session plan icnd1

44
SESSION PLAN Learning Outcome/s: LO 1 Identify the benefits of computer networks and how they function LO 2 Identify common threats to a network and threat-mitigation methods LO 3 Identify and compare the Open System Interconnection (OSI) and TCP/IP layered models that control host-to-host communications LO 4 Describe IP address classification and how a host can obtain an address LO 5 Describe the process that TCP uses to establish a reliable connection LO 6 Describe the host-to-host packet delivery process LO 7 Describe how Ethernet operates at Layer 1 and Layer 2 of the OSI model LO 8 Explain how to connect to an Ethernet LAN A. INTRODUCTION When you are building a network, the tasks and components can sometimes be overwhelming. The key to understanding how to build a comput network lies in understanding the foundations of network communications. The key to building a complex network involves gaining an understa of the physical and logical components of a simple point-to-point network. To become proficient in networking, you must gain knowledge of why networks are built and the protocols used in modern network designs. This activity explores the basics of networking and provides a solid found on which to build a comprehensive knowledge of networking technology. B. LEARNING ACTIVITIES LO 1 Identify the benefits of computer networks and how they function Learning Content Methods Presentation Practice Feedback What is a Network? Sector: Information and Communication Technology Qualification Title: Network Administration Unit of Competency: Build a Simple Network Module Title: Building a Simple Network Lecture Oral Presentation Group discussion Read Chapter 1 page 4 on what is a network Answer Oral Questionning Answer Written Exam Compare answer to Evidence Plan Compare answer to Written Exam

Upload: oliver-bc-sanchez

Post on 17-Jul-2016

39 views

Category:

Documents


1 download

DESCRIPTION

Session plan for Network Administration

TRANSCRIPT

Page 1: Session Plan ICND1

SESSION PLAN

Learning Outcome/s:

LO 1 Identify the benefits of computer networks and how they functionLO 2 Identify common threats to a network and threat-mitigation methodsLO 3 Identify and compare the Open System Interconnection (OSI) and TCP/IP layered models that control host-to-host communicationsLO 4 Describe IP address classification and how a host can obtain an addressLO 5 Describe the process that TCP uses to establish a reliable connectionLO 6 Describe the host-to-host packet delivery processLO 7 Describe how Ethernet operates at Layer 1 and Layer 2 of the OSI modelLO 8 Explain how to connect to an Ethernet LAN

A. INTRODUCTIONWhen you are building a network, the tasks and components can sometimes be overwhelming. The key to understanding how to build a computer network lies in understanding the foundations of network communications. The key to building a complex network involves gaining an understanding of the physical and logical components of a simple point-to-point network. To become proficient in networking, you must gain knowledge of why networks are built and the protocols used in modern network designs. This activity explores the basics of networking and provides a solid foundation on which to build a comprehensive knowledge of networking technology.

B. LEARNING ACTIVITIESLO 1 Identify the benefits of computer networks and how they functionLearning Content Methods Presentation Practice FeedbackWhat is a Network?

Sector: Information and Communication Technology

Qualification Title: Network Administration

Unit of Competency: Build a Simple Network

Module Title: Building a Simple Network

LectureOral PresentationGroup discussion

Read Chapter 1 page 4 on what is a network

Answer Oral Questionning

Answer Written Exam

Compare answer to Evidence Plan

Compare answer to Written Exam

Page 2: Session Plan ICND1

Interpreting a Network Diagram

Network User Applications

Characteristics of a Network

Physical Versus Logical Topologies

Bus Topology

Star and Extended-Star Topologies

Ring Topologies

Mesh and Partial-Mesh Topologies

Connection to the Internet

Common physical Components of a Network

Read Chapter 1 on Page 5 re. common components of a network

Read Chapter 1 on Page 6 re. interpreting a network diagram

Resource-Sharing Functions and Benefits Read Chapter 1 on Page 7 re.

resource-sharing and benefits

Read Chapter 1 on Page 9 re. network user applications

The Impact of User Applications on the Network

Read Chapter 1 on Page 10 re. the impact of user application on the networkRead Chaper 1 on Page 11 re. characterictics of network

Read Chapter 1 on Page 12-13 re. physical vs. logical topologiesRead Chapter 1 on Page 14 re. bus topology

