BJ89 COMPUTER NETWORKING FUNDAMENTALS

A. Description of the Evaluation

This competency is designed to provide an overview of networking concepts and standards, while allowing students to acquire and demonstrate basic skills regarding the installation and configuration of common networking devices and protocols.

An understanding of networking concepts is critical to the field of information technology for several reasons. First, knowledge of this field will enhance employment opportunities in the information technology industry and more specifically, in the field of networking. Skilled troubleshooting, acquired within this competency, is one of the foremost skills sought after by recruiters. Second, mastery of this competency will provide the candidate the required technical background to solve complex network problems. Third, the awarding of this competency will provide the basic building blocks toward acquiring more sophisticated and specific knowledge in networking science.

The use of the proper technical knowledge in the area of the LAN and WAN will be tested in twelve (12) distinct elements.

Each element must be achieved with a passing grade of ≥60%.

The evaluations will consist in identifying and/or using models, components, technologies, topologies, terminologies, protocols and the implementation of protocols through design, scenarios and ‘hands-on’ laboratory experiences.

Download “Preparation Guide for BJ89”.

B. Competency Elements

1. Match the appropriate port settings for a protocol used by a computer
for data transmission

Evaluation Criteria

  • Associate the port with the transport method and protocol when using a template.

Study Material

  • Video. IANA (ports).
2. Install, configure and troubleshoot IP addressing schemes to ensure proper communication between network devices

Evaluation Criteria

  • Create appropriate IP subnets from a scenario.
  • Implement IP subnets using equipment supplied in a lab environment.
  • Demonstrate connectivity between the end nodes.
  • Show proper technique in the application of proper IP classes and masks.

Study Material

  • Video. Rules to sub-netting.
  • Video. Sub netting calculation.
  • Video. Implementing sub netting.
3. Understand and use common networking terminology used by industry professionals

Evaluation Criteria

  • Write a brief definition of: LAN, MAN and WAN networks.
  • Identify components of a network (from a diagram) using the proper industry terminologies.
  • List the family of protocols based on the network environment in which they are used (i.e. LAN vs WAN).

Study Material

  • Video. Common icons.
4. Secure a SOHO (Small-Office-Home-Office) router and ensure that the proper encryption scheme is selected for your computer and router to communicate

Evaluation Criteria

  • From a drawing, describe the basic elements design of a wireless SOHO.
  • Describe the steps to implement security measures.
  • Identify common connectivity and encryption protocols and services to secure connectivity.

Study Material

  • SOHO wireless network design.
5. Properly make, test, audit and use network cables (ex: patch) to ensure efficient communication between computers

Evaluation Criteria

  • Through a visual audit of cables, identify their properties and purpose in a LAN.
  • Discriminate different types of medium and their connectors for data transport (i.e. cables, atmosphere, twisted pair, etc).
  • Properly repair a RJ45 connector using the supplied tools.
  • Identify 3 tools that are commonly used in making and/or testing structured LAN cabling.
  • Identify the components needed to establish a horizontal structured cable from the switched port to the node.

Study Material

  • Video. How to read a cable.
6. Understand logical and physical network topologies and their characteristics (i.e. peer-to-peer, client-server)

Evaluation Criteria

  • Identify common topologies with the use of visual diagrams.
  • Identify advantages and disadvantages of peer-to-peer communication.
  • Identify advantages and disadvantages of client/server communication.

Study Material

  • Video. Topologies.
7. Configure and troubleshoot connections between local and remote computers

Evaluation Criteria

  • Identify commands commonly used to test connectivity on a local LAN.
  • Identify at least three services or protocols offering remote computer access.
  • Identify the configuration steps to establish a remote access connection using the service or protocol of your
    choice.

Study Material

  • Commonly used commands.
8. Identify, install and perform basic configurations of common network devices such as hubs, switches and routers

Evaluation Criteria

  • Using a scenario, draw the icons representing the proper interconnecting devices.
  • Using circles and dashed circles identify the broadcast and collision domains.
  • List the importance of the hierarchical position and functions of the interconnecting devices (i.e. router vs switches vs hubs).

Study Material

  • Video. Collision and broadcast domain.
9. Understand the OSI model and use it to troubleshoot communication pathways

Evaluation Criteria

  • Identify the layers of the OSI Model by name and give a brief description of their function(s).
  • Identify protocols and/or equipment found at each layer of the OSI Model.
  • Give four reasons why the OSI Model is built in layers.
  • Define the purpose of the OSI Model.

Study Material

  • Video. OSI model explained.
10. Interpret documentation necessary for connectivity

Evaluation Criteria

  • Identify the troubleshooting procedure to diagnose a LAN cable problem.
  • Draw a flow chart identifying the steps listed above.
  • Describe the importance of keeping a written record of the problem.

Study Material

  • Video. Using Fluke for diagnosing.
  • Video. Troubleshooting methodology.
11. Effectively use command line tools to troubleshoot connectivity problems on a network.

Evaluation Criteria

  • Identify 5 commands commonly used to troubleshoot problems within a LAN.
  • Identify the purpose of the command.
  • Explain why the command line is preferable to use instead of the GUI tools.

Study Material

  • Commonly used commands.
  • Video. Connectivity commands part 1.
  • Video. Connectivity commands part 2.
12. Put into practice proper security measures

Evaluation Criteria

  • Identify from a diagram the equipment that can help implement security measures.
  • From the same diagram, identify those areas that would be involved in the implementation of security measures.
  • Identify potential threats that come from inside/outside the network.

Study Material

  • Video. Securing data from the inside.
  • Video. Internal threats.
  • Video. Limiting physical access.

C. Seminar

Video. Overview of the content of the course.

Please note that BJ89 Boot Camp seminar is a condensed version of the other PowerPoint presentations.

  • Boot Camp
  • Elements 1 to 5
  • Elements 6 to 9
  • Elements 10 to 12