You are on page 1of 9

te

u
it
st

In

COURSE SYLLABUS

st

In

TE

Course: NEPE 102

it

Network+

50 Cragwood Rd, Suite 350


South Plainfield, NJ 07080

TE

Victoria Commons, 613 Hope Rd Building #5,


Eatontown, NJ 07724
130 Clinton Rd,
Fairfield, NJ 07004

Syllabus

Avtech Institute of Technology Course

it

Instructor:
Course Duration:
Date/Time:
Training Location:

st

Course Description

In

In this course students will prepare for CompTIAs Network+ certification exam N10-003.
Based on Windows Server 2003, this course covers the full range of skills and concepts students
need to learn, such as basic networking concepts and configurations, the OSI model, working
with network-related hardware, network configuration with TCP/IP, network operating system
basics, fault tolerance and backup issues, and troubleshooting hardware and software problems.

Learning Objectives

it

1.0 Network Fundamental

st

1.1. Recognize the logical or physical network topologies given a diagram, schematic, or
description of Star, Bus, Mesh, and Ring.
1.2. Specify the main features of 802.2 (Logical Link Control), 802.3 (Ethernet), 802.5
(Token Ring), 802.11 (wireless), and Fiber Distributed Data Interface (FDDI)
networking technologies, including: Speed, Access method (CSMA/CA [Carrier Sense
Multiple Access/Collision Avoidance] and CSMA/CD [Carrier Sense Multiple Access /
Collision Detection]), Topology, and Media.
1.3. Specify the characteristics (for example, speed, length, topology, and cable type) of the
following cable standards: 10Base-T, 10Base-FL, 100Base-TX, 100Base-FX, 1000BaseTX, 1000Base-CX, 1000Base-SX, 1000Base-LX, 10GBase-SR, 10GBase-LR, and
10GBase-ER
1.4. Recognize the following media connectors and describe their uses: RJ11 (Registered
Jack), RJ-45, F-Type, ST (Straight tip), SC (subscriber connector), IEEE 1394
(FireWire), LC (local connector), MTRJ (Mechanical Transfer Registered Jack), USB
(Universal Serial Bus)
1.5. Recognize the following media types and describe their uses: Category 3, 5, 5e, and 6,
UTP (Unshielded twisted-pair), STP (shielded twisted-pair), Coaxial cable, SMF (singlemode fiber) optic cable, and MMF (multimode fiber) optic cable.
1.6. Identify the purposes, features, and functions of the following network components:
Hubs, Switches, Bridges, Routers, Gateways, CSU/DSU (Channel Service Unit/Data
Service Unit), NICs (network interface cards, ISDN (integrated Services Digital

TE

In

TE

te

N+ Maintaining PC Network

Avtech Institute

Page 2

Syllabus

te

N+ Maintaining PC Network

Network) adapters, WAPs (wireless access points), Modems, Transceivers (media


converters), and Firewalls.

2.0 The OSI Model

it

In

st

it

2.1. Identify a MAC (Media Access Control) address and its parts.
2.2. Identify the seven layers of the OSI (Open Systems Interconnect) model and their
functions.
2.3. Identify the OSI (Open Systems Interconnect) layers at which the following network
components operate: Hubs, Switches, Bridges, Routers, NICs (network interface cards),
and WAPs (wireless access points).
2.4. Differentiate between the following network protocols in terms of routing, addressing
schemes, interoperability, and naming conventions; IPX/SPX (Internet-work Packet
Exchange/Sequenced Packet Exchange), NetBEUI (Network Basic Input/Output System
Extended User Interface), AppleTalk/AppleTalk over IP (Internet Protocol), and TCP/IP
(Transmission Control Protocol/Internet Protocol). Broad overview and understand the
functions of the OSI Model and its seven layers: (Physical, Data Link, Network,
Transport, Session, Presentation, and Application).

