Base Knowledge
Previous completion of the following course unit is recommended:
- Computer Networks I
Teaching Methodologies
The following teaching methodologies are used in this course unit:
1. Expository method: explanatory method where theoretical foundations and concepts are presented by the teacher and discussed with the class. Concepts and information will be presented to students through, for example, slide presentations or oral discussions. It will be used in classes to structure and outline the information.
2. Demonstrative method: based on the example given by the teacher of a technical or practical operation that one wishes to be learned. It focuses on how a given operation is carried out, highlighting the most appropriate techniques, tools and equipment. It will be used, for example, in practical and laboratory classes.
3. Interrogative method: process based on verbal interactions, under the direction of the teacher, adopting the format of questions and answers. It allows for greater dynamics in the classroom and consolidates learning. It will be used, for example, to remember elements of previous classes and in revisions of the lectured content.
4. Active methods: pedagogical techniques will be used in which the student is the center of the learning process, being an active participant and involved in his own training. The teacher assumes the role of facilitator, stimulating critical thinking, collaboration, creativity and student autonomy. They will be applied in classes to achieve a dynamic and more lasting learning environment.
Learning Results
At the end of the course unit the student will be able to:
1. Identify the steps involved in device configuration. Describe the role of switches in a network. List the steps in the switch boot sequence. Interpret the meaning of various switch LED indicators. Describe the steps involved in system crash recovery. Configure SVI on a switch for management purposes. Configure switch ports according to network requirements. Explain the input and output errors on switch network interfaces. Describe the role of routers in a network. Configure router interfaces to meet specific network requirements. Use troubleshooting commands to check the status of interfaces and routes. Implement secure remote access solutions in a network environment. Configure SSH on network devices to enable secure remote management.
2. Describe the role of switching in a network. Explain how the MAC Address Table is populated and used in frame forwarding. Explain the different approaches to forward frames based on MAC addresses. Identify the differences between collision domains and broadcast domains. Summarize the purpose and benefits of using VLANs. Describe how VLANs operate across multiple switches. Explain the characteristics and uses of various VLAN types. Synthesize the process and purpose of VLAN tagging with IEEE 802.1Q. Configure VLANs on a network switch. Analyse the role and function of VLAN trunks in a network. Explain how DTP facilitates the creation of trunk links. Summarize how inter-VLAN routing operates. Configure router-on-a-stick to enable inter-VLAN routing. Configure inter-VLAN routing on a Layer 3 switch. Discuss methods for troubleshooting inter-VLAN routing problems.
3. Illustrate the basic operations of STP in a switched network. Explain the issues in a Redundant L2 Switched Network such as broadcast storms, multiple frame copies, and loops. Analyse the function of each STP port role. Compare the features and improvements of the different STP versions to determine appropriate use cases. Describe how EtherChannel operates to increase bandwidth and provide redundancy through link aggregation. Discuss how EtherChannel bundles multiple physical links into a single logical link. Justify how PAgP and LACP facilitate the formation and management of EtherChannel using dynamic negotiation. Configure EtherChannel on switches. Discuss troubleshooting techniques for resolving EtherChannel problems.
4. Explain the purpose of DHCPv4 protocol in a network. Illustrate the DHCPv4 operation using network simulation tools. Configure a DHCPv4 server in a network environment. Configure a device to act as a DHCPv4 client. Configure a DHCPv4 relay agent to facilitate DHCP communication across different subnets. Define SLAAC (Stateless Address Autoconfiguration) and DHCPv6 (Dynamic Host Configuration Protocol for IPv6). Explain the function of each type of ICMPv6 message. Identify the significance of the A (Autonomous), O (Other), and M (Managed) flags in RA messages. Configure devices to use SLAAC, Stateless DHCPv6, or Stateful DHCPv6 for IP address assignment. Argue the purpose and operation of DAD in IPv6. Configure a DHCPv6 server, client and relay agent. Justify the importance of FHRP in network redundancy. Analyse the characteristics and differences between various FHRP protocols. Configure HSRP on routers to enable failover and redundancy.
5. Explain the role of Network Address Translation (NAT) in IPv4 networks. Describe how NAT modifies IP addresses in packet headers. Identify the limitations of the IPv4 address space. Define key NAT terms such as inside local, inside global, outside local, and outside global. Compare the different types of NAT to determine their advantages and limitations. Explain how NAT enhances network security and address efficiency. Configure static NAT on network devices to provide fixed address translations. Implement dynamic NAT configurations to manage IP address allocation dynamically. Configure PAT using both a single IPv4 address and an address pool to optimize address usage. Explain how NAT64 facilitates communication between IPv6 and IPv4 networks.
