NYC College of Technology

CST3607: Interconnectivity (Spring 2017)


Contents:
Announcements
Assignment Requirements
Required Texts
Class Notes & Assignments : February, March, April, May
Recommended Web Sites and Books [ Get Firefox! ] [ NoScript ] uBlock Origin
Log into Blackboard via the CUNY PortalExternal Link
Cisco IOS and Router Command Reference
Bit Patterns of Often Used Subnet Mask Values (pdf)
OSI Reference Model (pdf)
IP Address Conversions : Decimal to Base-256 / Base-256 to Decimal

Announcements


Final Exam: Thurs. May 25, 2017


Exam #3: Thurs. May 11, 2017

Quiz #4: Due Sat. 4/8/2017 before 6pm, in Blackboard

Exam #2: Thurs. April 6, 2017

Quiz #3: Due Sat. 3/11/2017 before 3pm, in Blackboard

Exam #1: Thurs. March 9, 2017

Quiz #2: Subnetting :Tues. 3/7/2017

Assignment #3: Due Tues. 3/7/2017

Quiz #1: Subnetting : Thurs. 3/2/2017

Assignment #2: Due Thurs. 3/3/2017

Assignment #1, Due Tues. 2/28/2017

Important note about sending E-Mail to Me
  • Only use the e-mail address I gave you in class to communicate with me.
  • Do not use my cuny.edu address and do not e-mail me via Blackboard.

 


[ Top ] [ Home ]

 

Required for all Assignments

  • Make sure that your full name is neatly written on your assignment.
  • Submit a typed hardcopy at the beginning of class.
  • If you use the RTF or DocX template I supply, type your answers in the table below each question.
    • If you do not use the template I supply, make sure your answers stand out from the text of the question. i.e. bold or underlined, not both.
  • Do not double space.
  • Do not type your answers in all uppercase.
  • Print out your assignments before you come to class.
    Do not rely on the printer or network in our classroom to be available or functional.
  • Make sure that the correct assignment number and chapter are on your paper. Be mindful that the assignment number is not always the same as the chapter number.
  • E-mail your assignment only if you are going to be absent, and at least 2 hours before class starts, on the day that the assignment is due. This should ensure that I receive your assignment before the start of class.
  • No late assignments will be accepted.

 


[ Top ] [ Home ]

 

Required Text

CCNA Routing and Switching Complete Study Guide: Exam 100-105, Exam 200-105, Exam 200-125, 2nd EditionExternal Link

Author(s): Todd Lammle (Lammle.com)
ISBN: 978-1-119-28828-2
Publish date: September 2016
Publisher: Sybex
Also on Amazon.com

eBook: VitalSource.com

Forum: Todd Lammle's Cisco CCNA R/S Study Guide, 2nd Edition

Use LammleSim IOS, "IOS CCNA R/S SIM," to practice the hands-on labs.

Smile

 

 

Reference Texts

Connecting to the Internet: A Practical Guide About LAN-Internet ConnectivityExternal Link

Author(s): Andrew F. Ward
Publisher: Addison-Wesley, 1999. ISBN: 0-201-37956-2
Used copies are available through Amazon.comExternal Link

 


[ Top ] [ Home ]

 

Class Notes & Assignments

Tuesday: Jan. 31, 2017
Top / Home

News

In Class

Principle of Least Privilege

Identity Theft is a big problem.

 

Stay Informed! News Sources

Studying & Learning Tips

 

Memorize these Bit Patterns of Often Used Subnet Mask Values (pdf)

Bit(s)

Binary

 

Decimal

1

10000000

=

128

2

11000000

=

192

3

11100000

=

224

4

11110000

=

240

5

11111000

=

248

6

11111100

=

252

7

11111110

=

254

8

11111111

=

255

 

Password Managers

 

 

Read / Watch

Do

February

Thurs. Feb. 2, 2017
Top / Home

News

 

Protocol Review:

Troubleshooting Client Network Connectivity

 

Unicast, Broadcast, Multicast, Anycast

 

Microsoft OneNote

 

Wireless Network Security

 

Read

Do

 

Tues. Feb. 7, 2017
Top / Home

Identity Theft: Educate yourself and your people:

 

QuickTime should be uninstalled from all Microsoft Windows systems

 

Panopticlick

The Electronic Frontier Foundation (EFF) has an online tracker-testing in its Panopticlick, helping you analyze the privacy protections in your Web browser.

