Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
CompTIA’s Network+
(Exam N10-002)
Table of Contents
Table of Contents...............................................................................................................1
Course Overview................................................................................................................2
Course Preparation...........................................................................................................4
Section 1-1: Networking Theory.......................................................................................5
Section 1-2: Standards Organizations.............................................................................8
Section 1-3: A Typical Computer Network...................................................................10
Section 1-4: Varieties of Computer Networks...............................................................13
Section 2-1: The OSI Application Layer.......................................................................16
Section 2-2: The OSI Presentation Layer......................................................................18
Section 2-3: The OSI Session Layer...............................................................................21
Section 2-4: The OSI Transport Layer..........................................................................23
Section 2-5: The OSI Network Layer.............................................................................25
Section 2-6: The OSI Data Link Layer..........................................................................28
Section 2-7: The OSI Physical Layer.............................................................................31
Section 2-8: Multi-Layer Concepts................................................................................34
Section 3-1: Cables and Connectors...............................................................................36
Section 3-2: Ethernet (IEEE 802.3)................................................................................39
Section 3-3: Other LAN Standards................................................................................43
Section 3-4: WAN Links..................................................................................................46
Section 4-1: Common Protocol Suites............................................................................50
Section 4-2: TCP/IP.........................................................................................................56
Section 5-1: Security........................................................................................................64
Section 5-2: Fault Tolerance...........................................................................................69
Section 5-3: Performance................................................................................................72
Section 6-1: Installation...................................................................................................74
Section 6-2: Maintenance................................................................................................77
Section 6-3: Troubleshooting..........................................................................................79
Appendix A: Network+ Exam Objectives.....................................................................83
Before beginning the Network+ course, students should have a basic knowledge of
computer hardware and software. CompTIA's A+ certification is excellent preparation.
Recommend that students consider completing the following courses:
Module 1
Module 1 introduces the concept of a network.
Module 2
Module 2 explains details of the OSI model.
Module 3
Module 3 introduces Physical and Data Link standards used to build a network's
foundation.
Module 4
Module 4 introduces common protocols that correspond to the upper layers of the OSI
model. The focus is the TCP/IP protocol suite.
Module 5
Module 5 explains principles for managing access to the network and its resources.
Module 6
Module 6 explains and summarizes several network administration tips.
Module 7
Module 7 reviews details for the Network+ exam. It is meant to be used as a final review
and study guide.
Lab/Activities
This section of each lesson plan contains two different types of activities that can be
adapted to your classroom environment. Lecture activities can be presented on the board
or with handouts. They do not require student computers, so they work well in a
Homework Suggestions
Require each student to maintain a lab notebook. This could be a simple spiral notebook
or a three-ring binder. As part of their homework and during lab activities, have students
record/document the steps required to complete certain procedures. Recording procedures
reinforces steps and concepts, and gives the student a place to look for directions when
they want to repeat a task, but don’t remember the exact procedure. It also provides an
assessment tool for the instructor.
The Homework Suggestions section also lists the focus question for the next section.
Present this question at the end of class. Start each class with the focus question presented
in the previous class. Encourage students to be prepared to answer the question, but make
sure they understand that you don’t need a complete answer. You want them to preview
the next section for a basic answer. This can help stimulate a better quality discussion and
questions during the lecture. It will also help you assess student understanding of the
topic.
Consider the focus question for Section 1-3. What are the major components of a
computer network? Students should be able to provide simple responses such as:
Resources, servers, and clients.
Connectivity devices like routers and hubs.
Ideally, your classroom hub or switch will be accessible so you can unplug the classroom
network from the rest of the network. This allows you to practice items that are
potentially disruptive. When running something that is potentially disruptive, simply
unplug the classroom until the practice is over. For example, when students practice
assigning IP addresses, unplug the classroom so you don’t have to worry about duplicate
IP addresses.
One way to create this a practice lab is to use removable hard drives in the student
computers. Students check out the drives for their classes. This allows you to teach
multiple classes in a single lab, while preventing one class from damaging or destroying
the installations used by another class. To facilitate the frequent computer operating
system rebuilds required by this type of lab, consider investing in disk duplication
software. You could also create unattended installation files to automate the baseline
Windows 2000 installations needed for the lab computers.
Exam Objectives
2.2 Identify the seven layers of the OSI model and their functions.
3.5 Identify the purpose and characteristics of fault tolerance.
3.6 Identify the purpose and characteristics of disaster recovery.
Time
About 2 hours
Lecture Tips
Introduce Instructor.
Have each student introduce themselves, explain why they are taking the course,
and what they hope to get out of it.
Hand out and explain syllabus, lab policies, and any other required introductory
material.
Lab/Activity
Lecture Activity
Have the class recite the OSI mnemonics aloud a few times.
Try activities to help students put the OSI layers in the correct order, and identify
function of each layer.
o Label cards with OSI layers and hand them out to the class. Have students
line up in the correct order.
o Have students write the OSI layers in order three times.
o Bring labeled blocks and ask students to stack them.
o Give a student a function and ask him or her to identify the layer.
o Give a student a layer and ask him or her to identify the function.
The following idea would make a nice pop quiz for the next class period.
o Write the OSI layers in order and define the main purpose of each layer.
Computer Lab Activity
Assessment
Use the introduction to basic networking terms to check prerequisite background. As
students log on and start the courseware, check for basic interface skills. Students who
have trouble finding the Start Menu or using the mouse probably belong in a basic skills
course.
Homework Suggestions
Read Section 1-1 and take the section test.
Research the focus question for the next section.
o How are networking standards set?
Vocabulary: ISO, IEEE, ISOC, InterNIC, ICANN, IEC, ANSI, ITU, EIA/TIA,
RFC
Time
About 30 minutes
. Tips
Start with the focus question. Do students have any questions about the material
they have studied?
Briefly discuss the role of each of the standards organizations.
o ISO
o IEEE
o ISOC
Discuss RFCs.
o InterNIC
o ICANN
o IEC
o ANSI
o ITU
o EIA/TIA
Lab/Activity
Computer Lab Activity
Go to http://www.icann.org/ and find out how to register for an Internet domain
name.
Assessment
Check lab notebooks.
Exam Objectives
1.6 Identify the purpose, features, and functions of network components.
2.4 Identify the OSI layers at which network components operate.
3.4 Identify the main characteristics of network attached storage.
Time
About 1 hour
Lecture Tips
Start with the focus question. Do students have any questions about the material
they have studied?
Introduce typical computer network components.
o Resources, servers, clients, connectivity devices.
Discuss network resources and servers.
o Service software.
o Protocol software.
o Network card and driver.
o Explain the difference between:
External server devices.
External server devices including resources.
NAS – another name for a file server.
Internal server devices.
Discuss client computers.
o Applications.
Lab/Activity
Lecture Activity
Write layers and devices on slips of paper and put them in a box. Have each
student retrieve a card and identify the layer associated with the device or one
device associated with the layer.