Read Chapter 1 on Page 15 re. Star and Extended Star Topologies

Read Chapter 1 on Page 17 re. Ring Topologies

Read Chapter 1 on Page 18 re. Mesh and Partial-Mesh Topologies

Read Chapter 1 on Page 20 re. Connection to the Internet

Page 3: Session Plan ICND1

LO 2 Identify common threats to a network and threat-mitigation methodsSecuring the Network

Need for Network Security

Mitigating Common Threats

LO 3 Identify and compare the Open System Interconnection (OSI) and TCP/IP layered models that control host-to-host communicationsOSI Reference Model

Data Communications Process

LectureOral PresentationGroup discussion

Read Chapter 1 of Page 21 re. importance of securing the network

Answer Oral Questionning

Answer Written Exam

Compare answer to Evidence Plan

Compare answer to Written Exam

Read Chapter 1 of Page 22-24 about the needs for securing the network

Balancing Network Security Requirements

Read Chapter 1 of Page 25 about balancing network security requirements

Adversaries, Hacker Motivations, and Classes of Attack

Read Chapter 1 page 26 about Adversaries, Hackers, Motivations, and Classess of Attacks

Read Chapter 1 of Page 28-30 about Mitigation

LectureOral PresentationGroup discussion

Read Chapter 1 of Page 31-36 about Understanding Host-to-Host Communication Model

Answer Oral Questionning

Answer Written Exam

Compare answer to Evidence Plan

Compare answer to Written Exam

Read Chapter 1 of Page 36-38 about Data Communication Process

Page 4: Session Plan ICND1

Peer-to-Peer Communication

The TCP/IP Protocol Stack

OSI Model Versus TCP/IP Stack

LO 4 Describe IP address classification and how a host can obtain an addressIP Network Addressing

LO 5 Describe the process that TCP uses to establish a reliable connectionThe Transport Layer