3.0 TCP/IP Fundamentals

In

3.2. Identify the purpose of subnetting, the differences between private and public
network addressing schemes, the differences between IP addressing methods: Static,
Dynamic, and Self-assigned (APIPA).

3.3. Define the purpose, function and use of the following protocol used in the TCP/IP
suite: TCP, UDP, FTP, SFTP, TFTP, SMTP, HTTP, HTTPS, POP3/IMAP4, Telnet,
SSH, ICMP. ARP/RARP, NTP, NNTP, SCP, LDAP, IGMP, LPR.
3.4. Define the function of TCP/UDO ports.

TE

3.5. Identify the well-known ports associated with the following commonly used
services and protocols: 20 FTP, 21 FTP, 22 SSH, 23 Telnet, 25 SMTP, 53 DNS, 69
TFTP, 80 HTTP, 110 POP3, 119 NNTP, 123 NTP, 143 IMAP4, 443 HTTPS.

4.0 TCP/IP Utilities

4.1. Learning how to use the Address Resolution Protocol (ARP), the netstat Utility, the
nbstat Utility, the File Transfer Protocol (FTP), the ping Utility, winipcfg, ipconfig,
ifconfig, the tracert Utility, the Telnet Utility, and the nslookup Utility.
4.2. Given a troubleshooting scenario, select the appropriate network utility from the
following: tracert/traceroute, ping, arp, netstat, ipconfig/ifconfig, winipcfg, nslookup/dig

TE

st

3.1. Describe the TCP/IP family of protocols, IP Addressing, address classification, and
name resolutions services. Discuss of how to setup and configure TCP/IP on Windows
2000 and a brief discussion of VLAN technologies

Avtech Institute

Page 3

Syllabus

te

N+ Maintaining PC Network

4.3. Given output from a network diagnostic utility, identify the utility and interpret the output.

5.0 Network Operating Systems

In

st

it

5.1. Identify the basic capabilities (for example, features, client support, interoperability,
authentication, Directory Structure, file and print services, application support and
security) of the following server operating systems to access network resources:
5.1.1. Unix/Linux/Mac OS X Server
5.1.2. Novell Netware
5.1.3. Microsoft Windows
5.1.4. AppleShare IP (Internet Protocol)

6.0 Wired and Wireless Networks

In

7.0 WAN and Remote Access Technologies

TE

7.1. Identify the basic characteristics (for example, speed, capacity, and media) of the
following WAN (wide area network) technologies: Packet switching, Circuit switching,
ISDN, FDDI, T1/E1/J1, T3/E3/J3, OC-s, X.25
7.2. Identify the basic characteristics of the following internet access technologies: xDSL,
Broadband Cable (Cable modem), POTS/PSTN (Plain Old Telephone Service/Public
Switched Telephone Network), Satellite, Wireless
7.3. Define the function of the following remote access protocols and services: RAS Remote
Access Service), PPP (Point-to-Point Protocol), SLIP(Serial Line Internet Protocol),
PPP0E (Point-to-Point Protocol over Ethernet), PPTP (point-to-Point Tunneling
Protocol), VPN (Virtual Private Network), RDP (Remote Desktop Protocol)
7.4. Given a remote connectivity scenario comprising a protocol, authentication scheme,
physical connectivity, and configure the connection. Includes connection to the
following servers: UNIX/Linux/Mac OS X Server, NetWare, Windows, AppleShare IP
(Internet protocol).

TE

st

it

6.1. Specify the general characteristics (for example, carrier speed, frequency, transmission
type, and topology) of the following wireless technologies: 802.11 (frequency hopping
spread spectrum), 802.11x (direct sequence spread spectrum), Infrared, Bluetooth.
6.2. Identify factors which affect the range and speed of wireless service (for example,
interference, antenna type, and environmental factors).
6.3. The ability to install the most common network connectivity device, the network
interface card, or NIC. Knowing how to configure the workstation to components and
get them functional on Windows systems.
6.4. Identify the appropriate tool for a given wiring task (For example: wire crimper, media
tester/certifier, and punch down tool or tone generator).

