Foothill CollegeApproved Course Outlines

Physical Sciences, Mathematics & Engineering Division
C S 52BADVANCED SWITCHING & CAMPUS LAN DESIGN (CCNP)Winter 2014
4 hours lecture, 3 hours laboratory.5 Units

Total Quarter Learning Hours: 84 (Total of All Lecture, Lecture/Lab, and Lab hours X 12)
 
 Lecture Hours: 4 Lab Hours: 3 Lecture/Lab:
 Note: If Lab hours are specified, see item 10. Lab Content below.

Repeatability -
Statement: Not Repeatable.

Status -
 Course Status: ActiveGrading: Letter Grade with P/NP option
 Degree Status: ApplicableCredit Status: Credit
 Degree or Certificate Requirement: AA Degree
 GE Status: Non-GE

Articulation Office Information -
 Transferability: CSUValidation: 11/14/11

1. Description -
The course provides the knowledge and skills necessary to to plan, configure and verify the implementation of complex enterprise switching solutions using Cisco's Campus Enterprise Architecture. Secure integration of VLANs, WLANs, voice and video into campus networks is also provided. The material is presented in a lecture and discussion format supplemented by comprehensive laboratory exercises. This course uses the official Cisco Academy CCNP SWITCH curriculum and is designed to provide preparation for the CCNP SWITCH certification exam.
Prerequisite: None
Co-requisite: None
Advisory: C S 50C or equivalent experience.

2. Course Objectives -
The student will be able to:
  1. Implement VLAN based solution, given a network design and a set of requirements
  2. Implement a Security Extension of a Layer 2 solution, given a network design and a set of requirements
  3. Implement Switch based Layer 3 services, given a network design and a set of requirements
  4. Explain how to prepare infrastructure to support advanced services
  5. Implement High Availability, given a network design and a set of requirements
3. Special Facilities and/or Equipment -
  1. Access to a network laboratory with current Cisco network equipment host computers required to support the class.
  2. Website or course management system with an assignment posting component (through which all lab assignments are to be submitted) and a forum component (where students can discuss course material and receive help from the instructor). This applies to all sections, including on-campus (i.e., face-to-face) offerings.
  3. When taught via Foothill Global Access, a fully functional and maintained course management system through which the instructor and students can interact.
  4. When taught via Foothill Global Access, students must have currently existing e-mail accounts and ongoing access to computers with internet capabilities.

4. Course Content (Body of knowledge) -
  1. Implement VLAN based solution, given a network design and a set of requirements
    1. Determine network resources needed for implementing a VLAN based solution on a network
    2. Create a VLAN based implementation plan
    3. Create a VLAN based verification plan
    4. Configure switch-to-switch connectivity for the VLAN based solution
    5. Configure loop prevention for the VLAN based solution
    6. Configure Access Ports for the VLAN based solution
    7. Verify the VLAN based solution was implemented properly using show and debug commands
    8. Document the verification after implementing a VLAN solution
  2. Implement a Security Extension of a Layer 2 solution, given a network design and a set of requirements
    1. Determine network resources needed for implementing a Security solution
    2. Create a implementation plan for the Security solution
    3. Create a verification plan for the Security solution
    4. Configure port security features
    5. Configure general switch security features
    6. Configure private VLANs
    7. Configure VACL and PACL
    8. Verify the Security based solution was implemented properly using show and debug commands
    9. Document the verification results after implementing a Security solution
  3. Implement Switch based Layer 3 services, given a network design and a set of requirements
    1. Determine network resources needed for implementing a Switch based Layer 3 solution
    2. Create an implementation plan for the Switch based Layer 3 solution
    3. Create a verification plan for the Switch based Layer 3 solution
    4. Configure routing interfaces
    5. Configure Layer 3 Security
    6. Verify the Switch based Layer 3 solution was implemented properly using show and debug commands
    7. Document the verification results after implementing a Switch based Layer 3 solution
  4. Prepare infrastructure to support advanced services
    1. Implement a Wireless Extension of a Layer 2 solution
    2. Implement a VoIP support solution
    3. Implement video support solution
  5. Implement High Availability, given a network design and a set of requirements
    1. Determine network resources needed for implementing High Availability on a network
    2. Create a High Availability implementation plan
    3. Create a High Availability verification plan
    4. Implement first hop redundancy protocols
    5. Implement switch supervisor redundancy
    6. Verify High Availability solution was implemented properly using show and debug commands
    7. Document results of High Availability implementation and verification
5. Repeatability - Moved to header area.
 
