Professional Documents
Culture Documents
Curriculum Guide
For all locations and online:
Course Description:
Students in this course apply knowledge of wired and wireless network technologies and services as well as
network security and cost consideration to develop network solutions that meet business requirements for
Enterprise networks in a campus Branch Office environment. Critical thinking, problem-solving, troubleshooting
and teamwork are emphasized.
Appendices
Course Project Proposal Guidelines 32
Customer Research and Analysis Template 37
Customer and Technical Decision Matrix Template 39
Example Test 41
Student Assessment Test 47
Course Project Proposal Grading Form 48
All rights reserved. No part of this work may be reproduced or used in any form or by any means
graphic, electronic, or mechanical, including photocopying, recording, Web distribution or information
storage and retrieval systems without the prior consent of Undisclosed Curriculum Educational
Development Corporation.
-1-
Course Strategy:
SCOPE
Undisclosed Curriculum, with Laboratory introduces the student to the concepts, principles, models, and
tools used in the design of internetworking solutions for the modern enterprise business organization.
Where previous course work prepared students to understand networking at the lower OSI layers,
UNDISCLOSED CURRICULUM teaches students to begin at the upper layer of the OSI model and plan
a solution while working down to the bottom layer. The top-down model introduces an analytical
approach for assessing customer network requirements beginning with the applications necessary to run a
modern business enterprise. Student teams select a real business organization and then carefully analyze
its business goals and constraints; technical objectives and constraints, and supporting software
applications before designing an intelligent internetworking infrastructure. Each student team must
provide a final, tested Undisclosed Curriculum that meets business requirements for bandwidth,
convergence, performance, Quality of Service, and security. Emphasis is placed on using a hierarchical
Undisclosed Curriculum model to define network topology relationships by functional layers for both
wired and wireless networks. Teams learn how to use the enterprise composite network model for
grouping functional network areas into modular building blocks that simplify the complex
internetworking design task. A professional network modeling tool is utilized to test design parameters
for conformance to network performance goals.
Upon successful completion of UNDISCLOSED CURRICULUM course terminal objectives, students are
prepared to analyze the business enterprise; design or redesign an intelligent network infrastructure;
configure models for evaluating Undisclosed Curriculum capacity and performance; assimilate and
document a formal Undisclosed Curriculum proposal; and prepare a formal proposal presentation. In
addition, UNDISCLOSED CURRICULUM satisfies the prerequisite for Undisclosed, Undisclosed
Management with Lab.
LEVEL
Students entering UNDISCLOSED CURRICULUM must have a solid foundation in basic networking
concepts, protocols, and topologies. Students build upon LAN, MAN, and WAN knowledge as they use
new templates, tools, and models to analyze and propose enterprise network solutions. Familiarity with
network convergence and converged topologies; wired and wireless services; network component naming
and addressing techniques; protocol selection and behaviors; and security principles and concepts are
critical in the evaluation, troubleshooting, and design process.
Students must possess the capability to configure, and reconfigure, a network modeling tool and analyze
graphical output reports in order to assess critical indicators of network performance based upon selected
design parameters.
Prerequisite course work for UNDISCLOSED CURRICULUM ensures that students are able to
understand the relationship of a network operating system and its capabilities for supporting various
enterprise applications, converged data, and information as it traverses the local and wide-area network
enterprise infrastructure.
UNDISCLOSED CURRICULUM, Enterprise Undisclosed Curriculum with Lab satisfies the industry
need for network specialists who understand the steps and techniques used in the analyzation, planning,
design, and modeling of intelligent network infrastructures for global business organizations.
As major telecom providers push out more efficient Ethernet pipes, high-speed wireless technologies, and
fiber-to-the-premise broadband services, their service innovations will directly impact more than 43,000
public, and non-public, US and International corporations and some 16,000,000 mid-size companies
(Hoovers.com, 2006). According to Networkworld.com (2006), enterprise IT managers will focus on
Voice over IP (VoIP), security, optical technologies, and information storage solutions through 2009 to
reduce costs while at the same time be expected to provide responsive network solutions for their
enterprise.
To meet these challenges, enterprise Undisclosed Curriculumers, engineers, and managers face the
complex task of evolving their corporate networks into new protocols, technologies, and services. Jobs for
Undisclosed Curriculum professionals with engineer, specialist, architect, consultant, planner, project
manager, and manager titles are advertised on monstor.com (July, 2006) by a variety of national and
international companies. Many job requirements request a college degree in addition to the Cisco
Certified Design Associate (CCDA) certification.
TEACHING SUGGESTIONS
Each student position should be equipped with a personal computer, Microsoft Office, a web browser, and
a professional Undisclosed Curriculum and modeling tool such as OPNET IT Guru. Microsoft Visio is
not a professional design and modeling tool at this time and should not be used to complete
UNDISCLOSED CURRICULUM labs.
Teaching effectiveness is enhanced by immediately enforcing lecture content with a coordinated lab
exercise. For example, a lecture introducing students to the hierarchical network model can be reinforced
by having each student design the hierarchical model.
Visio
UNDISCLOSED CURRICULUM provides an Visio course shell to be used by all instructors teaching in
an accelerated lecture-led course format. The course shell is preconfigured with objectives, assignments,
lectures, discussion threads, and labs for student work outside the classroom. The shell also offers a
convenient method of grade management, student messaging, course document dissemination, and
student assignment deposition.
iLab
Accelerated 8-week and online course offerings usually provide students with access to an online,
integrated lab (iLab) environment for working assigned labs. Access to a particular iLab platform is
course dependent and automatically provided when the student completes the course registration process.
Students can then log into their course assigned iLab platform by using their normal Undisclosed
Curriculum Student D number and password. Students registering late may have up to a 2-day delay in
iLab access pending a post-registration system update schedule.
Online students may be required to use their home computer to work assigned labs using software
provided in a textbook or software downloaded from an authorized vendor with a prearranged licensing
agreement with Undisclosed Curriculum University and, and or, with Undisclosed Curriculum Online
University.