The following idea would make a nice pop quiz for the next class period.
o Give students a list of devices and have them identify the layers at which
the devices work
Computer Lab Activity
If you can, take a tour of a wiring closet and point out cables, patch panels, hubs,
routers, etc.
Assessment
Check lab notebooks.
Exam Objectives
1.6 Identify the purpose, features, and functions of network components.
2.11 Identify the basic characteristics of WAN technologies.
2.12 Define the function of remote access protocols and services.
Focus Question: How are networks classified, and what types of services do they
typically provide?
Time
About 1 hour
Lecture Tips
Start with the focus question. Do students have any questions about the material
they have studied?
Networks can be classified by size and scope. Explain each concept. How does
your network fit into these categories?
o LAN
o MAN
o WAN
Briefly mention LAN and WAN standards. These are covered in detail later in the
course, so at this point simply mention that they exist.
o LAN technologies.
Ethernet, Wi-Fi, Token Ring, FDDI.
What does your network use?
o WAN technologies.
Lab/Activity
Computer Lab Activity
Log on to the network as a group. Discuss the logon screen and user vs. share
level security. What type of security are you using? How do you know? Do the
interfaces and operating system give you any indication of the type of security?
Use My Network Places (Network Neighborhood) to browse your computer
network.
o Identify servers and discuss the services provided by each server.
o Identify client computers. Are any of them participating in a peer-to-peer
network?
Assessment
Check lab notebooks.
Homework Suggestions
Read Section 1-4 and take the section test.
Research the focus question for the next section.
o What are the functions of the application layer of the OSI model?
On a Windows 2000 Professional computer, right-click My Computer, then click
Manage. Browse to System Tools > Local Users and Groups > Users. What user
accounts exist? Does this computer use share or user level security?
On a Windows 9x/Me computer, logon with a user name. Then logon again with a
different user name. Log on again, but this time cancel the logon dialog box so
that no user name is entered. Are these actual user accounts? Do they control your
ability to use the computer? What are they for?
Exam Objectives
2.2 Identify the seven layers of the OSI model and their functions.
Focus Question: What are the functions of the application layer of the OSI
model?
Time
About 1 hour
Lecture Tips
Start with the focus question. Do students have any questions about the material
they have studied?
The Application layer provides an interface to the software that allows programs
to use network services.
o The term application does not refer to a specific program, such as a word
processor; this is a common misunderstanding.
o Example: You are running Word and try to open a file stored on a file
server and the request for the file is transferred to the network by the
application layer.
Briefly discuss service advertisement.
o Active service advertisement.
o Passive service advertisement.
o Active client advertisement.
o Passive client advertisement.
Discuss service protocols.
o Remind students of major services: file, print, web, mail, fax, application,
database, directory, remote access.
Lab/Activity
Computer Lab Activity
Explore a few service protocols. (Check sites to make sure they are available
before class.)
o Use a browser to open http://www.microsoft.com and an ftp site. Point
out the http and ftp protocols. They tell the browser which service protocol
you are using.
o Open a mail client such as Outlook Express. Open the properties for a mail
account and point out the POP, IMAP, and SMTP server configuration
parameters.
Assessment
Check lab notebooks.
Homework Suggestions
Read Section 2-1 and take the section test.
Research the focus question for the next section.
o What are the functions of the presentation layer of the OSI model?
Research the following question. Novell’s IPX/SPX protocol suite contains the
Service Advertisement Protocol (SAP). What type of advertisement technique
does it use?
Exam Objectives
2.2 Identify the seven layers of the OSI model and their functions.
Focus Question: What are the functions of the presentation layer of the OSI
model?
Time
About 1 hour
Lecture Tips
Start with the focus question. Do students have any questions about the material
they have studied?
The Presentation layer acts as a translator between the application and the
network. It formats data in a fashion that the network can use. It manages
encryption and decryption. Presentation layer protocols also code and decode
graphic and file format information.
Discuss data encryption.
o Symmetric encryption (secret key encryption).
One key is used to encrypt and decrypt.
How do you exchange the key safely?
o Asymmetric encryption.
Lab/Activity
Lecture Activity
Make two identical keys. Label them both symmetric. Make two different keys.
Label one private and the other public. You also need a piece of paper to represent
a message and an envelope.
Symmetric encryption activity.
o Give a symmetric key to one student. Explain that you are using your key
to encrypt your message. Then pass the message around the class.
Who can read the message?
What is the security issue with this technique? (How do you keep
the key secret – you need to get a copy of it to the person who is
supposed to be able to read the message.)
Asymmetric encryption activity.
o Put your public key on display in front of the class, and put your private
key in your pocket or desk.
o Give the message paper to a student. Ask him or her to encrypt the
message with your public key. (Have student put the message in the
envelope and lock it with the key.)
Why can the student encrypt the message? (Stress the point that
your public key really is public and anyone can use it to encrypt
something.)
o Pass the message around the class until it gets to you. Make a point of
using your private key to open the envelope, but don’t let them see your
private key. (It’s private!)
Who can read the message?
What happens if your private key is compromised?
o Now demonstrate signing. Write your name on the message and use your
private key to encrypt the signature.
Who can decrypt the signature? (Stress that they all have access to
the public key.)
What is the point of signing the message? (You are the only one
with your public key. If students can decrypt your signature, you
must have sent the message.)
Assessment
Check lab notebooks.
Homework Suggestions
Read Section 2-2 and take the section test.
Research the focus question for the next section.
o What are the functions of the session layer of the OSI model?
Use the Internet to investigate PGP – Pretty Good Privacy.
Use the Internet to investigate encryption restrictions.
o Many countries restrict access to or export of encryption technologies.
o Why? What types of restrictions can you find? Does the US have any
restrictions?
Exam Objectives
2.2 Identify the seven layers of the OSI model and their functions.
Focus Question: What are the functions of the session layer of the OSI model?
Time
About 1 hour
Lecture Tips
Start with the focus question. Do students have any questions about the material
they have studied?
The Session layer of the OSI model is responsible for establishing and
maintaining a connection between two nodes on the network. It describes how
network clients and services establish, maintain, and terminate communication
sessions with each other.
o The term “traffic cop” is often used to describe this layer
Do the lecture activity.
Discuss connection-oriented.
o Establish, maintain, terminate the connection.
o Creates a session.
o Reliable.
o Creates overhead.
Discuss connectionless communication.
o Does not verify existence of the other device.
o Does not establish, maintain, or terminate the connection.
Lab/Activity
Lecture Activity
You want to introduce the idea of making a connection before starting to
communicate. Don’t give the students any warning. Simply toss a ball to someone
in the class. Then tell another student that you are going to toss a ball his or her
way, and throw the ball.
o If you want someone to catch the ball, which approach is more reliable?
o If all you are worried about is throwing the ball, which approach is faster?
o Which approach takes more effort on your part?
