify Generic Routing Encapsulation (GRE) characteristics.

    80

    Configure and verify GRE.

    81

    Configure a point-to-point GRE VPN tunnel.

    82

    Identify IPsec terminology and concepts.

    83

    Configure GRE over IPsec.

    84

    Identify IPsec and SSL remote access characteristics.

  • 6

    Task Number 8545 Tasks/Competencies

    85

    Explain VPN planning design.

    Monitoring the Network 86

    Interpret router log messages.

    87

    Interpret syslog output.

    88

    Verify syslog.

    89

    Configure syslog and Network Time Protocol (NTP).

    90

    Identify characteristics of Simple Network Management Protocol (SNMP) versions.

    91

    Verify SNMP configuration.

    92

    Configure SNMP.

    93

    Compare SNMP and NetFlow.

    94

    Verify NetFlow.

    95

    Analyze NetFlow data.

    Ensuring Quality of Service (QoS)

    96

    Explain the term quality of service.

    97

    Describe network traffic characteristics.

    98

    Compare queuing algorithms.

    99

    Compare QoS models.

    Exploring Network Evolution

    100

    Identify pillars of the Internet of Things (IoT).

  • 7

    Task Number 8545 Tasks/Competencies

    101

    Define network terms.

    102

    Identify control plane and data plane characteristics.

    Troubleshooting the Network 103

    Troubleshoot a network.

    104

    Identify benefits of establishing a network baseline.

    105

    Identify commands used for measuring data.

    106

    Identify commands used for gathering symptoms.

    107

    Identify troubleshooting methods.

    108

    Identify common troubleshooting tools.

    109

    Identify the Open Systems Interconnection (OSI) layer associated with a network issue.

    110

    Identify commands used for troubleshooting a network issue.

    111

    Troubleshoot enterprise networks.

    112

    Document the discovery, remediation, and resolution of a problem.

    Legend: Essential Non-essential Omitted

    Curriculum Framework

    Designing a Hierarchical Network Task Number 39

  • 8

    Identify design hierarchy.

    Definition

    Identification should include the following layers of a hierarchical network and how they are used in network design:

    • Access • Distribution • Core

    Task Number 40

    Identify hierarchical network characteristics.

    Definition

    Identification should include specific hierarchical design characteristics by access, distribution, or core layers.

    Task Number 41

    Describe modules in a network design.

    Definition

    Description should include the following modules of a network topology:

    • Enterprise Campus • Enterprise Edge • Service Provider Edge • Remote Functional Edge

    Task Number 42

    Explain modules of the Cisco enterprise architecture.

  • 9

    Definition

    Explanation should include

    • network topology locations of Cisco enterprise architecture modules • purpose of each module.

    Connecting to the Wide Area Network (WAN) Task Number 43

    Identify WAN topologies.

    Definition

    Identification should include a comparison of four different network descriptions and topologies to identify the appropriate WAN technology types.

    Task Number 44

    Define WAN terms.

    Definition

    Definition should include WAN devices as shown on a physical network topology diagram.

    Task Number 45

    Classify WAN access options.

    Definition

    Classification should be done according to types and sub-types.

    Task Number 46

  • 10

    Identify private WAN infrastructure technology.

    Definition

    Identification should include private WAN access technology terminology by descriptions.

    Task Number 47

    Identify public WAN infrastructure terminology.

    Definition

    Identification should include public WAN access terminology by descriptions.

    Task Number 48

    Select appropriate WAN device modules.

    Definition

    Selection should include WAN access technologies to satisfy business requirements in a small to medium-sized business network.

    Making Point-to-Point Connections Task Number 49

    Describe the benefits of Point to Point Protocol (PPP) over High-level Data Link Control (HDLC) in a WAN.

    Definition

    Description should include

    • comparing PPP and HDLC • explaining why PPP would be more desirable in a WAN.

  • 11

    Task Number 50

    Identify serial communication terminology.

    Definition

    Identification should include descriptions of serial communications terminology.

    Task Number 51

    Configure HDLC on a router serial interface.

    Definition

    Task performance should include

    • configuring HDLC encapsulation on a router serial interface • using show commands to verify router serial interface settings.

    Task Number 52

    Troubleshoot serial interfaces.