Lecture-led classroom courses may not require iLab access if equipment or software resources are part of
an on-campus classroom.
Courses may also require students to do weekly research or projects instead of online labs. It depends on
the course.
Threaded Discussions
Students are required to participate in weekly threaded discussions to enhance the learning experience in
specific course topics. Properly structured discussion threads promote student involvement and lead to
greater fulfillment of course outcomes. Students must validate their discussions by posting source web
sites, documents, and other content used when researching a topic.
A comprehensive, applied-level book, that describes the principles of Undisclosed Curriculum and
presents guidelines for building a Undisclosed Curriculum solution. Emphasis is placed on the Cisco
Enterprise Composite Network Model that simplifies the design complexity of todays large, enterprise-
sized networks.
http://vig.prenhall.com/catalog/academic/product/0,1144,1587051419,00.html
Web Research:
Cisco Systems
Cisco Systems product listing and description. Excellent implementation guidelines, online seminars, and
other helpful information for the design engineer.
Lucent Technologies
World renowned telecommunications equipment manufacturer spun off from AT&T at divestiture (1984).
Excellent network product listing and description. Helpful information for the design engineer.
Bell Labs
Lucent Technologies world renowned research and development center hosting excellent information for
emerging technologies in the field of telecommunications and network computing.
Adtran
ADTRAN is an established supplier of advanced transmission products for expansive telecommunications
networks. The Enterprise Network (EN) Division provides product line solutions for wide area
connectivity across diverse communications networks and technologies. Good source for technology
overviews and white papers on emerging enterprise technologies.
6-
Black Box carries a full line of network solutions, testing equipment, and tools for the network
professional. Good technical reference section on their web site with technology overviews, white papers,
product data sheets, and cable and adapter configurations.
7-
National Software Testing Labs (NSTL)
National Software Testing Labs (NSTL) was established in 1983 as the worlds first independent IT
testing organization. NSTL services both the makers and the buyers of information technology with
cutting-edge testing methodologies and consulting services. NSTL is a world-recognized authority in
hardware and software performance, compatibility, usability, and functionality testing
http://www.ieee.org/portal/site
The Institute of Electrical and Electronics Engineers (IEEE) is the worlds leading professional
association for the advancement of technology. An assortment of magazines, journals, and documents
derived from their involvement in the global standardization of power and energy, biomedical and
healthcare, information technology, telecommunications, transportation, nanotechnology, and information
assurance. Their Standards Association includes the prominent 802 standards for wired and wireless
networks.
http://www.hoovers.com/
Hoovers Inc. provides an unbiased site for researching company, industry, and market intelligence and is
required for completing customer analysis work before beginning the enterprise Undisclosed Curriculum
process (must be accessed through the Undisclosed Curriculum Library electronic link for access as a
paid subscriber).
http://www.eseminarslive.com/
A free online and on-demand seminar portal sponsored by Ziff-Davis with frequent educational seminars
featuring network solutions and technologies designed for the network professional. Although seminars
are slanted around a specific vendors product or solution, the technical content is excellent.
http://www.bitpipe.com/
The webs leading online information source for professionals needing technology white papers,
webcasts, case studies, and product information. Membership is free with content including networking,
storage, wireless, telecom, enterprise business applications, and more.
http://www.networkworld.com/
Networkworld provides a large assortment of network information in formats such as video, white paper,
webcast, encyclopedia, newsletter, blog, RSS feed, and forum. Includes test results and analysis in all
areas of network services and products.
8-
Course Terminal Objectives
1. Given a set of requirements for a modern enterprise business organization, diagram and simulate
network solutions consisting of functional modules and hierarchical layers with respect to
intelligent network services, protocols, and topologies students will be able to design an
Enterprise network solution.
A. Describe the process of how to analyze and design an enterprise network as a system where
services, performance, throughput, delay, reliability, and scalability are all interrelated.
B. Differentiate and diagram enterprise composite network modules in LAN, CAN, and WAN
functional areas Select and correctly place standardized logical network icons into
functional network groups and layers in accordance with design requirements.
C. Identify hierarchical intersections of an enterprise network for proper traffic flows.
D. Select and build standardized physical network icons for vendor-specific Undisclosed
Curriculum topologies.
E. Simulate functional and vendor specific network topologies to measure design requirements.
F. Identify appropriate network services and performance characteristics for different business
needs and requirements
2. Given a team situation and top-down Undisclosed Curriculum tools, students will be able to
analyze and document customer organizational and technical goals, policies, requirements, and
constraints as inputs to the Undisclosed Curriculum process.
A. Develop, apply, and document project charts for design scope, organizational goals and
constraints, technical goals and constraints, planned applications, and intelligent network
services.
B. Develop and document solutions that meet customer and project requirements for network
security, QoS, management, availability, reliability, scalability, and performance.
C. Develop, apply, and document the use of decision tables for making appropriate selections
among software, protocol, and hardware that meet project design requirements.
D. Calculate and apply metrics to network components to determine mean-time-between-failure,
mean-time-to-restore, bandwidth, delay variation, and other service level requirements.
3. Given a team situation and a set of Undisclosed Curriculum requirements for a modern enterprise
business organization, students will be able to select and design enterprise campus network
topologies consisting of multilayered modularity, geographical borders, existing traffic flows, and
planned application traffic flows.
A. Translate design customer and network requirements into enterprise campus, enterprise edge,
and service provider edge network modules.
B. Identify different flows of traffic generated by applications, end users, and networking
devices.
C. Design and illustrate the organization's overall network topology, consisting of enterprise
composite network modular components and hierarchical functional areas.
D. Identify and label designed network components by interface type, protocol, bandwidth, and
Quality of Service (QoS).
4. Given a team situation and a set of Undisclosed Curriculum requirements for a modern enterprise
business organization, students will be able to design and connect the hierarchical and enterprise
composite network models into specific topologies that meet customer requirements.
