CISC143 Essentials of Networking
Department of Science, Technology, Engineering & Mathematics: Computer/Information Science
- I. Course Number and Title
- CISC143 Essentials of Networking
- II. Number of Credits
- 4 credits
- III. Number of Instructional Minutes
- 3000
- IV. Prerequisites
- None
- Corequisites
- CISC128 or permission of the Department of Science, Technology, Engineering and Mathematics.
- V. Other Pertinent Information
-
This course meets the General Education requirement for Scientific Literacy.
A proctored departmental final exam will be administered is included in this course.
- VI. Catalog Course Description
- This lecture and laboratory course introduces the fundamental properties of data transmission and computer networks. Topics include: data transfer, the OSI and TCP/IP models, protocols, WAN and LAN topologies, devices and media, security and troubleshooting. This course provides basic background for other networking courses and industry certifications.
- VII. Required Course Content and Direction
-
-
Course Learning Goals
Students will:
- explain the OSI (Open Standards Interface) and TCP/IP (Transmission Control Protocol/Internet Protocol) models and how they define data transmission;
- describe and configure important network protocols and implement logical addressing schemes;
- configure, maintain, and troubleshoot network connectivity devices and transmission media;
- implement network architecture with basic network security, including encryption;
- apply the scientific method of analysis and apply it in a variety of situations to solve networking problems, including data transmissions errors, hardware faults, malware, and configuration errors [Scientific Literacy]; and
- plan and implement a basic SOHO (small office/home office).
-
Planned Sequence of Topics and/or Learning Activities
Course Outline:
- Standards and the OSI and TCP/IP Models
- OSI (Open Standards Interface) seven layer model
- Data encapsulation
- Packets and frames
- TCP/IP (Transmission Control Protocol/Internet Protocol) model
- 802.X standards and transmission methods
- 802.3 Ethernet
- 802.11 wireless
- 802.16 mobile
- Standards organizations
- Addressing
- Logical vs. Physical addressing
- Binary and hexadecimal number systems
- Subnetting, supernetting, and classless inter-domain routing (CIDR)
- IPv4 and IPv6
- Dynamic Host Control Protocol (DHCP) vs. Automatic private IP addressing (APIPA)
- Purpose and implementation of DNS (Domain Name System)
- TCP and UDP (User Datagram Protocol) ports and sockets
- Transmission and Media
- Media types and characteristics
- Copper
- Fiber
- Wireless
- Data transmission concepts
- Digital vs. analog transmission
- Electromagnetic light and radio waves
- Duplexing
- Attenuation, latency, and noise
- Structured cabling
- Wiring standards
- Backbone structures
- Topologies
- Logical
- Physical
- Connectivity Devices
- Network interface cards
- Repeaters/hubs
- Bridges/switches
- Routers/gateways
- Modems
- WANs (Wide Area Networks) and Remote Connectivity
- Packet vs. circuit switching
- WAN transmission systems
- Phone lines - PSTN, ISDN, DSL
- Fiber optic - FTTP
- Frame relay, x-25
- ATM
- SONET
- Remote access and VPNs (virtual private networks)
- Routing and Switching
- Routers and other layer-3 devices
- Routing tables
- NAT (network addressing translation)
- Routing protocols
- Filtering
- Switches
- VLAN (virtual LAN) and trunking
- Store-and-forward vs. cut-through switching modes
- Broadcast domain vs. collision domain
- Wireless network
- WLAN (wireless LAN) architecture
- Obstacles including interference and reflection
- Wireless access points and encryption (WEP, WPA)
- Virtualization
- Virtual network components
- Virtual servers
- Virtual desktops and thin clients
- Cloud computing and NaaS (Network as a Service)
- Converged networks
- VoIP (voice over IP)
- Video-over-IP
- QoS (quality of service) assurance methods
- Network Security
- User authentication protocols (PKI, RADIUS, TACACS+, Kerberos, CHAP, MS-CHAP, and EAP)
- Firewalls
- Protocols
- Wireless encryption
- Honeypots
- Common threats
- Social engineering
- Malware - viruses, worms, Trojans
- DoS (Denial-of-service) attacks
- Botnets and zombies
- Policies, procedures, and incident response
- Network Design, Implementation and Maintenance
- Protocol analyzers and packer sniffers
- Fault tolerance
- Monitoring performance
- Disaster recovery
- Network troubleshooting methodology
- Systematic troubleshooting process
- Documentation
- Software and hardware tools
-
Assessment Methods for Course Learning Goals
The assessment of Course Learning Goals is based on written tests, labs, and other assignments, as well as performance-based tasks as appropriate, and a departmental final exam. -
Reference, Resource, or Learning Materials to be used by Student:
Departmentally-selected textbook. Details provided by the instructor of each course section. See course syllabus.
-
Review/Approval Date - 11/05; Revised 6/09; Revised 5/2011;Dept name change, 8/21/2012; New Core 8/2015; Revised: 5/20/2024