    Definition

    Troubleshooting should include diagnosing and repairing

    • physical layer • data link layer • network layer.

    Task Number 53

    Identify PPP features and operations.

    Definition

  • 12

    Identification should include

    • PPP order of operation in a layered, architectural network diagram • LCP and NCP functions by descriptions • PPP frame format.

    Task Number 54

    Identify the steps in the LCP link negotiation process.

    Definition

    Identification should include a flow chart to illustrate the steps in the LCP link negotiation process.

    Task Number 55

    Configure PPP link quality.

    Definition

    Configuration should include

    • PPP encapsulation on a serial interface with an IPv4 and IPv6 address • compression • link quality monitoring enabled.

    Task Number 56

    Configure password authentication protocol (PAP) and challenge handshake authentication protocol (CHAP) authentication.

    Definition

    Configuration should include

  • 13

    • reviewing routing configurations • configuring PPP encapsulation • configuring PPP authentication.

    Task Number 57

    Troubleshoot PPP with authentication.

    Definition

    Troubleshooting should include diagnosing and repairing

    • physical layer • data link layer • network layer.

    Task Number 58

    Troubleshoot basic PPP with authentication.

    Definition

    Troubleshooting should include

    • building the network and loading device configurations • troubleshooting the data link layer • troubleshooting the network layer.

    Task Number 59

    Verify PPP operation using show and debug commands.

    Definition

    Verification should include using show and debug commands to troubleshoot PPP.

  • 14

    Making Branch Connections Task Number 60

    Identify different broadband technologies.

    Definition

    Identification should include broadband solutions to support remote connectivity in a small to medium-sized business network.

    Task Number 61

    Explain the benefits and drawbacks of teleworking.

    Definition

    Explanation should include a classification of the benefits and drawbacks to the employer, government/community, or individual.

    Task Number 62

    Describe the requirements for teleworker connectivity.

    Definition

    Description should include classifying teleworker connectivity responsibility requirements as being that of a teleworker or corporation.

    Task Number 63

    Identify cable Internet access terminology.

    Definition

    Identification should include definitions of common cable Internet terms.

  • 15

    Task Number 64

    Identify digital subscriber line (DSL) terminology.

    Definition

    Identification should include definitions of common DSL terms.

    Task Number 65

    Identify broadband wireless terminology.

    Definition

    Identification should include the definitions of common broadband wireless terms.

    Task Number 66

    Configure Point-to-Point Protocol over Ethernet (PPPoE).

    Definition

    Task performance should include

    • configuring an ISP router with a username and password • configuring the virtual dialer interface with specific settings • activating the interface.

    Task Number 67

    Configure a router as a PPPoE client for DSL connectivity.

    Definition

    Task performance should include

    • building the network • configuring the ISP router

  • 16

    • configuring the Cust1 router.

    Creating Access Control Lists (ACLs) Task Number 68

    Determine correct wildcard mask.

    Definition

    Determination should include identifying the wildcard mask based upon ACL descriptive statements.

    Task Number 69

    Complete an access control list operation statement.

    Definition

    Completion should include determining the word or phrase needed to complete access control list operation statements.

    Task Number 70

    Place standard and extended ACLs.

    Definition

    Placing should include evaluating network policies and determining the best placement for the ACL types and locations.

    Task Number 71

    Configure standard IPv4 access control list.

    Definition

    Configuration should include

  • 17

    • planning an ACL implementation • configuring, applying, and verifying a standard ACL • viewing demonstration of configuring standard IPv4 ACLs.

    Task Number 72

    Create an extended ACL statement.

    Definition

    Creation should include

    • following requirements and topologies for three scenarios • determining whether packets will be permitted or denied based upon ACL statement and

    the source and destination IP addresses • identifying ACL placement based upon data from scenarios.

    Task Number 73

    Configure extended ACLs.

    Definition

    Configuration should include

    • configuring, applying, and verifying an extended, numbered ACL • configuring, applying, and verifying an extended, named ACL.

    Task Number 74

    Configure IPv6 ACLs.

    Definition

    Configuration should include configuring, applying, and verifying IPv6 ACLs.

  • 18

    Task Number 75

    Troubleshoot ACL configuration and placement.

    Definition

    Troubleshooting should include

    • building the network and configuring basic device settings • troubleshooting internal access • troubleshooting remote access.

