You are on page 1of 50

Undisclosed University

Curriculum Guide
For all locations and online:

UNDISCLOSED CURRICULUM: Undisclosed with Laboratory

Contact Hours: 4 Credit Hours: 3

Course Description:

Students in this course apply knowledge of wired and wireless network technologies and services as well as
network security and cost consideration to develop network solutions that meet business requirements for
Enterprise networks in a campus Branch Office environment. Critical thinking, problem-solving, troubleshooting
and teamwork are emphasized.

Undisclosed Curriculum Guide Index


Course Terminal Objectives 9
Laboratory Objectives 17
Standard 8 & 15 Week Syllabus 18
Standard 15-Week Course Outline (Retired) 27
Accelerated 8-Week Course Outline 30

Appendices
Course Project Proposal Guidelines 32
Customer Research and Analysis Template 37
Customer and Technical Decision Matrix Template 39
Example Test 41
Student Assessment Test 47
Course Project Proposal Grading Form 48

All rights reserved. No part of this work may be reproduced or used in any form or by any means
graphic, electronic, or mechanical, including photocopying, recording, Web distribution or information
storage and retrieval systems without the prior consent of Undisclosed Curriculum Educational
Development Corporation.

Author: Mercedes Jimenez/ Undisclosed Curriculum GA

-1-
Course Strategy:
SCOPE

Undisclosed Curriculum, with Laboratory introduces the student to the concepts, principles, models, and
tools used in the design of internetworking solutions for the modern enterprise business organization.
Where previous course work prepared students to understand networking at the lower OSI layers,
UNDISCLOSED CURRICULUM teaches students to begin at the upper layer of the OSI model and plan
a solution while working down to the bottom layer. The top-down model introduces an analytical
approach for assessing customer network requirements beginning with the applications necessary to run a
modern business enterprise. Student teams select a real business organization and then carefully analyze
its business goals and constraints; technical objectives and constraints, and supporting software
applications before designing an intelligent internetworking infrastructure. Each student team must
provide a final, tested Undisclosed Curriculum that meets business requirements for bandwidth,
convergence, performance, Quality of Service, and security. Emphasis is placed on using a hierarchical
Undisclosed Curriculum model to define network topology relationships by functional layers for both
wired and wireless networks. Teams learn how to use the enterprise composite network model for
grouping functional network areas into modular building blocks that simplify the complex
internetworking design task. A professional network modeling tool is utilized to test design parameters
for conformance to network performance goals.

Students enrolling in UNDISCLOSED CURRICULUM must complete prerequisite course work in


Undisclosed-208, Undisclosed; and, either Undisclosed Windows with Lab, or Network Operating
Systems UNIX/Linux with Lab. These prerequisite courses satisfy curriculum requirements in basic
networking fundamentals before students move into higher-level course work involving advanced
networking design concepts and higher-level protocols, services, and solutions.

Upon successful completion of UNDISCLOSED CURRICULUM course terminal objectives, students are
prepared to analyze the business enterprise; design or redesign an intelligent network infrastructure;
configure models for evaluating Undisclosed Curriculum capacity and performance; assimilate and
document a formal Undisclosed Curriculum proposal; and prepare a formal proposal presentation. In
addition, UNDISCLOSED CURRICULUM satisfies the prerequisite for Undisclosed, Undisclosed
Management with Lab.

LEVEL

Students entering UNDISCLOSED CURRICULUM must have a solid foundation in basic networking
concepts, protocols, and topologies. Students build upon LAN, MAN, and WAN knowledge as they use
new templates, tools, and models to analyze and propose enterprise network solutions. Familiarity with
network convergence and converged topologies; wired and wireless services; network component naming
and addressing techniques; protocol selection and behaviors; and security principles and concepts are
critical in the evaluation, troubleshooting, and design process.

Students must possess the capability to configure, and reconfigure, a network modeling tool and analyze
graphical output reports in order to assess critical indicators of network performance based upon selected
design parameters.

Prerequisite course work for UNDISCLOSED CURRICULUM ensures that students are able to
understand the relationship of a network operating system and its capabilities for supporting various
enterprise applications, converged data, and information as it traverses the local and wide-area network
enterprise infrastructure.

-2- UNDISCLOSED CURRICULUM


RATIONALE

UNDISCLOSED CURRICULUM, Enterprise Undisclosed Curriculum with Lab satisfies the industry
need for network specialists who understand the steps and techniques used in the analyzation, planning,
design, and modeling of intelligent network infrastructures for global business organizations.

As major telecom providers push out more efficient Ethernet pipes, high-speed wireless technologies, and
fiber-to-the-premise broadband services, their service innovations will directly impact more than 43,000
public, and non-public, US and International corporations and some 16,000,000 mid-size companies
(Hoovers.com, 2006). According to Networkworld.com (2006), enterprise IT managers will focus on
Voice over IP (VoIP), security, optical technologies, and information storage solutions through 2009 to
reduce costs while at the same time be expected to provide responsive network solutions for their
enterprise.

To meet these challenges, enterprise Undisclosed Curriculumers, engineers, and managers face the
complex task of evolving their corporate networks into new protocols, technologies, and services. Jobs for
Undisclosed Curriculum professionals with engineer, specialist, architect, consultant, planner, project
manager, and manager titles are advertised on monstor.com (July, 2006) by a variety of national and
international companies. Many job requirements request a college degree in addition to the Cisco
Certified Design Associate (CCDA) certification.

TEACHING SUGGESTIONS

Lecture-Led Classroom using iOptimize


Enterprise Undisclosed Curriculum with Lab is effectively taught in a lecture-lab classroom environment.
The classroom should be equipped with an overhead projection system so the instructor laptop, or an in-
class computer, can be connected to an overhead projector for displaying lecture materials, software
design and modeling tools, vendor web sites, and other Undisclosed Curriculum content.

Each student position should be equipped with a personal computer, Microsoft Office, a web browser, and
a professional Undisclosed Curriculum and modeling tool such as OPNET IT Guru. Microsoft Visio is
not a professional design and modeling tool at this time and should not be used to complete
UNDISCLOSED CURRICULUM labs.

Teaching effectiveness is enhanced by immediately enforcing lecture content with a coordinated lab
exercise. For example, a lecture introducing students to the hierarchical network model can be reinforced
by having each student design the hierarchical model.

Visio
UNDISCLOSED CURRICULUM provides an Visio course shell to be used by all instructors teaching in
an accelerated lecture-led course format. The course shell is preconfigured with objectives, assignments,
lectures, discussion threads, and labs for student work outside the classroom. The shell also offers a
convenient method of grade management, student messaging, course document dissemination, and
student assignment deposition.

-3- UNDISCLOSED CURRICULUM


Instructors should access the Undisclosed Curriculum University iOptimize Platform one week before the
class start date to locate their course shell. Time should be taken to become familiar with shell content
and layout; to add personal instructor information to the preconfigured syllabus; and to post a positive
welcome announcement to students. Instructors should contact their campus iOptimize coordinator if an
UNDISCLOSED CURRICULUM course shell does not appear in their session portal. Each iOptimize
course shell contains For Faculty sections that are strictly for instructor use and that contain helpful
information on conducting lectures, threads, and labs. Suggestions for course shell changes, additions, or
improvements can be emailed directly to the course architect whose email address is provided in the For
Faculty section under Course Home.

iLab
Accelerated 8-week and online course offerings usually provide students with access to an online,
integrated lab (iLab) environment for working assigned labs. Access to a particular iLab platform is
course dependent and automatically provided when the student completes the course registration process.
Students can then log into their course assigned iLab platform by using their normal Undisclosed
Curriculum Student D number and password. Students registering late may have up to a 2-day delay in
iLab access pending a post-registration system update schedule.

Online students may be required to use their home computer to work assigned labs using software
provided in a textbook or software downloaded from an authorized vendor with a prearranged licensing
agreement with Undisclosed Curriculum University and, and or, with Undisclosed Curriculum Online
University.

Lecture-led classroom courses may not require iLab access if equipment or software resources are part of
an on-campus classroom.

Courses may also require students to do weekly research or projects instead of online labs. It depends on
the course.

Accelerated 8-Week Schedule


In the accelerated 8-week course offerings, instructors must carefully monitor student progress to ensure
that students have time to complete required terminal course objectives. Students must remain caught-up
with in-class and out-of-class course work, labs, and projects. Team members must meet frequently to
ensure that course projects are completed on time. Students and teams that delay completion of course
work will usually be unable to satisfy course and project requirements.

Lecture-led Classroom Equipment Racks


In order to differentiate Undisclosed Curriculum University from other university programs, lecture-led
classroom environments should have equipment racks installed, and utilized, as much as possible to
reinforce hands-on lab objectives. Scheduled software labs, such as OPNET IT Guru, can be completed
by students as assigned homework under these circumstances.