Assessment
Check lab notebooks.
Homework Suggestions
Read Section 2-3 and take the section test.
Research the focus question for the next section.
o What are the functions of the transport layer of the OSI model?
Research TCP, which is a connection oriented protocol. How does TCP perform
handshaking?
Exam Objectives
2.2 Identify the seven layers of the OSI model and their functions.
Focus Question: What are the functions of the transport layer of the OSI model?
Time
About 1 hour
Lecture Tips
Start with the focus question. Do students have any questions about the material
they have studied?
The Transport layer makes sure that messages are transferred from node A to
node B reliably, without errors, and in the correct sequence.
o It manages flow control, the speed at which the recipient can accept data.
o If a message is too large for type of network, the Transport layer breaks
the message into smaller pieces.
Example: Most Ethernet networks cannot use packets greater than
1500 bytes. Token Ring packets may be much larger (4,464 to
17,914 bytes). If a packet is too large when it passes from the
Token Ring network to the Ethernet network, it has to be broken
into smaller pieces.
Use the lecture activity to introduce acknowledged and unacknowledged
communication.
Define acknowledged communication.
o More overhead, accurate communication.
Lab/Activity
Lecture Activity
Introduce acknowledged and unacknowledged communication. You need a few
note cards to represent message segments.
o With two students, one student passes a card to another. The second
student must say “I have card 1” before the first student can pass the next
card.
o With two students, one student passes a card to another. The first student
simply hands the cards over as fast as he can. The second student takes the
cards, but doesn’t say anything, even if he drops a card. (Encourage the
second student to drop a card.)
o Which technique is faster? Which is more accurate? Which generates
more overhead?
Introduce the need for flow control. Draw a picture of a device with three buffers.
Have another device rapidly send messages. What happens to the messages when
the buffer is full?
Assessment
Did students participate?
Homework Suggestions
Read Section 2-4 and take the section test.
Research the focus question for the next section.
o What are the functions of the network layer of the OSI model?
Research TCP windowed flow control. How does it work?
Before class, configure your computer as a router. If you only have one NIC in the
computer, use Add/Remove Hardware to install a second, fake NIC. Configure the IP
settings for the NIC. Run the RRAS wizard and configure the computer as a router. Open
Routing and Remote Access, right click the server, and select Enable Routing and
Remote Access. Select the router option and follow the steps in the wizard. This sets up a
routing table that you can demonstrate for the class.
If your computer is not normally configured as a router, after class, open Routing and
Remote Access, right click the server, and select Disable Routing and Remote Access.
Then use Device Manager to uninstall the fake NIC.
Exam Objectives
1.6 Identify the purpose, features, and functions of the following network
components:
2.2 Identify the seven layers of the OSI model and their functions.
2.4 Identify the OSI layers at which the following network components
operate:
Focus Question: What are the functions of the network layer of the OSI model?
Time
About 1½ hours
Lecture Tips
Start with the focus question. Do students have any questions about the material
they have studied?
The Network layer determines how data is routed from one part of the network to
another. It also resolves the logical computer address (at the network layer) with
the physical address of the network adapter (at the data link layer).
o The network layer is responsible for routing data between subnetworks. It
needs some type of addressing to identify computers, so it can decide
where to send the messages.
Define network addressing. (Stress this topic.)
o Discuss non-routable addressing.
o Discuss routable addressing.
o Draw a picture of a network with a router connecting a few segments.
Explain how non-routable and routable addressing works in this
environment.
A non-routable address does not have segment IDs, so computers
on different segments cannot communicate.
A routable address has segment IDs, so computers on different
segments can communicate.
Explain the difference between point-to-point and multipoint addressing. (Stress
this topic.)
o Point-to-point – send a message from one computer to another computer
Unicast.
o Point-to-multicast – send a message from one computer to many
Broadcast.
Multicast.
Define routing.
o What is the function of a router? (Stress this topic.)
It looks at the network address on a message and determines where
to send the message.
o Very briefly discuss routing methods (This is not needed for the exam.)
Circuit switched.
Packet switched.
Source intelligent.
Router intelligent.
Packet intelligent.
Permanent circuits.
On-demand circuits.
Lab/Activity
Computer Lab Activity
Use the route command to display the routing table on student computers.
Assessment
Check lab notebooks.
Homework Suggestions
Read Section 2-5 and take the section test.
Research the focus question for the next section.
o What are the functions of the data link layer of the OSI model?
Use the Internet to investigate routers. Compare features and price of two
different routers.
Before class create a handout listing about 5 to 10 different MAC addresses. Some
addresses should be legitimate, some not.
Exam Objectives
1.6 Identify the purpose, features, and functions of the following network
components:
2.1 Given an example, identify a MAC address.
2.2 Identify the seven layers of the OSI model and their functions.
2.4 Identify the OSI layers at which the following network components
operate:
3.3 Identify the main characteristics of VLANs.
Focus Question: What are the functions of the data link layer of the OSI model?
Time
About 1 hour
Lab/Activity
Lecture Activity
Pass out the handout and ask students to identify the legitimate MAC addresses.
(You may want to use this as pop quiz during your next class period.)
Which of the following are legitimate MAC addresses?
o A9-11-0C-B3-97-G1
o JB-A9-45-AC-75-71
o 12-56-63-88-4H-FF
o 5D-92-E9-AA-52-FF
o EF-C4-D4-7C-23-5A
Computer Lab Activity
Use ipconfig /all (or winipcfg) to determine the MAC addresses of the lab
computers. Record results in lab notebooks.
Homework Suggestions
Read Section 2-6 and take the section test.
Research the focus question for the next section.
o What are the functions of the physical layer of the OSI model?
Use the Internet to investigate switches. Compare features and price of two
different switches.
Before class, collect examples of cables for demonstration. Prepare diagrams to help
explain the different network topologies. Create a handout containing pictures of different
physical topologies.
Exam Objectives
1.1 Recognize the following logical or physical network topologies given a
schematic diagram or description:
1.6 Identify the purpose, features, and functions of the following network
components:
2.2 Identify the seven layers of the OSI model and their functions.
2.4 Identify the OSI layers at which the following network components
operate:
4.10 Given a troubleshooting scenario involving a network with a particular
physical topology and including a network diagram, identify the network
area affected and the cause of the problem.
4.12 Given a network troubleshooting scenario involving a
wiring/infrastructure problem, identify the cause of the problem.
Focus Question: What are the functions of the physical layer of the OSI model?
Time
About 1½ hours
Lecture Tips
Start with the focus question. Do students have any questions about the material
they have studied?
Physical layer controls the way data is actually sent over the physical medium. It
addresses data coding and the physical components.
o Data coding specifies items such as which signal actually represents a 0
and which represents a 1.
Discuss communication media.
o Electromagnetic spectrum.
Radio, microwave, infrared.
