NYC College of Technology

CST3607: Interconnectivity (Fall 2017)


Contents:
Announcements
Assignment Requirements
Required Texts
Class Notes & Assignments : September, October, November, December
Recommended Web Sites and Books[ NoScript ] uBlock Origin
Log into BlackboardExternal Link
Cisco IOS and Router Command Reference
Bit Patterns of Often Used Subnet Mask Values (pdf)
OSI Reference Model (pdf)
IP Address Conversions : Decimal to Base-256 / Base-256 to Decimal

Announcements


Assignment #1, Due Tues. 9/26/2017


Important note about sending E-Mail to Me
  • Only use the e-mail address I gave you in class to communicate with me.
  • Do not use my cuny.edu address and do not e-mail me via Blackboard.

 


[ Top ] [ Home ]

 

Required for all Assignments

  • Make sure that your full name is neatly written on your assignment.
  • Submit a typed hardcopy at the beginning of class.
  • If you use the RTF or DocX template I supply, type your answers in the table below each question.
    • If you do not use the template I supply, make sure your answers stand out from the text of the question. i.e. bold or underlined, not both.
  • Do not double space.
  • Do not type your answers in all uppercase.
  • Print out your assignments before you come to class.
    Do not rely on the printer or network in our classroom to be available or functional.
  • Make sure that the correct assignment number and chapter are on your paper. Be mindful that the assignment number is not always the same as the chapter number.
  • E-mail your assignment only if you are going to be absent, and at least 2 hours before class starts, on the day that the assignment is due. This should ensure that I receive your assignment before the start of class.
  • No late assignments will be accepted.

 


[ Top ] [ Home ]

 

Required Text

CCNA Routing and Switching Complete Study Guide: Exam 100-105, Exam 200-105, Exam 200-125, 2nd EditionExternal Link

Author(s): Todd Lammle (Lammle.com)
ISBN: 978-1-119-28828-2
Publish date: September 2016
Publisher: Sybex
Also on Amazon.com

eBook: VitalSource.com

Use the LammleSim IOS "IOS CCNA R/S SIM" to practice the hands-on labs.

 

 

Reference Texts

Connecting to the Internet: A Practical Guide About LAN-Internet ConnectivityExternal Link

Author(s): Andrew F. Ward
Publisher: Addison-Wesley, 1999. ISBN: 0-201-37956-2
Used copies are available through Amazon.comExternal Link

 


[ Top ] [ Home ]

 

Class Notes & Assignments

Tuesday: Aug. 29, 2017
Top / Home

News

In Class

Principle of Least Privilege

 

Stay Informed! News Sources

Studying & Learning Tips

 

Memorize these Bit Patterns of Often Used Subnet Mask Values (pdf)

Bit(s)

Binary

 

Decimal

1

10000000

=

128

2

11000000

=

192

3

11100000

=

224

4

11110000

=

240

5

11111000

=

248

6

11111100

=

252

7

11111110

=

254

8

11111111

=

255

 

Password Managers

 

Troubleshooting Client Network Connectivity

 

 

Read / Watch

Do

Thursday: Aug. 31, 2017
Top / Home

News

PortaPow Fast Charge + Data Block USB Adaptor

 

Identity Theft is a big problem.

 

Protocol Review:

 

Cisco IOS and Router Command Reference

 

Unicast, Broadcast, Multicast, Anycast

 

Collision and Broadcast Domains

 

 

Microsoft OneNote

 

Wireless Network Security

 

Virtual Private Network (VPN)

A virtual private network (VPN) enables users to send and receive data while remaining anonymous and secure online.

In the simplest terms, a VPN is used to create a secure, encrypted connection between your computer and a server operated by the VPN service.

 

Read

Do

 

September

Tuesday: Sept. 5, 2017
Top / Home

 

News

More than 150,000 Internet-facing printers were scanned, located, and used

 

QuickTime should be uninstalled from all Microsoft Windows systems

 

2 Factor Authentication

 

Panopticlick

The Electronic Frontier Foundation (EFF) has online tracker-testing in its Panopticlick, helping you analyze the privacy protections in your Web browser.

Web Browser Plugins

 

Telemetry is an automated communications process by which measurements and other data are collected at remote or inaccessible points and transmitted to receiving equipment for monitoring.

 

How would you know that a network has been compromised?