Avtech Institute

Page 4

Syllabus

te

N+ Maintaining PC Network

8.0 Network Access and Security

9.0 Fault Tolerance and Disaster Recovery

st

9.1. Identify the purpose, benefits, and characteristics of using antivirus software for virus
protection.
9.2. Identify the purpose and characteristics of how to asses fault tolerance disaster recovery
needs: for example, disk system fault tolerance methods, Power, Link redundancy,
Storage, and Services.
9.3. Identify the purpose and characteristics of disaster recovery for backup consideration:
9.3.1. Backup/restore
9.3.2. Offsite storage
9.3.3. Hot and cold spares
9.3.4. Hot, warm, and cold sites

10.0 Network Troubleshooting

In

TE

TE

10.1. Giving a network scenario, interpret visual indicators (for example, link LEDs [lightemitting diodes] and collision LEDs) to determine the nature of a stated problem.
10.2. Given a troubleshooting scenario involving a client accessing remote network services,
identify the cause of the problem (for example, file services, print services,
authentication failure, protocol configuration, physical connectivity, and SOHO [small
office, home office] router).
10.3. Given a troubleshooting scenario between a client and the following server
environments, identify the cause of a stated problem: UNIX/xMac OS X Server,

it

In

st

it

8.1. Identify the following security protocols and describe their purpose and function: IPSec
(Internet Protocol Security), L2TP (Layer 2 Tunneling Protocol), SSL (Secure Sockets
Layer), WEP (Wired Equivalent Privacy), WPA (Wi-Fi Protected Access), 802.1x
8.2. Identify authentication protocols (for example, CHAP [Challenge Handshake
Authentication Protocol], MS-CHAP [Microsoft Challenge Handshake Authentication
Protocol], PAP [Password Authentication Protocol], RADIUS [Remote Authentication
Dial-In User Service], Kerberos, and EAP [Extensible Authentication Protocol]).
8.3. Identify the basic capabilities needed for client workstations to connect to and use
network resources (for example, media, network protocols, and peer and server
services).
8.4. Identify the purpose, benefits, and characteristics of using a firewall.
8.5. Identify the purpose, benefits, and characteristics of using a proxy service.
8.6. Giving a connectivity scenario, determine the impact on network functionality of a
particular security implementation (for example, port blocking/filtering, authentication,
and encryption).

Avtech Institute

Page 5

Syllabus

te

N+ Maintaining PC Network

In

st

it

NetWare, Windows, AppleShare IP.


10.4. Given a scenario, determine the impact of modifying, adding, or moving network
services (for example, DHCP [Dynamic Host Configuration Protocol], DNS {Domain
Name Service] and WINS (Windows Internet Naming Service]) for network resources
and users.
10.5. Given a troubleshooting scenario involving a network with a particular physical
topology (for example, bus, star, mesh, or ring) and including a network diagram,
identify the network area affected and the cause of the stated failure.
10.6. Given a network troubleshooting scenario involving an infrastructure (for example,
wired or wireless) problem, identify the cause of a stated problem (for example, bad
media, interference, network hardware, or environment).

it

10.7. Given a network problem scenario, select an appropriate course of action based on a
logical troubleshooting strategy. This strategy can include the following steps: 1.
Identify the symptoms and potential causes, 2. Identify the affected area, 3. Establish
what has changed, 4. Select the most probable cause, 5.Implement an action plan and
solution, including potential effects, 6.Test the Result, 7.Identify the results and effects
of the solution, 8.Document the solution and process.

st

Prerequisite

In

Contact Hours

__________ semester credit hours

TE

Text / Lab Books

Semester Credit Hours

______ Contact Hours (Lecture ___ Hours / Lab ____ Hours)

Network + Deluxe Edition Study Guide Second Edition / Exam N10-003


David Groth

ISBN 0-7821-4416-0

TE

Familiarity with PC & Windows OS

Avtech Institute

Page 6

Teaching Strategies

it

A variety of teaching strategies may be utilized in this course, including but not limited to,
lecture, discussion, written classroom exercises, written lab exercises, performance based lab
exercises, demonstrations, quizzes and examinations. Some quizzes may be entirely or contain
lab based components. A mid-course and end course examination will be given.