Wireless communication.
Do students use any wireless devices? Do they know which
technology is used?
Remote control, handheld computer.
o Common types of cable.
Coaxial cable.
Twisted pair cable.
STP, UTP.
Fiber-optic cable.
Multimode, single-mode.
What type of wire is used for cable TV? A phone line?
Do any students have home networks? What communication media
do they use?
What does the school use?
Define network topology.
o Explain the difference between point-to-point connections and multipoint
connections..
o Present diagrams to help explain each of the different topologies
Bus.
Ring.
Dual, counter-rotating rings.
Star.
Stress the difference between physical topology and logical
topology.
Physical star, logical bus.
Physical star, logical ring.
Tree.
Mesh.
Partial mesh, full mesh.
Lab/Activity
Lecture Activity
Pass out example cables as you discuss different types of communication media.
Pass out the topology handout and ask students to identify each topology. (You
may want to use this as a pop quiz during your next class period.)
Computer Lab Activity
Diagram the physical cable layout of the lab.
Assessment
Check lab notebooks. Check topology handouts.
Homework Suggestions
Read Section 2-7 and take the section test.
Research the focus question for the next section.
o How do you use the OSI model in a real network?
Draw a diagram of your home’s wiring infrastructure. This is most likely to be a
few cable TV lines, but it could also be a home network.
Focus Question: How do you use the OSI model in a real network?
Time
About 1 hour
Lecture Tips
Start with the focus question. Do students have any questions about the material
they have studied?
Define logical communication channels.
o Stress the concept of encapsulation.
o Example: A remote client uses a modem to connect an ISP and then
connects to his business network over the Internet. Messages sent to the
business network are encapsulated so they can be sent over the Internet.
Messages are unpackaged when they arrive at the business so they can be
used on the business network.
Define multiplexing, binding, and addressing.
o Stress the concept of binding. You can bind multiple protocols to a single
network card.
o Show students how to view bindings on your computer.
o Addressing occurs at multiple levels of the OSI model. Use an example:
www.school.edu corresponds to IP address 165.13.5.233.
165.13.5.233 corresponds to MAC address 00-06-47-3F-57-DA.
Discuss using the OSI model.
o The OSI model is a theoretical model, not the real world. Actual network
protocol implementations do not correspond directly to the OSI model.
Stress this fact, as it tends to cause confusion!
o Example: TCP/IP was developed independently of the OSI model.
Protocols loosely correspond to levels of the OSI model, but they don’t
match it exactly.
Assessment
Check lab notebooks.
Homework Suggestions
Read Section 2-8 and take the section test.
Research the focus question for the next section.
o What types of cables and connectors are commonly used in networks?
Use the Internet to investigate the OSI model. Can you find a protocol suite that
actually implements the OSI model (uses the model as it’s primary design guide)?
Suppose you use your computer to connect to the web site www.microsoft.com.
Draw a diagram and explain the connection process between the your client
computer and the web server. Explain the connection in terms of the OSI model.
Collect cables, connectors and tools to demonstrate. Collect RJ-45 connectors, UTP, and
crimpers for the cable-making lab.
Exam Objectives
1.4 Recognize the following media connectors and/or describe their uses:
1.5 Choose the appropriate media type and connectors to add a client to an
existing network.
3.7 Given a remote connectivity scenario, configure the connection.
4.5 Given a wiring task, select the appropriate tool.
Focus Question: What types of cables and connectors are commonly used in
networks?
Time
About 1½ hours
Lecture Tips
Start with the focus question. Do students have any questions about the material
they have studied?
Discuss cable standards. Pass out examples.
o American Wire Gauge (AWG) Wires.
o Radio Guide (RG) coaxial cables.
o IBM cables.
Type 1, type 2, type 3, type 5, type 5J, type 6, type 9.
o EIA/TIA 568 UTP cables.
CAT1, CAT2, CAT3, CAT4, CAT5, CAT5e.
o EIA/TIA 568 STP cables.
o EIA/TIA 568 fiber-optic cables.
Discuss Connectors. Pass out examples.
o D-shell connectors.
Low density DB 15 –AUI.
o RJ connectors.
RJ-11, RJ-45.
o BNC connectors.
o Fiber optic connectors.
ST connector, SC connector.
o Insulation displacement connectors (punchdown blocks)
o IBM data connectors.
Demonstrate common wiring schemes.
o 568A wiring scheme – present a diagram.
o 568B wiring scheme – present a diagram.
Demonstrate cabling tools. Collect as many tools as you can and demonstrate
their use.
o Cutter.
o Stripper.
o Punch down tool.
o Crimper.
Show students how to create a network cable.
o Polisher.
o Tester.
o Time domain reflectometer (TDR).
o Tone generator and locator.
o Hardware loopback plug.
Assessment
Were students able to identify the connectors? Check cables and lab notebooks.
Homework Suggestions
Read Section 3-1 and take the section test.
Research the focus question for the next section.
o How does an Ethernet network function?
Make a crossover cable. (Use the Internet to find a wiring diagram for crossover
cables.)
You need to purchase CAT5 cable for a new network. Where are you going to
buy it? How much does it cost?
You need to purchase patch cables for a new network. Where are you going to
buy them? How much do they cost?
Exam Objectives
1.2 Specify the main features of 802.2, 802.3, 802.5, 802.11b, and FDDI
networking technologies.
1.3 Specify the characteristics (speed, length, topology, cable type, etc.) of
802.3 (Ethernet) standards, 10Base-T, 100Base-TX, 10Base-2, 10Base-5,
100Base-FX, and Gigabit Ethernet
1.4 Recognize media connectors and/or describe their uses.
1.5 Choose the appropriate media type and connectors to add a client to an
existing network.
1.6 Identify the purpose, features, and functions of network components.
Time
About 1½ hours
Lab/Activity
Lecture Activity
Ask questions and have students respond verbally or record answers in lab
notebooks.
Which standard(s) use fiber? Coaxial cable? Twisted pair?
Which standard(s) use BNC connectors? RJ-45 connectors? SC connectors?
What is the maximum cable length for 10Base2? 10Base5? 10BaseT? 100BaseT?
Assessment
Check lab notebooks or verbal responses.
Homework Suggestions
Read Section 3-2 and take the section test.
Research the focus question for the next section.
o Ethernet is the most popular LAN standard. Are they any other LAN
standards?
If the school uses Ethernet, diagram a portion of the network. Identify hubs,
switches, node lactations, and cable lengths.
You are installing a 10BaseT network. Price hubs, switches, and NICS.
You are installing a 100BaseTX network. Price hubs, switches, and NICS.
You are installing a 1000BaseT network. Price hubs, switches, and NICS.
Exam Objectives
1.2 Specify the main features of 802.2, 802.3, 802.5, 802.11b, and FDDI
networking technologies.