TCP/IP Applications

Transport Layer Functionality

LO 6 Describe the host-to-host packet delivery process

Read Chapter 1 of Page 39 about Peer-to-Peer Communications

Read Chapter 1 of Page 40 about TCP/IP Protocol Stack

Read Chapter 1 of Page 41 about OSI Model vs TCP/IP Stack

LectureOral PresentationGroup discussionGroup workAssignments

Read Chapter 1 of Page 44-59 about Understanding TCP/IP's Internet Layer

Answer Oral Questionning

Answer Written Exam

Compare answer to Evidence Plan

Compare answer to Written Exam

LectureOral PresentationGroup discussion

Read Chapter 1 of Page 63-66 about Transport Layer

Answer Oral Questionning

Answer Written Exam

Compare answer to Evidence Plan

Compare answer to Written Exam

Read Chapter 1 of Page 67-68 about TCP/IP Application

Read Chapter 1 of Page 69-83 about Functionality of a Transport Layer

Page 5: Session Plan ICND1

Layer 1 Devices and Their Functions

Layer 2 Devices and Their Functions

Layer 2 Addressing

Layer 3 Devices and Their Functions

Layer 3 Addressing

ARP Table

Host-to-Host Packet Delivery

Function of the Default Gateway

LO 7 Describe how Ethernet operates at Layer 1 and Layer 2 of the OSI model

LectureOral PresentationGroup discussion

Read Chapter 1 of Page 84 about Layer 1 Devices & Functions

Answer Oral Questionning

Answer Written Exam

Compare answer to Evidence Plan

Compare answer to Written Exam

Read Chapter 1 of Page 85 about Layer 2 Devices & Functions

Read Chapter 1 of Page 86 about Layer 2 Addressing

Read Chapter 1 of Page 86 about Layer 3 Devices & Functions

Read Chapter 1 of Page 86 about Layer 3 Addressing

Mapping Layer 2 Addressing to Layer 3 Addressing

Read Chapter 1 of Page 87 about Mapping Layer 2 & 3 Addressing

Read Chapter 1 of Page 88 about ARP Table

Read Chapter 1 of Page 89-98 about Host-to-Host Delivery

Read Chapter 1 of Page 98 about Default Gateway

Using Common Host Tools to Determine the Path Between Two Hosts Across a Network

Read Chapter 1 of Page 99 about Common Tools

Page 6: Session Plan ICND1

The Definition of a LAN

Components of a LAN

Functions of a LAN

How Big Is a LAN

Ethernet

Ethernet LAN Standards

The Role of CSMA/CD in Ethernet

Ethernet Frames

Ethernet Frame Addressing

Ethernet Addresses

LectureOral PresentationGroup discussion

Read Chapter 1 of 104 about Defining the LAN

Answer Oral Questionning

Answer Written Exam

Compare answer to Evidence Plan

Compare answer to Written Exam

Read Chapter 1 of Page 105 about Components of LAN

Read Chapter 1 of Page 106 about Function of LAN

Read Chapter 1 of Page 107 about How Big is LAN

Read Chapter 1 of Page 108 about Ethernet

Read Chapter 1 of Page 108 about Ethernet Standards

Read Chapter 1 of Page 109-111 about the Role of CSMA/CD

Read Chapter 1 of Page 111 about Ethernet Frames

Read Chapter 1 of Page 112 about Ethernet Frame Addressing

Read Chapter 1 of Page 113 about Ethernet Addresses

MAC Addresses and Binary-Hexadecimal Numbers

Read Chapter 1 of Page 113 about MAC Address & Binary-Hexadecimal Numbers

Page 7: Session Plan ICND1

LO 8 Explain how to connect to an Ethernet LANEthernet Network Interface Cards

Connection Media

Unshielded Twisted-Pair Cable

UTP Implementation

LectureOral PresentationGroup discussion

Read Chapter 1 of Page 115 about Connecting to an Ethernet LAN

Answer Oral Questionning

Answer Written Exam

Compare answer to Evidence Plan

Compare answer to Written Exam

Ethernet Media and Connection Requirements

Read Chapter 1 of Page 116 about Ethernet Media & Connection Requirements

Read Chapter 1 of Page 116 about Connection Media

Read Chapter 1 of Page 118 about UTP Cable

Read Chapter 1 of Page 119 about UTP Implementation

Page 8: Session Plan ICND1

SESSION PLAN

Learning Outcome/s:

LO 1 Identify switched LAN technology solutions to Ethernet networking issuesLO 2 Describe the host-to-host packet delivery process through a switchLO 3 Describe the features and functions of the Cisco IOS Software command-line interface (CLI)LO 4 Start an access layer switch and use the CLI to configure and monitor the switchLO 5 Enable physical, access, and port-level security on a switchLO 6 List the ways in which an Ethernet LAN can be optimizedLO 7 Describe methods of troubleshooting switch issues

A. INTRODUCTIONThis chapter describes the various types of Ethernet LAN topologies, details the challenges of shared LANs and how those challenges are solved with switched LAN technology, and describes ways in which LANs can be optimized.

B. LEARNING ACTIVITIESLO 1 Identify switched LAN technology solutions to Ethernet networking issuesLearning Content Methods Presentation Practice Feedback

Sector: Information and Communication Technology

Qualification Title: Network Administration

Unit of Competency: Ethernet LANs

Module Title: Understanding the Challemges of Shared LANs

Page 9: Session Plan ICND1

Ethernet LAN Segments

Extending a LAN Segment

Collisions

Collision Domains

LO 2 Describe the host-to-host packet delivery process through a switchLayer 2 Addressing

Layer 3 Addressing

Host-to-Host Packet Delivery

LO 3 Describe the features and functions of the Cisco IOS Software command-line interface (CLI)

LectureOral PresentationGroup discussion

Read Chapter 2 of Page 139-140 about Challenges of Shared LANs

Answer Oral Questionning

Answer Written Exam

Compare answer to Evidence Plan

Compare answer to Written Exam

Read Chapter 2 of Page 141 about Extending LAN Segment

Read Chapter 2 of Page 141 about the Collisions

Read Chapter 2 of Page 142 aboutCollision Domains

LectureOral PresentationGroup discussion

Read Chapter 2 of Page 144 about Addressing in Layer 2

Answer Oral Questionning

Answer Written Exam

Compare answer to Evidence Plan

Compare answer to Written Exam

Read Chapter 2 of Page 145 about Addressing in Layer 3

Read Chapter 2 of Page 145 about Host-to-Host Packet Delivery

Page 10: Session Plan ICND1

Configuring Network Devices

External Configuration Sources

Entering the EXEC Modes

Keyboard Help in the CLI

Enhanced Editing Commands

Command History

LO 4 Start an access layer switch and use the CLI to configure and monitor the switch

