Course Outline
1. Introduction to Networking Concepts
- What is Networking: Explains the concept of networking and how devices connect to share data.
- Advantages & Disadvantages: Discusses the benefits and limitations of networking systems.
- Network Characteristics: Explains features like scalability, reliability, and efficiency in networks.
- Network Models (Peer-to-Peer and Client-and-Server): Details the different network models and how they operate.
- Network Types (LAN, WAN, MAN, PAN): Covers various network types, including Local, Wide, Metropolitan, and Personal Area Networks.
- Network Topologies (Bus, Star, Ring): Describes different physical and logical network layouts.
- Internet connection (DSL, Cable, Serial Link): Explains the types of internet connections available for networks.
- Network Media: Discusses the various media used for data transmission in networking, including copper and fiber-optic cables.
2. Networking Models
- History: Provides a historical overview of networking model development.
- Layered Network Model: Describes the importance of a layered approach in networking, including OSI and TCP/IP models.
- Layering Concepts and Benefits: Explains the reasons for using a layered approach in network architecture.
- TCP/IP Protocol Architecture: Details the TCP/IP model and how it standardizes communication across the internet.
- RFC (Request For Comments): Discusses the role of RFCs in setting networking protocols.
- Application, Transport, Internet, and Network Access Layer: Breaks down the layers and functions within the TCP/IP stack.
- Devices at Different Layers: Describes the devices used at each layer in the networking model.
- Data Encapsulation: Explains how data is wrapped into packets for transmission.
- The OSI Reference Model: An introduction to the OSI model and its seven layers.
- OSI Layers and Their Functions: Describes the function of each of the OSI seven layers.
- Comparing OSI and TCP/IP: A comparison of the OSI and TCP/IP models for network communication.
3. LAN (Local Area Network)
- Ethernet History: Explains the evolution of Ethernet as a networking standard.
- Ethernet Types (10/100/1000 Base T, TX, SX/LX): Describes the various Ethernet standards and their transmission speeds.
- 10BASE2 and 10BASE5: Covers the legacy Ethernet standards and their applications.
- Repeaters: Explains the role of repeaters in extending network distances.
- 10BASE-T with Hubs: Discusses Ethernet networking with hubs.
- UTP Cabling, UTP Cables, and RJ-45 Connectors: Details UTP cabling and connectors used in networking.
- UTP Cabling Pin-outs: Explains how cables are wired with specific pinouts.
- CSMA/CD: Describes the protocol used for managing network traffic.
- Using Switches and Their Advantages: Explains the role of switches and their advantages over hubs.
- Ethernet Data-Link Protocols and Frame: Details the protocols and Ethernet frame structure.
- Wiring Ethernet Cables: Discusses the proper technique for wiring Ethernet cables.
- Ethernet Addressing, Framing, and Error Detection: Covers Ethernet addressing and error detection in transmission.
- LAN Types (Ethernet, Token Ring, FDDI): Compares different LAN technologies and their use cases.
4. WAN (Wide Area Network)
- WAN Basics (DCE, DTE, CSU/DSU, CPE, Demarc, DS0): Introduces the components and terminology of WAN technologies.
- WAN Technologies (Leased Lines, Circuit & Packet Switching, Cell Relay): Describes the various technologies used in WANs for data transmission.
- HDLC (High-Level Data Link Control): Explains this protocol used in WAN communication.
- PPP (Point-to-Point Protocol): Details PPP, a method of data transmission over WANs.
- Frame Relay: Explains the frame relay technology used for WAN connections.
- ATM (Asynchronous Transfer Mode): Describes ATM and its application in high-speed networks.
- WAN Cabling Standards: Discusses the cabling used for WAN connections.
- Clock Rates, Synchronization, DCE, and DTE: Explains synchronization and the devices involved in WAN setup.
- OSI Layer for Point-to-Point WANs: Describes the layer used for point-to-point connections in WANs.
5. Internet Protocol
- Network Layer Functions: Explains the functions of the network layer in handling IP routing and data forwarding.
