OBE Syllabus NetProg2019

You might also like

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 9

Calapan City Campus

Masipit, Calapan City


OUTCOMES-BASED

PROGRAM: Bachelor of Science in Information Technology

PROGRAM VISION, MISSION, GOALS AND OBJECTIVES:

C
O
U
R
S
E

I
N
F
COURSE INFORMATION:

SEMESTER 1st Semester School Year 2019-2020


COURSE CODE ITE 3

COURSE TITLE Network Programming


COURSE DESCRIPTION This course focuses on the basic network concepts about node, packet, protocol and address. This
focuses also on the different OSI Layer types. The students will know on how to configure different
networking devices such as CISCO routers and Switches. This also covers the essentials for effective
network programmers of the students. Activities include setting up a small networks comprising of a router,
switch and an end system. Followed by the combination of different routers on the network, configuring
clouds and using DSL modem. The students will also know on how to configure a server model.
COURSE CREDITS 3 units
CONTACT HOURS/ WEEK 3 hours (Laboratory) 2 hours (Lecture)
PREREQUISITE None
COURSE OBJECTIVES 1. Know the basic networking concepts
2. Be able to understand the difference between UDP and TCP.
3. Explain the difference between frames and packets. .
4. Discuss the role of OSI Reference Model.
5. Describe the different ports used in Internet.

LEARNING PLAN

LEARNING OUTCOMES TOPICS TIME ALLOTMENT TEACHING-LEARNING ACTIVITIES ASSESSMENT STRATEGIES

At the end of the unit, the students must CLASS ORIENTATION Week 1  Discussion  Recitation
have: 5 hours  Student Handbook  Quiz
 Familiarized with the College  College Vision, Mission, Goals and
Vision, Mission, Goals and Objectives and Core Values
Objectives and the Core Values,  College Policies and Classroom
 Familiarized with the Classroom Rules and Regulation
Rules and Regulation as well as  Course Syllabus and Course
the with the grading system; and Outline
an overview of the course.  Grading System
At the end of the unit, the students must IP Addressing Week 2-3  Lecture Discussion  Class Participation
have: 10 hours  Recitation  Quizzes
 Described the structure of an IPv4  8.0 Introduction  Collaborative Learning  Assignment
address.  8.1 IPv4 Network Addresses  Peer Grouping  Graded Recitation
 Described the purpose of the  8.2 IPv6 Network Addresses  Group/Individual Activities  Board walk
subnet mask.  8.3 Connectivity Verification  Demonstration  Group Output
 Compared the characteristics and  Video Presentation  Rubric
uses of the unicast, broadcast,  Situational Analysis  Configuration
and multicast IPv4 addresses.  Hands on Exercises Exercises
 Compared the use of public  Group Activity  Seatwork
address space and private
address space.
 Explained the need for IPv6
addressing.
 Described the representation of
an IPv6 address.
 Described types of IPv6 network
addresses.
 Configured global unicast
addresses.
 Described multicast addresses.
 Described the role of ICMP in an IP
network. (Include IPv4 and IPv6.)
 Used ping and trace route utilities
to test network connectivity.

At the end of the unit, the students must Subnetting IP Networks Week 4-6  Lecture Discussion  Class Participation
have: 15 hours  Recitation  Quizzes
 Explained why routing is necessary  Introduction  Collaborative Learning  Assignment
for hosts on different networks to  Subnetting an IPv4 Network  Peer Grouping  Graded Recitation
communicate.  Addressing Schemes  Group/Individual Activities  Board walk
 Described IP as a communication  Design Considerations for IPv6  Demonstration  Group Output
protocol used to identify a single  Video Presentation  Rubric
device on a network.  Situational Analysis  Configuration
 Given a network and a subnet  Hands on Exercises Exercises
mask, calculated the number of  Group Activity  Seatwork
host addresses available.
 Calculated the necessary subnet
mask in order to accommodate
the requirements of a network.
 Described the benefits of variable
length subnet masking (VLSM).
 Explained how IPv6 address
assignments are implemented in a
business network.