Web Browser Plugins

 

Telemetry is an automated communications process by which measurements and other data are collected at remote or inaccessible points and transmitted to receiving equipment for monitoring.

 

Spanning Tree Protocol (STP)

 

How would you know that a network has been compromised?

 

Network Analyzer/Packet Sniffer

 

 

Universal Plug-and-Play (UPnP)

 

Types of Ethernet cabling

Cisco's Three-Layer Hierarchical Model

 

Autonomous System (AS)

 

Dynamic Host Configuration Protocol (DHCP)

Phase

Transmission Method

Description

Discover broadcast --> Client requests an IP address.
The client broadcasts a DHCPDISCOVER message on the physical subnet to find available servers. The client creates a UDP packet with the broadcast destination of 255.255.255.255 or the subnet broadcast address.
Offer <-- unicast DHCP server offers an IP address from its pool.
When a DHCP server receives an IP lease request from a client, it extends an IP lease offer. This is done by reserving an IP address for the client and sending a DHCPOFFER message across the network to the client. This message contains the client's MAC address, followed by the IP address that the server is offering, the subnet mask, the lease duration, and the IP address of the DHCP server making the offer.
Request broadcast --> When the client PC receives an IP lease offer, it must tell all the other DHCP servers that it has accepted an offer. To do this, the client broadcasts a DHCPREQUEST message containing the IP address of the server that made the offer. When the other DHCP servers receive this message, they withdraw any offers that they might have made to the client. They then return the address that they had reserved for the client back to the pool of valid addresses that they can offer to another computer. Any number of DHCP servers can respond to an IP lease request, but the client can only accept one offer per network interface card.
Acknowledge <-- unicast When the DHCP server receives the DHCPREQUEST message from the client, the final phase of the configuration process is initiated. The acknowledgement phase involves sending a DHCPACK packet to the client. This packet includes the lease duration and any other configuration information that the client might have requested. At this point, the IP configuration process is complete.

 

Read

Do

 

Thurs. Feb. 9, 2017 ~ College Closed ~ Due to the impending weather emergency
Top / Home

 

From: Stephen Soiffer
Sent: Wednesday, February 8, 2017 7:29 PM
Subject: College closed tomorrow

Due to the impending weather emergency, the College will be closed tomorrow, Thursday Feb 9. No classes will be held and no College offices will be open. Only designated emergency staff need report. Additional information will be posted on the College website as it becomes available. Please stay safe!

Stephen M. Soiffer, PhD
Special Assistant to the President
New York City College of Technology/CUNY
300 Jay Street, Namm 319
Brooklyn NY 11201
O: 718.260.5992
F: 718.260.5406
ssoiffer@citytech.cuny.edu

 

 

Read / Watch

Do

 

 

Tues. Feb. 14, 2017
Top / Home

 

News

 

ARP (Address Resolution Protocol)

Neighbor Discovery Protocol (NDP)

Connection-oriented service vs Connectionless service

 

Subnet zero and the all-ones subnet

 

Read / Watch

Do

 

Thurs. Feb. 16, 2017
Top / Home

 

News

University attacked by its own vending machines, smart light bulbs & 5,000 IoT devices

A rash of invisible, fileless malware is infecting banks around the globe

 

ICMP (Internet Control Message Protocol)

TTL (Time to Live)

Diagnostic Commands

ping <IP Address>

tracert <IP Address>

Tracert

netstat -r

netstat -n

route print

ipconfig /all

 

Classful addressing vs Classless addressing

What distinguishes Classful addressing from Classless addressing?

