Network Training - Course Details

UNF Understanding Networking Fundamentals

Network Training Course Description:
In this broad-based foundational course, you'll move step-by-step through thebasics of data networking, practicing with leading-edge technologies from Cisco,Juniper, ADTRAN, HP, Dell, and Microsoft. With a strong foundation and an understanding of basic network functions,standards, and protocols, you will be prepared to tackle advanced networkingskills including TCP/IP, security, wireless integration, and Voice over IP.
Network Training Course Duration:
5 DAYS
Network Training Course Target Audience:
Technical professionals responsible for voice/data integration, network administrators, applications developers, help desk staff, IT managers, and IT project managers.
Network Training Course Prerequisite:
NONE
Course Content:

  • 1. Network Overview

    • Defining a Network
      • Reasons to Use a Network
    • Network Components
      • End Devices
      • Operating Systems
      • Network Infrastructure
      • Network Types
      • Network Services

  • 2. Network Functions and Standards

    • Generic Network Functions
    • Standards Organizations
      • Institute of Electrical and Electronics Engineers (IEEE)
      • Common WAN Serial Interface Standards
    • Internet Organizations
      • Internet Standards Process
    • OSI Model Overview
      • Layer 1: Physical Layer
      • Layer 2: Data Link Layer
      • Layer 3: Network Layer
      • Layer 4: Transport Layer
      • Layer 5: Session Layer
      • Layer 6: Presentation Layer
      • Layer 7: Application Layer
    • TCP/IP Model

  • 3. Local Signaling Media

    • Serial Cabling Specifications
      • Media Interface Specifications
      • DCE and DTE Specifications
    • Twisted-Pair Cabling Specifications
      • Cable Runs
      • Unshielded Twisted Pair Cabling
      • Half-Duplex and Full-Duplex Operation
      • Seven Keys to Successful UTP Wiring
    • Fiber Optic Cabling Systems
      • Fiber Optic Cabling Types
    • Wireless Networking Systems
      • Wireless Network Preparation
      • Cellular Modem

  • 4. Ethernet

    • Ethernet Overview
      • Network Interface Cards
      • Ethernet Addressing
    • Ethernet Standards
      • 10 Mbps Ethernet Connectivity Options
      • 100 Mbps Ethernet Connectivity Options
      • Gigabit Ethernet Overview
      • 10 Gigabit Ethernet Connectivity Options
      • 40 Gigabits and 100 Gigabits
    • Ethernet Version II Frame Structure
      • Ethernet Type Field
      • IEEE 802.3 with 802.2 Frame Format
      • Captured Frame Displayed by a Protocol Analyzer
    • Ethernet Equipment Overview
      • Ethernet Ports and Connectors
      • Ethernet Switches
      • Routers
      • Integrating 10, 100, and 1,000 Mbps and 10 Gbps Ethernet
    • Ethernet Performance Issues

  • 5. Switching

    • Switching Overview
      • Current Switch Installations
    • Switch Operation Overview
      • The Learning Process
      • The Flooding Process Part1
      • The Forwarding and Filtering Process
      • The Flooding Process Part 2
      • Switch Loop Problems
    • Switch Configuration
      • Port Security
    • Spanning Tree Algorithm Overview
      • STA Root Switch Election
      • STA Path Selection
      • Spanning Tree Timers
      • STA Self-Healing Ability
    • VLAN Overview
      • VLAN Configuration
      • VLAN Operation
      • VLANs on Multiple Switches
    • Switch Troubleshooting

  • 6. Logical Addressing

    • Logical Address Overview
    • Binary Numbering
      • Converting Binary to Decimal
      • Converting Decimal to Binary
      • Conversion Practice
    • Dotted Decimal Notation
    • Logical Address Types
    • Class-Based Addressing
      • Network-Specific Addresses
    • Reserved Addresses
    • Private Addresses
    • Network Masking
    • Classless Addressing

  • 7. Address Resolution Protocol (ARP)

    • Address Resolution Overview
    • ARP Process
      • ARP Messages
    • ARP Cache
      • Duplicate MAC Addresses
    • Gratuitous ARP
    • Proxy ARP
    • ARP Restrictions
      • ARP Command