Threaded Discussions
Students are required to participate in weekly threaded discussions to enhance the learning experience in
specific course topics. Properly structured discussion threads promote student involvement and lead to
greater fulfillment of course outcomes. Students must validate their discussions by posting source web
sites, documents, and other content used when researching a topic.

Course Project Assignment


A course project paper and presentation are required to allow students an opportunity to work in a real
team setting. Each team selects, analyzes, designs, models, and proposes an enterprise-sized network.
Teams follow several interrelated design models as they create an enterprise Undisclosed Curriculum
solution. Templates and decision charts, included in the Appendix, assist the student teams with how to
collect, analyze, and integrate critical information into a Undisclosed Curriculum project. Weekly

-4- UNDISCLOSED CURRICULUM


research or projects may take the place of an actual course project as they may build upon the previous
weeks work and comprise the actual course project.

-5- UNDISCLOSED CURRICULUM


Texts/References:

Suggested Course Text (Lecture and Lecture-Lab):


McCabe, James D. (2007) Network Analysis, Architecture, and Design 3rd Edition. Morgan Kaufmann
Publishers. ISBN 0-12370-480-4
A comprehensive, applied-level book, that describes the principles of Undisclosed Curriculum and
presents guidelines for building a Undisclosed Curriculum solution. Emphasis is placed on the Cisco
Enterprise Composite Network Model that simplifies the design complexity of todays large, enterprise-
sized networks.

Suggested Course Text (Undisclosed Curriculum OnLine):


McCabe, James D. (2007) Network Analysis, Architecture, and Design 3rd Edition. Morgan Kaufmann
Publishers. ISBN 0-12370-480-4

A comprehensive, applied-level book, that describes the principles of Undisclosed Curriculum and
presents guidelines for building a Undisclosed Curriculum solution. Emphasis is placed on the Cisco
Enterprise Composite Network Model that simplifies the design complexity of todays large, enterprise-
sized networks.

http://vig.prenhall.com/catalog/academic/product/0,1144,1587051419,00.html

Optional Course Texts:


Oppenheimer, Priscilla. (2001) Top-Down Undisclosed Curriculum. Cisco Press, ISBN: 1-57870-069-8.

A systematic approach to Undisclosed Curriculum with a focus on matching customer applications,


technical objectives, and business goals to logical and physical Undisclosed Curriculum stages. Emphasis
is placed on planning before implementing using the top-down model.

Web Research:
Cisco Systems
Cisco Systems product listing and description. Excellent implementation guidelines, online seminars, and
other helpful information for the design engineer.

Lucent Technologies
World renowned telecommunications equipment manufacturer spun off from AT&T at divestiture (1984).
Excellent network product listing and description. Helpful information for the design engineer.

Bell Labs
Lucent Technologies world renowned research and development center hosting excellent information for
emerging technologies in the field of telecommunications and network computing.

Adtran
ADTRAN is an established supplier of advanced transmission products for expansive telecommunications
networks. The Enterprise Network (EN) Division provides product line solutions for wide area
connectivity across diverse communications networks and technologies. Good source for technology
overviews and white papers on emerging enterprise technologies.

Black Box Network Services

6-
Black Box carries a full line of network solutions, testing equipment, and tools for the network
professional. Good technical reference section on their web site with technology overviews, white papers,
product data sheets, and cable and adapter configurations.

7-
National Software Testing Labs (NSTL)
National Software Testing Labs (NSTL) was established in 1983 as the worlds first independent IT
testing organization. NSTL services both the makers and the buyers of information technology with
cutting-edge testing methodologies and consulting services. NSTL is a world-recognized authority in
hardware and software performance, compatibility, usability, and functionality testing

http://www.ieee.org/portal/site
The Institute of Electrical and Electronics Engineers (IEEE) is the worlds leading professional
association for the advancement of technology. An assortment of magazines, journals, and documents
derived from their involvement in the global standardization of power and energy, biomedical and
healthcare, information technology, telecommunications, transportation, nanotechnology, and information
assurance. Their Standards Association includes the prominent 802 standards for wired and wireless
networks.

http://www.hoovers.com/
Hoovers Inc. provides an unbiased site for researching company, industry, and market intelligence and is
required for completing customer analysis work before beginning the enterprise Undisclosed Curriculum
process (must be accessed through the Undisclosed Curriculum Library electronic link for access as a
paid subscriber).

http://www.eseminarslive.com/
A free online and on-demand seminar portal sponsored by Ziff-Davis with frequent educational seminars
featuring network solutions and technologies designed for the network professional. Although seminars
are slanted around a specific vendors product or solution, the technical content is excellent.

http://www.bitpipe.com/
The webs leading online information source for professionals needing technology white papers,
webcasts, case studies, and product information. Membership is free with content including networking,
storage, wireless, telecom, enterprise business applications, and more.

http://www.networkworld.com/
Networkworld provides a large assortment of network information in formats such as video, white paper,
webcast, encyclopedia, newsletter, blog, RSS feed, and forum. Includes test results and analysis in all
areas of network services and products.

8-
Course Terminal Objectives

1. Given a set of requirements for a modern enterprise business organization, diagram and simulate
network solutions consisting of functional modules and hierarchical layers with respect to
intelligent network services, protocols, and topologies students will be able to design an
Enterprise network solution.

A. Describe the process of how to analyze and design an enterprise network as a system where
services, performance, throughput, delay, reliability, and scalability are all interrelated.
B. Differentiate and diagram enterprise composite network modules in LAN, CAN, and WAN
functional areas Select and correctly place standardized logical network icons into
functional network groups and layers in accordance with design requirements.
C. Identify hierarchical intersections of an enterprise network for proper traffic flows.
D. Select and build standardized physical network icons for vendor-specific Undisclosed
Curriculum topologies.
E. Simulate functional and vendor specific network topologies to measure design requirements.
F. Identify appropriate network services and performance characteristics for different business
needs and requirements

2. Given a team situation and top-down Undisclosed Curriculum tools, students will be able to
analyze and document customer organizational and technical goals, policies, requirements, and
constraints as inputs to the Undisclosed Curriculum process.

A. Develop, apply, and document project charts for design scope, organizational goals and
constraints, technical goals and constraints, planned applications, and intelligent network
services.
B. Develop and document solutions that meet customer and project requirements for network
security, QoS, management, availability, reliability, scalability, and performance.
C. Develop, apply, and document the use of decision tables for making appropriate selections
among software, protocol, and hardware that meet project design requirements.
D. Calculate and apply metrics to network components to determine mean-time-between-failure,
mean-time-to-restore, bandwidth, delay variation, and other service level requirements.

3. Given a team situation and a set of Undisclosed Curriculum requirements for a modern enterprise
business organization, students will be able to select and design enterprise campus network
topologies consisting of multilayered modularity, geographical borders, existing traffic flows, and
planned application traffic flows.

A. Translate design customer and network requirements into enterprise campus, enterprise edge,
and service provider edge network modules.
B. Identify different flows of traffic generated by applications, end users, and networking
devices.
C. Design and illustrate the organization's overall network topology, consisting of enterprise
composite network modular components and hierarchical functional areas.
D. Identify and label designed network components by interface type, protocol, bandwidth, and
Quality of Service (QoS).

4. Given a team situation and a set of Undisclosed Curriculum requirements for a modern enterprise
business organization, students will be able to design and connect the hierarchical and enterprise
composite network models into specific topologies that meet customer requirements.

A. Describe network switch design and positioning in an enterprise campus network.

-9- NETW-412
B. Identify and organize network factors, application characterization, and switching design
considerations for an appropriate enterprise campus Undisclosed Curriculum that meets the
organization's intelligent network requirements.
C. Design and illustrate an organization's enterprise campus functional area made up of the
campus building infrastructure, server farm, network management, and edge distribution
modules.
D. Identify and label designed campus network components by interface type, protocol,
bandwidth, and quality of service (QoS).
E. Use component and reference architecture and architectural models to design a network that
meets the requirements and goals of the company.

5. Given a team situation and a set of Undisclosed Curriculum requirements for a modern enterprise
business organization, students will be able to select appropriate network addressing solutions,
dynamic routing protocols, remote user and redundant service access technologies, and network
management hardware and software that meet project design requirements.

A. Describe network switch design and positioning in an enterprise campus network. Identify
and organize network factors, application characterization, and switching design
considerations for an appropriate enterprise campus Undisclosed Curriculum that meets the
organization's intelligent network requirements.
B. Design and illustrate an organization's enterprise campus functional area made up of the
campus building infrastructure, server farm, network management, and edge distribution
modules.
C. Identify and label designed campus network components by interface type, protocol,
bandwidth, and quality of service (QoS).
D. Identify network management devices and characteristics.
E. Determine whether to use in-band or out-of-band network management.
F. Select appropriate management hardware and software.