1.4 Recognize media connectors and/or describe their uses.
1.5 Choose the appropriate media type and connectors to add a client to an
existing network.
1.6 Identify the purpose, features, and functions of network components.
2.11 Identify the basic characteristics of WAN technologies.
Vocabulary: Wi-Fi, IEEE 802.11b, Token Ring IEEE 802.5, FDDI, 100VG-
AnyLAN, IEEE 802.12, ARCNet, Token Bus, LocalTalk
Focus Question: Ethernet is the most popular LAN standard. Are they any other
LAN standards?
Time
About 1½ hours
Lecture Tips
Start with the focus question. Do students have any questions about the material
they have studied?
802.11b – wireless networking (WiFi).
o For the exam, stress the 802.11b number and wireless networking terms,
not the term WiFi.
o Framing: Variable length frames.
o Media Access: CSMA/CA.
o Topology: Cellular.
o Signaling: Direct sequence spread spectrum signaling. Data rate can reach
11 megabits per second.
802.5 – Token Ring.
o Framing: Variable length frames up to 18,000 bytes in length.
o Media Access Control: Token passing.
o Topology: Ring (hybrid of a ring and a physical star/logical ring).
o Signaling: Baseband signaling, commonly at 4 or 16 megabits per second
(updated 100 and 1000 megabit versions also exist).
All nodes must be configured to operate at the same speed.
o Cables: IBM STP, UTP, and fiber-optic cable.
o Connectors:
DB-9 connectors to connect network cards to STP cables.
IBM Data Connectors to connect STP cables to hubs or wall
outlets.
RJ-45 for most UTP cables.
Media filters to convert other connectors.
SC or ST connectors for most fiber-optic cables.
FDDI – Fiber Distributed Data Interface.
o Framing: Variable length frames up to 4500 bytes in length.
o Media Access Control: Token passing .
o Topology: Ring .
Dual attachment devices connect to dual counter rotating rings.
Single attachment devices connect only to the primary ring.
o Signaling: Baseband signaling, 1300 nanometer light waves, 100 megabits
per second.
o Cables: 62.5/125 multimode fiber recommended, single mode fiber.
o Connectors: SC or ST recommended.
Briefly mention other standards.
o 100VG-AnyLAN – IEEE 802.12 .
Lab/Activity
Lecture Activity
Quiz students on IEEE standards. (This could also be a pop quiz for your next
class period.)
o 802.2, 802.3, 802.5, 802.11b, LLC, Ethernet, Token Ring, Wireless
Call out a standard number and ask students to tell you the name.
Call out a standard number and ask students to describe it.
Call out a name and ask students for the standard number.
Assessment
Check verbal responses to lab activity or quiz.
Homework Suggestions
Read Section 3-3 and take the section test.
Research the focus question for the next section.
o How do you connect to a WAN?
You are installing a Token Ring network. Investigate the cost. Price NICS and
MAUs.
You are installing a wireless network. Investigate the cost. Price wireless
transceivers and access points.
You are installing a FDDI network. Investigate the cost. Price hubs, cabling, and
NICs.
Before class, make sure you understand your school’s WAN connections.
Exam Objectives
1.4 Recognize the following media connectors and/or describe their uses:
1.5 Choose the appropriate media type and connectors to add a client to an
existing network.
1.6 Identify the purpose, features, and functions of the following network
components:
2.11 Identify the basic characteristics of the following WAN technologies.
3.7 Given a remote connectivity scenario, configure the connection.
4.2 Given a troubleshooting scenario involving a small office/home office
network failure, identify the cause of the failure.
4.3 Given a troubleshooting scenario involving a remote connectivity
problem, identify the cause of the problem.
Vocabulary: WAN media, PSTN, T1, E1, SONET/SDH, ISDN, DSL, cable
modems, wireless, satellite, frame relay, ATM, CSU/DSU
Time
About 1½ hours
Lecture Tips
Start with the focus question. Do students have any questions about the material
they have studied?
WAN media.
o Your business is not likely to own the infrastructure for the WAN links.
Instead, you typically lease it from someone else.
o What does your school do?
o Power cable, phone cables, television cables, radio, microwave
Discuss WAN communication issues.
o A WAN is often a network over a network
o Transceivers must be appropriate for the medium
o WAN media might need to carry other signals
o WAN media might support one direction only
Review circuit and packet switching.
o Packet switching - A technology that allows packets from the same
transmission to take different routes to reach their destination
o Circuit switching - A technology that creates a dedicated route or circuit
between two hosts on a WAN. All data moves along that route.
PSTN – the public switched telephone network.
o Point-to-point connections between modems (over the circuit switched
network)
o Due to FCC regulations regarding power levels sent over communication
lines, actual V.90 data rates do not exceed about 53 kbps.
o With V.90 modems, upstream speeds (from the client) remain 33.6 kbps.
Lab/Activity
Lecture Activity
As a group, discuss and diagram your school’s WAN connectivity. Record
diagram in lab notebooks.
Assessment
Check lab notebooks.
Homework Suggestions
Read Section 3-4 and take the section test.
Research the focus question for the next section.
o What are the common network protocol suites?
If you have a computer at home and connect to the Internet, diagram your home’s
WAN connectivity.
You are shopping around for WAN connection options. Check on T1, DSL, cable
modem, and ISDN price and availability in your area.
Exam Objectives
2.3 Differentiate between network protocols in terms of routing, addressing
schemes, interoperability, and naming conventions.
2.5 Define the purpose, function, and/or use of protocols within TCP/IP.
2.6 Define the function of TCP/UDP ports. Identify well-known ports.
2.8 Identify IP addresses and their default subnet masks.
2.9 Identify the purpose of subnetting and default gateways.
3.1 Identify the basic capabilities of server operating systems.
3.2 Identify the basic capabilities of client workstations.
3.7 Given a remote connectivity scenario, configure the connection.
3.11 Given a network configuration, select the appropriate NIC and network
configuration settings.
4.3 Given a troubleshooting scenario involving a remote connectivity
problem, identify the cause of the problem.
4.4 Given specific parameters, configure a client to connect to the following
servers:
4.11 Given a network troubleshooting scenario involving a client connectivity
problem, identify the cause of the problem.
Time
About 2 hours
Lecture Tips
Start with the focus question. Do students have any questions about the material
they have studied?
Introduce the Internet (TCP/IP) protocol suite.
o Introduce common protocols and explain their functions.
HTTP.
HTTPS.
SMTP.
POP3.
IMAP4.
NNTP.
NTP.
Telnet.
LPD/LPR.
FTP.
TFPT.
SSL.
TCP.
UDP.
IP.
o Introduce the concept of an IP address. IP addressing is covered in more
detail in the next section.
32 bits, 4 octets, decimal value between 0 and 255.
IP addresses are routable. They have a network ID and a host ID.
The subnet mask separates the host and network ID.
o IP addresses are routable.
Default gateway – the router on your subnet.