    Securing Site-to-Site Connectivity Task Number 76

    Identify the benefits of virtual private networks (VPNs).

    Definition

    Identification should include descriptions of VPNs, their uses, and their strengths.

    Task Number 77

    Compare types of VPNs.

    Definition

    Comparison should include descriptions of site-to-site and remote-access types.

    Task Number 78

    Configure VPNs.

    Definition

    Configuration should include

    • enabling security features and the securityk9 module

  • 19

    • configuring IPsec parameters on two routers • verifying IPsec VPN functionality on the network.

    Task Number 79

    Identify Generic Routing Encapsulation (GRE) characteristics.

    Definition

    Identification should include VPN functional network locations by GRE characteristics labels.

    Task Number 80

    Configure and verify GRE.

    Definition

    Task performance should include

    • verifying router connectivity • configuring GRE tunnels • verifying end-to-end network connectivity.

    Task Number 81

    Configure a point-to-point GRE VPN tunnel.

    Definition

    Task performance should include

    • configuring basic device settings • configuring a GRE tunnel • enabling routing over the GRE tunnel.

  • 20

    Task Number 82

    Identify IPsec terminology and concepts.

    Definition

    Identification should include

    • IPsec encryption algorithms (symmetric and asymmetric) as compared with terms and concept descriptions

    • IPsec authentication integrity and authentication process order steps • IPsec data integrity and authentication terminology by descriptions • IPsec options (secure and insecure).

    Task Number 83

    Configure GRE over IPsec.

    Definition

    Configuration should include

    • verifying router connectivity • enabling security features • configuring IPsec parameters • configuring GRE tunnels over IPsec • verifying end-to-end network connectivity.

    Task Number 84

    Identify IPsec and SSL remote access characteristics.

    Definition

    Identification of IPsec and SSL remote access characteristics should be based on descriptions.

    Task Number 85

  • 21

    Explain VPN planning design.

    Definition

    Explanation should address the use of VPNs in securing site-to-site connectivity in a small to medium-sized business network.

    Monitoring the Network Task Number 86

    Interpret router log messages.

    Definition

    Interpretation should include describing the different levels of router log messages.

    Task Number 87

    Interpret syslog output.

    Definition

    Interpretation should include

    • output messages • specific identifier statements.

    Task Number 88

    Verify syslog.

    Definition

    Verification should include

    • configuring a logging destination • configuring a trapping security level and logging source interface

  • 22

    • creating a deliberate syslog error and viewing the result • verifying syslog operation using specific parameters.

    Task Number 89

    Configure syslog and Network Time Protocol (NTP).

    Definition

    Configuration should include

    • configuring syslog service • generating logged events • manually setting switch clocks • configuring NTP service • verifying time-stamped logs.

    Task Number 90

    Identify characteristics of Simple Network Management Protocol (SNMP) versions.

    Definition

    Identification should include characteristics that make each SNMP version unique.

    Task Number 91

    Verify SNMP configuration.

    Definition

    Verification should include

    • configuring a server with specific SNMP settings • verifying SNMP-configured settings.

  • 23

    Task Number 92

    Configure SNMP.

    Definition

    Configuring should include

    • building a network and configuring basic device settings • configuring an SNMP manager and agents • converting OID codes with the Cisco SNMP Object Navigator.

    Task Number 93

    Compare SNMP and NetFlow.

    Definition

    Comparison should include classifying network monitoring tool characteristics as belonging to SNMP or NetFlow.

    Task Number 94

    Verify NetFlow.

    Definition

    Verification should include

    • configuring NetFlow ingress and egress traffic settings on an interface • configuring a NetFlow export destination IP address and export version level • displaying the configured NetFlow export settings.

    Task Number 95

  • 24

    Analyze NetFlow data.

    Definition

    Analysis should include

    • building a network and configuring basic device settings • configuring NetFlow on a router • analyzing NetFlow using the router CLI • exploring NetFlow Collector and Analyzer software.

    Ensuring Quality of Service (QoS) Task Number 96

    Explain the term quality of service.

    Definition

    Explanation should include

    • the meaning of quality of service and how it is achieved • network transmission quality terminology.

    Task Number 97

    Describe network traffic characteristics.