Cisco IOS Software Features and Functions

LectureOral PresentationSimulation ActivitiesDemonstrationLaboaratory Work

Read Chapter 2 of Page 151 about Cisco IOS Features and Functions

Trainer will demonstrate the use and functions of IOS Commands

Answer Oral Questionning

Answer Written Exam

Compare answer to Evidence Plan

Compare answer to Written Exam

Read Chapter of Page 152 about Configuring Network Devices

Perform Task Sheet 2-1

Evaluate work based on Perfomance Checklist 2-1

Read Chapter of Page 153 of Page 153 about External Configuration Source

Cisco IOS Command-Line Interface Functions

Read Chapter 2 of Page 154 about IOS Command Line

Read Chapter 2 of Page 155 about EXEC Mode

Read Chapter 2 of Page 156-158 about Help in CLI

Read Chapter 2 of Page 159 about Editing Commands

Read Chapter 2 of Page 160 about Command History

Page 11: Session Plan ICND1

Switch LED Indicators

Logging In to the Switch

MAC Address Table Management

LO 5 Enable physical, access, and port-level security on a switch

Physical Startup of the Catalyst Switch

LectureOral PresentationSimulation ActivitiesDemonstrationLaboaratory Work

Read Chapter 2 of Page 163 about Starting a Catalyst Switch

Answer Oral Questionning

Answer Written Exam

Perform Initial Catalyst Switch Startup on Page 163

Compare answer to Evidence Plan

Compare answer to Written Exam

Evaluate work based on Page 163

Read Chapter 2 of Page 164 about Switch LED

Viewing Initial Bootup Output from the Switch

Read Chapter 2 of Page 166-167 about Initial Bootup

Perform Switch Configuration on Page 167

Evaluate work based on Page 167

Read Chapter 2 of Page 168 about Switch Logging

Configuring a Switch from the Command Line

Read Chapter 2 of Page 169 about Configuring Switch from CLI

Perform Switch Configuration on Page 169

Evaluate work based on Page 169

Showing the Switch Initial Startup Status

Read Chapter 2 of Page 170 about Switch Initial Startup Status

Perform Switch Configuration on Page 171-172

Evaluate work based on Page 171-172

Read Chapter 2 of Page 173 about Mac Address Table Management

Page 12: Session Plan ICND1

Physical and Environmental Threats

Configuring Password Security

Configuring the Login Banner

Telnet Versus SSH Access

Port Security Configuration

Securing Unused Ports

LO 6 List the ways in which an Ethernet LAN can be optimizedMicrosegmentation

LectureOral PresentationSimulation ActivitiesDemonstrationLaboaratory Work

Read Chapter 2 of Page 175 about Physical and Environmental Threats

Answer Oral Questionning

Answer Written Exam

Compare answer to Evidence Plan

Compare answer to Written Exam

Read Chapter 2 of Page 175-177 about Configuring Security

Perform Password Security Configuration on Page 175-177

Compare Configuration on Page 175-177

Read Chapter 2 of Page 177 about Login Banner

Perform Steps on Page 177

Evaluate results on Page 177

Read Chapter 2 of Page 178 about Telnet vs SSH

Perform Step on Page 178

Compare results on Page 178

Read Chapter 2 of Page 178-181 about Port Security Configuration

Perform steps on Page 179-181

Evalaute results on Page 179-181

Read Chapter 2 of Page 182 about Securing Unused Ports

LectureOral PresentationSimulation ActivitiesDemonstrationLaboaratory Work

Read Chapter 2 of Page 182 about Microsegmentation

Answer Oral Questionning

Answer Written Exam

Perform Task Sheet 2-2

Compare answer to Evidence Plan

Compare answer to Written Exam

Evaluate work based on Perfomance Sheet 2-2

Page 13: Session Plan ICND1

Duplex Communication

LO 7 Describe methods of troubleshooting switch issuesUsing a Layered Approach

Read Chapter 2 of Page 183-186 about Duplex Communication

Perform Duplex Configuration on Page 185-186

Evaluate results on Page 185-186

Need for Different Media Rates in an Enterprise Network

Read Chapter 2 of Page 187 about Different Media Rates

Physical Redundancy in an Ethernet LAN

Read Chapter 2 of Page 187-189 about Physical Redundancy

Loop Resolution with Spanning Tree Protocol (STP)

