syllabus ip data 2.2
DESCRIPTION
sylabus for wipro ucf 2.2 ip dataTRANSCRIPT
IP Data- Level 2.2
Assessment Name Assessment Name and Level
Total No. of Questions 50
Total Marks 50
Pass Percentage 70 %
Duration of Assessment 1 hour 30 minutes
Topics
Topic Name No. of questions
IP Addressing, Sub netting and VLSM 5
Advanced Switching - Trunking,802.1q and ISL 27
Advanced Switching - HSRP/VRRP/GLBP
Advanced Switching - Spanning Tree and Port-Security
Advanced Switching - VLAN and VTP
Advanced Switching - Port-Channels-LACP and PAgP
Routing Protocols 6
Cisco Wireless Network 3
Network Security (ACL) 5
ITIL 5
Total 50
IP Addressing, Subnetting and VLSM
IP Addresses and Subnet masks
IP Address classes and ranges
Subnetting and supernetting
VLSM IP addressing design to a network
DHCP and DNS
DHCP operations in routers and switches. Advanced Switching - Trunking,802.1q and ISL
VLAN Trunking protocols ISL and 802.1Q
Routing Between VLANs
Configure and verify inter-VLAN routing in a Layer 2 topology using an external router, a switch SVI, or a switch-routed interface
Configure both a switch and router to accommodate inter-VLAN packet transfer using an external router
Layer 3 SVI
Commands used to configure an SVI
A routed port on a multilayer switch
Commands used to configure a routed port on a multilayer switch
Configure Layer 3 EtherChannel links
Configure inter-VLAN routing on a multilayer switch
Configure DHCP services on a Layer 3 switch
Deploying Multilayer Switching with Cisco Express Forwarding
Configure and verify inter-VLAN routing in a Layer 2 topology using multilayer switching with Cisco Express Forwarding
Multilayer switching and how it differs when you are performing Layer 2 vs. Layer 3 switching
Packet and frame header rewriting performed by a multilayer switch
Layer 3 switch processing
Switching methods available on a Cisco switch
Configure Cisco Express Forwarding on a Cisco switch Advanced Switching - HSRP/VRRP/GLBP
Configuring Layer 3 Redundancy with HSRP
Routing issues
Router redundancy process
Configure HSRP operations
Fine-tune and troubleshoot HSRP
Configuring Layer 3 Redundancy with VRRP and GLBP
VRRP operations process
Configure VRRP
GLBP operations process
Configure GLBP Advanced Switching - Spanning Tree and Port-Security
Spanning Tree Protocol (STP) Enhancements
STP standards and operations
Implement and configure PVST,PVRST+ and MSTP
RSTP port roles
Verify RSTP configurations
Protect and optimize the operation of STP
Configure BPDUGuard, BPDUFilter, RootGuard, and LoopGuard
Configure UDLD to detect and shut down unidirectional links Advanced Switching - VLAN and VTP
VLAN
Access VLAN and Voice VLAN
Normal VLAN and Extended VLAN
Static VLAN and Dynamic VLAN
VLAN Trunking
VLAN Trunking protocols ISL and 802.1Q
VTP, VTPv1 and VTPv2 advertisements
Native VLAN and VLAN filtering
VTP pruning
VTP Server, client and Transparent modes
VTP configurations and troubleshooting
Inter-VLAN routing and Switching
Routed ports
SVI interfaces
Layer-3 Switching Advanced Switching - Port-Channels-LACP and PAgP
Link Aggregation with Ether-Channel
Benefits of Ether-Channel
Compare the PAgP and the LACP
Layer 2 Ether-Channel links and load balancing
Ether-channel configurations Routing Protocols EIGRP
EIGRP neighborship and EIGRP packets
EIGRP DUAL and metric calculation methods(K1,K2,K3,K4 and K5)
EIGRP AD,FD,Successor and Feasible Successor
EIGRP Redistribution and Summarisation
EIGRP Equal and un-equal cost load balancing
EIGRP Stuck-in-active
EIGRP Authentication OSPF
OSPF Neighborship and OSPF packets
OSPF Network types and DR,BDR and DROTHER routers
OSPF areas Single and multiple
OSPF Redistribution and Summarisation
Configure OSPF routing
OSPF Routers - Internal, Backbone, ABR and ASBR
OSPF LSA types and OSPF areas stub filtering
OSPF virtual-links Cisco Wireless Networks
Networking technologies used in wireless (SSID --> WLAN_ID --> Interface -- >VLAN, 802.1q trunking)
Wireless topologies (IBSS, BSS, ESS, Point-to-Point, Point-to-Multipoint, basic Mesh, bridging)
802.11 authentication and encryption methods (Open, Shared, 802.1X, EAP, TKIP, AES)
Framework of wireless security and security components (authentication, encryption, MFP, IPS)
Authentication methods (Guest, PSK, 802.1X, WPA/WPA2 with EAP- TLS, EAP-FAST, PEAP, LEAP)
Describe and configure encryption methods (WPA/WPA2 with TKIP, AES)
Describe and configure the different sources of authentication (PSK, EAP-local or -external, Radius)
Configure authentication and encryption methods on a WLAN (WPA/WPA2 with PSK and 802.1x)
Implement wireless Guest networking
Network Security(ACL)
Access list types (Standard, Extended and Named)
Access List commands on cisco routers
References:
Microsoft Website: Introduction to TCP/IP http://technet.microsoft.com/en-us/library/cc939986.aspx Cisco Website: http://www.cisco.com/cisco/web/psa/default.html?mode=tech&level0=268436015 Technology Topics(Basics): Dial and Access IP LAN Switching WAN Etc Skillport Resource for Wipro employees: ICND1 and ICND2 courses Abbreviations/Acronyms: http://www.abbreviations.com/acronyms/TELECOM http://www.abbreviations.com/acronyms/NETWORKING Books: Computer Networks – Andrew Tanenbaum Internetworking with TCP/IP – Comer and Stevens Any of CCNA (R&S) certification books Disclaimer: The above topics are provided for reference only. Other topics may appear from different sources such as internal classroom trainings or the web.