    Definition

    Description should include indicating the appropriate type by each traffic characteristic.

    Task Number 98

    Compare queuing algorithms.

    Definition

  • 25

    Comparison should include choosing the correct algorithm for each characteristic.

    Task Number 99

    Compare QoS models.

    Definition

    Comparison should include choosing the correct model for each benefit.

    Exploring Network Evolution Task Number 100

    Identify pillars of the Internet of Things (IoT).

    Definition

    Identification should include evaluating network policies and determining the best placement for the ACL types and locations.

    Task Number 101

    Define network terms.

    Definition

    Definitions should include terms related to

    • cloud computing • virtualization • hypervisor.

    Task Number 102

    Identify control plane and data plane characteristics.

  • 26

    Definition

    Identification should include selecting the appropriate field for the plane characteristics.

    Troubleshooting the Network Task Number 103

    Troubleshoot a network.

    Definition

    Troubleshooting should include using basic commands to diagnose and repair IP connectivity issues.

    Task Number 104

    Identify benefits of establishing a network baseline.

    Definition

    Identification should include statements indicating benefits of establishing a network baseline.

    Task Number 105

    Identify commands used for measuring data.

    Definition

    Identification should include the various commands and their specific uses.

    Task Number 106

    Identify commands used for gathering symptoms.

    Definition

  • 27

    Identification should include the specific uses of various commands used to gather symptom information for network problems.

    Task Number 107

    Identify troubleshooting methods.

    Definition

    Identification should include various methods and their specific effects.

    Task Number 108

    Identify common troubleshooting tools.

    Definition

    Identification should include the uses and characteristics of tools for troubleshooting software and hardware.

    Task Number 109

    Identify the Open Systems Interconnection (OSI) layer associated with a network issue.

    Definition

    Identification should include naming the OSI layer associated with given, specific symptoms and causes of network issues.

    Task Number 110

    Identify commands used for troubleshooting a network issue.

    Definition

  • 28

    Identification should include

    • correct PC command to verify end-to-end network connectivity issues • correct PC command to help verify DNS connectivity.

    Task Number 111

    Troubleshoot enterprise networks.

    Definition

    Troubleshooting should include

    • reviewing network requirements to include o VLANs, STP, routing, inter-VLAN routing, DHCP, NAT, PPP, and Frame relay o DHCPv6, EIGRPv6, and IPv6 routing o port security and EtherChannel

    • isolating and resolving network issues • documenting the steps to verify the requirements.

    Task Number 112

    Document the discovery, remediation, and resolution of a problem.

    Definition

    Documentation should record the systematic approach of troubleshooting issues in a small to medium-sized business network.

    SOL Correlation by Task 39

    Identify design hierarchy.

    English: 12.5

    History and Social Science: GOVT.6, VUS.14, WG.17, WHII.14

  • 29

    40 Identify hierarchical network characteristics. English: 12.5 41 Describe modules in a network design.

    42 Explain modules of the Cisco enterprise architecture.

    43 Identify WAN topologies. English: 12.5 44 Define WAN terms. English: 12.3 45 Classify WAN access options.

    46 Identify private WAN infrastructure technology.

    47 Identify public WAN infrastructure terminology.

    48 Select appropriate WAN device modules.

    49 Describe the benefits of Point to Point Protocol (PPP) over High-level Data Link Control (HDLC) in a WAN. English: 12.5

    50 Identify serial communication terminology.

    51 Configure HDLC on a router serial interface.

    52 Troubleshoot serial interfaces.

    53 Identify PPP features and operations.

    54 Identify the steps in the LCP link negotiation process.

    55 Configure PPP link quality.

    56 Configure password authentication protocol (PAP) and challenge handshake authentication protocol (CHAP) authentication.

    57 Troubleshoot PPP with authentication.

    58 Troubleshoot basic PPP with authentication.

    59 Verify PPP operation using show and debug commands.

    60 Identify different broadband technologies.

    61 Explain the benefits and drawbacks of teleworking. English: 12.5 62 Describe the requirements for teleworker connectivity.

    63 Identify cable Internet access terminology. English: 12.3 64 Identify digital subscriber line (DSL) terminology. English: 12.3 65 Identify broadband wireless terminology. English: 12.3 66 Configure Point-to-Point Protocol over Ethernet (PPPoE).