Read Chapter 2 of Page 190 about Loop Resolution

Performa Task Sheet 2-3

Evaluate answer based on Performance Sheet 2-3

LectureOral PresentationSimulation ActivitiesDemonstrationLaboaratory Work

Read Chapter 2 of Page 192 about the Layered Approach

Answer Oral Questionning

Answer Written Exam

Compare answer to Evidence Plan

Compare answer to Written Exam

Identifying and Resolving Media Issues

Read Chapter 2 of Page 192 about Resolving Media Issues

Perform Configuration based on Page 192-193

Evaluate Result based on Page 192-193

Identifying and Resolving Common Access Port Issues

Read Chapter 2 of Page 194 about Common Port Issues

Identifying and Resolving Common Configuration Issues

Read Chapter 2 of Page 194 about Resolving Common Configuration Issues

Page 14: Session Plan ICND1

SESSION PLAN

Learning Outcome/s:

LO 1 Describe the function of routing in the network modelLO 2 Convert a decimal number into a binary number and a binary number into decimal formatLO 3 Describe how IP constructs network addressesLO 4 Start a router and use the CLI to configure and monitor the routerLO 5 Implement a basic configuration for a Cisco routerLO 6 Describe the packet flow from one host to another through a routerLO 7 Implement basic router securityLO 8 Describe basic SDM featuresLO 9 Use SDM to enable a DHCP server on the routerLO 10 Remotely access a router using Telnet and SSH

A. INTRODUCTIONModule 3, “LAN Connections,” looks at how a router provides connectivity between the different networks in an internetwork. This module also describesIP addressing number conversion and basic routing configuration skills.

B. LEARNING ACTIVITIESLO 1 Describe the function of routing in the network modelLearning Content Methods Presentation Practice Feedback

Sector: Information and Communication Technology

Qualification Title: Network Administration

Unit of Competency: LAN Connections

Module Title: Connections Through LANs

Page 15: Session Plan ICND1

Exploring the Functions of Routing

Routers

Path Determination

Routing Tables

Dynamic Routing Protocols

LO 2 Convert a decimal number into a binary number and a binary number into decimal formatDecimal and Binary Systems

Powers of 2

Decimal-to-Binary Conversion

LectureOral PresentationGroup discussion

Read Chapter 4 of Page 237-238 about the Function of a Router

Answer Oral Questionning

Answer Written Exam

Compare answer to Evidence Plan

Compare answer to Written Exam

Read Chapter 4 of Page 238 about Routers

Read Chapter 4 of Pge 239 about Path Determination

Read Chapter 4 of Page 240-241 about Routing Tables

Static, Dynamic, Directly Connected, and Default Routes

Read Chapter 4 of Page 242 about Statis, Dynamic, Directly Connected, & Default Routes

Read Chapter 4 of Page 242-244 about Dynamic Routing

LectureOral PresentationSimulation ActivitiesDemonstrationLaboaratory Work

Read Chapter 4 of Page 246-249 about Number System

Answer Oral Questionning

Answer Written Exam

Perform Calculation on Page 247-249

Compare answer to Evidence Plan

Compare answer to Written Exam

Compare Answer on Page 247-249

Read Chapter 4 of Page 249 about Powers of 2

Read Chapter 4 of Page 250 about Decimal-to-Binary Conversion

Performa calculation based on Page 250-251

Compare answer on Page 250

Page 16: Session Plan ICND1

Binary-to-Decimal Conversion Read Chapter 4 of Page 251 about Binary-to-Decimal Conversion