Lab/Activity
Lecture Activity
Close notebooks. Give each student the name of a protocol and ask him or her to
explain the protocol function.
Present the diagram with the router. Ask the students to determine which
computers can communicate with each other. You could do this as a group, hand
out the diagram and use it as a quiz, or assign it as homework.
Assessment
Were students able to identify protocols? Were they able to determine which computers
could communicate with each other? Check lab notebooks.
Homework Suggestions
Read Section 4-1 and take the section test.
Research the focus question for the next section.
o How does IP addressing work?
Hand out a DNS diagram with computer names at the bottom level. Ask students
to identify the FQDN for each computer.
Substitute server and path names appropriate to your environment. Go to the Run
command and type the following UNC paths. What do you see? Explain how the
UNC command syntax determines the results.
o \\server
o \\server\sharename
o \\server\sharename\folder
o \\server\sharename\folder\file.txt
Identify the legitimate IP addresses in this list. If an IP address is not correct,
explain the problem.
o 221.25.166.255
o 15.0.0.5
o 257.25.69.235
o 12.15.222
o 192.16.8.35
o 199.301.10.171
Exam Objectives
2.5 Define the purpose, function, and/or use of protocols within TCP/IP.
2.6 Define the function of TCP/UDP ports. Identify well-known ports.
2.7 Identify the purpose of network services.
2.8 Identify IP addresses and their default subnet masks.
2.9 Identify the purpose of subnetting and default gateways.
2.10 Identify the differences between public vs. private networks.
3.9 Identify the purpose, benefits, and characteristics of using a proxy.
3.11 Given a network configuration, select the appropriate NIC and network
configuration settings.
4.1 Given a troubleshooting scenario, select the appropriate TCP/IP utility
from among the following:
4.7 Given output from a diagnostic utility, identify the utility and interpret the
output.
4.8 Given a scenario, predict the impact of modifying, adding, or removing
network services on network resources and users.
Time
About 5 hours
Lecture Tips
Start with the focus question. Do students have any questions about the material
they have studied?
IP Version 4 (IPv4).
o TCP/IP addressing.
32 bits, 4 octets, decimal numbers between 0 and 255.
Subnet mask separates network and host ID.
Use a binary example to explain how the mask is used to determine
the network ID.
Address 11000000 10101000 01000001 00010001
Mask 11111111 11111111 11111111 00000000
Subnet 11000000 10101000 01000001 --------
Host -------- -------- -------- 00010001
o IPv4 classes.
o Explain how to tell if an IP address is Class A, B, C, D or E. The first octet
is:
A: 1-127 (First octet start with 0)
126 network IDs, up to 16,777,214 hosts
B: 128-191 (First octet start with 10)
16,384 network IDs, up to 65,534 hosts
C: 192-233 (First octet start with 110)
2,097,152 network IDs, up to 254 hosts
D: 224-231 (First octet start with 1110)
268,435,455 multicast group ID
Lab/Activity
Lecture Activity
Identify legitimate IP addresses.
o 169.254.2.68
o 235.123.6.198
o 128.256.201.33
Practice identifying the class of an IP address.
o 45.16.7.8
o 219.34.250.1
o 293.6.17.89
o 145.67.189.203
o 121.45.6.253
o 131.56.78.15
Given a scenario, what class address should you use? Will you use public or
private IP addresses? Support your decision.
o You need to support 80,000 hosts. The network needs access to the
Internet.
o You need to support 500 hosts. The network needs access to the Internet.
o Your company is an ISP. You need to support connections for 150 Web
servers that your company will be hosting.
Give a student a quick overview of what a service does. Ask the student to
identify the service.
o DHCP/BootP, DNS, NAT, ICS, SNMP, WINS.
Computer Lab Activity
Practice each of the following commands:
Ipconfig, Winipcfg, or ifconfig.
Assessment
Check lab notebooks.
Homework Suggestions
Read Section 4-2 and take the section test.
Research the focus question for the next section.
o What can I do to secure my network?
Practice identifying the class of an IP address.
o 159.16.129.234
o 161.78.101.2
o 78.91.78.206
o 10.11.13.14
o 67.126.36.56
Which if the following are valid host IP addresses. Why or why not?
o 23.45.234.261
o 64.64.64.66
o 127.0.0.0
o 10.255.255.255
o 154.90.23.16
Run nslookup www.microsoft.com. Analyze the results.
Run netstat on your computer. Then connect to a web site. Run netstat again. Did
anything change? Why?
Run nbtstat –n. Analyze the results.
Exam Objectives
2.6 Define the function of TCP/UDP ports. Identify well-known ports.
2.12 Define the function of the following remote access protocols and services.
2.13 Identify the following security protocols and describe their purpose and
function:
3.1 Identify the basic capabilities of the following server operating systems:
3.2 Identify the basic capabilities of client workstations.
3.7 Given a remote connectivity scenario, configure the connection.
3.8 Identify the purpose, benefits, and characteristics of using a firewall.
3.10 Given a scenario, predict the impact of a particular security
implementation on network functionality.
4.3 Given a troubleshooting scenario involving a remote connectivity problem
identify the cause of the problem.
4.11 Given a network troubleshooting scenario involving a client connectivity
problem, identify the cause of the problem.
Vocabulary: physical security, user account, access rights, password policy, SSL,
Kerberos, IPSec, PPP, PPPoE, PPTP, L2TP, firewall, TCP port, UDP port
Time
About 2 hours
Lecture Tips
Start with the focus question. Do students have any questions about the material
they have studied?
Discuss low-level security.
o Communication medium and topology.
o Physical access to equipment.
Introduce user accounts and access rights. Present an overview of access rights for
the most common operating systems.
o Windows NT/2000/XP.
Read, Read & Execute, Write, Modify, Full Control.
o NetWare.
Read, Write, Erase, Create, Modify, File Scan, Access Control,
Supervisor.
o UNIX.
Read, Write, Execute, for Owner, Group, Other.
o Macintosh.
See Folders, See Files, Make Changes, Read/Write, Read Only,
Write Only.
o Stress the nature of these access rights. They allow administrators to
control what users can do to files on the network servers.
o Use your computer to demonstrate access rights to a folder. You are most
likely to demonstrate this with Windows, but if you have access to
additional systems, demonstrate those also.
o Introduce password policies.
Discussion: What is your password policy? What happens if you
require really long passwords, but don’t train users about the need
for strong security? Why do you want a password policy?
Do not allow blank passwords.
Require passwords to be a minimum length.
Require passwords to fit complexity rules.
Require periodic password changes
Do not allow reused passwords.
Lock out accounts after a certain number of failed attempts.
Only allow logon during certain hours.
Don't use words in the dictionary.
Don't use dates (such as birthdays or anniversaries).
Use both uppercase and lowercase letters.
Use non-alphabetic characters (such as numbers and symbols).
Use mnemonics to create passwords.