    67 Configure a router as a PPPoE client for DSL connectivity.

    68 Determine correct wildcard mask.

    69 Complete an access control list operation statement. English: 12.3 70 Place standard and extended ACLs.

    71 Configure standard IPv4 access control list. English: 12.5 72 Create an extended ACL statement.

  • 30

    73 Configure extended ACLs.

    74 Configure IPv6 ACLs.

    75 Troubleshoot ACL configuration and placement.

    76

    Identify the benefits of virtual private networks (VPNs).

    English: 12.5

    History and Social Science: GOVT.6, VUS.14, WG.17, WHII.14

    77 Compare types of VPNs. English: 12.5 78 Configure VPNs. History and Social Science: VUS.14 79 Identify Generic Routing Encapsulation (GRE)

    characteristics.

    80 Configure and verify GRE.

    81 Configure a point-to-point GRE VPN tunnel.

    82 Identify IPsec terminology and concepts.

    83 Configure GRE over IPsec. History and Social Science: VUS.14 84 Identify IPsec and SSL remote access characteristics.

    85 Explain VPN planning design.

    86 Interpret router log messages.

    87 Interpret syslog output.

    88 Verify syslog.

    89 Configure syslog and Network Time Protocol (NTP).

    90 Identify characteristics of Simple Network Management Protocol (SNMP) versions. English: 12.5

    91 Verify SNMP configuration.

    92 Configure SNMP.

    93 Compare SNMP and NetFlow. English: 12.5 94 Verify NetFlow.

    95 Analyze NetFlow data. English: 12.5 96 Explain the term quality of service. English: 12.3, 12.5 97 Describe network traffic characteristics.

    98 Compare queuing algorithms. English: 12.5 99 Compare QoS models.

    100 Identify pillars of the Internet of Things (IoT). English: 12.5 101 Define network terms. English: 12.3 102 Identify control plane and data plane characteristics. English: 12.5

  • 31

    103 Troubleshoot a network.

    104 Identify benefits of establishing a network baseline. English: 12.5 105 Identify commands used for measuring data. English: 12.5 106 Identify commands used for gathering symptoms. English: 12.5 107 Identify troubleshooting methods. English: 12.5 108 Identify common troubleshooting tools. English: 12.5 109 Identify the Open Systems Interconnection (OSI) layer

    associated with a network issue. English: 12.5

    110 Identify commands used for troubleshooting a network issue. English: 12.5

    111 Troubleshoot enterprise networks.

    112 Document the discovery, remediation, and resolution of a problem. English: 12.6

    Transportation Career Modules The following transportation career modules were correlated to this course in March 2012 as part of Careers in Transportation Curriculum Project funded by the US Department of Transportation. Modules include field-tested activities and lesson plans that require students to apply knowledge and skills learned in this course and may encourage students to explore related careers in the Transportation, Distribution, and Logistics Career Cluster. Click on the link to access the Careers in Transportation Curriculum Project site and scroll down to search for modules by ID number and title. Related Career Module(s):

    • ID#: LPMS701-113 Title: Graphical Linear Programming

    Cyber Security and Cyber Forensics Infusion Units Cyber Security and Cyber Forensics Infusion Units were designed to be infused with designated CTE courses to help students in those programs achieve additional, focused, validated tasks/competencies in personal and professional cyber security skills. These units are not mandatory, and, as such, the tasks/competencies are marked as "optional," to be taught at the instructor's discretion. Teachers can find the infusion/unit in the course listing.

    Entrepreneurship Infusion Units

    https://www.transportation.gov/careers

  • 32

    Entrepreneurship Infusion Units may be used to help students achieve additional, focused competencies and enhance the validated tasks/competencies related to identifying and starting a new business venture. Because the unit is a complement to certain designated courses and is not mandatory, all tasks/competencies are marked “optional.” Teachers can find the infusion/unit in the course listing.