6. Given a team situation and a set of Undisclosed Curriculum requirements for a modern enterprise
business organization, students will be able to assess legal compliance; disaster recovery; and
security risks, threats, and vulnerabilities within each modular block of the enterprise composite
network model, develop performance specifications and plan for them.

A. Develop goals for performance.


B. Identify and label designed enterprise edge and service provider edge network components by
interface type, protocol, bandwidth, and quality of service (QoS).
C. Develop data traffic prioritization, management, scheduling, and queuing requirements.
D. Identify and select WAN technologies that meet the organization's application and service
level agreement (SLA) requirements for throughput, packet loss, error rate, and so forth.
E. Develop security and privacy plans.
F. Do a threat analysis, and identify physical and logical threats to the network.

10 -
7. Given a team situation and a business case for an enterprise business organization, students will
be able to use proper design concepts to select vendors, equipment, service-providers, and
develop a set of network blueprints and metrics to be used to create the network.

A. Identify and document proper Undisclosed Curriculum concepts.


B. Develop criteria for selecting proper vendors, equipment, and service-providers.
C. Develop logical diagrams of the network.
D. Develop network blueprints of the network.
E. Develop metrics to identify how successor one has been at meeting all the requirements.
F. Plan and employ voice and multimedia protocol technologies for management, routing, delay,
queuing, and transport of converged data in the Undisclosed Curriculum.

11 -
Content Outline: Suggested Time
Allocations

I. Review of LANs, WANs, Components and Protocols and Undisclosed Curriculum Process10%
A. Review definitions and networking
1. internetworking
2. protocol
3. The OSI Model
B. Review LAN principles
1. Physical network access
2. Data transmission types
C. Review WAN principles
1. Categories
2. Virtual circuits
3. Devices
D. Review internetwork addressing
1. MAC addresses
2. Network layer addresses
E. Review network device functionality
1. Hubs
2. Bridges
3. Switches
4. Routers
F. Review routed compared to routing protocols
G. Review the popular protocols
1. TCP/IP protocol suite
2. Netware
3. AppleTalk
4. IBM SNA
H. Discuss System Methodology
I. Discuss Service Characteristics
J. Discuss Performance Characeristics

II. Requirements Analysis: Concepts and Process 10%


A. Explain user requirements
B. Explain application requirements
1. Applications types
2. Application groups
3. Application locations

12 -
C. Explain device requirements
1. Device types
2. Performance characteristics
3. Device location
D. Explain network requirements
1. Existing network and migration
2. Network management and security
E. Explain other requirements
1. Financial requirements
2. Enterprise requirements
3. Supplemental performance requirements
F. Explain how to gather and list the requirements for the new network
1. Determining initial conditions
2. Setting customer expectations
3. Taking performance measurements
4. Mapping device locations
G. Explain how to develop service metrics
1. Measurement tools
2. Where to apply service metrics
H. Explain how to develop RMA requirements
1. Reliability
2. Maintainability
3. Availability
I. Explain how to develop capacity requiements
1. Estimating data rates

III. Flow Analysis 20%


A. Explain the concept of data flows
1. Explain the two types
1. Individual flows
2. Composite flows
2. Critical flows

B. Explain how to identify and develop flows


1. Developing a profile
2. Choosing top level applications
C. Explain how to identify the starting point and ending point (sink) of a data flow
D. Explain the four different flow models
1. Peer-to-Peer
2. Client-Server
3. Hierarchical Client-Server
4. Distributed-Computing
E. Explain the need to prioritize different data flows
F. Explain the need for and how to create flows specifications or flowspecs
1. Flowspec algorithums
2. Capacity and service planning

13 -
IV. Network Architecture 20%
A. Describe the component architecture
1. Addressing/routing components
2. Network management components
3. Performance components
4. Security components
B. Explain the need to create a reference architecture
1. External relationships
C. Explain the different architectural models and how to use them
1. Topographical models
2. Flow-based models
3. Functional models

V. Addressing, Routing, and Management Architecture 10%


A. Explain addressing fundamentals
B. Explain IPv4, classful, classless, and Variable Length Subnet Masks
C. Explain routing mechanisms
1. Static routing
2. Dynamic routing
D. Explain how to use different addressing strategies
E. Explain how to use and evaluate different routing strategies
F. Discuss the need to define network management
G. Discuss network management mechanisms
1. Monitoring mechanisms
2. Configuration mechanisms
3. Troubleshooting mechanisms
H. Explain how management traffic can be setup
1. In-band on the production netowrk
2. Out-of-band on its own separate network
3. Centralized, Distributed, and Hierarchical management
4. MIB selection
5. Checks and balances
6. Scaling network management traffic

VI. Performance and Security Architecture 10%


A. Explain the need to develop goals for performance
B. Explain some of the different performance mechanisms
1. Quality of Service (QoS)
2. Prioritization, traffic management, scheduling, and queuing
C. Explain how different performance mechanisms need to be evaluated
D. Explain the need to develop a security and privacy plan
E. Explain how to administer a security and privacy plan
1. Threat analysis
2. Policies and procedures
F. Explain the need to implement security mechanisms
1. Physical security and awareness
14 -
2. Protocol and application security
3. Encryption/decryption
4. Network perimeter security
5. Remote access security
G. Explain how to evaluate the different security mechanisms

VII. Basic Campus Switching Design 20%


A. Describe the campus design methodology
1. Designing the enterprise campus
B. Define a network geography
1. Location of nodes
2. Distance between nodes
3. Inter-intra-building
C. Describe network application characterization
1. Client-client
2. Client-distributed server
3. Client-server farm
4. Client-enterprise edge
D. Describe the data link layer technologies
1. Collision
2. Broadcast
3. Shared
4. Switched
5. Bandwidth
6. Range
7. Intelligent services
8. High-availability
9. Cost
E. Describe layer 2 and layer 3 switching design considerations
1. Spanning tree
2. Load sharing (layer 2 and layer 3)
3. Switching (layer 2 and layer 3)
4. Load-sharing
5. Failure domain
6. Convergence
7. Policy domain
8. Cost.
F. Describe various transmission media
G. Explain a campus design
1. Enterprise campus design requirements and considerations.

15 -
H. Compare network traffic patterns
1. 80/20 rule, 20/80 rule
2. Traditional vs. modern
I. Describe multicast traffic patterns
J. Describe QoS considerations for delay-sensitive traffic
1. QoS in LAN switches
2. Voice traffic across a switch
K. Discuss the building of access and distribution layers in a design
1. Access layer considerations port security, access speeds, traffic
classification on uplinks
2. Building distribution layer considerations performance, intelligent network
services, manageability and scalability
L. Discuss the campus backbone design
1. Layer 2 backbone design VLAN, Split layer 2 backbone design
2. Layer 3 backbone design reduced connections, flexible topology, multicast
and broadcast, scalable, intelligent
3. Split layer 3 design gigabit speeds, convergence, voice
M. Discuss server placement
1. Building access module
2. Building distribution module
3. Server farm
N. Discuss connectivity to the remainder of the enterprise network.

16 -
UNDISCLOSED CURRICULUM: Enterprise Undisclosed Curriculum with Laboratory

Laboratory Objectives:

1. Given an existing or fictitious enterprise-sized business organization to use as an enterprise


customer model for the UNDISCLOSED CURRICULUM course proposal and design project,
learn to use Visio to reproduce the existing and future proposed Undisclosed Curriculum. (TCO
1)

2. Given an enterprise customer model and a set of top-down network analysis and design tools,
determine and document customer business and technical goals that meet technologies and
products that are consistent with an organizations structure, information flows, and platform
requirements. (TCO 2)

3. Given a diagram of a simple enterprise network, create and label the network diagram using basic
features of a Undisclosed Curriculum and modeling tool such as Visio. The basic features include
--identify, select, place, connect, and label both standards-based logical and vendor-specific
physical network icons used in Undisclosed Curriculum and modeling configurations. (TCO 3)

4. Given a diagram of a modular Undisclosed Curriculum model, such as the Cisco Enterprise
Composite Network Model (ECNM), create and label the model using advanced features of a
Undisclosed Curriculum and modeling tool such as Visio. Advanced features include setting and
modeling various protocols, packet sizes, and traffic flows among enterprise campus, enterprise
edge, and service provider edge modules making up the ECNM. (TCO 4)

5. Given a list of site locations for the selected enterprise customer, create and label a layer-2 logical
topology map using a Undisclosed Curriculum and modeling tool such as Visio. The design
includes a geographical map overlay, site locations, site-to-site connectivity, WAN services, and
traffic flow simulation. Include the design and supporting documentation in the UNDISCLOSED
CURRICULUM course proposal and design project paper. (TCO 5)