Performa calculation based on Page 251-252

Compare answer on Page 251

Page 17: Session Plan ICND1

LO 3 Describe how IP constructs network addressesSubnetworks

How End Systems Use Subnet Masks

How Routers Use Subnet Masks

Mechanics of Subnet Mask Operation

Applying Subnet Mask Operation

Class C Example

Class B Example

LectureOral PresentationSimulation ActivitiesDemonstrationLaboaratory Work

Read Chapter 4 of Page 252 about Subnetworks

Answer Oral Questionning

Answer Written Exam

Perform Calculation on Page 255

Compare answer to Evidence Plan

Compare answer to Written Exam

Compare Answer on Page 255

Computing Usable Subnetworks and Hosts

Read Chapter 4 of Page 255 about Computing Usable Subnetwork & Hosts

Perform Calculation on Page 255-258

Compare answer on Page 255-258

Read Chapter 4 of Page 258 about End System Using Subnet Masks

Read Chapter 4 of Page 259-260 about How Routers Use Subnet Masks

Read Chapter 4 of Page 261-262 about Mechanics of Subnet Masks

Perform calculation based on Page 262-263

Compare results on Page 262-263

Read Chapter 4 of Page 263 about Subnet Mask Operation

Perform calculations on Page 263-264

Compare results on Page 263-264

Determining the Network Addressing Scheme

Read Chapter 4 of Page 264 about Network Addressing Scheme

Perform calculations on Page 264-265

Compare results on Page 264-265

Read Chapter 4 of Page 265-266 about Example of Class C

Perform calculations based on Page 265-266

Compare answer on Page 267

Read Chapter 4 of Page 267 about Example of Class B

Perform calculation on Page 267-268

Compare answer on Page 268

Page 18: Session Plan ICND1

Class A Example

LO 4 Start a router and use the CLI to configure and monitor the routerInitial Startup of a Cisco Router

Initial Setup of a Cisco Router

Logging In to the Cisco Router

LO 5 Implement a basic configuration for a Cisco routerCisco Router Configuration Modes

Read Chapter 4 of Page 268 about Example of Class A

Perform calculation based on Page 268-269

Compare answer on Page 270

LectureOral PresentationSimulation ActivitiesDemonstrationLaboaratory Work

Read Chapter 4 of Page 271 about Initial Startup of a Cisco Router

Answer Oral Questionning

Answer Written Exam

Perform steps on Page 271

Compare answer to Evidence Plan

Compare answer to Written Exam

Evaluate answer on Page 271-272

Read Chapter 4 of Page 272-278 about Initial Setup of a Cisco Router

Perform activities on Page 272-278

Compare answer based on Page 272-278

Read Chapter 4 of Page 279 about Cisco Router Logging

Perform steps on Page 280

Compare result based on Page 280

Showing the Router Initial Startup Status

Read Chapter 4 of Page 282 about Cisco Router Initial Startup Status

LectureOral PresentationSimulation ActivitiesDemonstrationLaboaratory Work

Read Chapter 4 of Page 283 about Configuration Modes

Answer Oral Questionning

Answer Written Exam

Perform steps on Page 285

Compare answer to Evidence Plan

Compare answer to Written Exam

Evaluate result on Page 285

Configuring a Cisco Router from the CLI

Read Chapter 4 of Page 285 about Configuring Cisco Router from CLI

Perform Step on Page 286

Evaluate result on Page 286

Page 19: Session Plan ICND1

Configuring Cisco Router Interfaces

Verifying the Interface Configuration

LO 6 Describe the packet flow from one host to another through a routerLayer 2 Addressing

