|
Cisco Instructor training Program on CCNA Module 1 & 2
|
7th – 18th December 2015
|
|
|
A two week “Cisco Instructor Training Program” was organized by Amity University , Nodia on “CCNA Module ( 1 & 2 )” from 07th to 18th, December 2015. Ms.Priyanka Upadhyay (Assistant Professor, Applied Sciences), Ms. Priyanka Sandeep (Assistant Professor, Information Technology ) and Ms. Gunjeet Kaur (Assistant Professor, Electronics & Communication) departments of Dronacharya Group of Institutions , Greater Noida, had participated in the two week Cisco instructor training program. |
|
The main objective of the program was to make the trainees aware about CCNA Module (1 & 2) so that they can prepare students for the certification. |
|
Day 1 : 7th December 2015 |
|
On the first day the introductory session was taken by Mr. Naresh Kumar, CISCO, Regional Networking Academy, where he introduced the course and its details. He explained about hierarchy of the training centers like ASC, QA, RA, ITC and procedure to create a course from Netspace, how to enroll students for a course, how to publish a course and how instructor should access resources. |
|
After that trainees were given chance to create course and enroll students using their own netspace and explained how to allocate time for exams, how to use activation tools and how to manage activations. Again Mr. Naresh Kumar started with the explanation of first chapter “Explore the Network- CCNA”, where topic was Network as a platform. Next session was conducted by Mr. Sanjeet, who instructed the trainees to download packet tracer software and work on it. He explained the functions of all tabs inside the tracer.
|
|
Day 2 : 08th December 2015 |
|
On the second day, Mr. Naresh Kumar discussed on “Security”, which include how to protect network from unauthorized access. He explained about networking trends like BYOD, online collaboration, cloud computing and technology trends, power line networking, security threats, security solutions, additional solutions etc. Network Security is the process of taking physical and software preventative measures to protect the underlying networking infrastructure from unauthorized access, misuse, malfunction, modification, destruction, or improper disclosure, thereby creating a secure platform for the users and programs to perform. |
|
Mr. Naresh then explained about “Network Protocols and Communications”. Here communication medium, rules establishment, message formatting and encapsulations, message delivery options and protocol suite and message segmentation were discussed in detail. In the next session Mr. Sanjeet Kumar explained about physical layer protocols, Ethernet, Sub - layer, Medium Access Control, Frame processing, frame attributes, switching topics in chapter 5. |
|
Day 3: 09th December 2015 |
|
Mr. Sanjeet conducted the third day session by introducing “Network Layer“. He explained that the network layer is responsible for packet forwarding including routing through intermediate routers, since it knows the address of neighboring network nodes, and it also manages quality of service (QoS), and recognizes and forwards local host domain messages to the Transport Layer. |
|
He further explained how network layer protocols and services support communications across data networks, how routers enable end - to - end connectivity in a small - to - medium - sized business networks, how to determine the appropriate device to route traffic in a small - to - medium - sized business network and how to configure a router with basic configurations. |
|
Next session was conducted by Mr. Naresh Kumar on “Internet Protocol Address (IP address)”. An IP address is a numerical label assigned to each device computer participating in a computer network that uses the Internet Protocol for communication. He discussed how to describe the structure of an IPv4 address, purpose of the subnet mask, comparison of the characteristics and uses of the unicast, broadcast, multicast IPv4 addresses., need for IPv6 addressing , types of Ipv6 network, usage of ping and traceroute utilities to test network connectivity. |
|
In the end of the third day he explained about the subnetting IP networks. He explained why routing is necessary for hosts on different networks to communicate. IP as a communication protocol is used to identify a single device on a network and how to calculate the number of host addresses available in order to accommodate the requirements of network. |
|
Day 4 : 10th December 2015 |
|
On fourth day session was taken by Mr. Naresh Kumar on “Transport Layer”. Transport layer is conceptual division of methods in the layered architecture of protocols in the network stack in the Internet Protocol Suit and Open Systems Interconnection (OSI). The protocols of the layer provide host-to-host communication services for application and services such as connection - oriented data stream support, reliability, flow control, and multiplexing. |
|
His next session was on “Application layer”. Application layer contains communication protocols and interface methods which is used in process to process communications across an Internet Protocol (IP) computer network. In the end Mr. Sanjeet elaborated Network Securtiy, mitigating network attacks and managing loS configuration files. |
|
Day 5 : 11th December 2015 |
|
Mr. Sanjeet started with the introduction of “IOS (originally Internetwork Operating System)” on the fifth day. He explained that IOS is software used on most Cisco Systems routers and current Cisco network switches. IOS is a package of routing, switching, internetworking and telecommunications functions integrated into a multitasking operating system. All Network devices come with default OS. He explained Access to Internet can be of two types CUI and GUI. CUI (character user interface or command-line user interface) is a prompt used to interact with computer programs. It works by allowing the user (client) to issue commands as one or more lines of text (referred to as command lines) to a program. GUI (Graphic user interface ) on other is a type of interface that allows users to interact with electronic devices through graphical icons and visual indicators such as secondary notation, as opposed to text-based interfaces, typed command labels or text navigation. |
|
Mr. Sanjeet further discussed about access methods into routers such as Console, Telnet and SSH and how to work on hyper terminal. HyperTerminal is a program that you can use to connect to other computers, Telnet sites, bulletin board systems (BBSs), online services, and host computers, using either your modem, a null modem cable or Ethernet connection. |
|
Day 6 : 12th December 2015 |
|