-9- NETW-412
B. Identify and organize network factors, application characterization, and switching design
considerations for an appropriate enterprise campus Undisclosed Curriculum that meets the
organization's intelligent network requirements.
C. Design and illustrate an organization's enterprise campus functional area made up of the
campus building infrastructure, server farm, network management, and edge distribution
modules.
D. Identify and label designed campus network components by interface type, protocol,
bandwidth, and quality of service (QoS).
E. Use component and reference architecture and architectural models to design a network that
meets the requirements and goals of the company.
5. Given a team situation and a set of Undisclosed Curriculum requirements for a modern enterprise
business organization, students will be able to select appropriate network addressing solutions,
dynamic routing protocols, remote user and redundant service access technologies, and network
management hardware and software that meet project design requirements.
A. Describe network switch design and positioning in an enterprise campus network. Identify
and organize network factors, application characterization, and switching design
considerations for an appropriate enterprise campus Undisclosed Curriculum that meets the
organization's intelligent network requirements.
B. Design and illustrate an organization's enterprise campus functional area made up of the
campus building infrastructure, server farm, network management, and edge distribution
modules.
C. Identify and label designed campus network components by interface type, protocol,
bandwidth, and quality of service (QoS).
D. Identify network management devices and characteristics.
E. Determine whether to use in-band or out-of-band network management.
F. Select appropriate management hardware and software.
6. Given a team situation and a set of Undisclosed Curriculum requirements for a modern enterprise
business organization, students will be able to assess legal compliance; disaster recovery; and
security risks, threats, and vulnerabilities within each modular block of the enterprise composite
network model, develop performance specifications and plan for them.
10 -
7. Given a team situation and a business case for an enterprise business organization, students will
be able to use proper design concepts to select vendors, equipment, service-providers, and
develop a set of network blueprints and metrics to be used to create the network.
11 -
Content Outline: Suggested Time
Allocations
I. Review of LANs, WANs, Components and Protocols and Undisclosed Curriculum Process10%
A. Review definitions and networking
1. internetworking
2. protocol
3. The OSI Model
B. Review LAN principles
1. Physical network access
2. Data transmission types
C. Review WAN principles
1. Categories
2. Virtual circuits
3. Devices
D. Review internetwork addressing
1. MAC addresses
2. Network layer addresses
E. Review network device functionality
1. Hubs
2. Bridges
3. Switches
4. Routers
F. Review routed compared to routing protocols
G. Review the popular protocols
1. TCP/IP protocol suite
2. Netware
3. AppleTalk
4. IBM SNA
H. Discuss System Methodology
I. Discuss Service Characteristics
J. Discuss Performance Characeristics
12 -
C. Explain device requirements
1. Device types
2. Performance characteristics
3. Device location
D. Explain network requirements
1. Existing network and migration
2. Network management and security
E. Explain other requirements
1. Financial requirements
2. Enterprise requirements
3. Supplemental performance requirements
F. Explain how to gather and list the requirements for the new network
1. Determining initial conditions
2. Setting customer expectations
3. Taking performance measurements
4. Mapping device locations
G. Explain how to develop service metrics
1. Measurement tools
2. Where to apply service metrics
H. Explain how to develop RMA requirements
1. Reliability
2. Maintainability
3. Availability
I. Explain how to develop capacity requiements
1. Estimating data rates
13 -
IV. Network Architecture 20%
A. Describe the component architecture
1. Addressing/routing components
2. Network management components
3. Performance components
4. Security components
B. Explain the need to create a reference architecture
1. External relationships
C. Explain the different architectural models and how to use them
1. Topographical models
2. Flow-based models
3. Functional models
15 -
H. Compare network traffic patterns
1. 80/20 rule, 20/80 rule
2. Traditional vs. modern
I. Describe multicast traffic patterns
J. Describe QoS considerations for delay-sensitive traffic
1. QoS in LAN switches
2. Voice traffic across a switch
K. Discuss the building of access and distribution layers in a design
1. Access layer considerations port security, access speeds, traffic
classification on uplinks
2. Building distribution layer considerations performance, intelligent network
services, manageability and scalability
L. Discuss the campus backbone design
1. Layer 2 backbone design VLAN, Split layer 2 backbone design
2. Layer 3 backbone design reduced connections, flexible topology, multicast
and broadcast, scalable, intelligent
3. Split layer 3 design gigabit speeds, convergence, voice
M. Discuss server placement
1. Building access module
2. Building distribution module
3. Server farm
N. Discuss connectivity to the remainder of the enterprise network.
16 -
UNDISCLOSED CURRICULUM: Enterprise Undisclosed Curriculum with Laboratory
Laboratory Objectives:
2. Given an enterprise customer model and a set of top-down network analysis and design tools,
determine and document customer business and technical goals that meet technologies and
products that are consistent with an organizations structure, information flows, and platform
requirements. (TCO 2)
3. Given a diagram of a simple enterprise network, create and label the network diagram using basic
features of a Undisclosed Curriculum and modeling tool such as Visio. The basic features include
--identify, select, place, connect, and label both standards-based logical and vendor-specific
physical network icons used in Undisclosed Curriculum and modeling configurations. (TCO 3)
4. Given a diagram of a modular Undisclosed Curriculum model, such as the Cisco Enterprise
Composite Network Model (ECNM), create and label the model using advanced features of a
Undisclosed Curriculum and modeling tool such as Visio. Advanced features include setting and
modeling various protocols, packet sizes, and traffic flows among enterprise campus, enterprise
edge, and service provider edge modules making up the ECNM. (TCO 4)
5. Given a list of site locations for the selected enterprise customer, create and label a layer-2 logical
topology map using a Undisclosed Curriculum and modeling tool such as Visio. The design
includes a geographical map overlay, site locations, site-to-site connectivity, WAN services, and
traffic flow simulation. Include the design and supporting documentation in the UNDISCLOSED
CURRICULUM course proposal and design project paper. (TCO 5)
6. Given a completed business/technical analysis for the selected enterprise customer, plan and
illustrate a logical converged-Undisclosed Curriculum using a Undisclosed Curriculum and
modeling tool such as Visio. Design steps include --select, place, connect, address, and label
logical network components making up an Enterprise Composite Network Model. Include the
design and supporting documentation in the UNDISCLOSED CURRICULUM course proposal
project paper. (TCO 6)
7. Given a completed business/technical analysis for the selected enterprise customer, plan and
illustrate a physical converged-Undisclosed Curriculum using a Undisclosed Curriculum and
modeling tool such as Visio. Design steps include --select, place, connect, address, and label
physical network components making up an Enterprise Composite Network Model. Include the
design and supporting documentation in the UNDISCLOSED CURRICULUM course proposal
project paper. (TCO 7)
8. Given a completed business/technical analysis for the selected enterprise customer, plan and
illustrate a converged-Undisclosed Curriculum meeting requirements for security, compliance,
and disaster recovery using a Undisclosed Curriculum tool such as Visio. Include the design and
supporting documentation in the UNDISCLOSED CURRICULUM course proposal project
paper. (TCO 1,5,6,7)
17 -
8 and 15-Week Syllabus
Contact Information
Telephone:
Web Page:
Office Hours:
Course Description
Required Textbook
Network Analysis, Architecture, and Design 3rd Edition. James D. McCabe, Morgan Kaufmann Publishers
Copyright 2007, ISBN: 0-12370-480-4
Classroom access to Visio is required for enterprise Undisclosed Curriculum and modeling assignments.