Layer 3 Addressing

Host-to-Host Packet Delivery

Using the show ip arp Command

Using Common Cisco IOS Tools

LO 7 Implement basic router securityPhysical and Environmental Threats

Read Chapter 4 of Page 287 about Configuring Cisco Router Interface

Perform steps on Page 287-288

Evaluate result on Page 287-288

Configuring the Cisco Router IP Address

Read Chapter 4 of Page 288 about Cisco Router IP Address

Perform steps on Page 288

Evaluate result on Page 288

Read Chapter 4 of Page 289 about Verifying Interface Configuration

Perform steps on Page 289

Evaluate results on Page 289-293

LectureOral PresentationGroup discussionDemonstration

Read Chapter 4 of Page 295 about Layer 2 Addressing

Answer Oral Questionning

Answer Written Exam

Compare answer to Evidence Plan

Compare answer to Written Exam

Read Chapter 4 of Page 295 about Layer 3 Addressing

Read Chapter 4 of Page 295 about Host-to-Host Packet Delivery

Read Chapter 4 of Page 302 about IP ARP Tool

Read Chapter 4 of Page 304 about Cisco IOS Tools

LectureOral PresentationSimulation ActivitiesDemonstrationLaboaratory Work

Read Chapter 4 of Page 305-306 about Physical and Environmental Threats

Answer Oral Questionning

Answer Written Exam

Compare answer to Evidence Plan

Compare answer to Written Exam

Page 20: Session Plan ICND1

Configuring Password Security

Configuring the Login Banner

Telnet and SSH Access

LO 8 Describe basic SDM featuresCisco SDM Overview

More Link

Configuration Overview

Cisco SDM Wizards

LO 9 Use SDM to enable a DHCP server on the routerUnderstanding DHCP

Read Chapter 4 of Page 306 about Password Security

Read Chapter 4 of Page 307 about Login Banner

Read Chapter 4 of Page 307 about Telnet & SSH

Perform IOS Commands on Page 308

Evaluate results on Page 308

LectureOral PresentationSimulation ActivitiesDemonstrationLaboaratory Work

Read Chapter 4 of Page 309 about Cisco SDM

Answer Oral Questionning

Answer Written Exam

Compare answer to Evidence Plan

Compare answer to Written Exam

Configuring Your Router to Support Cisco SDM

Read Chapter 4 of Page 311 about Configuring Cisco SDM

Perform activities on Page 311-312

Evaluate results on Page 311-312

Read Chapter 4 of Page 314 about Links

Read Chapter 4 of Page 314 about Configuration Overview

Read Chapter 4 of Page 316 about Cisco SDM Wizards

LectureOral PresentationGroup discussion

Read Chapter 4 of Page 317-318 about DHCP

Answer Oral Questionning

Answer Written Exam

Compare answer to Evidence Plan

Compare answer to Written Exam

Page 21: Session Plan ICND1

Monitoring DHCP Server Functions

Using a Cisco Router as a DHCP Server

Read Chapter 4 of Page 319 about DHCP Server

Using Cisco SDM to Enable the DHCP Server Function

Read Chapter 4 of Page 319 about Using SDM as DHCP Server

Read Chapter 4 of Page 321 about Monitoring DHCP Server

Page 22: Session Plan ICND1

LO 10 Remotely access a router using Telnet and SSH

Closing a Telnet Session

Alternate Connectivity Tests

Establishing a Telnet or SSH Connection

LectureOral PresentationSimulation ActivitiesDemonstrationLaboaratory Work

Read Chapter 4 of Page 323 about Telnet or SSH Connection

Answer Oral Questionning

Answer Written Exam

Perform activity on Page 323

Compare answer to Evidence Plan

Compare answer to Written Exam

Evaluate answer on Page 323

Suspending and Resuming a Telnet Session

Read Chapter 4 of Page 325 about Telnet Session

Perform activity on Page 235-236

Evaluate answer on Page 235-236

Read Chapter 4 of Page about Closing a Telnet Session

Perform activity on Page 236

Evaluate answer on Page 236

Read Chapter 4 of Page 327 about Alternate Connectivity Tests

Perform activity on Page 237

Evaluate answer on Page 237

Page 23: Session Plan ICND1

SESSION PLAN

When you are building a network, the tasks and components can sometimes be overwhelming. The key to understanding how to build a computer network lies in understanding the foundations of network communications. The key to building a complex network involves gaining an understanding of the physical and logical components of a simple point-to-point network. To become proficient in networking, you must gain knowledge of why networks are built and the protocols used in modern network designs. This activity explores the basics of networking and provides a solid foundation

Resources Time6hrs.Interconnecting Cisco

Network Devices Part 1 (ICND1)Multimedia ProjectorPDF FileEbookPrinter Material

Page 24: Session Plan ICND1
Page 25: Session Plan ICND1

3hrs.

LO 3 Identify and compare the Open System Interconnection (OSI) and TCP/IP layered models that control host-to-host communications3hrs.

Interconnecting Cisco Network Devices Part 1 (ICND1)Multimedia ProjectorPDF FileEbookPrinted Material

Interconnecting Cisco Network Devices Part 1 (ICND1)Multimedia ProjectorPDF FileEbookPrinted Material

Page 26: Session Plan ICND1

6hrs.

3hrs.

Interconnecting Cisco Network Devices Part 1 (ICND1)Multimedia ProjectorPDF FileEbookPrinted Material

Interconnecting Cisco Network Devices Part 1 (ICND1)Multimedia ProjectorPDF FileEbookPrinted Material

Page 27: Session Plan ICND1

6hrs.Interconnecting Cisco Network Devices Part 1 (ICND1)Multimedia ProjectorPDF FileEbookPrinted Material

Page 28: Session Plan ICND1

3hrs.Interconnecting Cisco Network Devices Part 1 (ICND1)Multimedia ProjectorPDF FileEbookPrinted Material

Page 29: Session Plan ICND1

3hrs.Interconnecting Cisco Network Devices Part 1 (ICND1)Multimedia ProjectorPDF FileEbookPrinted Material

Page 30: Session Plan ICND1

SESSION PLAN

This chapter describes the various types of Ethernet LAN topologies, details the challenges of shared LANs and how those challenges are solved with switched

Resources Time

Page 31: Session Plan ICND1

3hrs.