 

Network Analyzer/Packet Sniffer

 

 

Universal Plug-and-Play (UPnP)

 

Types of Ethernet cabling

Autonomous System (AS)

 

Read

Do

 

Thursday: Sept. 7, 2017
Top / Home

 

News

 

Spanning Tree Protocol (STP)

 

Cisco's Three-Layer Hierarchical Model

 

Dynamic Host Configuration Protocol (DHCP)

Phase

Transmission Method

Description

Discover broadcast --> Client requests an IP address.
The client broadcasts a DHCPDISCOVER message on the physical subnet to find available servers. The client creates a UDP packet with the broadcast destination of 255.255.255.255 or the subnet broadcast address.
Offer <-- unicast DHCP server offers an IP address from its pool.
When a DHCP server receives an IP lease request from a client, it extends an IP lease offer. This is done by reserving an IP address for the client and sending a DHCPOFFER message across the network to the client. This message contains the client's MAC address, followed by the IP address that the server is offering, the subnet mask, the lease duration, and the IP address of the DHCP server making the offer.
Request broadcast --> When the client PC receives an IP lease offer, it must tell all the other DHCP servers that it has accepted an offer. To do this, the client broadcasts a DHCPREQUEST message containing the IP address of the server that made the offer. When the other DHCP servers receive this message, they withdraw any offers that they might have made to the client. They then return the address that they had reserved for the client back to the pool of valid addresses that they can offer to another computer. Any number of DHCP servers can respond to an IP lease request, but the client can only accept one offer per network interface card.
Acknowledge <-- unicast When the DHCP server receives the DHCPREQUEST message from the client, the final phase of the configuration process is initiated. The acknowledgement phase involves sending a DHCPACK packet to the client. This packet includes the lease duration and any other configuration information that the client might have requested. At this point, the IP configuration process is complete.

 

 

ARP (Address Resolution Protocol)

 

 

Read / Watch

Do

 

 

Tuesday: Sept. 12, 2017
Top / Home

 

A rash of invisible, fileless malware is infecting banks around the globe

Surveillance Self-Defense is Electronic Frontier Foundation (EFF)'s guide to defending yourself and your friends from surveillance by using secure technology and developing careful practices.

 

Since Hurricane Katrina, the National Insurance Crime Bureau has offered a free vehicle identification number, or VIN, check service to see if a car has been in a flood. The service is available at http://www.nicb.org/vincheck. A VIN also can be entered into the National Motor Vehicle Title Information System database at http://www.vehiclehistory.gov.

Carfax, which charges $39.99 for a report, is offering its flood-damage database for free post-Harvey. Buyers can check if a car is flood-damaged at http://carfax.com/flood.

 

In Class

Neighbor Discovery Protocol (NDP)

Connection-oriented service vs Connectionless service

 

 

Tools

Rufus: Create a bootable USB from an ISO

XBoot: Create a bootable USB flash drive with multple Live OS's

inSSIDer open-source Wi-Fi scanning software

 

Read / Do

Read

Do

 

Thursday: Sept. 14, 2017
Top / Home

 

BlueBorne

Anti-Virus, or Not?

 

Subnet zero and the all-ones subnet

 

Broadcast Address, Wildcard Mask, Block Size practice:

 

Default Mask vs Mask

 

Using the Wildcard mask to determine the last address (a.k.a. broadcast address) within a subnet.

 

 

Read / Do

Practice, practice, practice: SubnettingQuestions.com

 

Practice makes improvement!

 

 

 

 

Tuesday: Sept. 19, 2017 **TH (Classes follow Thurdsay schedule)
Top / Home

Google: My Activity

 

Supernetting

 

Subnetting

Answer these questions when subnetting:

 

Using the AND function to determine the network address

 

Converting a Decimal Number to Base 256  (Dotted-decimal)

 

 

Subneting into a Large Number of Subnets

Determine the network address of a high subnet number.

  1. Multiply the target subnet number by the number of addresses per subnet, to get the number of addresses to add to the network address (subnet zero) to jump to the target subnet.
  2. Convert the resulting number of addresses to its Base-256 (dotted-decimal) equivalent.
  3. Add the Base-256 equivalent to the network address, to determine the target subnets address.

 

Subnetting Tips/Notes

 

 

Do

Do

 

 

Thursday: Sept. 21, 2017 : (No Classes)
Top / Home

Read

Do

 

Tuesday: Sept. , 2017
Top / Home

 

In Class

Read/Do

 

 

Thursday: Sept. , 2017
Top / Home

In Class

Read

Do

 

 

October

 

November

 

December

 

Tuesday December 19, 2017 ~ Last Day of Class
Top / Home

 

Final Exam: Tues. December 19, 2017

(Note: This outline of the final exam will change, so check often for updates as this day approches.)

 

The final exam includes, but is not limited, to the following:

 

 

 

 

Recommended Web Sites and Books

 


[ Top ] [ Home ]

 

 

All items Copyright ©1996 - 2017 Chin. All Rights reserved Reproduction without explicit permission is prohibited. See: Terms of use