Core Syllabus. Version 2.6 C OPERATE KNOWLEDGE AREA: OPERATION AND SUPPORT OF INFORMATION SYSTEMS. June 2006

Similar documents
Networking. Networking and Communication Trends Convergence (Accessibility) Speed Stability Simplicity* Embeddedness

IT4405 Computer Networks (Compulsory)

5105: BHARATHIDASAN ENGINEERING COLLEGE NATTARMPALLI UNIT I FUNDAMENTALS AND LINK LAYER PART A

Assignment - 1 Chap. 1 Wired LAN s

CSC 170 Fall 2017 Dr. R. M. Siegfried. Study Guide for Final Exam

6 Computer Networks 6.1. Foundations of Computer Science Cengage Learning

Introduction to Networking

M2-R4: INTERNET TECHNOLOGY AND WEB DESIGN

COMPONENTS OF DATA COMMUNICATION

Identify the features of network and client operating systems (Windows, NetWare, Linux, Mac OS)

Networks. Computer Technology

Router Router Microprocessor controlled traffic direction home router DSL modem Computer Enterprise routers Core routers

Data Communication and Network. Introducing Networks

L1/L2 NETWORK PROTOCOL TESTING

Introduction to computer networking

Chapter 11: Wide-Area Networks and the Internet

Computer Communication & Networks / Data Communication & Computer Networks Week # 03

PLEASE READ CAREFULLY BEFORE YOU START

ITEC 3800 Data Communication and Network. Introducing Networks

Erasable Programmable Read-Only Memory (EPROM) Electrically Erasable Programmable Read-Only Memory (EEPROM) CMOS 2.2.

Computer Networks. Computer Networks. Telecommunication Links. CMPUT101 Introduction to Computing - Spring Chapter 12: Computer Networks 1

Communicating over the Network

6 Computer Networks 6.1. Foundations of Computer Science Cengage Learning

Networks and Communications MS216 - Course Outline -

This course prepares candidates for the CompTIA Network+ examination (2018 Objectives) N

CS1302-COMPUTER NETWORKS UNIT I -DATA COMMUNICATION PART A

06/02/ Local & Metropolitan Area Networks 0. INTRODUCTION. 1. History and Future of TCP/IP ACOE322

Data Communication & Computer Networks MCQ S

QUESTION BANK UNIT-I

Number: Passing Score: 750 Time Limit: 120 min File Version: 1.0. Microsoft Exam Name: Identity with Windows Server 2016 (beta)

A+ Guide to Software: Managing, Maintaining, and Troubleshooting, 5e. Chapter 8 Networking Essentials

Defining Networks with the OSI Model. Module 2

EEC-484/584 Computer Networks

CompTIA Network+ Course

M3-R3: INTERNET AND WEB DESIGN

PLEASE READ CAREFULLY BEFORE YOU START

PLEASE READ CAREFULLY BEFORE YOU START

Chapter 2 Network Models 2.1

Data & Computer Communication

The OSI Model. Open Systems Interconnection (OSI). Developed by the International Organization for Standardization (ISO).

Computer Networks. Dr. Abdel Ilah ALshbatat Dept. of Communication and Computer Engineering Faculty of Engineering Tafila Technical University

Review: Networking Fall Final

Introduction to Networking

Selected Sections of Applied Informatics

Need For Protocol Architecture

ROYAL INSTITUTE OF INFORMATION & MANAGEMENT

Need For Protocol Architecture

Typical Network Uses

Computer Networks SYLLABUS CHAPTER - 2 : NETWORK LAYER CHAPTER - 3 : INTERNETWORKING

3+1+0 (3) IT 201 T. Principles of Information and Technology Systems. Prereq: CS 110T IT 222 T. Communications and Networks Fundamentals (4)

Internet Structural View. The Internet software layers. Package-shipping example TCP UDP

TCP/IP THE TCP/IP ARCHITECTURE

Textbook Charles Petzold, Programming Windows, 5th edition, Microsoft Press. References - other textbooks or materials none

SRM ARTS AND SCIENCE COLLEGE SRM NAGAR, KATTANKULATHUR

Operating Systems CS 571

Part VI. Appendixes. Appendix A OSI Model and Internet Protocols Appendix B About the CD

Area Covered is small Area covered is large. Data transfer rate is high Data transfer rate is low

TestOut Network Pro - English 4.1.x COURSE OUTLINE. Modified

TestOut Network Pro - English 5.0.x COURSE OUTLINE. Modified

SYLLABUS. osmania university CHAPTER - 3 : MEDIUM ACCESS CONTROL (MAC) SUBLAYER Standards, Bluetooth, Bridges and Routers.

