Foothill CollegeApproved Course Outlines

Physical Sciences, Mathematics & Engineering Division
4 hours lecture, 3 hours laboratory.5 Units

Total Quarter Learning Hours: 84 (Total of All Lecture, Lecture/Lab, and Lab hours X 12)
 Lecture Hours: 4 Lab Hours: 3 Lecture/Lab:
 Note: If Lab hours are specified, see item 10. Lab Content below.

Repeatability -
Statement: Not Repeatable.

Status -
 Course Status: ActiveGrading: Letter Grade with P/NP option
 Degree Status: ApplicableCredit Status: Credit
 Degree or Certificate Requirement: AS Degree
 GE Status: Non-GE

Articulation Office Information -
 Transferability: CSUValidation: 11/14/11; 11/19/13

1. Description -
This course describes the architecture, components, and operations of a converged switched network. Students learn about the hierarchical network design model and how to configure a switch for basic and advanced functionality. By the end of this course, students will be able to troubleshoot and resolve common issues with Virtual LANs, VTP, and inter-VLAN routing in a converged network. Students will also develop the knowledge and skills needed to implement a Wireless LAN in a small-to-medium network.
Prerequisite: None
Co-requisite: None
Advisory: C S 50A.

2. Course Objectives -
The student will be able to:
  1. Describe the convergence of data, voice, and video in the context of switched networks and describe the basic function of switches.
  2. Describe and perform basic switch configuration and create a switched network for a small-to-medium-sized business.
  3. Explain the purpose of VLANs in a switched network.
  4. Describe and demonstrate the purpose of Spanning Tree Protocol and first hop redundancy protocols.
  5. Describe, configure and demonstrate link aggregation.
  6. Explain, configure, and demonstrate the three methods of inter-VLAN routing.
  7. Describe, configure and demonstrate DHCPv4 and DHCPv6
  8. Describe wireless LAN technology, standards, and the components of a wireless LAN infrastructure.
3. Special Facilities and/or Equipment -
  1. The college will provide access to a network laboratory with current Cisco network equipment host computers required to support the class.
  2. The college will provide a website or course management system with an assignment posting component (through which all lab assignments are to be submitted) and a forum component (where students can discuss course material and receive help from the instructor). This applies to all sections, including on-campus (i.e., face-to-face) offerings.
  3. When taught via Foothill Global Access on the Internet, the college will provide a fully functional and maintained course management system through which the instructor and students can interact.
  4. When taught via Foothill Global Access on the Internet, students must have currently existing e-mail accounts and ongoing access to computers with internet capabilities.