Classless Inter-Domain Routing (CIDR) : RFC 1519

CIDR (Classless Inter Domain Routing) vs VLSM (Variable Length Subnet Mask)

Subnet zero and the all-ones subnet

Powers of 2: (Ch. 4, p. 139)

 

Tools

Rufus: Create a bootable USB from an ISO

XBoot: Create a bootable USB flash drive with multple Live OS's

inSSIDer open-source Wi-Fi scanning software

 

Read / Do

 

Tues. Feb. 21, 2017
Top / Home

 

Broadcast Address, Wildcard Mask, Block Size practice:

 

Subnetting and Supernetting

Subnetting

Supernetting

Default Mask vs Mask

 

Using the Wildcard mask to determine the last address (a.k.a. broadcast address) within a subnet.

 

Practice, practice, practice: SubnettingQuestions.com

 

Practice makes improvement!

 

Do

 

Thurs. Feb. 23, 2017
Top / Home

News

 

Subnetting, continued...

 

Using the AND function to determine the network address

 

Converting a Decimal Number to Base 256  (Dotted-decimal)

 

 

Subneting into a Large Number of Subnets

Determine the network address of a high subnet number.

  1. Multiply the target subnet number by the number of addresses per subnet, to get the number of addresses to add to the network address (subnet zero) to jump to the target subnet.
  2. Convert the resulting number of addresses to its Base-256 (dotted-decimal) equivalent.
  3. Add the Base-256 equivalent to the network address, to determine the target subnets address.

 

Subnetting Tips/Notes

 

 

Do

 

 

Tues. Feb. 28, 2017
Top / Home

News

 

In Class

Read/Do

 

 

March

Thurs. March 2, 2017
Top / Home

In Class

Quiz #1: Subnetting

----

Assignment #2 Debriefing

 

VLSM (Variable Length Subnet Mask)

VLSM: Configuring Subnets Using the Numeric Method (PDF)

 

Do

Do

 

Tues. March 7, 2017
Top / Home

In Class

Read / Do

 

Thurs. March 9, 2017
Top / Home

In Class

Exam #1

 

Read / Do

 

Tues. March 14, 2017 ~ College Closed ~ Due to the impending weather emergency
Top / Home

 

 

Thurs. March 16, 2017
Top / Home

In Class

 

Better Focus and Efficient Studying When Not Multitasking

 

Read / Do

 

Tues. March 21, 2017
Top / Home

News

Tips

Recommended Sci-Fi Books

 

Backing Up: 3-2-1 Rule

 

Optical Media for Long Term Archives

 

Route Aggregation / Route Summarization / Network Address Aggregation

Step 1 Convert the addresses to binary format and align them in a list.
Step 2

Locate the bit where the common pattern of digits ends.

(It might be helpful to draw a vertical line marking the last matching bit in the common pattern.)

Step 3

Count the number of common bits.

The summary route number is represented by the first IP address in the block, followed by a slash, followed by the number of common bits.

 

 

Read

Do

 

Thurs. March 23, 2017
Top / Home

 

Cisco IOS

 

Routers

 

Google: My Activity

 

Read / Do

 

Tues. March 28, 2017
Top / Home

In Class

 

 

Cisco Discovery Protocol (CDP)

How Routers Talk to Each Other

Forwarding Techniques

Delivery of a Packet

Routing protocols:

Protocol

Vector

Description

RIP (Routing Information Protocol)

distance-vector routing

IGRP (Interior Gateway Routing Protocol)

distance-vector routing

  • considered a classful routing protocol
  • IGRP supports multiple metrics for each route, including bandwidth, delay, load, MTU, and reliability
  • maximum hop count of IGRP-routed packets is 255 (default is 100)