  • 8. Network Layer Process

    • Logical Addressing
      • Network Loop Handling
      • Routing Decision-Making
      • Path Control
      • Multicast Management
    • Communication Flexibility
      • Multiplexing
      • Data Length Management
    • Quality of Service
      • Data Receipt Verification
    • Diagnostics
      • Logical Error Review

  • 9. Subnetting

    • Subnetting Overview
      • Communication Between Hosts
      • IP Address and Mask
    • Subnetting Basics
      • Subnet Rules
      • Subnetting Decisions
      • Four Key Addresses
    • Case Study
      • Onageristic Analysis Inc.
      • Masking for Subnets
      • Masking for Interfaces
      • Headquarters Addressing
      • East Addressing
      • West Addressing
      • WWAN Addressing

  • 10. Routing

    • Routing Overview
      • Logical Segmentation
    • Static Links vs. Dynamic Routing
    • Router Configuration Overview
      • Routing Protocols
      • Routing Metrics
      • Routing Decisions
    • Routing Protocol Operation
      • Routing Information Protocol
      • RIP Routing Tables
      • Open Shortest Path First (OSPF)
      • Enhanced Interior Gateway Routing Protocol (EIGRP)
      • Border Gateway Protocol (BGP)

  • 11. WAN Overview

    • WAN Overview
      • Telecommunications Infrastructure
      • Connection Types: PVC and SVC
      • WAN Technologies
    • WAN Circuit-Switching
      • Wide Area Transmission Rates
      • SONET
      • Leased Lines
    • WAN Packet-Switching
      • Packet-Switching Networks
      • Metro/Carrier Ethernet
      • X.25 Overview
      • Frame Relay Overview

  • 12. Host-to-Host Handling

    • Process Identification
      • Application Port Numbering
      • Temporary Ports
      • Port Address Translation
    • Connectionless Function
      • Connectionless Support
    • Connection-Based Functions
      • Connection Handshake
      • Connection Shutdown

  • 13. Supporting Processes

    • Dynamic Host Configuration Protocol
      • Four-Step IP Addressing Process
    • Domain Name System
      • Internet Naming Hierarchy
      • Top-Level Domains
      • Country Domains
      • Dynamic DNS
    • ICMP Overview
      • The ping Command
      • Variation Reports

  • 14. NetBIOS and NetBEUI

    • A Historical Perspective
      • What is NetBIOS?
      • NetBIOS Services
      • NetBIOS vs. NetBEUI
      • NetBIOS over TCP/IP
    • Server Message Block
      • SMB Security
    • NetBIOS Limitations
      • The net Commands
      • The nbtstat Command

  • 15. Security

    • Network Security Overview
      • Network Security Assessment
      • Attack Types
      • Hackers and Attackers
      • Authentication
      • Enciphering
      • Intrusion Detection Systems
    • Content Filtering
      • Firewalls
      • Personal Firewalls
      • Packet Filters
      • Proxy Servers
      • Stateful Inspection Firewalls
    • Security Levels
      • Single-Layer Protection
      • Double-Layer Protection
      • Triple-Layer Protection
    • Virtual Private Networks (VPNs)
    • Develop a Security Plan
      • Vulnerability Assessment

  • 16. User and Manager Processes

    • User and Manager Processes Overview
    • Terminal Emulation
    • File Transfer
      • Connection-Based File Transfer
      • Connectionless File Transfer
    • E-Mail
      • Sending E-Mail
      • Retrieving E-Mail
    • Web Browsing
      • Uniform Resource Locator
    • Network Management

  • 17. Wireless LANs

    • Wireless LAN Overview
      • Wireless LAN Components
      • Wireless Design Issues
    • Wireless LAN Standards
      • IEEE 802.11b
      • IEEE 802.11a
      • IEEE 802.11g
      • IEEE 802.11n
      • Wi-Fi Alliance
    • Wireless Security
      • Basic Security Steps
      • Wired Equivalent Privacy
      • Wi-Fi Protected Access
      • Wi-Fi Protected Access 2
    • Standard Optional Solutions
      • Cellular Wi-Fi Router