- 18 -
Terminal Course Objectives (TCOs)
UNDISCLOSED CURRICULUM Enterprise Undisclosed Curriculum with Lab
1. Given a set of requirements for a modern enterprise business organization, diagram and simulate
network solutions consisting of functional modules and hierarchical layers with respect to
intelligent network services, protocols, and topologies students will be able to design an
Enterprise network solution.
2. Given a team situation and top-down Undisclosed Curriculum tools, students will be able to
analyze and document customer organizational and technical goals, policies, requirements, and
constraints as inputs to the Undisclosed Curriculum process.
3. Given a team situation and a set of Undisclosed Curriculum requirements for a modern enterprise
business organization, students will be able to select and design enterprise campus network
topologies consisting of multilayered modularity, geographical borders, existing traffic flows, and
planned application traffic flows.
4. Given a team situation and a set of Undisclosed Curriculum requirements for a modern enterprise
business organization, students will be able to design and connect the hierarchical and enterprise
composite network models into specific topologies that meet customer requirements.
5. Given a team situation and a set of Undisclosed Curriculum requirements for a modern enterprise
business organization, students will be able to select appropriate network addressing solutions,
dynamic routing protocols, remote user and redundant service access technologies, and network
management hardware and software that meet project design requirements.
6. Given a team situation and a set of Undisclosed Curriculum requirements for a modern enterprise
business organization, students will be able to assess legal compliance; disaster recovery; and
security risks, threats, and vulnerabilities within each modular block of the enterprise composite
network model, develop performance specifications and plan for them.
7. Given a team situation and a business case for an enterprise business organization, students will
be able to use proper design concepts to select vendors, equipment, service-providers, and
develop a set of network blueprints and metrics to be used to create the network.
19 -
Course Requirements and Policies
Attendance
Class attendance is critical to academic success. Attendance will be taken at the beginning of class
through the Attendance Tracking System (ATS). Students must scan their student ID into the ATS
during a 30 minute interval that begins 10 minutes before the start of class. Students will also
manually sign in at the start of class using an attendance form provided by the instructor.
Attendance and punctuality in the workplace is mandatory for long-term employment and advancement.
Building good attendance and punctuality habits while attending Undisclosed Curriculum will better
prepare you to enter the workplace.
Passing
A passing grade is required in both lecture and lab to successfully pass the course. The final lab grade
will count 14% of the course grade; however, a failing lab grade can result in a failing grade for the
course.
Lab Responsibilities
It is your responsibility to utilize lab time efficiently and to enhance your understanding of course
fundamentals by actively participating in all lab assignments. Failure to participate, excessive absences,
and failure to turn in assignments on time will result in a failing grade. Lab make-up papers will not be
accepted 7 days after the original due date. You are required to observe lab rules and regulations
pertaining to conduct, talking, safety, and equipment handling. It is your responsibility to sign the lab
attendance roster and scan-in, at the start of each lab. An official Student ID is required to scan in.
Library Resources
The library offers an excellent environment in which to study and perform research. Technical and
business books, journals, periodicals, CDs/DVDs, magazines, newspapers, and the Internet are available
to support classroom and laboratory learning. A set of Cisco books are available to supplement
UNDISCLOSED CURRICULUM. A Telecommunications Resource Sheet is available at the Librarys
front desk that provides a list of information resources that will help you locate research information for
your project. Library Hours: Monday through Thursday from 7:30 a.m. until 10:00 p.m.; Friday from
7:30 a.m. until 8:30 p.m.; Saturday from 10:00 a.m. until 4:00 p.m.; and closed on Sunday.
20 -
Undisclosed Curriculum Policy
Conduct
The Undisclosed Curriculum Student Handbook policies on conduct are to be followed at all times while
on campus. Policies are a part of every business organization and must be observed in the workplace as
well. Please review the Undisclosed Curriculum <campus state> Student Handbook.
Honor System
Professionalism, honesty, and integrity are values required of all Undisclosed Curriculum staff and
students. Cheating will not be tolerated. If someone is found cheating on an examination, an automatic
zero (0) will be assigned as a grade. This grade will not be replaced or dropped. Offenses will be
documented and reported so that further offenses are grounds for dismissal. Students are responsible for
promptly notifying their professor, or the deans department, whenever cheating is observed. Cheating
degrades our reputation in the business community and unfairly places honest, hardworking students at a
disadvantage. If you suspect cheating, report it!