6. Given a completed business/technical analysis for the selected enterprise customer, plan and
illustrate a logical converged-Undisclosed Curriculum using a Undisclosed Curriculum and
modeling tool such as Visio. Design steps include --select, place, connect, address, and label
logical network components making up an Enterprise Composite Network Model. Include the
design and supporting documentation in the UNDISCLOSED CURRICULUM course proposal
project paper. (TCO 6)

7. Given a completed business/technical analysis for the selected enterprise customer, plan and
illustrate a physical converged-Undisclosed Curriculum using a Undisclosed Curriculum and
modeling tool such as Visio. Design steps include --select, place, connect, address, and label
physical network components making up an Enterprise Composite Network Model. Include the
design and supporting documentation in the UNDISCLOSED CURRICULUM course proposal
project paper. (TCO 7)

8. Given a completed business/technical analysis for the selected enterprise customer, plan and
illustrate a converged-Undisclosed Curriculum meeting requirements for security, compliance,
and disaster recovery using a Undisclosed Curriculum tool such as Visio. Include the design and
supporting documentation in the UNDISCLOSED CURRICULUM course proposal project
paper. (TCO 1,5,6,7)

17 -
8 and 15-Week Syllabus

Undisclosed Curriculum University


UNDISCLOSED CURRICULUM Enterprise Undisclosed Curriculum with Lab
Syllabus <Week Session>
Professor: <name here>

Contact Information

Telephone:

E-mail: (Show Student-410-S on the Subject line)

Web Page:

Office Hours:

Course Description

UNDISCLOSED CURRICULUM Enterprise Undisclosed Curriculum with Lab


Students in this course apply knowledge of wired and wireless network technologies and services as
well as network security and cost consideration to develop network solutions that meet business
requirements. Critical thinking, problem-solving, troubleshooting and teamwork are emphasized.
Prerequisites: NETW-208, and NETW-230 or NETW-240 / 5-4

Required Textbook

Network Analysis, Architecture, and Design 3rd Edition. James D. McCabe, Morgan Kaufmann Publishers
Copyright 2007, ISBN: 0-12370-480-4

Classroom access to Visio is required for enterprise Undisclosed Curriculum and modeling assignments.

- 18 -
Terminal Course Objectives (TCOs)
UNDISCLOSED CURRICULUM Enterprise Undisclosed Curriculum with Lab

1. Given a set of requirements for a modern enterprise business organization, diagram and simulate
network solutions consisting of functional modules and hierarchical layers with respect to
intelligent network services, protocols, and topologies students will be able to design an
Enterprise network solution.

2. Given a team situation and top-down Undisclosed Curriculum tools, students will be able to
analyze and document customer organizational and technical goals, policies, requirements, and
constraints as inputs to the Undisclosed Curriculum process.

3. Given a team situation and a set of Undisclosed Curriculum requirements for a modern enterprise
business organization, students will be able to select and design enterprise campus network
topologies consisting of multilayered modularity, geographical borders, existing traffic flows, and
planned application traffic flows.

4. Given a team situation and a set of Undisclosed Curriculum requirements for a modern enterprise
business organization, students will be able to design and connect the hierarchical and enterprise
composite network models into specific topologies that meet customer requirements.

5. Given a team situation and a set of Undisclosed Curriculum requirements for a modern enterprise
business organization, students will be able to select appropriate network addressing solutions,
dynamic routing protocols, remote user and redundant service access technologies, and network
management hardware and software that meet project design requirements.

6. Given a team situation and a set of Undisclosed Curriculum requirements for a modern enterprise
business organization, students will be able to assess legal compliance; disaster recovery; and
security risks, threats, and vulnerabilities within each modular block of the enterprise composite
network model, develop performance specifications and plan for them.

7. Given a team situation and a business case for an enterprise business organization, students will
be able to use proper design concepts to select vendors, equipment, service-providers, and
develop a set of network blueprints and metrics to be used to create the network.

19 -
Course Requirements and Policies

Class and Lab Schedule


Lecture/Lab: <week day> in room <room number> from <start time> until <end time> for session
<session letter>

Attendance
Class attendance is critical to academic success. Attendance will be taken at the beginning of class
through the Attendance Tracking System (ATS). Students must scan their student ID into the ATS
during a 30 minute interval that begins 10 minutes before the start of class. Students will also
manually sign in at the start of class using an attendance form provided by the instructor.
Attendance and punctuality in the workplace is mandatory for long-term employment and advancement.
Building good attendance and punctuality habits while attending Undisclosed Curriculum will better
prepare you to enter the workplace.

Passing
A passing grade is required in both lecture and lab to successfully pass the course. The final lab grade
will count 14% of the course grade; however, a failing lab grade can result in a failing grade for the
course.

Project Research Paper


A research paper is required consisting of an enterprise-sized Undisclosed Curriculum project that
meets Terminal Course Objectives. Failure to complete and submit a research paper will result in a zero
grade on the project. The project paper will count as 30% of the total course grade. APA style is required
for citing in-text references; imported images, graphics, and pictures; and for formatting the Reference
page.

Lab Responsibilities
It is your responsibility to utilize lab time efficiently and to enhance your understanding of course
fundamentals by actively participating in all lab assignments. Failure to participate, excessive absences,
and failure to turn in assignments on time will result in a failing grade. Lab make-up papers will not be
accepted 7 days after the original due date. You are required to observe lab rules and regulations
pertaining to conduct, talking, safety, and equipment handling. It is your responsibility to sign the lab
attendance roster and scan-in, at the start of each lab. An official Student ID is required to scan in.

Library Resources
The library offers an excellent environment in which to study and perform research. Technical and
business books, journals, periodicals, CDs/DVDs, magazines, newspapers, and the Internet are available
to support classroom and laboratory learning. A set of Cisco books are available to supplement
UNDISCLOSED CURRICULUM. A Telecommunications Resource Sheet is available at the Librarys
front desk that provides a list of information resources that will help you locate research information for
your project. Library Hours: Monday through Thursday from 7:30 a.m. until 10:00 p.m.; Friday from
7:30 a.m. until 8:30 p.m.; Saturday from 10:00 a.m. until 4:00 p.m.; and closed on Sunday.

20 -
Undisclosed Curriculum Policy

Conduct
The Undisclosed Curriculum Student Handbook policies on conduct are to be followed at all times while
on campus. Policies are a part of every business organization and must be observed in the workplace as
well. Please review the Undisclosed Curriculum <campus state> Student Handbook.

Honor System
Professionalism, honesty, and integrity are values required of all Undisclosed Curriculum staff and
students. Cheating will not be tolerated. If someone is found cheating on an examination, an automatic
zero (0) will be assigned as a grade. This grade will not be replaced or dropped. Offenses will be
documented and reported so that further offenses are grounds for dismissal. Students are responsible for
promptly notifying their professor, or the deans department, whenever cheating is observed. Cheating
degrades our reputation in the business community and unfairly places honest, hardworking students at a
disadvantage. If you suspect cheating, report it!

Dropping Courses
Courses must be dropped by the appropriate date shown in the current term's schedule in order to be
shown as a W (Withdrawal) without penalty to your academic Grade Point Average (GPA). Courses
can only be dropped through the Academic Affairs Office. Students on the class roster after week 6 of the
accelerated term, will receive a grade.

Consecutive Absences
Please call the Registrar if you must be absent from class for more than one consecutive session. Failure
to notify the Registrar under these circumstances will result in your name being dropped from the
attendance roll. Successive failure to scan into ATS will result in an automatic drop.

Plagiarism
Using another person or authors ideas, words, expressions, findings, photographs, icons, images, charts,
or schematics in your research paper without acknowledging the source is a violation of the Academic
and Professional Conduct policy. A student who does not give appropriate credit, or reference, when
paraphrasing, quoting, or pasting anothers writings, whether bound or software, is guilty of plagiarism.
Any incident of plagiarism will result in a grade of 0 for the assignment. APA is the required style in
citing references for Undisclosed Curriculum undergraduate courses.

Additional Assistance
If you need academic help outside the classroom, you are encouraged to arrange tutoring through the
Academic Assistance Center (ASC). If you need personal counseling, the academic department will
advise you of available student counselors.

Disabilities and Special Needs


If you are diagnosed with a Special Need, please seek assistance from: 1) <Name> in Student Services for
a Physical or Mental Special Need and/or 2) <Name> in Academics for a Special Learning Need. You
must provide recent documentation stating the nature of your condition and any accommodations that
need to be met.

21 -
Testing and Grading
Test dates and content: Test dates are listed on the Course Guide Syllabus section of this document.
Test dates for in-classroom courses are subject to change at the discretion of the professor. Each test will
be developed from lecture content and lab exercises.
Do not be tardy on examination dates: Failure to report to class on time during testing disrupts other
students. Therefore, you must be present at the start of class to receive your test paper. Late arrivals will
have 5-points deducted on their paper. Online students must test with their authorized exam week.