  • 33

    Appendix: Credentials, Course Sequences, and Career Cluster Information Industry Credentials: Only apply to 36-week courses

    • A+ Certification Examination • Business Information Processing Assessment • Cisco Certified CyberOps Associate Examination • Cisco Certified DevNet Associate Examination • Cisco Certified Networking Associate (CCNA) Examination • Cisco Certified Networking Professional (CCNP) Automation for Cisco Enterprise Solutions

    Examination • Cisco Certified Networking Professional (CCNP) Cisco Enterprise Networks Examination • Cisco Certified Networking Professional (CCNP) Cisco SD-WAN Solutions Examination • Cisco Certified Networking Professional (CCNP) Designing Enterprise Wireless Networks Examination • Cisco Certified Networking Professional (CCNP) Enterprise Advanced Routing and Services

    Examination • Cisco Certified Networking Professional (CCNP) Enterprise Network Core Technologies Examination • Cisco Certified Networking Professional (CCNP) Implementing Enterprise Wireless Networks

    Examination • College and Work Readiness Assessment (CWRA+) • Computer Networking Fundamentals Assessment • Customer Service Specialist (CSS) Examination • Internetworking Examination • IT Fundamentals+ Certification Examination • Microsoft 365 Fundamentals Examination • Microsoft Certified Azure Fundamentals Examination • Microsoft Dynamics 365 Fundamentals Examination • Microsoft Office Specialist (MOS) Examinations • Microsoft Technology Associate (MTA) Examinations • Network Administration Certification Tests • Network+ Certification Examination • Professional Communications Certification Examination • Security+ Certification Examination • Technical Support Certification Tests • Workplace Readiness Skills for the Commonwealth Examination

    Concentration sequences: A combination of this course and those below, equivalent to two 36-week courses, is a concentration sequence. Students wishing to complete a specialization may take additional courses based on their career pathways. A program completer is a student who has met the requirements for a CTE concentration sequence and all other requirements for high school graduation or an approved alternative education program.

  • 34

    • Computer Networking Hardware Operations I (8542/18 weeks, 70 hours) • Computer Networking Hardware Operations II (8543/18 weeks, 70 hours) • Computer Networking Hardware Operations III (8544/18 weeks, 70 hours)

    Career Cluster: Information Technology

    Pathway Occupations

    Information Support and Services

    Applications Integrator Computer Support Specialist Computer Systems Engineer, Architect Database Administrator Database Analyst Information Systems Analyst Information Systems Security Developer Information Systems Security Manager Maintenance Technician Network Systems and Data Communication Analyst Software Test Engineer Systems Analyst Technical Writer

    Network Systems

    Computer and Information Systems Administrator Computer Operator Computer Security Specialist Computer Software Engineer Computer Support Specialist Computer Systems Engineer, Architect Database Analyst Information Security Analyst Network and Computer Systems Administrator Network Architect Network Systems and Data Communication Analyst Software Test Engineer Systems Analyst Telecommunications Equipment Installer, Repairer Telecommunications Specialist

    Programming and Software Development

    Computer Software Engineer Information Security Analyst Network Systems and Data Communication Analyst Programmer Project Manager Software Applications Engineer Software Test Engineer Systems Analyst

    Web and Digital Communications

    Computer Support Specialist Computer Systems Engineer, Architect Project Manager Software Test Engineer Systems Analyst

    Computer Networking Hardware Operations IV8545 18 weeks / 70 hoursTable of ContentsAcknowledgmentsCourse DescriptionTask Essentials ListCurriculum FrameworkDesigning a Hierarchical NetworkTask Number 39Identify design hierarchy.Definition

    Task Number 40Identify hierarchical network characteristics.Definition

    Task Number 41Describe modules in a network design.Definition

    Task Number 42Explain modules of the Cisco enterprise architecture.Definition

    Connecting to the Wide Area Network (WAN)Task Number 43Identify WAN topologies.Definition

    Task Number 44Define WAN terms.Definition

    Task Number 45Classify WAN access options.Definition

    Task Number 46Identify private WAN infrastructure technology.Definition

    Task Number 47Identify public WAN infrastructure terminology.Definition

    Task Number 48Select appropriate WAN device modules.Definition

    Making Point-to-Point ConnectionsTask Number 49Describe the benefits of Point to Point Protocol (PPP) over High-level Data Link Control (HDLC) in a WAN.Definition

    Task Number 50Identify serial communication terminology.Definition

    Task Number 51Configure HDLC on a router serial interface.Definition

    Task Number 52Troubleshoot serial interfaces.Definition

    Task Number 53Identify PPP features and operations.Definition

    Task Number 54Identify the steps in the LCP link negotiation process.Definition

    Task Number 55Configure PPP link quality.Definition

    Task Number 56Configure password authentication protocol (PAP) and challenge handshake authentication protocol (CHAP) authentication.Definition