On sixth day, session was conducted by Mr. Naresh Kumar who introduced “Routing and Switching”. Routing is the process of selecting best paths in a network. Routing is a process which is done between two networks using IP addresses. On the other hand Switch is a device that channels incoming data from any of multiple input ports to the specific output port that will take the data toward its intended destination. |
|
He started with “Introduction to Switched Networks” and explained how to describe convergence of data, voice and video in context of switched networks. He explained the process of frame forwarding in switched network and comparison of collision domain to broadcast domain. |
|
In the end Mr. Naresh Kumar discussed about the packet tracer activity on configuration of routers, switches, PCs, subnetting , secure shell configuration and how to back up tftp files. He further resolved the queries of participants. |
|
Day 7 : 14th December 2015 |
|
There was a “Practical Skill Assessment” on seventh day. Online assignment on skill assessment was given to participants who were to complete same in stipulated time period. A Network scenario with certain detail was given to them and participant were to design the network and configure entire devices as per documentation. |
|
In the afternoon “Teach Back” session was conducted. Each of the participants were given chapter on which they had to prepare lectures and give presentations within half an hour, which enable participants to revise all concept so far introduced. |
|
Day 8 : 15th December 2015 |
|
On the eighth day, session was taken by Mr. Sanjeet on “Cisco Switches”. A switch is a device in a computer network that electrically and logically connects together other devices. Multiple data cables are plugged into a switch to enable communication between different networked devices. Mr. Sanjeet explained about network access layer issues like commands for implementing secure access, MAC address flooding and DHCP spoofing in network access layer. |
|
In computer networking, MAC flooding is a technique employed to compromise the security of network switches. Switches maintain a MAC Table that maps individual MAC addresses on the network to the physical ports on the switch. DHCP snooping is a security feature that acts like a firewall between untrusted hosts and trusted DHCP servers. The DHCP snooping feature performs the following activities, Validates DHCP message received from untrusted sources and filters out invalid messages. |
|
In the next session topic VLAN segmentation was discussed. VLAN Segmentation is one way of breaking a larger network into smaller sections is by implementing VLANs. VLANs allow an administrator to segment networks based on factors such as function, project team, or application, without regard for the physical location of the user or device and benefits for the organization in terms of security, cost reduction, better performance and improved IT staff efficiency. He further explained about types of VLAN, Voice VLAN and how VLAN trunks are created. |
|
In the end inter VLAN routing was shown practically and were given scenario to design and configure VLANs and to troubleshoot them. |
|
Day 9 : 16th December 2015 |
|
Ninth day session started with the discussion on “Static Routing”. Static routing is a form of routing that occurs when a router uses a manually - configured routing entry, rather than information from a dynamic routing traffic. Dynamic routing, also called as adaptive routing, describes the capability of a system, through which routes are characterized by their destination, to alter the path that the route takes through the system in response to a change in conditions. Different type of routing protocol and its characteristics, classification of dynamic routing protocols, functions of a router , characteristics of network , was explained in details along with configuration and verification commands. |
|
In the end the participant were given scenario to configure all router interfaces and use proper routing configuration as per given documents. |
|
Day 10 : 17th December 2015 |
|
On the tenth day, session was conducted by Mr. Sanjeet on “Access Control Lists”. An Access Control List (ACL), is a list of permissions attached to an object that specifies which users or system processes are granted access to objects, as well as what operations are allowed on given objects.. Each entry in a typical ACL specifies a subject and an operation. He explained in details how ACLs are used to filter traffic and comparison standard and guideline for creating ACLs. He further added how to configure standard IPv4 ACLs to filter traffic according to networking requirement and how to modify a standard IPv4 ACL using sequence numbers. |
|
In the next session Mr. Sanjeet explained “Dynamic Host Configuration Protocol (DHCP)”. DHCP is a client / server protocol that automatically provides an Internet Protocol (IP) host with its IP address and other related configuration information such as the subnet mask and default gateway. He described the operation DHCPv4 in a small to medium sized business network, configure a router as DHCPv4 server and configuration of a router as DHCPv4 client, troubleshooting a DHCP configuration for IPv4 in a switched network. |
|
In the end, he discussed about “Network Address Translation (NAT) for IPv4”. NAT is a methodology of remapping one IP address space into another by modifying network address information in Internet Protocol (IP) datagram packet headers while they are in transit across a traffic routing device. The technique was originally used for ease of rerouting traffic in IP networks without renumbering every host. |
|
He explained about characteristic of NAT, the benefits and drawback of NAT, how to configure static and dynamic NAT and PAT using the CLI. Port Address Translation (PAT), is an extension to network address translation (NAT) that permits multiple devices on a Local Area Network (LAN) to be mapped to a single public IP address. The goal of PAT is to conserve IP addresses. |
|
Day 11 : 18th December 2015
|
|
On the last day, there was exam on CCNA module in the first session, in which all the participants successfully cleared the test. In the next session Mr. Sanjeet showed Cabling of Unshielded Twisted Pair (UTP) wire of T568A and T568B. He further resolved the queries of participants from all the modules and live network scenario were configured using 2 Cisco Routers and 1 Switch using PCs. |
|
Two week “Cisco Instructor Training program” was completed successfully, which was highly informative and interactive for the participants. In the end Mr.Sanjeet and Mr.Naresh distributed the certificates to all the participants. |
|
Some Glimpses: |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Click here to View Events & Seminars 2015 |
|
|
|
Click here to View Events & Seminars 2014 |
|
|
|
Click here to View Events & Seminars 2013 |
|
|
|
|
|