Distractions in the classroom: Students cannot use cell phones, bring children into the classroom, or
disturb other students by excessive talking or loud behavior.

Distractions during testing: Students cannot (in addition to the above classroom distractions) leave the
room for any reason once a test starts; use a calculator or cell phone for viewing notes; leave any note(s)
or other subject materials in view; talk to other students; borrow supplies from another student; or enter
the classroom late.

Student questions during testing: In fairness to all students, the professor cannot answer student
questions related to the test once an exam starts. Students should review their test upon receiving it and
ask questions before the professor officially starts the test.

The final test is required by all students regardless of course average. The final examination is
mandatory. Students are required to take examinations on their scheduled test date no makeup tests
are administered.

Grading Process:
Source Grade % Early Reward Late Penalty
or Points
Quizzes 1 through 7 14% or 140 None Make-up tests will not be
administered.

Final 30% or 300

Weekly Lab 35% or 350 None. 10 points subtracted if paper is submitted


Exercises/Milestones after the published due date. Papers will
not be accepted after one week of its
required due date. Professor will not be
responsible for any paper not placed in
the course shell Dropbox. Late papers are
penalized 10 points.
Threaded 21% or 210 None Quality and quantity in posting to TDs is
Discussions expected.
Total Grade 100%

Grade Index:
90 100 A
80 89 B
70 79 C
60 69 D
0 59 F

22 -
Diversity Statement

In accordance with Undisclosed Curriculum Universitys Mission Statement, we are a diverse college
community of life-long learners committed to promoting the acceptance and respect of individual
differences that are inherent in our college. Through standards of conduct and diversity training, we seek
an environment that will insure success, well-being and safety of our entire Undisclosed Curriculum
community.

We support fair, equal, and non-discriminatory treatment as a responsibility of all members of our
Undisclosed Curriculum community. It is our position to empower everyone at Undisclosed Curriculum
to be responsible for each other and to actively uphold these standards of conduct.

In support of this statement, students, faculty, staff, and all other members of the Undisclosed Curriculum
community are expected to respect diversity, which includes, but is not limited to age, disability, gender,
marital status, national origin, race, religion, and sexual orientation.

Deans Signature Professors Signature

23 -
Undisclosed Curriculum University
Syllabus for Course UNDISCLOSED CURRICULUM Enterprise Undisclosed Curriculum with
Lab (Retired) - Ignore

Week 1: Terminal Course Objective: 2

Student Assessment Test

Chapter 1 Internetworking Technology Review

Lab 1: Researching hoovers.com for a Undisclosed Curriculum Project Customer

Week 2: Terminal Course Objective: 2

Chapter 2 Applying Design Principles in Network Deployment

Lab 2: Introduction to OPNET IT Tutorial

Week 3: Terminal Course Objective: 2

Chapter 2 Applying Design Principles in Network Deployment

Lab 3: Using IT Guru to Design the Hierarchical Network Model

Customer Research and Analysis Paper due (see template in Doc Sharing)

Week 4: Terminal Course Objectives: 1, 3

Test 1 (Material covered in weeks 1 through 3)

Chapter 3 Structuring and Modularizing the Network

Lab 4: Using IT Guru Design the Enterprise Composite Network Model


(Figure 3-8, page 131)

Week 5: Terminal Course Objectives: 1, 3

Chapter 3 Structuring and Modularizing the Network

Lab 5: Using IT Guru to Design the Enterprise Edge Functional Area


(Figure 3-12, page 138)

Identifying Customer and Technical Requirements and Constraints Matrix due (see
template in Doc Sharing)

24 -
Week 6: Terminal Course Objectives: 1, 4

Chapter 4 Basic Campus Switching Design Considerations

Lab 6: Using IT Guru to Design and Label the Hierarchical Network - (Figure 3-
26, page 176)

Week 7: Terminal Course Objectives: 1, 4

Chapter 4 Basic Campus Switching Design Considerations

Lab 7: Using IT Guru to Design Remote Access Connection Requirements


(Figure 5-6 page 277)

Week 8: Terminal Course Objectives: 1, 5

Test 2 (Material covered in weeks 4 through 7)

Chapter 5 Designing WANS

Lab 8: Using IT Guru to Design Permanent Secondary WAN Link


(Figure 5-9 page 286)

Week 9: Terminal Course Objectives: 1, 5

Chapter 5 Designing WANS

Lab 9: Using IT Guru to Design a Traditional versus Converged Undisclosed Curriculum


(Figure 8-11 page 463 & Figure 8-13 page 455)

Week 10: Terminal Course Objectives: 1, 6

Chapter 8 Designing Networks for Voice Transport

Lab 10: Using IT Guru to Design the Customers Layer 2 Topology

Week 11: Terminal Course Objectives: 1, 5,6,7

Chapter 8 Designing Networks for Voice Transport

Lab 11: Using IT Guru to Design the Logical Converged Enterprise Network for the Project
Customer.

25 -
Week 12: Terminal Course Objectives: 1, 5,6,7

Test 3 (Material covered in weeks 8 through 11)

Chapter 9 Evaluating Security Solutions for the Network

Lab 12: Using IT Guru to Design the Physical Converged Enterprise Network for the Project
Customer.

Week 13: Terminal Course Objectives: 1, 5,6,7

Chapter 9 Evaluating Security Solutions for the Network

Lab 13: Using IT Guru to Design the Project Customers New, Converged LAN/WAN Network
(Resume Lab 11 & 12 logical and physical topologies)

Week 14: Terminal Course Objectives: All

Class Project Presentations (20-minutes per team)

Course Project Proposal Papers due

Week 15: Terminal Course Objective: All

Final Exam - Test 4 (Concentration on material covered in weeks 12 through 14)

26 -
UNDISCLOSED CURRICULUM Standard 15-Week Course Outline (Retired) - Ignore

Week Topic Class TCO(s) Lab Assignment Lab


Assignments Obj.
1 Internetworking Technology Review - Student Assessment Test Read chapter 1 2 Lab 1: Researching hoovers.com for a Undisclosed Curriculum Project Customer 1

2 Applying Design Principles in Network Deployment Read chapter 2 2 Lab 2: Introduction to OPNET IT Guru Tutorial 2

Customer Research and Analysis due (see template in Doc Sharing)

3 Applying Design Principles in Network Deployment Read chapter 2 2 Lab 3: Using IT Guru to Design the Hierarchical Network Model 3
Test 1 Weeks 1-3 Test 1
Lab 4: Using IT Guru to Design the Enterprise Composite Network Model (Figure 3-8, page 131)
4 Structuring and Modularizing the Network Read chapter 3 1,3 3
Identifying Customer and Technical Requirements and Constraints
Matrix due (see template in Doc Sharing)

Lab 5: Using IT Guru to Design the Enterprise Edge Functional Area (Figure 3-12, page 138)
5 Structuring and Modularizing the Network Read chapter 3 1,3 4
Lab 6 Lab 6: Using IT Guru or NetCracker to Design the Hierarchical Network - (Figure 3-26, page 176)
6 Basic Campus Switching Design Considerations Read chapter 4 1,4 4

Lab 7: Using IT Guru to Design Remote Access Connection Requirements (Figure 5-6 page 277)
7 Basic Campus Switching Design Considerations Read chapter 4 1,4 4
Test 2 Weeks 4-7 Test 2
Lab 8: Using IT Guru to Design Permanent Secondary WAN Link (Figure 5-9 page 286)
8 Designing WANS Read chapter 5 1,5 5
Lab 9: Using IT Guru to Design a Traditional versus Converged Undisclosed Curriculum (Figure 8-11
page 463 & Figure 8-13 page 455)
9 Designing WANS Read chapter 5 1,5 5
Lab 10: Using IT Guru to Design the Customers Layer 2 Topology Map
10 Designing Networks for Voice Transport Read chapter 8 1,6 5
Lab 11: Using IT Guru or NetCracker to Design the Logical Converged Enterprise Network for the
11 Designing Networks for Voice Transport Read chapter 8 1,5,6,7 Project Customer. 6
Test 3 Weeks 8-11 Test 3
Lab 12: Using IT Guru to Design the Physical Converged Enterprise Network for the Project Customer. 7
12 Evaluating Security Solutions for the Network Read chapter 9 1,5,6,7
Lab 13: Using IT Guru to Design the Project Customers New, Converged LAN/WAN Network (Resume
and complete Labs 11 & 12 of the logical and physical designs)
13 Evaluating Security Solutions for the Network Read chapter 9 1,5,6,7 6,7

14 Team Presentations Course Project Papers due none All Team Presentations All Teams No Exceptions All

Test 4 (no
15 Final Exam - All Weeks makeup All Final Exam All

- 27 -
Undisclosed Curriculum University
Syllabus for Course UNDISCLOSED CURRICULUM Enterprise Undisclosed Curriculum with
Lab