Dropping Courses
Courses must be dropped by the appropriate date shown in the current term's schedule in order to be
shown as a W (Withdrawal) without penalty to your academic Grade Point Average (GPA). Courses
can only be dropped through the Academic Affairs Office. Students on the class roster after week 6 of the
accelerated term, will receive a grade.
Consecutive Absences
Please call the Registrar if you must be absent from class for more than one consecutive session. Failure
to notify the Registrar under these circumstances will result in your name being dropped from the
attendance roll. Successive failure to scan into ATS will result in an automatic drop.
Plagiarism
Using another person or authors ideas, words, expressions, findings, photographs, icons, images, charts,
or schematics in your research paper without acknowledging the source is a violation of the Academic
and Professional Conduct policy. A student who does not give appropriate credit, or reference, when
paraphrasing, quoting, or pasting anothers writings, whether bound or software, is guilty of plagiarism.
Any incident of plagiarism will result in a grade of 0 for the assignment. APA is the required style in
citing references for Undisclosed Curriculum undergraduate courses.
Additional Assistance
If you need academic help outside the classroom, you are encouraged to arrange tutoring through the
Academic Assistance Center (ASC). If you need personal counseling, the academic department will
advise you of available student counselors.
21 -
Testing and Grading
Test dates and content: Test dates are listed on the Course Guide Syllabus section of this document.
Test dates for in-classroom courses are subject to change at the discretion of the professor. Each test will
be developed from lecture content and lab exercises.
Do not be tardy on examination dates: Failure to report to class on time during testing disrupts other
students. Therefore, you must be present at the start of class to receive your test paper. Late arrivals will
have 5-points deducted on their paper. Online students must test with their authorized exam week.
Distractions in the classroom: Students cannot use cell phones, bring children into the classroom, or
disturb other students by excessive talking or loud behavior.
Distractions during testing: Students cannot (in addition to the above classroom distractions) leave the
room for any reason once a test starts; use a calculator or cell phone for viewing notes; leave any note(s)
or other subject materials in view; talk to other students; borrow supplies from another student; or enter
the classroom late.
Student questions during testing: In fairness to all students, the professor cannot answer student
questions related to the test once an exam starts. Students should review their test upon receiving it and
ask questions before the professor officially starts the test.
The final test is required by all students regardless of course average. The final examination is
mandatory. Students are required to take examinations on their scheduled test date no makeup tests
are administered.
Grading Process:
Source Grade % Early Reward Late Penalty
or Points
Quizzes 1 through 7 14% or 140 None Make-up tests will not be
administered.
Grade Index:
90 100 A
80 89 B
70 79 C
60 69 D
0 59 F
22 -
Diversity Statement
In accordance with Undisclosed Curriculum Universitys Mission Statement, we are a diverse college
community of life-long learners committed to promoting the acceptance and respect of individual
differences that are inherent in our college. Through standards of conduct and diversity training, we seek
an environment that will insure success, well-being and safety of our entire Undisclosed Curriculum
community.
We support fair, equal, and non-discriminatory treatment as a responsibility of all members of our
Undisclosed Curriculum community. It is our position to empower everyone at Undisclosed Curriculum
to be responsible for each other and to actively uphold these standards of conduct.
In support of this statement, students, faculty, staff, and all other members of the Undisclosed Curriculum
community are expected to respect diversity, which includes, but is not limited to age, disability, gender,
marital status, national origin, race, religion, and sexual orientation.
23 -
Undisclosed Curriculum University
Syllabus for Course UNDISCLOSED CURRICULUM Enterprise Undisclosed Curriculum with
Lab (Retired) - Ignore
Customer Research and Analysis Paper due (see template in Doc Sharing)
Identifying Customer and Technical Requirements and Constraints Matrix due (see
template in Doc Sharing)
24 -
Week 6: Terminal Course Objectives: 1, 4
Lab 6: Using IT Guru to Design and Label the Hierarchical Network - (Figure 3-
26, page 176)
Lab 11: Using IT Guru to Design the Logical Converged Enterprise Network for the Project
Customer.
25 -
Week 12: Terminal Course Objectives: 1, 5,6,7
Lab 12: Using IT Guru to Design the Physical Converged Enterprise Network for the Project
Customer.
Lab 13: Using IT Guru to Design the Project Customers New, Converged LAN/WAN Network
(Resume Lab 11 & 12 logical and physical topologies)
26 -
UNDISCLOSED CURRICULUM Standard 15-Week Course Outline (Retired) - Ignore
2 Applying Design Principles in Network Deployment Read chapter 2 2 Lab 2: Introduction to OPNET IT Guru Tutorial 2
3 Applying Design Principles in Network Deployment Read chapter 2 2 Lab 3: Using IT Guru to Design the Hierarchical Network Model 3
Test 1 Weeks 1-3 Test 1
Lab 4: Using IT Guru to Design the Enterprise Composite Network Model (Figure 3-8, page 131)
4 Structuring and Modularizing the Network Read chapter 3 1,3 3
Identifying Customer and Technical Requirements and Constraints
Matrix due (see template in Doc Sharing)
Lab 5: Using IT Guru to Design the Enterprise Edge Functional Area (Figure 3-12, page 138)
5 Structuring and Modularizing the Network Read chapter 3 1,3 4
Lab 6 Lab 6: Using IT Guru or NetCracker to Design the Hierarchical Network - (Figure 3-26, page 176)
6 Basic Campus Switching Design Considerations Read chapter 4 1,4 4
Lab 7: Using IT Guru to Design Remote Access Connection Requirements (Figure 5-6 page 277)
7 Basic Campus Switching Design Considerations Read chapter 4 1,4 4
Test 2 Weeks 4-7 Test 2
Lab 8: Using IT Guru to Design Permanent Secondary WAN Link (Figure 5-9 page 286)
8 Designing WANS Read chapter 5 1,5 5
Lab 9: Using IT Guru to Design a Traditional versus Converged Undisclosed Curriculum (Figure 8-11
page 463 & Figure 8-13 page 455)
9 Designing WANS Read chapter 5 1,5 5
Lab 10: Using IT Guru to Design the Customers Layer 2 Topology Map
10 Designing Networks for Voice Transport Read chapter 8 1,6 5
Lab 11: Using IT Guru or NetCracker to Design the Logical Converged Enterprise Network for the
11 Designing Networks for Voice Transport Read chapter 8 1,5,6,7 Project Customer. 6
Test 3 Weeks 8-11 Test 3
Lab 12: Using IT Guru to Design the Physical Converged Enterprise Network for the Project Customer. 7
12 Evaluating Security Solutions for the Network Read chapter 9 1,5,6,7
Lab 13: Using IT Guru to Design the Project Customers New, Converged LAN/WAN Network (Resume
and complete Labs 11 & 12 of the logical and physical designs)
13 Evaluating Security Solutions for the Network Read chapter 9 1,5,6,7 6,7
14 Team Presentations Course Project Papers due none All Team Presentations All Teams No Exceptions All
Test 4 (no
15 Final Exam - All Weeks makeup All Final Exam All
- 27 -
Undisclosed Curriculum University
Syllabus for Course UNDISCLOSED CURRICULUM Enterprise Undisclosed Curriculum with
Lab
Chapter 1: Introduction
28 -
Week 6: Terminal Course Objective: 6
29 -
Undisclosed Accelerated 8-Week Course Outline
- 30 -
Topic
Week Class Assignments TCO(s) Lab Assignment Lab Obj.