Lab/Activity
Computer Lab Activity
If you are running Windows 200/XP, open WINNT\system32\drivers\etc\services.
Do you recognize some of the ports?
Use the Make New Connection wizard to create a dial-up connection to the
Internet.
o If student computers don’t have modems, install a fake modem at the
beginning of this lab. The following steps are for a Windows 2000
Professional computer. Steps are similar for other Windows platforms.
o Run Add/Remove Hardware wizard > Add/Troubleshoot a device > Add a
new device > No, I want to select the hardware from a list > Modems >
Don’t detect my modem; I will select it from a list > (Standard Modem
Types), select a model > Select a port.
Assessment
Check lab notebooks.
Homework Suggestions
Read Section 5-1 and take the section test.
Research the focus question for the next section.
o How can I protect my network from disasters?
Use the Make New Connection wizard to create a dial-up connection to a private
network.
Use the Make New Connection wizard to create a VPN connection.
Create a password policy for the place you work. Defend your choices. How often
will the user be forced to change passwords? How many can they reuse? What is
the minimum password length? Why are these choices appropriate for the
environment you work in?
Exam Objectives
3.5 Identify the purpose and characteristics of fault tolerance.
3.6 Identify the purpose and characteristics of disaster recovery.
Time
About 1½ hours
Lecture Tips
Start with the focus question. Do students have any questions about the material
they have studied?
Discuss the difference between fault-tolerance and disaster recover.
o Fault-tolerance – you can stress the network without it failing.
o Disaster recover – you can recover the network after it fails.
Low-level redundancy.
o Topology.
o Duplicate servers.
o UPS devices.
RAID.
o RAID 0.
Disk striping.
Blocks of data striped across two or more disks.
Reduces fault-tolerance.
Increases performance.
Lab/Activity
Lecture Activity
You need to create a backup plan for your network. Which backup method(s)
backs up and marks files only if they have been changed since the last time they
were backed up?
You need to create a backup plan for your network. Which backup method(s)
backs up files only if they have been changed since the last full backup but does
not mark them as being backed up?
You perform a full backup of your file server every Sunday night. The rest of the
week you perform an incremental backup at 11:00 PM. The file server fails at
9:00 AM on Wednesday. How do you restore the server? How much data, if any,
will you loose?
You perform a full backup of your file server every Sunday night. The rest of the
week you perform a differential backup at 11:00 PM. The file server fails at 1:00
PM on Thursday. How do you restore the server? How much data, if any, will you
loose?
Computer Lab Activity
Use Windows Backup to back up a folder on your lab computer. (Have students
select a folder that is not too large.) Record procedure in lab notebooks.
Assessment
Check lab notebooks.
Time
About 1½ hours
Lecture Tips
Start with the focus question. Do students have any questions about the material
they have studied?
Discuss low-level performance issues.
o Network architecture.
o Computer hardware.
o Use your current network as an example. Are you running 10BaseT or
100BaseT? Do you use hubs or switches? What speed are they?
Introduce network performance monitoring. Briefly discuss each tool.
o Windows Performance Monitor.
o Windows Network Monitor.
o NetWare MONITOR.NLM.
o NetWare LANalyzer Agent and ManageWise Management Console.
o SNMP.
o Demonstrate one of your network monitoring tools. (This will depend on
your infrastructure, but if students are running Windows 2000 or XP,
demonstrate Performance Monitor.)
Explain why you should create a baseline.
o How to create a baseline.
o Use it to detect abnormal performance.
o Use it to detect a trend.
o Use examples from your own network to discuss baseline performance.
What are the peak logon times? What are the peak web-surfing times? Are
any of the servers hit really hard? Do they need to be upgraded? How can
you tell?
o Discussion statement: A baseline is a good political tool.
Lab/Activity
Computer Lab Activity
Use Performance (System Monitor) to look at the performance of your computer.
o Add counters.
Processor, % Processor Time.
Memory, Available Bytes.
Physical Disk, % Disk Time.
o Generate activity. Play a game, open some files, open a few large
programs, etc.
o What happens to the counters as you generate activity?
Assessment
Check lab notebooks.
Homework Suggestions
Read Section 5-3 and take the section test.
Research the focus question for the next section.
o What kinds of tasks are required when you install a network?
You manage an Ethernet network that uses 100MB hubs. There are 30 clients on
each network segment (subnet). You are thinking about replacing the hubs with
100 MB switches. What type of performance gains do you expect to see? How
much will it cost?
Before class, make a list of a few areas where your network could use improvement.
Exam Objectives
3.7 Given a remote connectivity scenario, configure the connection.
Focus Question: What kinds of tasks are required when you install a network?
Time
About 1 hour
Lecture Tips
Start with the focus question. Do students have any questions about the material
they have studied?
Discuss planning a network installation. Use your own network as an example.
o Find out about the existing network, plans, and standards.
What are you using now?
o Choose a network architecture.
If you could upgrade would you change your architecture, or just
the speed?
o Decide which services the network will provide.
What do you use now? Is there anything you would like to add?
o Choose a network operating system.
What OS do you use now? Do you plan to upgrade soon? What
OS? Why?
o Choose client operating systems.
What OS do you use now? Do you plan to upgrade soon? What
OS? Why?
o Create network administration standards.
Do you have any defined standards? Who keeps track of them?
How are they decided?
o Announce the installation schedule.
Lab/Activity
Lecture Activity
Assessment
Check lab notebooks.
Homework Suggestions
Read Section 6-1 and take the section test.
Research the focus question for the next section.
o What types of tasks are required to maintain a network?
Plan a home network.
Time
About 1 hour
Lecture Tips
Start with the focus question. Do students have any questions about the material
they have studied?
Briefly mention monitoring. You reviewed a few tools in Section 5-3.
o Monitoring adds load, so monitor what you need to, but be careful not to
monitor so much that performance degrades.
Discuss viruses.
o Install antivirus software on servers and workstations.
o Update software regularly.
o Train users.
o Use your environment as an example. What do you run on lab computers?
How often do you update antivirus software? Are you running antivirus
software on your mail server? Do you scan for problem attachments?
Discuss software patches and upgrades.
o Manufacturer’s web site.
o Example: Demonstrate the Windows Update website, available on the start
menu or at http://windowsupdate.microsoft.com/.
Discuss the need for good documentation.
Lab/Activity
Computer Lab Activity
Go to http://windowsupdate.microsoft.com/ and check to see if your computer
needs any updates.
Run the antivirus software on lab computers. Scan your hard drives for viruses.
Assessment
Check lab notebooks.
Before class, prepare troubleshooting examples based on your own network and
experience.
Exam Objectives
4.2 Given a troubleshooting scenario involving a small office/home office
network failure, identify the cause of the failure.
4.3 Given a troubleshooting scenario involving a remote connectivity
problem, identify the cause of the problem.