4. Course Content (Body of knowledge) -
  1. The Converged Switched Network
    1. Converged Networks
      1. Growing Complexity of Networks
      2. Elements of a Converged Network
      3. Borderless Network Architecture
        1. Hierarchical
        2. Modular
        3. Resiliency
        4. Flexibility
      4. Access, Distribution and Core Layers
    2. Switched Networks
      1. Role of Switched Networks
      2. Switch form factors
      3. Multilayer Switching
      4. Port Density
      5. Forwarding Rates
      6. Power over Ethernet
      7. Frame forwarding
        1. Forwarding based on the ingress port and the destination address
        2. Dynamically Populating a Switch MAC Address Table
        3. Switch Forwarding Methods
          1. Store-and-Forward
          2. Cut-Through
      8. Collision Domains
      9. Broadcast Domains
      10. Reducing Network Congestion
        1. High port density
        2. Large frame buffers
        3. Port speed
        4. Fast internal switching
  2. Switch Configuration
    1. Switch IOS Management
      1. Switch Boot Sequence
      2. Recovering from a System Crash
      3. Switch LED Indicators
      4. Configuring for Basic Switch Management Access
    2. Basic Switch Configuration
      1. Configure Switch Ports
        1. Duplex Communication and Bandwidth
        2. Auto-MDIX Feature
        3. Verifying Switch Port Configuration
      2. Secure Remote Access
        1. SSH Operation
        2. SSH Configuration
      3. Security Concerns in LANs
        1. MAC Address Flooding
        2. DHCP Spoofing
        3. Leveraging the Cisco Discovery Protocol
      4. Switch port security
        1. Secure Unused Ports
        2. DHCP Snooping
        3. Port Security
          1. Violation Modes
          2. Configuring Dynamic Port Security
          3. Configuring Port Security Sticky
          4. Ports In Error Disabled State
          5. Network Time Protocol
  3. VLANs
    1. Overview of VLANs
      1. Characteristics of a VLAN
        1. A logical partition of a Layer 2 network.
          1. Multiple partitions can be created, allowing for multiple VLANs to co-exist.
          2. VLANs are mutually isolated and packets can only pass between them via a router.
          3. The partitioning of the Layer 2 network takes place inside a Layer 2 device, usually via a switch.
        2. Each VLAN is a broadcast domain, usually with its own IP network.
        3. Benefits of VLANs
    2. Types of VLANs
    3. VLAN Trunks
      1. Tagging Ethernet Frames for VLAN Identification
      2. Native VLANs and 802.1Q Tagging
      3. Voice VLAN Tagging
      4. Configuring IEEE 802.1q Trunk Links
      5. Resetting the Trunk To Default State
    4. VLAN Assignments
      1. VLAN Ranges on Catalyst Switches
      2. Creating a VLAN
      3. Assigning Ports to VLANs
      4. Changing VLAN Port Membership
      5. Deleting VLANs
    5. Dynamic Trunking Protocol (DTP)
      1. Permits ports to negotiate to become trunks.
      2. Negotiated Interface Modes
    6. Troubleshooting VLAN and Trunk problems.
  4. LAN Redundancy
    1. Spanning Tree Protocol
      1. Purpose of Spanning Tree
        1. Redundancy at OSI Layers 1 and 2
      2. STP Operation
        1. Spanning-Tree Algorithm
          1. Purpose
          2. Port Roles
          3. Root Bridge
          4. Path Cost
          5. 802.1D BPDU Frame Format
          6. BPDU Propagation and Process
          7. Extended System ID
      3. Spanning Tree Protocol Types
        1. PVST+
        2. Rapid PVST+
      4. BPDU Types
        1. Rapid PVST+
        2. PVST+
      5. Edge Ports
      6. Link types
      7. Configuring PVST+
      8. Configuring Rapid PVST+
      9. Load Balancing
      10. Convergence
      11. Configuration issues
    2. First-Hop Redundancy Protocols
      1. Default Gateway Limitations
      2. Router Redundancy
      3. Steps for Router Failover
      4. First-Hop Redundancy Protocols
        1. Hot Standby Router Protocol (HSRP)
        2. HSRP for IPv6
        3. Virtual Router Redundancy Protocol version 2 (VRRPv2)
        4. VRRPv3
        5. Gateway Load Balancing Protocol (GLBP)
        6. GLBP for IPv6
        7. ICMP Router Discovery Protocol (IRDP)
  5. Link Aggregation
    1. Introduction
      1. Link aggregation allows the creation of logical links comprised of several physical links.
      2. EtherChannel is a form of link aggregation used in switched networks.
      3. Advantages of EtherChannel
      4. EtherChannel Operation
        1. Implementation Restrictions
        2. Port Aggregation Protocol (PAgP)
        3. Link Aggregation Control Protocol (LACP)
      5. Link Aggregation
    2. Configuration
      1. Guidelines
        1. EtherChannel must be supported.
        2. Speed and duplex must match.
        3. VLAN match—All interfaces in same VLAN.
        4. Range of VLAN—Same range on all interfaces.
      2. Configuring Etherchannel
      3. Configuring Interfaces
      4. Configuring LACP
      5. Verifying Etherchannel
  6. Inter-VLAN Routing
    1. Inter-VLAN Routing Operation
      1. Inter-VLAN touting is a process for forwarding network traffic from one VLAN to another, using a router.
      2. Legacy Inter-VLAN Routing
      3. Router-on-a-Stick Inter-VLAN Routing
      4. Multilayer Switch Inter-VLAN Routing
    2. Configure Legacy Inter-VLAN Routing
    3. Configure Router-on-a-Stick
    4. Configure Layer 3 Switching
      1. Layer 3 switches usually have packet-switching throughputs in the millions of packets per second (pps).
      2. All Catalyst multilayer switches support the following types of Layer 3 interfaces
        1. Routed port
        2. Switch virtual interface (SVI)
      3. High-performance switches, such as the Catalyst 6500 and Catalyst 4500, are able to perform most of the router's functions.
      4. Several models of Catalyst switches require enhanced software for specific routing protocol features.
      5. Layer 3 Switching Operation and Configuration
      6. Inter-VLAN Routing with Switch Virtual Interfaces
      7. Inter-VLAN Routing with Routed Ports
      8. Configuring Static Routes on a Catalyst 2960
  7. Dynamic Host Configuration Protocol
    1. DHCP Features.
    2. BootP and DHCP differences.
    3. DHCP Protocol
    4. DHCP Configuration.
    5. Verifying DHCP Operation.
    6. Troubleshooting DHCP Operation.
  8. Wireless LANS
    1. The 802.11 protocol suite.
    2. Access points
      1. Operation
      2. Security Configuration
    3. Wireless LAN Controllers
      1. Thick access point vs. thin access points
    4. Managing a wireless network
    5. Configuring wireless devices
5. Repeatability - Moved to header area.
6. Methods of Evaluation -
  1. Tests and quizzes
  2. Written laboratory assignments.
  3. Final examination
7. Representative Text(s) -
Odom, Wendall. Switched Networks, Indianapolis:Cisco Press, 2014.