BLM6196 COMPUTER NETWORKS AND COMMUNICATION PROTOCOLS

Module 1. Introduction. Version 2, CSE IIT, Kharagpur

Layering in Networked computing. OSI Model TCP/IP Model Protocols at each layer

Communication Networks

Sub Code & Name : EC2352 COMPUTER NETWORKS Unit: I Branch: EC Semester :VI. Unit syllabus: PHYSICAL LAYER 9

The Lean Plan p. 1. Embedded Systems. The Operating System The Development Environment. Acknowledgments Introduction p. 1.

1. What is a Computer Network? interconnected collection of autonomous computers connected by a communication technology

Copyleft 2005, Binnur Kurt. Objectives

Computers Are Your Future Eleventh Edition Chapter 7: Networks: Communicating & Sharing Resources

Understanding Networking Fundamentals

5047 : Introduction to Installing and Managing Microsoft Exchange Server 2007

Lecture 7: Internetworking See Chapter 3 of Colouris

CCNA Exploration Network Fundamentals. Chapter 03 Application Functionality and Protocols

CIT 380: Securing Computer Systems. Network Security Concepts

Chapter 4 The Internet

MODERNIZATION OF AUTOMATIC SURFACE WEATHER OBSERVING SYSTEMS AND NETWORKS TO UTILIZE TCP/IP TECHNOLOGY

Chapter 11: Input/Output Organisation. Lesson 17: Standard I/O buses USB (Universal Serial Bus) and IEEE1394 FireWire Buses

Chapter 2. Application Layer

Introduction to Computer Science. William Hsu Department of Computer Science and Engineering National Taiwan Ocean University

Introduction... xiii Chapter 1: Introduction to Computer Networks and Internet Computer Networks Uses of Computer Networks...

ก ก Information Technology II

Chapter 4: Networking and the Internet. Network Classifications. Network topologies. Network topologies (continued) Connecting Networks.

Chapter 4: Networking and the Internet

Computer Networks (Unit wise Questions)

QUESTION BANK EVEN SEMESTER

Objectives. Connecting with Computer Science 2

CompTIA A+ Accelerated course for & exams

Lecture A4 Network / Internet. Computing and Art : Nature, Power, and Limits CC 3.12: Fall 2007

Outline. Inter-Process Communication. IPC across machines: Problems. CSCI 4061 Introduction to Operating Systems

System Programming. Introduction to computer networks

Unit 2: Technology Systems

The Internet and the World Wide Web

Chapter 2. Communicating Over The Network. CCNA1-1 Chapter 2

COURSE OUTLINE: A+ COMPREHENSIVE

FINAL EXAM REVIEW PLEASE NOTE THE MATERIAL FROM LECTURE #16 at the end. Exam 1 Review Material

ITP 140 Mobile Applications Technologies. Networks

ECS 15; Lectures 17 and 18. The Internet. What is the internet, and how does it work? TA feedback

Agenda Computer Hardware Input Devices Output Devices Secondary Storage Computer Software System Software Application Software Working with Windows

and the World Wide Web

Chapter 2 Network Architectures A global view

Transcription:

Core Syllabus C OPERATE KNOWLEDGE AREA: OPERATION AND SUPPORT OF INFORMATION SYSTEMS Version 2.6 June 2006

EUCIP CORE Version 2.6 Syllabus. The following is the Syllabus for EUCIP CORE Version 2.6, which provides the basis for the tests in this module domain. Module Goals EUCIP CORE: Operate Knowledge Area Module C, Operate, deals with networks and related communication services of an IT Infrastructure, as well as the maintenance and usage issues in terms of service provision. The module requires the candidate to know about hardware components, computing architectures and different operating systems. The candidate shall also distinguish between the various levels of communication protocols, and their application both to wired and wireless network technologies. In addition, he/she shall understand the simple network management protocol (SNMP), e-mail and web services, and the related security threats and remedies. The candidate shall appreciate the importance of a client-oriented approach to IT support, and apply some of the basic principles of IT service delivery. C - OPERATE KNOWLEDGE AREA : OPERATION AND SUPPORT OF INFORMATION SYSTEMS C.1 Computing Components and Architecture C.1.1 Main Hardware C.1.1.1 Describe the main components of a computer system and their functions C.1.1.2 C.1.1.3 C.1.1.4 C.1.1.5 C.1.1.6 C.1.1.7 C.1.1.8 Describe the main types of peripheral units and their functions Understand the parameters which characterise any type of peripheral units Describe the main types of memory technology Identify various types of buses in a computer system Describe the concept of instruction pipelining Describe the concept of instruction-level parallelism Understand the parameters which characterise a microprocessor: (clock frequency, pipeline stages, caching system, chip size) C.1.2 Computer Architecture C.1.2.1 Show, using diagrams, the architecture of a general purpose computer C.1.2.2 Describe the concept of a multiprocessor machine EUCIP Ltd. 2006 Page 2 of 8 Ref: EUCIPV2.6_2006