    Task Number 57Troubleshoot PPP with authentication.Definition

    Task Number 58Troubleshoot basic PPP with authentication.Definition

    Task Number 59Verify PPP operation using show and debug commands.Definition

    Making Branch ConnectionsTask Number 60Identify different broadband technologies.Definition

    Task Number 61Explain the benefits and drawbacks of teleworking.Definition

    Task Number 62Describe the requirements for teleworker connectivity.Definition

    Task Number 63Identify cable Internet access terminology.Definition

    Task Number 64Identify digital subscriber line (DSL) terminology.Definition

    Task Number 65Identify broadband wireless terminology.Definition

    Task Number 66Configure Point-to-Point Protocol over Ethernet (PPPoE).Definition

    Task Number 67Configure a router as a PPPoE client for DSL connectivity.Definition

    Creating Access Control Lists (ACLs)Task Number 68Determine correct wildcard mask.Definition

    Task Number 69Complete an access control list operation statement.Definition

    Task Number 70Place standard and extended ACLs.Definition

    Task Number 71Configure standard IPv4 access control list.Definition

    Task Number 72Create an extended ACL statement.Definition

    Task Number 73Configure extended ACLs.Definition

    Task Number 74Configure IPv6 ACLs.Definition

    Task Number 75Troubleshoot ACL configuration and placement.Definition

    Securing Site-to-Site ConnectivityTask Number 76Identify the benefits of virtual private networks (VPNs).Definition

    Task Number 77Compare types of VPNs.Definition

    Task Number 78Configure VPNs.Definition

    Task Number 79Identify Generic Routing Encapsulation (GRE) characteristics.Definition

    Task Number 80Configure and verify GRE.Definition

    Task Number 81Configure a point-to-point GRE VPN tunnel.Definition

    Task Number 82Identify IPsec terminology and concepts.Definition

    Task Number 83Configure GRE over IPsec.Definition

    Task Number 84Identify IPsec and SSL remote access characteristics.Definition

    Task Number 85Explain VPN planning design.Definition

    Monitoring the NetworkTask Number 86Interpret router log messages.Definition

    Task Number 87Interpret syslog output.Definition

    Task Number 88Verify syslog.Definition

    Task Number 89Configure syslog and Network Time Protocol (NTP).Definition

    Task Number 90Identify characteristics of Simple Network Management Protocol (SNMP) versions.Definition

    Task Number 91Verify SNMP configuration.Definition

    Task Number 92Configure SNMP.Definition

    Task Number 93Compare SNMP and NetFlow.Definition

    Task Number 94Verify NetFlow.Definition

    Task Number 95Analyze NetFlow data.Definition

    Ensuring Quality of Service (QoS)Task Number 96Explain the term quality of service.Definition

    Task Number 97Describe network traffic characteristics.Definition

    Task Number 98Compare queuing algorithms.Definition

    Task Number 99Compare QoS models.Definition

    Exploring Network EvolutionTask Number 100Identify pillars of the Internet of Things (IoT).Definition

    Task Number 101Define network terms.Definition

    Task Number 102Identify control plane and data plane characteristics.Definition

    Troubleshooting the NetworkTask Number 103Troubleshoot a network.Definition

    Task Number 104Identify benefits of establishing a network baseline.Definition

    Task Number 105Identify commands used for measuring data.Definition

    Task Number 106Identify commands used for gathering symptoms.Definition

    Task Number 107Identify troubleshooting methods.Definition

    Task Number 108Identify common troubleshooting tools.Definition

    Task Number 109Identify the Open Systems Interconnection (OSI) layer associated with a network issue.Definition

    Task Number 110Identify commands used for troubleshooting a network issue.Definition

    Task Number 111Troubleshoot enterprise networks.Definition

    Task Number 112Document the discovery, remediation, and resolution of a problem.Definition

    SOL Correlation by TaskTransportation Career ModulesCyber Security and Cyber Forensics Infusion UnitsEntrepreneurship Infusion UnitsAppendix: Credentials, Course Sequences, and Career Cluster Information