8. Disciplines -
Computer Science
9. Method of Instruction -
  1. Lectures which include motivation for the architecture of the specific topics being discussed.
  2. In-person or On-line labs (for all sections, including those meeting face-to-face/on campus) consisting of
    1. An assignment web-page located on a college-hosted course management system or other department-approved Internet environment. Here, the students will review the specification of each assignment and submit their completed lab work.
    2. A discussion web-page located on a college hosted course management system or other department-approved Internet environment. Here, students can request assistance from the instructor and interact publically with other class members.
  3. Detailed review of laboratory assignments which includes model solutions and specific comments on the student submissions.
  4. In person or on-line discussion which engages students and instructor in an ongoing dialog pertaining to all aspects of designing, implementing and analyzing programs.
  5. When course is taught fully on-line:
    1. Instructor-authored lecture materials, handouts, syllabus, assignments, tests, and other relevant course material will be delivered through a college hosted course management system or other department-approved Internet environment.
    2. Additional instructional guidelines for this course are listed in the attached addendum of CS department on-line practices.
10. Lab Content -
  1. Analyze the advantages of LAN segmentation, and LAN segmentation using bridges, switches, and routers.
  2. Configure VLANs, VTP and Inter-VLAN routing on switches and routers.
  3. Configure and test switchport security.
  4. Configure and explain the uses of the Spanning Tree protocol and diagram and demonstrate its use.
  5. Configure portfast and RSTP and demonstrate how it converges into a loop free network
  6. Describe the benefits of virtual LANS and demonstrate their configuration and operation.
  7. Configure wireless access-points in a stand-alone environment
  8. Extend the wireless network to include a wired distribution system, VLANs, and DHCP.
11. Honors Description - No longer used. Integrated into main description section.
12. Types and/or Examples of Required Reading, Writing and Outside of Class Assignments -
  1. Reading
    1. Textbook assigned reading averaging 30 pages per week.
    2. Online curriculum averaging 20 pages per week.
    3. On-line resources as directed by instructor though links pertinent to networking.
    4. Library and reference material directed by instructor through course handouts.
  2. Writing
    1. Technical prose documentation that supports and describes the laboratory exercises that are submitted for a grades.
13. Need/Justification -
This course is a required core course for the Enterprise Networking degree.

Course status: Active
Last updated: 2014-06-19 12:31:30

Foothill CollegeApproved Course Outlines