3hrs.

Interconnecting Cisco Network Devices Part 1 (ICND1)Multimedia ProjectorPDF FileEbookPrinted Material

Interconnecting Cisco Network Devices Part 1 (ICND1)Multimedia ProjectorPDF FileEbookPrinted Material

Page 32: Session Plan ICND1

3hrs.

1hr.

Interconnecting Cisco Network Devices Part 1 (ICND1)Multimedia ProjectorPDF FileEbookPrinted MaterialPacket Tracer 5.1 or higher

Page 33: Session Plan ICND1

3hrs.

1hr.

30min.

30min.

Interconnecting Cisco Network Devices Part 1 (ICND1)Multimedia ProjectorPDF FileEbookPrinted MaterialPacket Tracer 5.1 or higher

Page 34: Session Plan ICND1

3hrs.

30min.

30min.

30min.

30min.

3hrs.

Interconnecting Cisco Network Devices Part 1 (ICND1)Multimedia ProjectorPDF FileEbookPrinted MaterialPacket Tracer 5.1 or higher

Interconnecting Cisco Network Devices Part 1 (ICND1)Multimedia ProjectorPDF FileEbookPrinted MaterialPacket Tracer 5.1 or higher

Page 35: Session Plan ICND1

1hr.

3hrs.

30min.

Interconnecting Cisco Network Devices Part 1 (ICND1)Multimedia ProjectorPDF FileEbookPrinted MaterialPacket Tracer 5.1 or higher

Page 36: Session Plan ICND1

SESSION PLAN

Module 3, “LAN Connections,” looks at how a router provides connectivity between the different networks in an internetwork. This module also describes

Resources Time

Page 37: Session Plan ICND1

3hrs.

3hrs.

30min.

Interconnecting Cisco Network Devices Part 1 (ICND1)Multimedia ProjectorPDF FileEbookPrinted Material

Interconnecting Cisco Network Devices Part 1 (ICND1)Multimedia ProjectorPDF FileEbookPrinted MaterialPacket Tracer 5.1 or higher

Page 38: Session Plan ICND1

30min.

Page 39: Session Plan ICND1

3hrs.

30min.

30min.

30min.

30min.

30min.

30min.

Interconnecting Cisco Network Devices Part 1 (ICND1)Multimedia ProjectorPDF FileEbookPrinted MaterialPacket Tracer 5.1 or higher

Page 40: Session Plan ICND1

30min.

3hrs.

30min.

30min.

3hrs.

30min.

Interconnecting Cisco Network Devices Part 1 (ICND1)Multimedia ProjectorPDF FileEbookPrinted MaterialPacket Tracer 5.1 or higher

Interconnecting Cisco Network Devices Part 1 (ICND1)Multimedia ProjectorPDF FileEbookPrinted MaterialPacket Tracer 5.1 or higher

Page 41: Session Plan ICND1

30min.

30min.

30min.

3hrs.

3hrs.

Interconnecting Cisco Network Devices Part 1 (ICND1)Multimedia ProjectorPDF FileEbookPrinted Material

Interconnecting Cisco Network Devices Part 1 (ICND1)Multimedia ProjectorPDF FileEbookPrinted MaterialPacket Tracer 5.1 or higher

Page 42: Session Plan ICND1

30min.

3hrs.

3hrs.

Interconnecting Cisco Network Devices Part 1 (ICND1)Multimedia ProjectorPDF FileEbookPrinted MaterialPacket Tracer 5.1 or higher

Interconnecting Cisco Network Devices Part 1 (ICND1)Multimedia ProjectorPDF FileEbookPrinted Material

Page 43: Session Plan ICND1
Page 44: Session Plan ICND1

3hrs.

30min.

30min.

30min.

Interconnecting Cisco Network Devices Part 1 (ICND1)Multimedia ProjectorPDF FileEbookPrinted MaterialPacket Tracer 5.1 or higher