- IP Packets: Describes how data is packaged into IP packets for transmission.
- IP Routing: Discusses how routers direct IP packets through a network.
- Routing Protocols: Introduces the protocols used for routing IP packets (e.g., OSPF, RIP).
- IP Addressing: Details the structure and use of IP addresses.
- A, B, and C Classes of Networks: Describes different classes of IP addresses for network segmentation.
- IP Subnetting: Explains how IP subnetting works to divide a network into smaller segments.
- Host & Router Routing: Describes the routing processes at host and router levels.
- ARP, DNS, DHCP & Ping: Details the key protocols for IP address resolution, domain name services, dynamic IP allocation, and network diagnostics.
6. TCP/IP Transport Layer
- Transport Layer Protocols: TCP and UDP: Describes the two key protocols of the transport layer: TCP and UDP.
- Transmission Control Protocol: Explains how TCP ensures reliable data transfer.
- Ports & Their Multiplexing: Details the use of ports to multiplex connections in the transport layer.
- TCP Error Recovery, Flow Control and Data Segmentation: Discusses how TCP handles errors, manages flow control, and segments data.
- TCP Connection Establish and Terminate: Describes how TCP establishes and terminates connections.
- UDP (User Datagram Protocol): Explains the role of UDP for fast, connectionless communication.
7. Applications
- TCP/IP Applications, QoS Needs, and Impact: Discusses the applications relying on TCP/IP and the need for Quality of Service (QoS).
- The World Wide Web: Introduces the role of the web in internet applications.
- HTTP (Hyper Text Transfer Protocol), HTTPS & SSL: Details the protocols used in web browsing and secure transactions.
- Universal Resource Locators: Explains how URLs identify web resources.
- FTP (File Transfer Protocol), Secured FTP: Discusses FTP for file transfer and its secure variants.
- SMTP, POP3 & IMAP: Explains email protocols for sending and receiving messages.
- Telnet: Describes the use of Telnet for remote access to devices.
8. Network Security
- Sources and Types of Threats: Identifies the various network security threats and their sources.
- Firewalls: Discusses the role of firewalls in network security.
- Intrusion Detection and Prevention: Describes systems that detect and prevent unauthorized network access.
- Virtual Private Networks (VPN): Explains the concept and benefits of VPNs for secure connections.
- (Continued in the next message for the rest)
9. LAN Switching
- Ethernet LAN Media and Cable Lengths: Discusses the types of media (such as copper or fiber) and the supported cable lengths in Ethernet LANs.
- Hubs, Bridges, and Switches: Describes the differences between hubs, bridges, and switches and their role in network traffic management.
- Forward and Filter Decision Switching: Explains how switches make forwarding decisions and filter unnecessary data.
- Learning MAC Addresses & Frames Flooding: Details how switches learn MAC addresses and handle frame flooding when they don't know the destination address.
- Spanning Tree Protocol: Introduces the Spanning Tree Protocol (STP), which prevents loops in Ethernet networks.
- Collision Domains and Broadcast Domains: Explains the concepts of collision and broadcast domains, and how switches segment them.
- Virtual LANs (VLAN): Describes the benefits and configuration of VLANs, which logically segment a LAN.
10. LAN Switches
- Switches and LED Switch Status: Describes the function of LEDs on switches and how they indicate the status of the network.
- Accessing the CLI & Password Security: Explains how to access a switch via CLI and implement basic password security.
- User and Enable Modes: Describes the two primary operational modes for a Cisco switch: user mode and enable mode.
- The debug and show Commands: Details the use of debug and show commands for troubleshooting and monitoring switch behavior.
- Configuration Sub-modes and Contexts: Explains the different configuration sub-modes available when configuring a Cisco switch.
- Storing, Copying and Erasing Switch Configuration Files: Discusses how to manage switch configuration files, including storing, copying, and erasing.
- Initial Configuration: Covers the steps for configuring a switch for the first time.
11. Ethernet Switch Configuration
- Securing CLI: Discusses methods to secure the CLI by setting strong passwords and restricting access.