Week 1: Terminal Course Objective: 1

Chapter 1: Introduction

Lab 1: Introduction to Visio

Week 2: Terminal Course Objective: 1, 2

Chapter 2: Requirements Analysis: Concepts

Chapter 3: Requirements Analysis: Process

Lab 2: Milestone 1 Network Segmentation

Week 3: Terminal Course Objective: 3

Chapter 4: Flow Analysis

Lab 3: Milestone 2 Network Data Flow Tables

Week 4: Terminal Course Objective: 4

Chapter 5: Network Architecture

Lab 4: Milestone 3: Network VLAN Design Template

Week 5: Terminal Course Objective: 5

Chapter 6: Addressing and Routing Architecture

Chapter 7: Network Management Architecture

Lab 5: Milestone 4Subnetting, and Dynamic Routing Tables

28 -
Week 6: Terminal Course Objective: 6

Chapter 8: Performance Architecture

Chapter 9: Security and Privacy Architecture

Lab 6Milestone 5: Lab Report

Week 7: Terminal Course Objective: 7

Chapter 10: Undisclosed Curriculum


Lab 7- Milestone 6: Undisclosed Curriculum Lab Report

Week 8: Terminal Course Objective: All

Final Exam (Concentration on material covered in weeks 4 through 7)

29 -
Undisclosed Accelerated 8-Week Course Outline

- 30 -
Topic
Week Class Assignments TCO(s) Lab Assignment Lab Obj.

1 Read chapter 1 1 Lab 1: Introduction to Visio 1


Undisclosed Curriculum System Methodology

Requirements Analysis:
Lab 2: Milestone 1 Network Segmentation
Concepts and Process 2 Read chapters 2 and 3 2 2

Flow Analysis
3 Read chapter 4 3 Lab 3: Milestone 2 Network Data Flow Tables 3

Network Architecture 4 Read chapter 5 4 Lab 4: Milestone 3: Network VLAN Design Template 4

Network Addressing, Routing, and Management


Architecture 5 Read chapters 6 and 7 5 Lab 5: Milestone 4Subnetting, and Dynamic Routing Tables 5

Lab 6Milestone 5: Lab Report


Performance and Security Architecture 6 Read chapters 8 and 9 6
6

Undisclosed Curriculum 7 Read chapter 10 7 Lab 7- Milestone 6: Undisclosed Curriculum Lab Report
7

31 -
Final Exam - All Weeks 8 Final Exam (no makeup Test) All

32 -
Appendix A
UNDISCLOSED CURRICULUM - Enterprise Undisclosed Curriculum with Lab
Course Project Proposal Guidelines

Project Introduction:

Modern enterprise networks are becoming increasingly complex and much more integrated into the
enterprises they serve. With the growth of the Internet, groupware, and other connective technologies and
applications, Information Systems, including networks, are increasingly embedded into the basic structure
of the modern business. Integration of voice, data, and imaging over one network infrastructure enables
employees, suppliers, vendors, and customers to efficiently access corporate information on a global
scale.

Enterprise Undisclosed Curriculum with Lab, UNDISCLOSED CURRICULUM, is the capstone course
for the networking series. Your lecture and lab experience with network operating systems, LAN/WAN
technologies, converged networks, wireless networks, and network protocols such as TCP/IP and its
various services prepares you to design a state-of-the-art, enterprise network infrastructure. Your
infrastructure allows immediate communications, and data access, to business stakeholders so that they
may effectively, efficiently, and quickly analyze and resolve complex business issues.

By researching an enterprise size company and analyzing its global infrastructure, the CCDA approach
can be used to develop reliable, scalable, and secure mission critical information systems that can quickly
share data among valuable stakeholders.

A project paper and PowerPoint presentation are the required outcomes of your research project effort. An
enterprise size company is one whose geographical displacement covers multiple states and can include
overseas sites. Local enterprises do not qualify for UNDISCLOSED CURRICULUM. At a minimum, an
enterprise company should be regional in scope and consist of 500 computing devices at a minimum.

Project research teams, formed in week 1 --see the week 1 threaded discussion on Joining a project
team --select an enterprise-wide company using Hoovers.com. The team works as a Undisclosed
Curriculum team to migrate their project customer into a state-of-the-art, converged network. Teams
formally document their Undisclosed Curriculum in a proposal paper, and simulate their network model
using OPNET IT Guru Design and Simulation software. Final project papers are due in the Dropbox by
midnight on Sunday of week 7:

Teams will be made up of 2 to 3 students (no exceptions).

Each team will elect a Team Leader who is responsible for assigning, coordinating, and leading
the team effort through to completion. The team leader should email the professor with a team
name and its member names by the end of week 1.

Each team is responsible for providing a project status report to the professor every two weeks.
Status reports should be emailed to the professor. Team members should rotate this responsibility.
A status report consists of one to two lines of status information, e.g. team one is on track; team
one completed the required templates for week 2; etc..

- 33 -
Team members are expected to pull their fair share of the project load. A team member who does
not produce as expected can be expelled from the team by a majority-vote of all team members.

Team behavior and responsibility sharing will not be micromanaged by the


professor. Teams are expected to resolve their forming and storming issues and quickly
meld into a normal, performing team. Individual or team behavior/performance issues
that cannot be resolved by the team, and that are brought to the attention of the professor
for resolution, will result in an overall 10 point grade reduction in the final project grade.

Use Hoovers On-Line (www.hoovers.com) to select an enterprise-sized company to serve as


your enterprise Undisclosed Curriculum model. Your company should have multiple sites across
a region, country, or countries; currently maintains LANs, CANs, and/or MANs; support remote
users; and transports voice, data, imaging, and/or video across the WAN. (Undisclosed
Curriculum University, local medical centers, and school systems cannot be used for a project
customer).

Using the textbook, complete an enterprise composite network model of corporate headquarters
and a campus design for a branch. One diagram should be completed for each headquarters and
a branch location. All branches will follow the master branch design (boilerplate) for network
consistency.

In modeling your enterprise-size company, different sites may use different Data Link Layer 2
protocols. Adhere to definitions for segment, LAN, building network, campus network, remote
access, WAN, and enterprise network infrastructures. Examine the interconnection of various
protocols, speeds, interfaces, and media in the network. Do not forget the voice component in
your design.

Research network components, architectures, and topologies using publications, library resources,
and authentic Web sites (cisco.com, 3com.com, lucent.com, avaya.com, nortel.com, madge.com),
and other product information sources including technology white papers.

Research and cite IEEE, EIA/TIA, ITU-T, cert, and other standards for transport, cabling,
security, and protocols.

Use and document at least 5-references used in your research references must be hardcover
textbooks, technical magazines/newspapers, journal sources, or authentic web sites. Include a
References page in your proposal paper.

Write a professional, neat, and accurate project paper. You will be strictly evaluated on grammar,
sentence structure, spelling, and formatting, as well as technical and schematic accuracy. Be sure
to proof-read your final paper for typos, proper APA in-text citations, grammar, sentence logic
flow, and paragraph clarity. Use a Proposal format for your paper. Errors are easy to fix and
costly to your final grade proof read and correct errors!

Use APA guidelines and rules (see below) to reference works used, to ground your technical
assertions; to show the source used for schematics and diagrams that you did not create; and
cite product photographs pasted into your paper from vendor sites.

34 -
To avoid plagiarism, see the syllabus for Undisclosed Curriculum Online help on avoiding
plagiarism. These rules apply for all graphic images, diagrams, charts, or other borrowed
information from vendor or technical web sites that are cut and pasted into your proposal body or
appendix.

Complete a thorough OPNET IT Guru diagram showing the OLD network architecture Layer 2
Topology design only with appropriate labeling.

Complete a thorough OPNET IT Guru diagram showing the NEW network architecture both
logical and physical designs including services, speeds, addresses, naming conventions,
protocols, layers, and other pertinent information.

Create a professional PowerPoint slide presentation to supplement your oral presentation use a
minimum of 10 slides. Include an introduction slide that serves to introduce your team and shows
each members assigned project task.

Deposit your project proposal and power point presentation in the week 7 Dropbox for Project
Paper and Project Presentation. Ensure that your team names and titles are on the cover page,
and power point slide, along with your project customer name, course title, professor name, and
date. Papers should be placed in the Dropbox by Sunday midnight MT in Week 7.