EIGRP (Enhanced Interior Gateway Routing Protocol)

distance-vector routing

  • Adds support for VLSM (variable length subnet mask)
  • Adds the Diffusing Update Algorithm (DUAL) in order to improve routing and provide a loopless environment.
  • EIGRP has completely replaced IGRP

OSPF (Open Shortest Path First)

link-state routing protocol

  • Routes packets based solely on the destination IP address found in IP packets.
  • Designed to support variable-length subnet masking (VLSM, CIDR).
  • OSPF detects changes in the topology, such as link failures, very quickly and converges on a new loop-free routing structure within seconds.
  • falls into the group of interior gateway protocols, operating within an autonomous system (AS)
  • the most widely-used interior gateway protocol (IGP) in large enterprise networks
  • OSPF does not use TCP or UDP but uses IP directly, via IP protocol 89. OSPF handles its own error detection and correction, therefore negating the need for TCP or UDP functions.

BGP (Border Gateway Protocol)

path vector protocol

  • makes routing decisions based on path, network policies and/or rulesets
  • v4 supports Classless Inter-Domain Routing and the use of route aggregation to decrease the size of routing tables.
  • RFC 4271
  • The most widely-used exterior gateway protocol (EGP) is BGP.

 

 

Lab-01

 

Read

Do

 

Thurs. March 30, 2017
Top / Home

Industry Info

Loop Prevention (Routers)

Routing Tables

Field

Description

Mask The network prefix (in CIDR notation) of the destination network

Network address

The network address of the destination network

Next Hop IP address

The IP address of the next neighbor router to the destination network.
Think... From the router you're on, what is the IP address of the closest router I can pass the packet to, to get that packet to the destination network?

Interface

The network interface used to get to the destination network.
a.k.a. "Exit Interface"
Think... From the router you're on, which interface do I have to send the packet out of, to get it to the Next Hop router?

 

 

Lab-02: R&S Study Guide 2nd Ed.: Chapters 6 & 7 Hands-on Labs Combined

Lab-03: Building Routing Tables

 

Read / Do

Do

 

 

April

Tues. April 4, 2017
Top / Home

 

In Class

Router Configuration Checklist

Cisco IOS

 

Router Simulator (RouterSim)

 

Lab-04: (Configuring Router interfaces, and the RIP Routing Protocol)

 

 

Read / Do

 

Thurs. April 6, 2017
Top / Home

In Class

 

Exam 2

You must be able to correctly answer all of the Review Questions from each chapter.

The exam includes, but is not limited, to the following:

 

Do

 

Tues. April 11, 2017 ~ No Class ~ Spring Recess
Top / Home

Do

 

Thurs. April 13, 2017 ~ No Class ~ Spring Recess
Top / Home

Do

 

Tues. April 18, 2017 ~ No Class ~ Spring Recess
Top / Home

Do

 

Thurs. April 20, 2017 ~ No Class ~ **M - Classes follow a Monday Schedule
Top / Home

Do

 

Tues. April 25, 2017
Top / Home

Document the configuration of each router in your lab

 

Read / Do

 

Thurs. April 27, 2017
Top / Home

In Class

 

Lab-05: (Serial, OSPF, DHCP)

Read

Do

 

 

May

Tues. May 2, 2017
Top / Home

In Class

 

Lab-05 Debriefing:

 

Self-Evaluation

 

 

Chapter 10: Layer 2 Switching

The three functions of a switch.

Configuring an IP address on a switch

Port Security on a Switch

(Chapter 10, pgs. 417, 428)

Restrict and shutdown violation modes alert you via SNMP that a violation has occurred on a port. (pg. 443, 3rd sentence in the 5th paragraph)

 

Spanning Tree Protocol (STP)

Bridge Protocol Data Unit (BPDU)

 

Spanning Tree Protocol (STP): Port States

The ports on a switch with enabled Spanning Tree Protocol (STP) are in one of the following four port states.