Requirements Analysis:
Lab 2: Milestone 1 Network Segmentation
Concepts and Process 2 Read chapters 2 and 3 2 2
Flow Analysis
3 Read chapter 4 3 Lab 3: Milestone 2 Network Data Flow Tables 3
Network Architecture 4 Read chapter 5 4 Lab 4: Milestone 3: Network VLAN Design Template 4
Undisclosed Curriculum 7 Read chapter 10 7 Lab 7- Milestone 6: Undisclosed Curriculum Lab Report
7
31 -
Final Exam - All Weeks 8 Final Exam (no makeup Test) All
32 -
Appendix A
UNDISCLOSED CURRICULUM - Enterprise Undisclosed Curriculum with Lab
Course Project Proposal Guidelines
Project Introduction:
Modern enterprise networks are becoming increasingly complex and much more integrated into the
enterprises they serve. With the growth of the Internet, groupware, and other connective technologies and
applications, Information Systems, including networks, are increasingly embedded into the basic structure
of the modern business. Integration of voice, data, and imaging over one network infrastructure enables
employees, suppliers, vendors, and customers to efficiently access corporate information on a global
scale.
Enterprise Undisclosed Curriculum with Lab, UNDISCLOSED CURRICULUM, is the capstone course
for the networking series. Your lecture and lab experience with network operating systems, LAN/WAN
technologies, converged networks, wireless networks, and network protocols such as TCP/IP and its
various services prepares you to design a state-of-the-art, enterprise network infrastructure. Your
infrastructure allows immediate communications, and data access, to business stakeholders so that they
may effectively, efficiently, and quickly analyze and resolve complex business issues.
By researching an enterprise size company and analyzing its global infrastructure, the CCDA approach
can be used to develop reliable, scalable, and secure mission critical information systems that can quickly
share data among valuable stakeholders.
A project paper and PowerPoint presentation are the required outcomes of your research project effort. An
enterprise size company is one whose geographical displacement covers multiple states and can include
overseas sites. Local enterprises do not qualify for UNDISCLOSED CURRICULUM. At a minimum, an
enterprise company should be regional in scope and consist of 500 computing devices at a minimum.
Project research teams, formed in week 1 --see the week 1 threaded discussion on Joining a project
team --select an enterprise-wide company using Hoovers.com. The team works as a Undisclosed
Curriculum team to migrate their project customer into a state-of-the-art, converged network. Teams
formally document their Undisclosed Curriculum in a proposal paper, and simulate their network model
using OPNET IT Guru Design and Simulation software. Final project papers are due in the Dropbox by
midnight on Sunday of week 7:
Each team will elect a Team Leader who is responsible for assigning, coordinating, and leading
the team effort through to completion. The team leader should email the professor with a team
name and its member names by the end of week 1.
Each team is responsible for providing a project status report to the professor every two weeks.
Status reports should be emailed to the professor. Team members should rotate this responsibility.
A status report consists of one to two lines of status information, e.g. team one is on track; team
one completed the required templates for week 2; etc..
- 33 -
Team members are expected to pull their fair share of the project load. A team member who does
not produce as expected can be expelled from the team by a majority-vote of all team members.
Using the textbook, complete an enterprise composite network model of corporate headquarters
and a campus design for a branch. One diagram should be completed for each headquarters and
a branch location. All branches will follow the master branch design (boilerplate) for network
consistency.
In modeling your enterprise-size company, different sites may use different Data Link Layer 2
protocols. Adhere to definitions for segment, LAN, building network, campus network, remote
access, WAN, and enterprise network infrastructures. Examine the interconnection of various
protocols, speeds, interfaces, and media in the network. Do not forget the voice component in
your design.
Research network components, architectures, and topologies using publications, library resources,
and authentic Web sites (cisco.com, 3com.com, lucent.com, avaya.com, nortel.com, madge.com),
and other product information sources including technology white papers.
Research and cite IEEE, EIA/TIA, ITU-T, cert, and other standards for transport, cabling,
security, and protocols.
Use and document at least 5-references used in your research references must be hardcover
textbooks, technical magazines/newspapers, journal sources, or authentic web sites. Include a
References page in your proposal paper.
Write a professional, neat, and accurate project paper. You will be strictly evaluated on grammar,
sentence structure, spelling, and formatting, as well as technical and schematic accuracy. Be sure
to proof-read your final paper for typos, proper APA in-text citations, grammar, sentence logic
flow, and paragraph clarity. Use a Proposal format for your paper. Errors are easy to fix and
costly to your final grade proof read and correct errors!
