Active Outline
General Information
- Course ID (CB01A and CB01B)
- CIS D069B
- Course Title (CB02)
- The Bits and Bytes of Computer Networking
- Course Credit Status
- Credit - Degree Applicable
- Effective Term
- Fall 2022
- Course Description
- This course is designed to provide a full overview of computer networking. It starts with the fundamentals of modern networking technologies and protocols, and advances to an overview of the cloud option for practical applications, with an emphasis on network troubleshooting.
- Faculty Requirements
- Course Family
- Not Applicable
Course Justification
This CTE, CSU transferable course is on the IT Support Specialist certificate will provide a full overview of computer networking including technologies, protocols, cloud options for practical application, and network troubleshooting.
Foothill Equivalency
- Does the course have a Foothill equivalent?
- No
- Foothill Course ID
Formerly Statement
Course Development Options
- Basic Skill Status (CB08)
- Course is not a basic skills course.
- Grade Options
- Letter Grade
- Pass/No Pass
- Repeat Limit
- 0
Transferability & Gen. Ed. Options
- Transferability
- Transferable to CSU only
Units and Hours
Summary
- Minimum Credit Units
- 4.5
- Maximum Credit Units
- 4.5
Weekly Student Hours
Type | In Class | Out of Class |
---|---|---|
Lecture Hours | 4.0 | 8.0 |
Laboratory Hours | 1.5 | 0.0 |
Course Student Hours
- Course Duration (Weeks)
- 12.0
- Hours per unit divisor
- 36.0
Course In-Class (Contact) Hours
- Lecture
- 48.0
- Laboratory
- 18.0
- Total
- 66.0
Course Out-of-Class Hours
- Lecture
- 96.0
- Laboratory
- 0.0
- NA
- 0.0
- Total
- 96.0
Prerequisite(s)
Corequisite(s)
Advisory(ies)
Limitation(s) on Enrollment
Entrance Skill(s)
General Course Statement(s)
Methods of Instruction
Lecture and visual aids
Discussion of assigned reading
Laboratory discussion sessions and quizzes that evaluate the proceedings weekly laboratory exercises
Collaborative learning and small group exercises
Quiz and examination review performed in class
Assignments
- Readings from text
- Hands on lab exercises
- Two to three exams to assess (comprehensive or multiple choice) competency different modules
Methods of Evaluation
- One or two midterm examinations requiring students to apply topics covered in the lectures and reading. Responses are evaluated on implementation of stated constructs and correctness of responses
- Final examination requiring students to apply topics covered in the lectures and reading. Responses are evaluated on implementation of stated constructs and correctness of responses
- Evaluation of lab topics, based on correctness, documentation, quality, and explanations
Essential Student Materials/Essential College Facilities
Essential Student Materials:Â
- None
- None
Examples of Primary Texts and References
Author | Title | Publisher | Date/Edition | ISBN |
---|---|---|---|---|
Course Guide 1 | Google IT Support Professional Certificate. |
Examples of Supporting Texts and References
None.
Learning Outcomes and Objectives
Course Objectives
- Describe computer networks in terms of a five-layer model.
- Paraphrase all of the standard protocols involved with TCP/IP communications.
- Associating powerful network troubleshooting tools and techniques.
- Implement cloud computing, everything as a service, and cloud storage.
- Interpret and explore the future of computer networking.
CSLOs
- Describe computer networks in terms of a five-layer model and the standard protocols involved with TCP/IP communications.
- Associate powerful network troubleshooting tools and techniques and network services like DNS and DHCP.
Outline
- Describe computer networks in terms of a five-layer model.
- Comprehend the basics of computer networking covering TCP/IP and OSI networking models and how the network layers work together.
- Summarize the physical layer and data link layer of the networking model.
- Compare and contrast networking devices such as cables, hubs, and switches, routers, servers, and clients.
- Summarize how all the separate protocol layers of the network model fit together to create a network.
- Paraphrase all of the standard protocols involved with TCP/IP communications.
- Review the IP addressing scheme and how subnetting works.
- Explore the power of encapsulation works and how protocols such as ARP allow different layers of the network to communicate.
- Identify the basic functions of routing, routing protocols, and how the Internet works
- Summarize the IP addressing scheme, understand how subnetting works, perform binary math to describe subnets and understand how these technologies support the Internet.
- Associating powerful network troubleshooting tools and techniques.
- Highlight the transport and application layers and how they interoperate.
- Describe TCP ports and sockets, identify the different components of a TCP header, and be able to explain the difference between connection-oriented and connectionless protocols, and explain how TCP is used to ensure data integrity.
- Examine networking services and review the role and internals of DNS.
- Explain why incorporating DHCP makes network administration a simpler task than attempting to do a complete network configuration without it.
- Describe how DNS and DHCP work, how NAT technologies help keep networks secure, and how VPNs and proxies help users connect and stay secured.
- Implement cloud computing, everything as a service, and cloud storage.
- Outline the history of the Internet, how it evolved, and how it works today.
- Experiment with different ways to connect to the Internet through cables, wireless and cellular connections, and even fiber connections.
- Define the components of Wide Area Networks (WANs) and outline the basics of wireless and cellular networking.
- Explain network services like DNS and DHCP that help make computer networks run.
- Interpret and explore the future of computer networking.
- Implement the practical aspects of troubleshooting a network using popular operating systems.
- Detect and fix a series of common network connectivity problems using tools available in Microsoft Windows, MacOS, and Linux operating systems.
Lab Topics
- Have learners come up with an IP addressing scheme and subnets for their fictional organization.
- Have them choose from RFC1918 address space
- Talk about different ways to organize IP address space
- Physical location
- Device type
- Device role
- Security segmentation
- Reinforce subnetting constraints
- Use non-overlapping subnet definitions
- Consider reserved addresses
- Plan for growth - Create a diagram with local restaurants across the top and learner names across the bottom. Associate an IP address and netmask with each. Have learners draw connecting lines between learners and restaurants that are in the same "delivery area" (i.e. subnet).
- Using drawing and/or diagramming tools, have learners create a logical network diagram of their fictional organization. Consider having them include all or some of the following items in their diagram:
- How their network connects to the Internet
- End-user devices (workstations, laptops, POS terminals)
- Servers
- Shared office devices (printers, scanners, copiers)
- Guest wireless networking - Demonstrate encapsulation/decapsulation with physical objects. For example, include payloads on index cards and place them in envelopes representing each successive protocol.
- Give each "server" a zone file of records that they know. Have learners play a game of "telephone" where the "client" has to resolve an address by passing messages between the learners.
- Lead activity to demonstrate name resolution and the local hosts'Â file.