6. Methods of Evaluation -
  1. Tests and quizzes
  2. Written laboratory assignments.
  3. Final examination
7. Representative Text(s) -
Froom, Richard. Implementing Cisco IP Switched Networks (SWITCH) Foundation Learning Guide: Foundation learning for SWITCH 642-813, Indianapolis:Cisco Press, 2010.

8. Disciplines -
Computer Science
 
9. Method of Instruction -
  1. Lectures which include motivation for the architecture of the specific topics being discussed.
  2. In-person or On-line labs (for all sections, including those meeting face-to-face/on campus) consisting of
    1. An assignment web-page located on a college-hosted course management system or other department-approved Internet environment. Here, the students will review the specification of each assignment and submit their completed lab work.
    2. A discussion web-page located on a college hosted course management system or other department-approved Internet environment. Here, students can request assistance from the instructor and interact publicly with other class members.
  3. Detailed review of laboratory assignments which includes model solutions and specific comments on the student submissions.
  4. In person or on-line discussion which engages students and instructor in an ongoing dialog pertaining to all aspects of designing, implementing and analyzing programs.
  5. When course is taught fully on-line:
    1. Instructor-authored lecture materials, handouts, syllabus, assignments, tests, and other relevant course material will be delivered through a college hosted course management system or other department-approved Internet environment.
    2. Additional instructional guidelines for this course are listed in the attached addendum of CS department on-line practices.
 
10. Lab Content -
  1. Clearing a Switch Connected to a Larger Network
    1. Clear the configuration of a switch that is connected to other switches and prepare it for a new lab.
  2. Static VLANS, VLAN Trunking, and VTP Domains and Modes
    1. Set up a VTP domain.
    2. Create and maintain VLANs.
    3. Configure ISL and 802.1Q trunking.
  3. Per-VLAN Spanning Tree Behavior
    1. Observe the behavior of a separate spanning tree instance per VLAN.
    2. Change spanning tree mode to rapid spanning tree.
  4. VLANs, VTP, and Inter-VLAN Routing Case Study
    1. Plan and design the International Travel Agency switched network as shown in the diagram and described below.
    2. Implement the design on the switches and router.
    3. Verify that all configurations are operational and functioning according to the requirements.
  5. Hot Standby Router Protocol
    1. Configure inter-VLAN routing with HSRP to provide redundant, fault-tolerant routing to the internal network.
  6. Securing Layer 2 Switches
    1. Secure the Layer 2 network against MAC flood attacks.
    2. Prevent DHCP spoofing attacks.
    3. Prevent unauthorized access to the network using AAA and 802.1X.
    4. Securing Spanning Tree Protocol
  7. Secure the Layer 2 spanning-tree topology with BPDU guard.
    1. Protect the primary and secondary root bridge with root guard.
    2. Protect switch ports from unidirectional links with UDLD.
  8. Voice and Security in a Switched Network - Case Study
    1. Plan, design, and implement the International Travel Agency switched network as shown in the diagram and described below.
    2. Implement the design on the lab set of switches.
    3. Verify that all configurations are operational and functioning according to the guidelines.
 
11. Honors Description - No longer used. Integrated into main description section.
 
12. Types and/or Examples of Required Reading, Writing and Outside of Class Assignments -
  1. Reading
    1. Textbook assigned reading averaging 60 pages per week.
    2. On-line resources as directed by instructor though links pertinent to networking.
    3. Library and reference material directed by instructor through course handouts.
  2. Writing
    1. Technical prose documentation that supports and describes the laboratory exercises that are submitted for a grade.
13. Need/Justification -
This course is a restricted support course for the AA degree in Enterprise Networking.


Course status: Active
Last updated: 2014-06-19 12:33:16


Foothill CollegeApproved Course Outlines