Required Project Proposal Sections:

1. Title Page
Topic title
Course name
Course number
Course session
Team leader name
Team member names
Date submitted

2. Table of Contents
List each section in order of the proposal content
List each page number across from each section name

3. Executive Summary
One-page double-spaced
Should be the last page written after RFP is completed
Written to the CEO, President, or CFO of the company
Explain how your proposal helps the company meet, or exceed, its company mission
statement, goals, objectives, and budget

4. Introduction
One-page double-spaced
Should be written after all technical documentation is completed
Written to the technical and financial management
Explain exactly what you design solution does in technical terms

35 -
5. Body
20 - 40 double-spaced pages in actual body
Each section starts a new page with the section header at the top of the page
Use APA Reference Style to cite in-text citations for referenced sources in the form of:
(authors last name, date, page number or numbers)
Each section should reflect the chapter topic found in the text:
Customer introduction and profile
Customer goals and constraints
Technical goals and constraints
Existing Undisclosed Curriculum analysis
Technical goals and constraints of new network
New Undisclosed Curriculum analysis, including security
Implementation schedule (use MS-Project)
Testing plan
Project budget, cost/benefit analysis, and/or Return on Investment (ROI)
Detailed materials summary page with cost per unit and total cost
Detailed components and parts summary page
Physical diagram of existing (old) Undisclosed Curriculum(OPNET IT Guru
diagram)
Logical and physical diagrams of new Undisclosed Curriculum(OPNET IT
Guru diagram)

6. Conclusion
One page double-spaced
The conclusion page is used to close the sale
Summarize the benefits to the company that your solution/implementation provides

7. References
Reference page must reflect the APA Reference Style
List at least five references

8. Appendix
Physical NetCracker design of existing (old) network
Logical NetCracker design of new network
Physical NetCracker design of new network
Charts
Graphs
Photographs
Other supplemental information

9. Suggested Presentation slides


Team introduction slide
Team assignments
Customer introduction slide
Customer description slide
Existing Undisclosed Curriculum physical only
Inadequacies, constraints, and/or problems with existing network
New Undisclosed Curriculum logical and physical
Solutions provided by new technology, topology, etc.
Benefits derived by implementing the new network

36 -
Costs and ROI (include recurring and non-recurring costs)
Materials and parts used
Conclusion

Project papers must comply with these additional rules:

1. Project papers must be written in black ink using a word processing application.

2. A consistent font size (no smaller that 12 pt) and type must be used for titles, headers, paragraph,
and chart contents.

3. A descriptive header must accompany each paragraph section.

4. Pages must be numbered and listed in the table of contents page.

5. All written material must be in your own words do not cut and paste from other written
sources.

6. Make sure the cover page is viewable with your team name, team number, course name, course
number, session number, and date.

7. Do not print on both sides of a page; use one side only.

8. To avoid plagiarism, see the syllabus. Rules apply to all graphic images, diagrams, charts, or
other borrowed information from vendor or technical web sites that are cut and pasted into your
proposal body or appendix.

Examples of APA Style:


Example of an in-text citation
When paraphrasing someone else's material, you are required to cite it. An example of an in-text citation
taken from the Top-Down Undisclosed Curriculum book by Priscilla Oppenheimer looks like this:
A good Undisclosed Curriculum must recognize that a customers requirements embody many business
and technical goals including requirements for availability, scalability, affordability, security, and
manageability (Oppenheimer, 2004, p. 6).
The citation, in this example, shows that the paragraph is taken from page 6 in a textbook authored by
Oppenheimer and published in 2004.
Please ensure that everything cited in your paper is listed on your references page and everything listed on
your references page is cited in your text. Use APA style for your references page format. A few
examples for a typical APA references page looks like this:

Example of One Author


Oppenheimer, P. (2004). Top-down Undisclosed Curriculum (2nd ed.). Indianapolis, IN: Cisco
Press.

37 -
Example of More Than One Author
Nichols, R., & Lekkas, P. (2002). Wireless security, models, threats, and solutions. New York,
NY: McGraw-Hill.

Example of a CD-ROM Reference


Federal Bureau of Investigation. (1998, March). Encryption: Impact on law enforcement.
Washington, DC: Author. Retrieved from SIRS database (SIRS Government Reporter, CD-ROM, Fall
1998 release)

Examples of Web Site References


American Psychological Association. (1995, September 15). APA public policy action alert:
Legislation would affect grant recipients [Announcement]. Washington, DC: Author. Retrieved January
25, 1996, from the World Wide Web: http://www.apa.org/ppo/istook.html

Weisenmiller, E. M. (1995). The impact of the Macintosh PowerPC on the prepress industry of
the southeastern United States. Retrieved June 7, 1999 from the World Wide Web: http://teched.vt.edu/
ElectronicPortfolios/Weisenmiller.ep/Thesistoc.html

Example of an On-line Government Reference


Bush, G. (1989, April 12). Principles of ethical conduct for government officers and
employees. Exec. Order No. 12674. Pt. 1. Retrieved November 18, 1997 from the World Wide Web:
http://www.usoge.gov/exorders/eo12674.html

End of Undisclosed Curriculum Project Guidelines

38 -
Appendix B
UNDISCLOSED CURRICULUM Enterprise Undisclosed Curriculum with Lab
Customer Research and Analysis Template

You customer research and analysis page(s) will identify the organization chosen for your Undisclosed
Curriculum project. Specific requirements are found in the CCDA Self-Study text book in chapter 2. Each
section should be completed. Remember to cite your references to avoid plagiarism.

Business name (Hoovers.com)


Headquarters address
City, State, Zip
Main business telephone with area code
Web site URL and e-mail address

Type of business and Industry (Hoovers.com)


Products or Services offered

Organizational structure of the business (an organization chart Hoovers.com)

Company Mission Statement (Hoovers.com or companys web site)


Company Goals and Objectives (at least four goals/objectives)
Company Constraints (at least two constraints)
Write one goal for your company that explains the primary reason it is investing in a network
implementation or upgrade (you would normally request this from the company CEO or Technology
Officer as support for the project).

Number of departments (Hoovers.com or companys web site)


Number of branches, sites, locations
List counties, states, and/or foreign countries where branches are located

Number of employees (Hoovers.com or companys web site)


Number of employees at each site (divide total number of employees by total number of sites exception
is company headquarters)

Financial Analysis Three to four year view of revenues, expenses, profits/earnings, stock performance,
etc. (use a MS-Word chart do not cut and paste). (Hoovers.com or companys web site)

Use the customer and network requirements chart to show:


Name and type of software application(s) being used (page 58)
Most critical business application if more than one is listed (page 58)
Cost of downtime (total revenues divided by number of hours in a year).

This report is used by the professor to track each groups research project progress. It is to be used by
each team as a guide for starting the project paper. Failure to submit this section could result in 10 points
off your final project paper grade. Do not cut and paste any section use you own wording with MS-
Word, MS-Excel, etc. Submit one report per team. Your document will become the first section in the
body of your project proposal paper.

- 39 -
Appendix C
Undisclosed Curriculum Project Templates
Customer and Technical Decision Matrix Template

Table 2-2 Design Scope Template


Scope of Design Comments

Table 2-4 Organizational Goals Template


Goal Data Comments

Table 2-6 Organizational Constraints Template


Constraint Data Comments
Budget
Personnel
Policy
Schedule

Table 2-8 Planned Applications Template


Application Type Application * Level of Comments
Importance (1-4)

1=not very important; 2= somewhat important; 3= important; 4=extremely


important.

- 40 -
Undisclosed Project Templates
Customer and Technical Decision Matrix Template

Table 2-10 Planned Intelligent Service Template


Service Comments
Security
QoS
Network Management
High Availability
IP Multicast

Table 2-12 Technical Goals Template


Technical Goals * Importance Comments
Performance
Security
Availability
Modernize
Scalability
Manageability
* 1=not very important; 2= somewhat important; 3= important; 4=extremely important.

Table 2-14 Technical Constraints Template


Technical Constraints Gathered Data Comments

Table 2-18 Decision Table Template Use as required for other decisions
Options
Required Required Required Required
Parameters Parameters Parameters Parameters

Parameter

Parameter

Parameter

- 41 -
Appendix D
Example UNDISCLOSED CURRICULUM Test

1. (1.0 point)
Match the role of each layer in the hierarchical network model to its name.

[a] 1. Core
[b] 2. Access
[c] 3. Distribution
a. High-speed data transport
b. Local and remote user entry into the network
c. Policy based connectivity

2. (1.0 point)
True or false: Each layer in the hierarchical network model must be implemented with distinct physical
devices.

a. True
*b. False

3. (1.0 point)
Name three features of a Layer 3 switch when used in the access layer?

*a. Routing between broadcast domains


b. Providing Network Address Translation (NAT) services
*c. Authentication and security
*d. Dial-on-demand routing to remote locations
e. Load balancing to the core layer

4. (1.0 point)
Which two statements are true?

*a. UplinkFast immediately unblocks a blocked port after root port failure.
*b. PortFast immediately puts a port into the forwarding state.
c. UplinkFast immediately puts a port into the forwarding state.
d. PortFast immediately unblocks a blocked port after root port failure.

5. (1.0 point)
Which layer in the hierarchical model provides media translation?

a. access layer
*b. distribution layer
c. core layer
d. broadcast layer

- 42 -
6. (1.0 point)
What are three roles of the hierarchical model's core layer?