At the end of the unit, the students must Introduction to Switched Networks Week 7,8  Lecture Discussion  Class Participation
have: 10 hours  Recitation  Quizzes
 Explained the advantages and  LAN Design  Collaborative Learning  Assignment
disadvantages of static routing  The Switched Environment  Peer Grouping  Graded Recitation
 Configured initial settings on a  Basic Switch Configuration  Group/Individual Activities  Board walk
Cisco switch  Switch Security: Management  Demonstration  Group Output
 Configured switch ports to meet and Implementation  Video Presentation  Rubric
network requirements  Situational Analysis  Configuration
 Configured the management  Hands on Exercises Exercises
switch virtual interface  Group Activity  Seatwork
 Described basic security attacks in
a switched environment
 Described security best practices
in a switched environment
 Configured the port security
feature to restrict network access

MIDTERM EXAMINATION

At the end of the unit, the students must Implementing VLAN Security  Lecture Discussion  Class Participation
have: Week 10,11  Recitation  Quizzes
 Explained the purpose of VLAN in  VLAN Segmentation 10 hours  Collaborative Learning  Assignment
a switched network  VLAN Implementation  Peer Grouping  Graded Recitation
 Analyzed how a switch forwards  VLAN Security and Design  Group/Individual Activities  Board walk
frames based VLAN configuration  Demonstration  Group Output
in a multi-switched environment  Video Presentation  Rubric
 Configured a switch port to be Routing Concepts  Situational Analysis  Configuration
assigned to a VLAN based on  Hands on Exercises Exercises
requirements  Initial Configuration of a Router  Group Activity  Seatwork
 Configured a trunk port on a LAN  Routing Decisions
switch  Routing Operation
 Configured Dynamic Trunk
Protocol (DTP)
 Troubleshoots VLAN and trunk
configurations in a switched
network
 Configured security features to
mitigate attacks in a VLAN-
segmented environment
 Explained security best practices
for a VLAN-segmented
environment
 Configured a router to route
between multiple directly
connected networks
 Described the primary functions
and features of a router.
 Explained how routers use
information in data packets to
make forwarding decisions in a
small to medium-sized business
network.
 Explained the encapsulation and
de-encapsulation process used by
routers when switching packets
between interfaces
 Compared ways in which a router
builds a routing table when
operating in a small to medium-
sized business network.

At the end of the unit, the students must Inter-VLAN Routing Week 12,13  Lecture Discussion  Class Participation
have: 10 hours  Recitation  Quizzes
 Described the three primary  Inter-VLAN Routing Configuration  Collaborative Learning  Assignment
options for enabling inter-VLAN  Troubleshooting Inter-VLAN Routing  Peer Grouping  Graded Recitation
routing  Layer 3 Switching  Group/Individual Activities  Board walk
 Configured legacy inter-VLAN  Demonstration  Group Output
routing  Video Presentation  Rubric
 Configured router-on-a-stick inter- Static Routing  Situational Analysis  Configuration
VLAN routing  Hands on Exercises Exercises
 Troubleshoot common inter-VLAN  Static Routing Implementation  Group Activity  Seatwork
configuration issues  Configure Static and Default
 Troubleshoot common IP Routes
addressing issues in an inter-VLAN  Review of CIDR and VLSM
routed environment  Configure Summary and Floating
 Configured inter-VLAN routing Static Routes
using Layer 3 switching  Troubleshoot Static and Default
 Troubleshoot inter-VLAN routing in Route Issues
a Layer 3 switched environment
 Explained the advantages and
disadvantages of static routing.
 Explained the purpose of different
types of static routes.
 Configured IPv4 and IPv6 static
routes by specifying a next-hop
address.
 Configured an IPv4 and IPv6
default routes.
 Explained the use of legacy
classful addressing in network
implementation.
 Explained the purpose of CIDR in
replacing classful addressing.