6. Illustrate the importance of network security in protecting data and systems. Identify current trends in cybersecurity. List different types of threat actors (e.g., hackers, insiders, hacktivists, state-Sponsored). Identify common tools used by threat actors (e.g., malware, phishing kits). Describe the characteristics and behaviors of various types of malware. Define Access Control Lists (ACLs). Describe how ACLs can be used to filter traffic and enhance security. Explain how wildcard masks are used to specify network and host addresses in ACLs. Identify the best practices for designing and implementing ACLs. Classify the different types of IPv4 ACLs. Configure IPv4 ACLs to filter traffic. Define Virtual Private Networks (VPNs). Discuss how VPN technology ensures secure and private communication over public networks. Explain the use cases and benefits of site-to-site and remote access VPNs. Explain the components and operations of IPsec in securing VPNs.
7. Describe the principles of switch security in a network. Configure port security on a switch by defining a MAC addresses limit, aging times, and violation modes. Explain how IEEE 802.1x protocol and AAA servers operate to provide access control in a network. Discuss the risks associated with various Layer 2 security threats. Describe how MAC address table attacks are executed. Explain how VLAN attacks compromise network security. Illustrate the mechanism of ARP attacks (e.g. ARP spoofing). Summarize how address spoofing attacks work and their consequences. Analyse how STP attacks can disrupt network operations. Implement best practices and configurations to secure a LAN against attacks.
8. Demonstrate the importance of WLANs in modern networking. Compare the characteristics and use cases of each type of wireless network. Explain how different wireless technologies function. Evaluate the differences between various IEEE 802.11 standards to determine appropriate use cases. Illustrate the role of each component in a WLAN. Summarize WLAN operations using network simulation tools. Configure WLANs using different topology modes. Explain the differences between BSS and ESS. Analyse 802.11 frames in the context of data transmission in WLANs. Configure CAPWAP to manage wireless access points in a network. Configure channel management settings to optimize WLAN performance.
9. Justify the importance of routing in a network. Describe how routers determine the best path for packet forwarding. Explain how packet forwarding is performed by routers. Configure basic settings on a router, such as interfaces and lines. Analyse entries in an IP routing table. Compare the differences between static and dynamic routing. Configure IPv4 and IPv6 static and default static routes on routers. Configure floating static routes to serve as backup connections in a network. Explain the application of static host routes in IPv4 and IPv6. Discuss the characteristics and functions of each dynamic routing protocol. Summarize troubleshooting methods for IPv4 static and default route issues.
10. List the key features of OSPF. Identify the difference between single-area and multiarea OSPF. Describe the role of each OSPF component in the routing process. Explain the purpose and function of each OSPF packet type. Discuss the operational phases of OSPF (neighbor discovery, forming adjacencies, flooding LSAs, building the LSDB, running the SPF algorithm). Configure single-area OSPFv2 on routers in a network. Explain how OSPF operates in point-to-point and multiaccess network topologies. Configure default route propagation in single-area OSPFv2. Use troubleshooting commands to ensure the correct operation of single-area OSPFv2.
11. Define network management. Explain the purpose and operation of Cisco Discovery Protocol (CDP) in device discovery. Implement CDP in a network setting. Explain the usage of Link Layer Discovery Protocol (LLDP) for device discovery in multi-vendor networks. Implement LLDP in a network setting. Define Network Time Protocol (NTP). Explain the importance of time synchronization in networks. Discuss the hierarchical structure of NTP servers and clients. Configure NTP settings on network devices. Define Simple Network Management Protocol (SNMP). Analyse the role of SNMP in network management. Identify the components of SNMP operation (agents, managers, MIBs). Explain how SNMP traps alert administrators to network events. Describe the differences and improvements in each SNMP version (v1, v2c, v3). Explain the structure and purpose of MIB (Management Information Base) and Object ID. Define Syslog and its role in network management. Describe how Syslog messages are transmitted and stored. Analyze Syslog messages to interpret network events. Configure Syslog facilities to organize and prioritize log messages. Implement Syslog in a network environment. Perform file maintenance tasks on routers and switches using TFTP and USB. Perform backup and restoration of OS images to and from a TFTP server.
Program
1. Device Configuration. Switch. Switch Boot Sequence. Switch LED Indicators. System Crash Recovery. Switch Management Access (SVI). Switch Ports Configuration. Interface Input and Output Errors. Router. Types of Router Interfaces. Router Interfaces Configuration. Interfaces and Routes troubleshooting Commands. Secure Remote Access. SSH Operation.
2. Switching Concepts. MAC Address Table. Frame Forwarding. Switching Domains. VLANs. VLANs in a Multi-Switched Environment. VLAN Types: data, native, management, voice. IEEE 802.1Q Tagging. VLAN Configuration. VLAN Trunks. Dynamic Trunking Protocol (DTP). Inter-VLAN Routing Operation. Router-on-a-Stick Inter-VLAN Routing. Inter-VLAN Routing using Layer 3 Switches. Inter-VLAN Routing Troubleshooting.
3. Spanning Tree Protocol (STP). Challenges in a redundant L2 switched network. STP Operations: Root, Designated and Alternate ports. Evolution of STP: PVST+, IEEE 802.1D-2004, RSTP, Rapid PVST+, MSTP, MST. Rapid PVST+ Configuration. EtherChannel. EtherChannel Operation. PAgP and LACP Protocols. EtherChannel Configuration. EtherChannel Troubleshooting.