  • 18. Instant Communications

    • Instant Messaging Overview
      • Integrated Communications
      • Presence Awareness
      • Security Issues
    • Sarbanes-Oxley (SOX) Act
    • Standards
      • SIMPLE
      • XMPP
    • Short Message Service
      • SMS Center
    • Enhanced Messaging Service
    • Multimedia Messaging Service
    • Potential Future

  • 19. Networking Advances

    • Internet Protocol Version 6 (IPv6)
      • IPv6 Addressing
      • Internet2
    • What is Unified Communications?
      • UC Components
      • Unified Messaging
      • Presence
      • Web Conferencing
      • Voice over Internet Protocol (VoIP)
    • Voice over IP
      • Uses for VoIP
      • Why VoIP Instead of Traditional Voice?
    • IPTV
      • Streaming
      • Protocol Decisions

  • Lab 1: Network Equipment

    • Identifying the Equipment
    • Identifying the Cabling in the Classroom
    • Identifying the Lab Configurations

  • Lab 2: Simple Networking with Ethernet

    • Configuring your PC
    • Cables Might Matter
    • Connecting to the Hub
    • Using netstat

  • Lab 3: Elementary Protocol Analysis

    • The Protocol Analyzer
    • Traffic Flow in a Hub Network
    • Error Messages

  • Lab 4: Exploring Layer 2 Switching

    • Using a Single Workgroup Switch
    • Using Switches to Isolate Traffic Among Ports
    • Viewing the Switch Forwarding Table
    • Using Multiple Switches
    • Controlling Traffic with the Spanning Tree Protocol
    • Viewing Forwarding Tables from Other Vendors

  • Lab 5: Logical Addressing

    • Identifying Classes of Addresses
    • Identifying Public and Private Addresses
    • Identifying Properly Formatted Masks
    • Identifying Masks and Prefixes
    • IP Network Address Selection
    • Labeling an IP Network with Correct Addresses

  • Lab 6: Address Resolution Protocol (ARP) Processing

    • View the ARP Cache
    • Verify the ARP Cache Entries for the Classroom
    • View an ARP Exchange Using the Protocol Analyzer

  • Lab 7: Subnetting

    • Selecting Masks for Various Problems
    • Creating a Subnet Plan
    • Labeling the Network Diagram

  • Lab 8: Routing

    • Add Routers to the Networks
    • Convert Your Workstation to DHCP for Address Assignment
    • Workgroup 1 Router Information
    • Workgroup 2 Router Information
    • Configurations

  • Lab 9: IP Header Analysis

    • IP Header Information

  • Lab 10: TCP Operation

    • Viewing a TCP Session
    • Locating and Documenting the Three-Step Startup Process
    • Locating and Documenting the Application Login Process
    • Locating and Documenting the Logout Process
    • Locating and Documenting TCP Session Termination

  • Lab 11: DHCP Operation and Analysis

    • Viewing the Result of DHCP Failure
    • Viewing Your DHCP Configuration
    • View a UDP Header
    • View the Four-Step DHCP Process

  • Lab 12: DNS

    • Querying a DNS Server with nslookup
    • Viewing a DNS Request
    • Viewing a DNS Response

  • Lab 13: ICMP

    • Examining an Echo Request/Echo Response Message Pair
    • Examining a Network Unreachable Message

  • Lab 14: Network Security

    • Implementing the Windows XP Firewall Function
    • Testing the Windows XP Firewall Function
    • Viewing the Configuration of the Firewall Implementation in the Network
    • Testing the Network Firewall Function

  • Lab 15: User Processes

    • Viewing an SMTP Session
    • Viewing a POP3 Session

  • Lab 16: Wireless Networking

    • Setting Up a Wireless Connection
    • Verifying Your New IP Address
    • Determining Your Wireless Connectivity

  • Lab 17: Instant Messaging

    • o Instant Messaging

  • Lab 18: Leading Edge Processes

    • Preparing for Voice over IP
    • Placing a Call
    • Watching the Call Process