*a. Provide fast and efficient data transport


*b. Provide maximum availability and reliability
c. Provide access to the corporate network via some wide-area technology
d. Implement policies regarding security
e. Delineate broadcast domains
*f. Implement scalable routing protocols

7. (1.0 point)
Briefly explain what the distribution layer needs in order to redistribute between routing protocols?

Correct Answer:
The distribution layer can redistribute between bandwidth-intensive access layer routing protocols (RIP)
and optimized core routing protocol (OSPF). Redistribution allows the access layer and core layers to
share routing information.

8. (1.0 point)
Briefly explain the benefit of using Layer 3 switching in the core network layer?

Correct Answer:
Layer 3 allows the full use of all redundant links and load balancing.

9. (1.0 point)
Select the functional areas in the Enterprise Composite Network model?

*a. Service Provider Edge


*b. Enterprise Edge
c. Distribution Edge
*d. Enterprise Campus
e. Remote Access and VPN Connectivity

10. (1.0 point)


Name the modules and submodules within the Enterprise Campus functional area?

*. Server Farm module


*b. Network Management module
c. Internet Connectivity module
*d. Edge Distribution module
*e. Campus Infrastructure module

11. (1.0 point)


The Enterprise Edge functional area includes which modules?

a. Server Farm Module


*b. Internet Connectivity module.
*c. WAN module
*d. E-commerce module
*e. VPN/Remote Access module

43 -
12. (1.0 point)
The Service Provider Edge functional area is composed of which modules?

*a. Internet Server Provider (ISP) module


b. WAN module
*c. Public Switched Telephone Network (PSTN) module
d. X.25 Packet Switched module
*e. Frame Relay and ATM module

13. (1.0 point)


Which module of the Enterprise Composite model would include wireless connectivity to remote
locations?

a. PSTN module
b. WAN module
c. X.25 Packet Switched module
*d. Frame Relay and ATM module
e. ISP module

14. (1.0 point)


Briefly explain the advantage for using the Enterprise Composite Network model?

Correct Answer:
The Enterprise Composite Network Model allows that Undisclosed Curriculumer to focus only on a
selected module and its functions at one time. Network solutions and intelligent network service can be
described on a per-module basis and validated as part of the complete enterprise Undisclosed Curriculum.

15.(1.0 point)
Briefly explain the Campus Backbone submodule's role?

Correct Answer:
The campus backbone submodule interconnects the building access and distribution submodules with the
server farm, network management, and edge distribution modules.

16. (1.0 point)


Match the types of devices would be found in each of these modules to its module:

[a] 1. Web servers


[b] 2. SMTP mail servers
[c] 3. Broadband Wireless
[d] 4. VPN concentrators
[e] 5. Public FTP servers

a. E-commerce module
b. Internet Connectivity module
c. Remote Access and VPN module
d. Remote Access and VPN module
e. Internet Connectivity module

44 -
17.(1.0 point)
Briefly explain the role of the Service Provider functional area?

Correct Answer:
The Internet Service Provider functional area enables communications with other networks using different
WAN technologies and with ISPs.

18. (1.0 point)


Match the following network service or a network solution to its specific classification:

[a] 1. Network management


[b] 2. Voice over IP
[c] 3. Storage networking
[d] 4. Security
[e] 5. High availability
[f] 6. QoS
[g] 7. Content networking

a. Service
b. Solution
c. Solution
d. Service
e. Service
f. Service
g. Solution

19. (1.0 point)


List functions support security and are the responsibility of the Enterprise Composite Network model's
Network Management module?

Correct Answer:
The Network Management module security functions include syslog; authentication, authorization, and
accounting (AAA); and One Time Passwords (OTP).

20. (1.0 point)


High availability from end-to-end is only possible when ___________ is deployed throughout the
internetwork.

a. Load-balancing
*b. Redundancy
c. Bandwidth
d. Queuing
e. Jitter

21. (1.0 point)


Briefly explain the purpose for designing route redundancy in a network?

Correct Answer:
Redundant routes minimize the effect of link or device failures and provides load-balancing when all
routes are up.

45 -
22. (1.0 point)
A full mesh design is ideal for connecting a ________ number of devices.

*a. Small
b. Medium
c. Large
e. Extra Large

23. (1.0 point)


Backup links can use different technologies.

*a. True
b. False

24. (1.0 point)


What components are required in IP telephony?

*a. IP Phones
b. Analog Phones
*c. Router with voice ports or Gateway
*d. Gatekeeper
*e. Switch with in-line power

25. (1.0 point)


What role does the Building Access submodule play for voice transportation?

Correct Answer:
The Building Access submodule provides connectivity of IP Phones into Layer 2 switches with in-line
power and packet classification capabilities.

26. (1.0 point)


What should be considered when evaluating the existing data infrastructure for IP telephony?

Correct Answer:
The existing infrastructure should be evaluated for performance, availability, features, and capacity.

27. (1.0 point)


Why is Content Networking important in modern networks?

Correct Answer:
Content networking is important in modern networks for ensuring that the large amount of data and its
variety within network content servers take advantage of optimal network resources when moved across
the network.

46 -
28. (1.0 point)
Which content networking function directs a user request to the optimal resource within a global network
based on user-defined policies?

*a. Content routing


b. Content switching
c. Content policy
d. Content server
e. Content Concentrator

29. (1.0 point)


Which modules can contain content switches?

a. E-Commerce module
b. ISP module
c. WAN module
d. Internet Connectivity module
*e. Server Farm module

30. (1.0 point)


Which layer in the hierarchical model is only concerned with speed of packet delivery?

a. access layer
b. distribution layer
*c. core layer
d. broadcast layer

47 -
Appendix E
UNDISCLOSED CURRICULUM with Lab
Student Assessment Test
Name: Date:
1. Define ISDN PRI

2. What is IEEE 802.3z

3. Bandwidth of OC-1

4. What is IEEE 802.5

5. On which OSI Layer is the router?

6. Bandwidth of DS-0

7. On which OSI Layer is the switch?

8. Bandwidth of T-1

9. What is IEEE 802.3

10. Bandwidth of DS-3

11. Define ISDN BRI

12. What is IEEE 802.11

13. Bandwidth of OC-3

14. Define ATM

15. On which OSI Layer is the hub?

16. Define Frame Relay

17. On which OSI Layer is encryption performed?

18. What is IEEE 802.3u

19. On which OSI Layer is the Network Interface Card (NIC)?

20. On which OSI Layer is the physical media (fiber optics, air, cable)?

21. What is IEEE 802.1d

22.What is IEEE 802.1q or ISL

- 48 -
Appendix F
Course Project Proposal Grading Form
Team Names Date Grade

1. Paper met research topic and proposal guidelines for assigned content including
adequate number of pages (20 points)
Selected an appropriate enterprise project customer using Hoovers.
Followed project guidelines for proposal provided with syllabus.
Included all required proposal sections as listed in guidelines.
Included an adequate number of pages in body.
Included all required schematics, charts, graphs, photos in appendix.
Delivered oral and written presentation including professional slides.

2. Paper met technical content requirements for CCDA model both written and design (20
points)
Presented a written proof that adhered to CCDA DESGN solution(s).
Designed and implemented a technically accurate network solution.
Provided a modular approach via Enterprise Composite Network Model.
Simulated new Undisclosed Curriculum using software Design/Simulation.
Included both a logical and a physical Undisclosed Curriculum.
Included all required labels, protocols, speeds, interfaces, addresses.
Included hierarchical topology with core, distribution, access layers.
Included an adequate IP addressing and component naming model.
Included job aids, decision charts, and other rationale in solution.
Completed all written, design, and presentation project requirements.

3. Paper contained neat type, legible content, and clear graphic illustrations (10 points)
Prepared written content using a quality word-processing application.
Consistent font style and type used throughout paper.
Prepared charts, tables, and other statistical forms using a quality word-
processing/software application.
Prepared clear and easily interpreted graphic illustrations.
Other .

4. Paper written in professional business style, used correct grammatical content, and
displayed evidence of a final proof reading to assure quality (10 points)
Utilized business style writing with appropriate grammatical content.
Utilized headers and spaced paragraphs to facilitate reading.
Checked for correct spelling and proofed for grammatical errors/typos.
Prepared individual pages for each section
Displayed quality format, preparation, and assembly
Other .

5. Paper used APA style guidelines, and references page, for crediting original sources of
text, charts, graphics, and other information borrowed through research effort (20 points)
Proper APA style used for citing in-text sources (author,date,page).
Proper APA style used for citing web sites including retrieval date.
Proper APA style used for citing imported photos, charts, and graphics.
Proper APA style used for References page with at least 5 references

- 49 -
End of UNDISCLOSED CURRICULUM Guide

- 50 -

You might also like