Use APA guidelines and rules (see below) to reference works used, to ground your technical
assertions; to show the source used for schematics and diagrams that you did not create; and
cite product photographs pasted into your paper from vendor sites.
34 -
To avoid plagiarism, see the syllabus for Undisclosed Curriculum Online help on avoiding
plagiarism. These rules apply for all graphic images, diagrams, charts, or other borrowed
information from vendor or technical web sites that are cut and pasted into your proposal body or
appendix.
Complete a thorough OPNET IT Guru diagram showing the OLD network architecture Layer 2
Topology design only with appropriate labeling.
Complete a thorough OPNET IT Guru diagram showing the NEW network architecture both
logical and physical designs including services, speeds, addresses, naming conventions,
protocols, layers, and other pertinent information.
Create a professional PowerPoint slide presentation to supplement your oral presentation use a
minimum of 10 slides. Include an introduction slide that serves to introduce your team and shows
each members assigned project task.
Deposit your project proposal and power point presentation in the week 7 Dropbox for Project
Paper and Project Presentation. Ensure that your team names and titles are on the cover page,
and power point slide, along with your project customer name, course title, professor name, and
date. Papers should be placed in the Dropbox by Sunday midnight MT in Week 7.
1. Title Page
Topic title
Course name
Course number
Course session
Team leader name
Team member names
Date submitted
2. Table of Contents
List each section in order of the proposal content
List each page number across from each section name
3. Executive Summary
One-page double-spaced
Should be the last page written after RFP is completed
Written to the CEO, President, or CFO of the company
Explain how your proposal helps the company meet, or exceed, its company mission
statement, goals, objectives, and budget
4. Introduction
One-page double-spaced
Should be written after all technical documentation is completed
Written to the technical and financial management
Explain exactly what you design solution does in technical terms
35 -
5. Body
20 - 40 double-spaced pages in actual body
Each section starts a new page with the section header at the top of the page
Use APA Reference Style to cite in-text citations for referenced sources in the form of:
(authors last name, date, page number or numbers)
Each section should reflect the chapter topic found in the text:
Customer introduction and profile
Customer goals and constraints
Technical goals and constraints
Existing Undisclosed Curriculum analysis
Technical goals and constraints of new network
New Undisclosed Curriculum analysis, including security
Implementation schedule (use MS-Project)
Testing plan
Project budget, cost/benefit analysis, and/or Return on Investment (ROI)
Detailed materials summary page with cost per unit and total cost
Detailed components and parts summary page
Physical diagram of existing (old) Undisclosed Curriculum(OPNET IT Guru
diagram)
Logical and physical diagrams of new Undisclosed Curriculum(OPNET IT
Guru diagram)
6. Conclusion
One page double-spaced
The conclusion page is used to close the sale
Summarize the benefits to the company that your solution/implementation provides
7. References
Reference page must reflect the APA Reference Style
List at least five references
8. Appendix
Physical NetCracker design of existing (old) network
Logical NetCracker design of new network
Physical NetCracker design of new network
Charts
Graphs
Photographs
Other supplemental information
36 -
Costs and ROI (include recurring and non-recurring costs)
Materials and parts used
Conclusion
1. Project papers must be written in black ink using a word processing application.
2. A consistent font size (no smaller that 12 pt) and type must be used for titles, headers, paragraph,
and chart contents.
5. All written material must be in your own words do not cut and paste from other written
sources.
6. Make sure the cover page is viewable with your team name, team number, course name, course
number, session number, and date.
8. To avoid plagiarism, see the syllabus. Rules apply to all graphic images, diagrams, charts, or
other borrowed information from vendor or technical web sites that are cut and pasted into your
proposal body or appendix.
37 -
Example of More Than One Author
Nichols, R., & Lekkas, P. (2002). Wireless security, models, threats, and solutions. New York,
NY: McGraw-Hill.
Weisenmiller, E. M. (1995). The impact of the Macintosh PowerPC on the prepress industry of
the southeastern United States. Retrieved June 7, 1999 from the World Wide Web: http://teched.vt.edu/
ElectronicPortfolios/Weisenmiller.ep/Thesistoc.html
38 -
Appendix B
UNDISCLOSED CURRICULUM Enterprise Undisclosed Curriculum with Lab
Customer Research and Analysis Template
You customer research and analysis page(s) will identify the organization chosen for your Undisclosed
Curriculum project. Specific requirements are found in the CCDA Self-Study text book in chapter 2. Each
section should be completed. Remember to cite your references to avoid plagiarism.
Financial Analysis Three to four year view of revenues, expenses, profits/earnings, stock performance,
etc. (use a MS-Word chart do not cut and paste). (Hoovers.com or companys web site)
This report is used by the professor to track each groups research project progress. It is to be used by
each team as a guide for starting the project paper. Failure to submit this section could result in 10 points
off your final project paper grade. Do not cut and paste any section use you own wording with MS-
Word, MS-Excel, etc. Submit one report per team. Your document will become the first section in the
body of your project proposal paper.
- 39 -
Appendix C
Undisclosed Curriculum Project Templates
Customer and Technical Decision Matrix Template
- 40 -
Undisclosed Project Templates
Customer and Technical Decision Matrix Template
Table 2-18 Decision Table Template Use as required for other decisions
Options
Required Required Required Required
Parameters Parameters Parameters Parameters
Parameter
Parameter
Parameter
- 41 -
Appendix D
Example UNDISCLOSED CURRICULUM Test
1. (1.0 point)
Match the role of each layer in the hierarchical network model to its name.
[a] 1. Core
[b] 2. Access
[c] 3. Distribution
a. High-speed data transport
b. Local and remote user entry into the network
c. Policy based connectivity
2. (1.0 point)
True or false: Each layer in the hierarchical network model must be implemented with distinct physical
devices.
a. True
*b. False
3. (1.0 point)
Name three features of a Layer 3 switch when used in the access layer?
4. (1.0 point)
Which two statements are true?
*a. UplinkFast immediately unblocks a blocked port after root port failure.