- Console and vty Settings: Describes how to configure the console and virtual terminal (vty) settings for remote access.
- Logging synchronous and exec-timeout Commands: Explains how to configure logging and session timeout for managing switch access.
- IP Address & Interfaces Configuring: Describes how to assign IP addresses and configure interfaces on a switch.
- Port Security: Details the concept of port security and how to configure it to prevent unauthorized access.
- VLAN Configuration: Explains how to create and manage VLANs on a switch.
- Securing Unused Interfaces: Discusses how to secure unused interfaces to prevent unauthorized access.
12. Switch Troubleshooting
- Cisco Discovery Protocol: Describes the use of the Cisco Discovery Protocol (CDP) to discover devices on a network.
- Layer and Interface Status: Discusses how to check the status of layers and interfaces to diagnose network issues.
- Interface Speed and Duplex Issues: Explains how mismatched speeds or duplex settings on interfaces can cause network problems.
- Analyzing the Forwarding Path: Details how to analyze the path a frame takes through the switch to troubleshoot forwarding issues.
- Port Security and Filtering: Covers troubleshooting port security and filtering issues to prevent unauthorized access.
13. Wireless LANs
- Wireless LAN Basics: Provides an overview of wireless LANs and their components.
- Wireless LAN Standards & Modes: Discusses the IEEE standards (802.11) and different modes of operation in wireless LANs.
- Wireless Encoding and Nonoverlapping DSSS Channels: Explains encoding techniques and the use of non-overlapping channels to avoid interference.
- Wireless Interference, Coverage Area, Speed, and Capacity: Discusses factors affecting wireless performance, such as interference, coverage, and speed.
- Wireless Media Access (Layer 2): Describes the layer 2 access methods used in wireless networks.
- Wireless LAN Security (WEP, WPA, IEEE 802.11i, WPA-2 SSID Cloaking and MAC Filtering): Explains the various security protocols for wireless networks.
14. Operating Routers
- Installing Routers & Router Interfaces: Describes the installation of routers and the configuration of their interfaces.
- Router CLI & Difference with the Switch CLI: Explains how the router CLI differs from the switch CLI and how to navigate it.
- Interface Status Codes and IP Addresses: Discusses how to check interface status and assign IP addresses on routers.
- Bandwidth and Clock Rate on Serial Interfaces: Explains how to configure bandwidth and clock rates on serial links.
- Router Auxiliary (Aux) Port: Details the use of the router's auxiliary port for management.
- Setup Mode, Upgrading, and Boot Process of the IOS: Discusses the initial configuration process and the router boot sequence.
- Configuring the Configuration Register and the Show Version Command: Explains how to configure the router's configuration register and use the show version command.
15. Routing Protocol Concepts and Configuration
- Connected and Static Routes: Introduces connected and static routes and how they are configured.
- Default Routes and Their Configuration: Discusses default routes and how to configure them for traffic routing.
- Routing Protocol (IGP & EGP) & Algorithms: Explains interior and exterior gateway protocols (IGP, EGP) and their routing algorithms.
- Autosummarization and Manual Summarization, Classless and Classful Routing Protocols, and Convergence: Details the process of summarizing routes in routing protocols.
- Basic Concepts, Configuring, and Verifying RIP-2: Introduces RIP-2 and explains its configuration and verification.
- Different Metrics Used and the Show IP Route Command: Describes the metrics used in routing protocols and how to view routing information.
- Administrative Distance: Explains the concept of administrative distance in routing protocols.
- Debug Command and RIP: Details the use of the debug command for troubleshooting RIP.
16. Troubleshooting IP Routing
- IP Addressing Issues: Discusses common IP addressing issues and troubleshooting techniques.
- Host Networking Commands of Telnet, Tracert, Ipconfig, Arp, Netstat, and Nslookup: Explains the usage of these networking commands for troubleshooting.
Apply for Certification
https://www.vskills.in/certification/Certified-Basic-Network-Support-Professional