4. DHCPv4. DHCPv4 Operation. DHCPv4 Server. DHCPv4 Client. DHCPv4 Relay. SLAAC and DHCPv6 Concepts. Types of ICMPv6 Messages: RA, RS, NA, NS. RA Message Flags: A, O, M. Types of dynamic IPv6 Global Unicast Address (GUA) Assignment: SLAAC, Stateless DHCPv6, Statefull DHCPv6. Duplicate Address Detection (DAD). DHCPv6 Server. DHCPv6 Client. DHCPv6 Relay Agent. First Hop Redundancy Protocol (FHRP). Default Gateway Limitations. Router Redundancy. Types of FHRP Protocols. HSRP Operation.
5. NAT for IPv4. NAT Characteristics. IPv4 Address Space. NAT Terminology. Types of NAT: Static NAT, Dynamic NAT, Port Address Translation (PAT). NAT Advantages. Static NAT Configuration. Dynamic NAT Configuration. PAT Configuration: single IPv4 address, address pool. NAT for IPv6 (NAT64).
6. Network Security Concepts. Current State of Cybersecurity. Threat Actors. Threat Actor Tools. Malware Types. Common Network Attacks: Reconnaissance Attacks, Access Attacks, DoS Attacks. ACL Concepts. Purpose of ACLs. Wildcard Masks in ACLs. Guidelines for ACL Creation. Types of IPv4 ACLs. Configure IPv4 ACLs. Virtual Private Networks (VPNs). VPN Technology. Types of VPNs: Remote-Access VPNs, Site-to-Site VPNs. IPsec.
7. Switch Security. Port Security: MAC addresses limit, aging, violation modes. Access Control: IEEE 802.1x protocol and AAA Servers. Layer 2 Security Threats. MAC Address Table Attacks. VLAN Attacks. ARP Attacks. Address Spoofing Attacks. STP Attacks. LAN Attacks.
8. WLANS. Types of Wireless Networks: WPAN, WLAN, WMAN, WWAN. Wireless Technologies. IEEE 802.11 Standards. WLAN Components. WLAN Operation. Topology Modes: Ad hoc, Infrastructure, Tethering. Basic Service Set (BSS) and Extended Service Set (ESS). IEEE 802.11 Frame Structure. Control and Provisioning of Wireless Access Points (CAPWAP) Protocol. CAPWAP Operation. Channel Management.
9. Routing Concepts. Path determination. Packet Forwarding. Basic Router Configuration. IP Routing Table. Static and Dynamic Routing. Static Routes. IPv4 and IPv6 static and default static routes. Floating static routes (backup connection). IPv4 and IPv6 static host routes. Dynamic Routing Protocols: RIP, EIGRP, OSPS, IS-IS. IPv4 Static and Default Routes Troubleshooting.
10. Single-Area OSPFv2. OSPF Features. Single-Area and Multiarea OSPF. Components of OSPF. OSPF Packets. OSPF Operation. Single-Area OSPFv2 Configuration. OSPF Router ID. Point-to-Point OSPF Networks. Multiaccess OSPF Networks. Modify Single-Area OSPFv2. Default Route Propagation. Verify Single-Area OSPFv2.
11. Network Management. Device Discovery. CDP. CDP Configuration and Troubleshooting. LLDP. LLDP Configuration and Troubleshooting. NTP. Time and Calendar Services. NTP Operation. NTP Configuration and Troubleshooting. SNMP. SNMP Operation. SNMP Agent Traps. SNMP Versions. MIB Object ID. Syslog. Syslog Operation. Syslog Message Format. Syslog Facilities. Syslog Configuration and Troubleshooting. Router and Switch File Maintenance. TFTP and USB to Back Up and Restore a Configuration. Password Recovery. OS Image Management. Backup and Restore OS Image to a TFTP Server.
Curricular Unit Teachers
Luís Alberto Morais VelosoGrading Methods
- - Exam - 50.0%
- - Report - 50.0%
- - Theoretical Test 2 - 25.0%
- - Theoretical Test 1 - 25.0%
- - Report - 50.0%
Internship(s)
NAO
Bibliography
Cisco. (2024). CCNAv7: Switching, routing, and wireless essentials. (n.d.). Cisco Networking Academy. Retrieved September 18, 2025, from https://www.netacad.com/
Forouzan, B. (2009). TCP/IP protocol suite (4th ed.). McGraw-Hill Publishing.
Kurose, J., & Ross, K. (2008). Computer networking: A top-down approach featuring the internet. Addison-Wesley.
Kozierok, C. (2005). The TCP/IP guide, a comprehensive, illustrated internet protocols reference. No Starch Press.
Lammle, T., Robb D., & Buhagiar J. (2024). CCNA Certification Study Guide: Exam 200-301 (2nd ed.). Sybex.
Stallings, W. (2013). Data and computer communications (10th ed.). Pearson.
Véstias, M. (2016). Redes cisco para profissionais (7th ed.). FCA.