At the end of the unit, the students must Routing Dynamically Week 14  Lecture Discussion  Class Participation
have: 5 hours  Recitation  Quizzes
 Explained the basic operation of  Dynamic Routing Protocols  Collaborative Learning  Assignment
dynamic routing protocols.  Distance Vector Dynamic Routing  Peer Grouping  Graded Recitation
 Compared and contrast dynamic  RIP and RIPng Routing  Group/Individual  Board walk
and static routing.  Link-State Dynamic Routing Activities  Group Output
 Determined which networks are  The Routing Table  Demonstration  Rubric
available during an initial network  Video Presentation  Configuration
discovery phase.  Situational Analysis Exercises
 Defined the different categories of  Hands on Exercises  Seatwork
routing protocols.  Group Activity
 Described the process by which
distance vector routing protocols
learn about other networks.
 Identified the types of distance-
vector routing protocols.
 Configured the RIP routing
protocol.
 Configured the RIPng routing
protocol.
 Explained the process by which
link-state routing protocols learn
about other networks.

At the end of the unit, the students must Access Control Lists  Lecture Discussion  Class Participation
have: Week 15, 16  Recitation  Quizzes
• Explained how ACLs are used to  IP ACL Operation 10 hours  Collaborative Learning  Assignment
filter traffic.  Standard IPv4 ACLs  Peer Teaching  Graded Recitation
• Compared standard and  Extended IPv4 ACLSs  Group/Individual  Board walk
extended IPv4 ACLs.  Contextual Unit: Debug with ACLs Activities  Rubric
• Explained how ACLs use wildcard  Troubleshoot ACLs  Demonstration  Seatwork
masks.  Contextual Unit: IPv6 ACLs  Video Presentation  Observation of
• Explained the guidelines for  Group Activity group/individual
creating ACLs.  Group Presentation work
• Explained the guidelines for  Program Output
placement of ACLs.
• Configured standard IPv4 ACLs to
filter traffic according to
networking requirements.
• Modified a standard IPv4 ACL
using sequence numbers.
• Configured a standard ACL to
secure vty access.

FINAL EXAMINATION

COURSE REQUIREMENTS:

 Major Exams  Projects


 Quizzes / Exercises  Class Attendance
 Oral and Written Output  Class Participation

GRADING SYSTEM:
Quizzes 15%
Midterm/Finals 30% Final Grade = Midterm Grade + Tentative FG)
Recitation 10%
Hands On/Programming Exercises 40% 2
Attendance/Seatwork/Project 5%
Total 100%

Final Grade = ( Midterm Grade + Pre-


REFERENCE MATERIALS:

Textbook: IP Subnetting Guide: Fastest Way to Learn Subnetting by Al Rivas


Cisco CCNA Networking For Beginners: 3rd Edition: The Ultimate Beginners Crash Course To Learn Cisco Quickly And Easily (CCNA,
Networking, IT Security, ITSM) by Adam Vardy
CCNA Commands Essentials with Examples by Kazi Syras Al Mamun
Hardening Cisco Routers: Help for Network Administrators by Thomas Akin

Electronic: https://www.youtube.com/watch?v=LxNgWsseE0w
https://www.computernetworkingnotes.com/ccna-study-guide/subnetting-tutorial-subnetting-explained-with-examples.html
https://www.tutorialspoint.com/ipv4/index.htm
https://www.computernetworkingnotes.com/ccna-study-guide/access-control-list-explained-with-examples.html
https://www.computernetworkingnotes.com/ccna-study-guide/vlsm-tutorial-with-examples.html
http://www.pearsonitcertification.com/store/cisco-ccna-routing-and-switching-200-120-complete-video-9781587144004

COURSE POLICIES:
1. A student will be dropped from the class if his or her absences exceeded 20% of the total class hours.
2. A student will be marked late if he or she comes late for 15 minutes.
3. Three incidences of tardiness will be equivalent to one absence.
4. Use of any gadgets in the class is prohibited unless required by the instructor.
5. Submission of written outputs should only be made on or before the deadline.
6. Academic dishonesty like cheating in any examination, plagiarism and the like will be penalized as stipulated in the MinSCAT Student Handbook.

Prepared by:

ELMER H. FESTIJO
Instructor I

Date Submitted: October 10, 2019


Checked and Endorsed by:

FIDEL C. ROMASANTA, MIT


BSIT Program Chair Approved:
EVELYN ANTHONY RODRIGUEZ, DIT
Dean, College of Computer Studies

You might also like