4.6 Given a network scenario, interpret visual indicators to determine the
nature of the problem.
4.9 Given a network problem scenario, select an appropriate course of action
based on a general troubleshooting strategy. This strategy includes the
steps of the general troubleshooting model.
4.10 Given a troubleshooting scenario involving a network with a particular
physical topology and including a network diagram, identify the network
area affected and the cause of the problem.
4.11 Given a network troubleshooting scenario involving a client connectivity
problem, identify the cause of the problem.
4.12 Given a network troubleshooting scenario involving a
wiring/infrastructure problem, identify the cause of the problem.
Vocabulary: power light, link light, activity light, error message, error log,
performance monitor
Time
About 1½ hours
Lecture Tips
Start with the focus question. Do students have any questions about the material
they have studied?
Discuss the general troubleshooting model.
o Step 1: Establish the Symptoms.
o Step 2: Identify the Affected Area.
o Step 3: Establish What has Changed.
o Step 4: Select the Most Probable Cause.
o Step 5: Implement a Solution.
o Step 6: Test the Result.
o Step 7: Recognize the Potential Effects of the Solution.
o Step 8: Document the Solution.
Present troubleshooting examples. Use the model as a guide for solving the
problems.
o Example 1: Draw a diagram with four computers, two on subnet
192.168.1.x/24 and two on subnet 192.168.2.x/24. The subnets are
connected by a router. Router port IP addresses are 192.168.1.1 and
192.168.2.1. Label the IP address, subnet mask, and default gateway for
each client. Label the default gateway of one of the clients on subnet 1
incorrectly.
One of the clients on subnet 1 can’t communicate with clients on
subnet 2. The other client on this subnet can communicate with
clients on subnet 2.
Lab/Activity
Lecture Activity
Computer Lab Activity
Unplug the network cable for your lab computer. Take a look at the link lights on
the NIC. If possible, look at the lights on the classroom hub or switch.
Assessment
Check lab notebooks.
Homework Suggestions
Read Section 6-3 and take the section test.
Research the focus question for the next section.
Find a STOP message in Event View on a Windows 2000 computer. Research the
cause of the error and the solution to the problem. http://support.microsoft.com is
a good place to look for more information on STOP messages.
Star/hierarchical
Bus
Mesh
Ring
Wireless
1.2 Specify the main features of 802.2 (LLC), 802.3 (Ethernet), 802.5 3-2, 3-3
(Token Ring), 802.11b (wireless), and FDDI networking technologies,
including:
Speed
Access method
Topology
Media
1.3 Specify the characteristics (e.g., speed, length, topology, cable type, 3-2
etc.) of the following:
RJ-11
RJ-45
AUI
BNC
ST
SC
1.5 Choose the appropriate media type and connectors to add a client to 3-1 to 3-4
an existing network.
1.6 Identify the purpose, features, and functions of the following 1-3, 1-4,
network components: 2-5 to 2-7,
3-2 to 3-4
Hubs
Switches
Bridges
Routers
Gateways
CSU/DSU
Network interface cards/ISDN adapters/System Area Network cards
Wireless access points
2.2 Identify the seven layers of the OSI model and their functions. 1-1, 2-1 to 2-7
TCP/IP
IPX/SPX
NetBEUI
AppleTalk
2.4 Identify the OSI layers at which the following network 1-3, 2-5 to 2-7
components operate:
Hubs
Switches
Bridges
2.5 Define the purpose, function, and/or use of the following 4-1, 4-2
protocols within TCP/IP:
IP
TCP
UDP
FTP
TFTP
SMTP
HTTP
HTTPS
POP3/IMAP4
Telnet
ICMP
ARP
NTP
2.6 Define the function of TCP/UDP ports. Identify well-known 4-1, 4-2, 5-1
ports.
DHCP/BootP
DNS
NAT/ICS
WINS
SNMP
2.8 Identify IP addresses (IPv4, IPv6) and their default subnet masks. 4-1, 4-2
2.9 Identify the purpose of subnetting and default gateways. 4-1, 4-2
2.10 Identify the differences between public vs. private networks. 4-2
2.11 Identify the basic characteristics (e.g., speed, capacity, media) 1-4, 3-3, 3-4
of the following WAN technologies.
2.12 Define the function of the following remote access protocols 1-4, 5-1
and services.
RAS
PPP
PPTP
ICA
2.13 Identify the following security protocols and describe their purpose and 5-1
function:
IPsec
L2TP
SSL
Kerberos
UNIX/Linux
NetWare
Windows
Macintosh
3.2 Identify the basic capabilities of client workstations (i.e., client 4-1, 5-1
connectivity, local security mechanisms, and authentication).
3.5 Identify the purpose and characteristics of fault tolerance. 1-1, 5-2
3.6 Identify the purpose and characteristics of disaster recovery. 1-1, 5-2
3.7 Given a remote connectivity scenario (e.g., IP, IPX, dial-up, 3-1, 3-4, 4-1,
PPPoE, authentication, physical connectivity, etc.), configure 5-1, 6-1
3.8 Identify the purpose, benefits, and characteristics of using a firewall. 5-1
3.9 Identify the purpose, benefits, and characteristics of using a proxy. 4-2
3.10 Given a scenario, predict the impact of a particular security implementation 5-1
on network functionality (e.g., blocking port numbers, encryption, etc.).
3.11 Given a network configuration, select the appropriate NIC and network 4-1, 4-2
configuration settings (DHCP, DNS, WINS, protocols,
NetBIOS/host name, etc.).
tracert
ping
arp
netstat
nbtstat
ipconfig/ifconfig
winipcfg
nslookup
4.4 Given specific parameters, configure a client to connect to the following 4-1
servers:
UNIX/Linux
NetWare
Windows
Macintosh
4.5 Given a wiring task, select the appropriate tool (e.g., wire crimper, 3-1
media tester/certifier, punch down tool, tone generator, optical tester, etc.).
©2002 TestOut Corporation (Rev 11/02) 87
CompTIA Network+ (N10-002)
4.6 Given a network scenario interpret visual indicators (e.g., link lights, 6-3
collision lights, etc.) to determine the nature of the problem.
4.7 Given output from a diagnostic utility (e.g., tracert, ping, ipconfig, etc.), 4-2
identify the utility and interpret the output.
4.8 Given a scenario, predict the impact of modifying, adding, or removing 4-2
network services (e.g., DHCP, DNS, WINS, etc.) on network resources
and users.
4.10 Given a troubleshooting scenario involving a network with a particular 2-7, 6-3
physical topology (i.e., bus, star/hierarchical, mesh, ring, and wireless)
and including a network diagram, identify the network area affected and
the cause of the problem.
4.11 Given a network troubleshooting scenario involving a client 4-1, 5-1, 6-3
connectivity problem (e.g., incorrect protocol/client software/authentication
configuration, or insufficient rights/permissions), identify the cause of
the problem.