Understands computer networking concepts and vocabulary.
Has received experience with real implementations of the concepts.
Has built an intuition of the relationship between standards bodies and technology.
Has built confidence through problem solving.
Nodes and Links
Describe the role of a node and a link in an abstract network model.
Define bandwidth, latency and throughput.
Data Volume Formula
Explain how bandwidth * latency = data volume is related to the concept of traditional “volume.”
Sliding Window Protocol
Describe the operation of a packet based sliding window protocol.
OSI Model vs. Internet Model Layering
List 7 layers of the OSI Model and compare them to the layering used in the Internet model.
Explain the concept of encapsulation and its relationship to layering in the network models.
IP Packet Transfers
Describe how an IP packet is carried in an Ethernet frame.
Sliding Window Relationships
Explain how TCP’s byte-stream sliding window is related to a traditional packet-based sliding window algorithm.
Explain the differences between a hub, switch (bridge), and a router.
Specific Hardware Terms
Explain the relationship between an 802.1D bridge and a modern switch.
Describe how a learning bridge “learns” what port should be used to forward a packet to a device.
Describe how Spanning tree works and explain why it is necessary.
Distance-Vector vs. Link-State Routing
Compare and contrast distance-vector and link-state routing algorithms.
SOHO Router Components
Explain the operation of the components of a SOHO wireless edge router including, DHCP, NAT/PAT, Routing function, Switching function and relationship to wireless access point.
Describe how DNS works in the global internet including caching and root servers.
Cons of Guaranteed Delivery
Explain why guaranteed delivery is not desirable in certain multimedia protocols.
Access from Devices
Access MIBS from devices using SNMP on a workstation.
Describe the operation of and configuration of Virtual LANs on an 802.1Q switchAccess MIBS from devices using SNMP on a workstation.
Troubleshoot connectivity problems in a host occurring at multiple layers of the OSI model.
Describe applications of symmetric encryption, asymmetric encryption and one-way hash to authentication, non-repudiation, integrity and confidentiality.