|
Sep 17, 2025
|
|
|
|
2025-2026 Undergraduate Catalog
|
ITC 46000 - Enterprise Switching & Routing
This course is a study of Routing and Switching fundamentals, and how the Internet is integrated into the computing environment to enable organizations to share resources, collaborate, and meet organizational goals. The networking essentials and the creation of simple Local Area Networks (LANs) are expanded upon to incorporate the linking of these simple networks to each other and to the Internet, to create an internetwork. Routing and Switching devices such as switches and routers will be examined in great detail. Students will focus on techniques to analyze, plan, and manage an enterprise network. In support of these techniques, lab activities will include subnetting, packet-sniffing, and switch and router configuration.
Preparation for Course P: ITC 33100 with grade of C- or better.
Cr. 3. Student Learning Outcomes 1. Configure and subdivide an IP network.
2. Use advanced routing concepts such as CIDR, summarization, and VLSM.
3. Convert between decimal, binary, and hexadecimal numbering systems.
4. Identify the differences between IPv4 and IPv6.
5. Configure a router dealing with modes, prompts, passwords, context-sensitive help, and enhanced editing feature.
6. Configure HyperTerminal to access routers and switches.
7. Manipulate the router boot process.
8. Use Cisco Discovery Protocol 2.
9. Configure IP on the router.
10. Use various commands, such as ping, trace, and telnet.
11. Use Cisco’s new Security Device Manager.
12. Differentiate between routable, non-routable, and routing protocols.
13. Differentiate between Exterior Gateway Protocols and Interior Gateway Protocols.
14. Differentiate between distance-vector and link-state protocols.
15. Combat the count-to-infinity problem.
16. Configure RIP.
17. Configure static routing and default routes.
18. Differentiate between classful and classless routing.
19. Design, implement, and configure Virtual Local Area Networks (VLANs).
20. Design, implement, and configure Access Control Lists (ACLs).
|
|