Method of Evaluating Students


Grade Distribution

st

Class Attendance
Mid Term

In

Finals

Special Projects Makeup projects

100%

Total

it

Grading Policy

Point Range

Interpretation

Grade

90 100

Excellent

80 89

Very Good

70 79

Average

60 69

Poor

Below 60

Failure

N/A

Withdrawal

N/A

Pass

N/A

Incomplete

Quality Points

st

At the end of each course, each student is assigned a final grade as follows:
4.0

In

3.0 3.9
2.0 2.9

1.0 1.9
0
0

TE

TE

A student earning a grade of D or above is considered to have passed the course and is eligible to
pursue further studies. A student receiving a grade of F has failed the course. A failed course
must be repeated and passed to meet Avtech Institutes graduation requirements, in addition to
an overall program GPA of 2.0.

Requirements for Successful Completion of the Course


At a minimum, students must achieve the following:

Syllabus

te

N+ Maintaining PC Network

Avtech Institute

Page 7

Syllabus

te

N+ Maintaining PC Network

1.0 A passing grade of D or above


2.0 Completion of all required examinations
4.0 Adherence to the school attendance policy.

it

Equipment Needed

3.0 Submission of all required lab exercises and projects and;

Industry standard desktop computer for lab exercises.

st

Equipment Breakdown Lab room


Videos and Projector

In

Library Assignments

To be determined by the instructor.

Portfolio Assignment

it

Student program outcome portfolios are required to demonstrate student competencies. In


conjunction with your course structure, please select a project/paper that best demonstrates what
you have learned in this course and add it to your program portfolio.

Course Policies

st

Disruptive Behavior

In

Copyright Infringement

Specific exemptions to copyright infringement are made for student use in the context of learning
activities. Graphic design students often download images from the Internet, or scan images
from publications. As long as this work is for educational purpose, and subject to faculty
permission, this is not a problem.
Plagiarism

Attendance

TE

Faculty cannot tolerate the misrepresentation of work as the students own. This often involves
the use by one student or another students design, whether voluntarily or involuntarily. In the
event that plagiarism is evident and documented, all students involved in the conscious decision
to misrepresent work must receive an F as the grade for the project. A second occurrence may
result in suspension for the rest of the quarter, and return to the school only after a review by the
Academic Standards Committee.

Attendance and Lateness

In education and the workplace, regular attendance is necessary if individuals are to excel. There
is a direct correlation between attendance and academic success. Attendance is mandatory. All

TE

Disruptive behavior is an activity that interferes with learning and teaching. Inappropriate
talking during class, surfing inappropriate website, tardiness, cheating, alcohol or drug use, use
of cell phone, playing lout music during class, etc. all disrupt the learning process.

Avtech Institute

Page 8

Syllabus

te

N+ Maintaining PC Network

students must arrive on time and prepared to learn at each class session. At the faculty members
discretion, students may be marked absent if they arrive more than 15 minutes late to any class.
More that five absences in a class that meets twice per week or more that two absences in a class
that meets once per week may result in a failure.

Make-Up Work

it

Late Projects and Homework

TE

In

TE

st

it

In

st

All projects and homework must be handed in on time. Homework should be emailed to your
instructor if you are going to miss a class. Work that is submitted one week late will result in the
loss of one full grade; and work that is submitted two weeks late will result in the loss of two full
grades; more than two weeks late you will receive a failing grade on the project.

Avtech Institute

Page 9

You might also like