Blocking

Listening

Learning

Forwarding

 

"Disabled" is not one of the four states. Disabled (technically, is not a transition state). A port in the administratively disabled state doesn’t participate in frame forwarding or STP. A port in the disabled state is virtually nonoperational.

 

Read / Do / Watch

 

Thurs. May 4, 2017
Top / Home

In Class

Chapter 11: VLANs and InterVLAN Routing

Lab-06: VLANs on multiple switches with a Trunk Port

Read

Read

Do

 

Tues. May 9, 2017
Top / Home

In Class

Access Control List (ACL)

Standard ACL (1-99)

Extended ACL (100-199)

applied closest to the destination

applied closest to the source

Denies or Permits:

  • source IP address

Denies or Permits:

  • source IP address
  • destination IP address
  • port or service

 

Lab-07: Chapter 12: Cisco IOS: Security: Access Control Lists (ACLs)

Router

Interface

IP Address

Network Address

Wildcard Mask

Description

Corp

Serial 0/0

172.16.10.1 /30

   

Connection to SF

Corp

Serial 0/1

172.16.10.5 /30

   

Connection to LA

Corp

Fa0/0

10.10.10.1 /24

   

 

 

 

 

   

 

SF

Fa0/0

192.168.10.1 /24

   

 

SF

S0/0/0

172.16.10.2 /30

   

Connection to Corp

 

 

 

   

 

LA

Fa0/0

192.168.20.1 /24

   

 

LA

S0/0/0

172.16.10.6 /30

   

Connection to Corp

 

Read / Do

 

Thurs. May 11, 2017
Top / Home

In Class

Exam #3: In Class, via Blackboard

To be prepared for this, and any of the exams, you must be able to answer all of the Review Questions at the end of each chapter.

This exam includes, but is not limited, to the following:

 

Read / Do

 

 

Tues. May 16, 2017
Top / Home

In Class

Exam 3 / Quiz 5 Debriefing

 

Network Address Translation (NAT)

 

Lab-08: Chapter13: Cisco IOS – Network Address Translation (NAT)

Lab-02: R&S Study Guide: Chapters 6 & 7 Hands-on Labs Combined

 

Read / Do

Study for the Final Exam

 

 

Thurs. May 18, 2017
Top / Home

 

Three strategies for the transition from IPv4 to IPv6:

Advantages that IPv6 has over IPv4.

IPv6 Addressing

IPv6: Zero Omission Rules

OSPFv3

What is the command to configure OSPFv3 on a router?

 

Lab-9: Chapter 14: IPv6

 

Read / Do

Assignment #5: IPv6 Zero Omission Rules

 

 

Study for the Final Exam

 

Tues. May 23, 2017
Top / Home

 

Assignment #5 Debriefing

Lab-10: Troubleshooting Challenge (This will be Quiz #7)

You must be in class to get credit for completeting this lab.

This "challenge" hands-on lab will be graded as a quiz.

This will give you an opportunity to increase your grade, more than just one lab.

You'll need to use troubleshooting commands to diagnose the network topology and configurations. For example:

You may need to do some or all of the following:

This should not be much of a challenge, as you would have had plenty of practice from completing all of the hands-on labs from chapters 6 through 15.

 

Study for the Final Exam

 

 

Thurs. May 25, 2017 ~ Last Day of Class
Top / Home

 

Final Exam: Thurs. May 25, 2017

(Note: This outline of the final exam may change, so check daily for updates.)

 

The final exam includes, but is not limited, to the following:

 

Chapter 13: Network Address Translation (NAT)

 

Chapter 14: Internet Protocol Version 6 (IPv6)

Chapter 15: Enhanced Switched Technologies

Cisco IOS Diagnostic Commands

 

 

Recommended Web Sites and Books

 


[ Top ] [ Home ]

 

 

All items Copyright ©1996 - 2017 Chin. All Rights reserved Reproduction without explicit permission is prohibited. See: Terms of use