*b. PortFast immediately puts a port into the forwarding state.
c. UplinkFast immediately puts a port into the forwarding state.
d. PortFast immediately unblocks a blocked port after root port failure.
5. (1.0 point)
Which layer in the hierarchical model provides media translation?
a. access layer
*b. distribution layer
c. core layer
d. broadcast layer
- 42 -
6. (1.0 point)
What are three roles of the hierarchical model's core layer?
7. (1.0 point)
Briefly explain what the distribution layer needs in order to redistribute between routing protocols?
Correct Answer:
The distribution layer can redistribute between bandwidth-intensive access layer routing protocols (RIP)
and optimized core routing protocol (OSPF). Redistribution allows the access layer and core layers to
share routing information.
8. (1.0 point)
Briefly explain the benefit of using Layer 3 switching in the core network layer?
Correct Answer:
Layer 3 allows the full use of all redundant links and load balancing.
9. (1.0 point)
Select the functional areas in the Enterprise Composite Network model?
43 -
12. (1.0 point)
The Service Provider Edge functional area is composed of which modules?
a. PSTN module
b. WAN module
c. X.25 Packet Switched module
*d. Frame Relay and ATM module
e. ISP module
Correct Answer:
The Enterprise Composite Network Model allows that Undisclosed Curriculumer to focus only on a
selected module and its functions at one time. Network solutions and intelligent network service can be
described on a per-module basis and validated as part of the complete enterprise Undisclosed Curriculum.
15.(1.0 point)
Briefly explain the Campus Backbone submodule's role?
Correct Answer:
The campus backbone submodule interconnects the building access and distribution submodules with the
server farm, network management, and edge distribution modules.
a. E-commerce module
b. Internet Connectivity module
c. Remote Access and VPN module
d. Remote Access and VPN module
e. Internet Connectivity module
44 -
17.(1.0 point)
Briefly explain the role of the Service Provider functional area?
Correct Answer:
The Internet Service Provider functional area enables communications with other networks using different
WAN technologies and with ISPs.
a. Service
b. Solution
c. Solution
d. Service
e. Service
f. Service
g. Solution
Correct Answer:
The Network Management module security functions include syslog; authentication, authorization, and
accounting (AAA); and One Time Passwords (OTP).
a. Load-balancing
*b. Redundancy
c. Bandwidth
d. Queuing
e. Jitter
Correct Answer:
Redundant routes minimize the effect of link or device failures and provides load-balancing when all
routes are up.
45 -
22. (1.0 point)
A full mesh design is ideal for connecting a ________ number of devices.
*a. Small
b. Medium
c. Large
e. Extra Large
*a. True
b. False
*a. IP Phones
b. Analog Phones
*c. Router with voice ports or Gateway
*d. Gatekeeper
*e. Switch with in-line power
Correct Answer:
The Building Access submodule provides connectivity of IP Phones into Layer 2 switches with in-line
power and packet classification capabilities.
Correct Answer:
The existing infrastructure should be evaluated for performance, availability, features, and capacity.
Correct Answer:
Content networking is important in modern networks for ensuring that the large amount of data and its
variety within network content servers take advantage of optimal network resources when moved across
the network.
46 -
28. (1.0 point)
Which content networking function directs a user request to the optimal resource within a global network
based on user-defined policies?
a. E-Commerce module
b. ISP module
c. WAN module
d. Internet Connectivity module
*e. Server Farm module
a. access layer
b. distribution layer
*c. core layer
d. broadcast layer
47 -
Appendix E
UNDISCLOSED CURRICULUM with Lab
Student Assessment Test
Name: Date:
1. Define ISDN PRI
3. Bandwidth of OC-1
6. Bandwidth of DS-0
8. Bandwidth of T-1
20. On which OSI Layer is the physical media (fiber optics, air, cable)?
- 48 -
Appendix F
Course Project Proposal Grading Form
Team Names Date Grade
1. Paper met research topic and proposal guidelines for assigned content including
adequate number of pages (20 points)
Selected an appropriate enterprise project customer using Hoovers.
Followed project guidelines for proposal provided with syllabus.
Included all required proposal sections as listed in guidelines.
Included an adequate number of pages in body.
Included all required schematics, charts, graphs, photos in appendix.
Delivered oral and written presentation including professional slides.
2. Paper met technical content requirements for CCDA model both written and design (20
points)
Presented a written proof that adhered to CCDA DESGN solution(s).
Designed and implemented a technically accurate network solution.
Provided a modular approach via Enterprise Composite Network Model.
Simulated new Undisclosed Curriculum using software Design/Simulation.
Included both a logical and a physical Undisclosed Curriculum.
Included all required labels, protocols, speeds, interfaces, addresses.
Included hierarchical topology with core, distribution, access layers.
Included an adequate IP addressing and component naming model.
Included job aids, decision charts, and other rationale in solution.
Completed all written, design, and presentation project requirements.
3. Paper contained neat type, legible content, and clear graphic illustrations (10 points)
Prepared written content using a quality word-processing application.
Consistent font style and type used throughout paper.
Prepared charts, tables, and other statistical forms using a quality word-
processing/software application.
Prepared clear and easily interpreted graphic illustrations.
Other .
4. Paper written in professional business style, used correct grammatical content, and
displayed evidence of a final proof reading to assure quality (10 points)
Utilized business style writing with appropriate grammatical content.
Utilized headers and spaced paragraphs to facilitate reading.
Checked for correct spelling and proofed for grammatical errors/typos.
Prepared individual pages for each section
Displayed quality format, preparation, and assembly
Other .
5. Paper used APA style guidelines, and references page, for crediting original sources of
text, charts, graphics, and other information borrowed through research effort (20 points)
Proper APA style used for citing in-text sources (author,date,page).
Proper APA style used for citing web sites including retrieval date.
Proper APA style used for citing imported photos, charts, and graphics.
Proper APA style used for References page with at least 5 references
- 49 -
End of UNDISCLOSED CURRICULUM Guide
- 50 -