C.1.2.3 Describe the concept of a Memory Hierarchy C.1.3 Multimedia Components C.1.3.1 Know the standard multimedia types (audio, music, graphics, image, video, telephony, TV) C.1.3.2 C.1.3.3 Know the main multimedia I/O devices (scanners, digital camera, microphone, etc.) Know the major multimedia storage standards (CD-ROM, DVD, Magneto Optical disk) C.2 Operating Systems C.2.1 Principles C.2.1.1 Describe the functions of a typical Operating System C.2.2 Concurrent and Parallel Processes C.2.3 Memory and Storage Management C.2.1.2 C.2.1.3 C.2.1.4 C.2.2.1 C.2.2.2 C.2.2.3 C.2.2.4 C.2.2.5 C.2.3.1 C.2.3.2 C.2.3.3 C.2.3.4 C.2.3.5 Describe the different types of Operating System (Time-sharing, Real-time, Batch) Describe the concept of Application Program Interfaces Describe how the resources of a computer system are managed by software Justify the presence of concurrency inside an Operating System Describe the mutual exclusion problem Describe the concept of a process Describe the concept of a thread Describe a context switch operation Explain the concept of virtual memory Describe how virtual memory is realised in hardware and software Describe the thrashing concept Describe the concept of memory hierarchy Describe the functions of a file system C.2.4 Security and Protection C.2.4.1 Recognise the need for protection and security in a computer system EUCIP Ltd. 2006 Page 3 of 8 Ref: EUCIPV2.6_2006

C.2.4.2 Describe the protection mechanisms implemented by Operating Systems C.2.5 Examples of Operating Systems C.2.4.3 C.2.4.4 C.2.4.5 C.2.4.6 C.2.5.1 C.2.5.2 Understand the difference between identification and authentication Describe the principles of access control Recognise the need for recovery and back-up Describe the concept of backdoor, Trojan horse and computer virus threats Describe the main features of the Unix or Linux Operating System Describe the main features of the W2000 or Windows XP Operating System C.3 Communications and Networks C.3.1 Communication Principles C.3.1.1 C.3.1.2 C.3.1.3 C.3.1.4 C.3.1.5 Understand the difference between an analog and a digital signal Understand the transformation between an analog signal and its corresponding digital version Describe the concepts of circuit switching and packet switching Describe the concepts of streams and datagrams Describe the role of the main network standardisation bodies C.3.2 Network Components and Architectures C.3.2.1 C.3.2.2 C.3.2.3 C.3.2.4 C.3.2.5 C.3.2.6 C.3.2.7 Describe the components of a network and their roles Describe the different characteristics of the transmission media (twisted pair, Coaxial cable, fiber optic, microwaves) Describe how the components of a network are connected to each other in practice Describe the roles of interconnecting devices (hub, switch, router) Describe the standard network topologies Differentiate between the concepts of LAN and WAN Name the major LAN Standards EUCIP Ltd. 2006 Page 4 of 8 Ref: EUCIPV2.6_2006

C.3.3 Communication Protocols C.3.3.1 Describe the ISO 7-layer reference model C.3.3.2 C.3.3.3 C.3.3.4 C.3.3.5 C.3.3.6 Describe the instantiation of the ISO reference model in TCP/IP Describe how a packet is routed over the Internet Understand the differences between TCP and UDP Know the major differences between a connection-oriented and a connectionless protocol Understand the concept of network congestion and the mechanisms for avoiding it C.4 Network Services C.4.1 Network Security C.4.1.1 Know the main security threats in networks (sniffing and spoofing) C.4.1.2 C.4.1.3 C.4.1.4 C.4.1.5 Describe the scope of cryptography Differentiate between secret-key algorithms from public key algorithms Describe a strong authentication protocol Understand how to use cryptography for protecting networks C.4.2 Domain Name System C.4.2.1 Define the scope of the Domain Name System (DNS) C.4.2.2 C.4.2.3 C.4.2.4 Describe the naming of Internet hosts Describe the concept of resource descriptor Outline how a Domain Name is translated into an IP address C.4.3 The World-Wide-Web C.4.3.1 Describe the World Wide Web (WWW) as a client server application C.4.3.2 C.4.3.3 C.4.3.4 C.4.3.5 C.4.3.6 Describe the role of the server Describe the role of the client: browser Describe the role and the functions of the Hypertext Transmission Protocol (HTTP) Understand the concept of Universal Resource Locator ( URL) Describe the main characteristics of Hypertext Mark-up Language ( HTML) EUCIP Ltd. 2006 Page 5 of 8 Ref: EUCIPV2.6_2006

C.4.3.7 Describe the concept of the Common Gateway Interface (CGI) C.4.3.8 Describe the concept of an applet C.4.4 E-mail C.4.4.1 Understand the role of an e-mail client C.4.4.2 C.4.4.3 C.4.4.4 C.4.4.5 C.4.4.6 Understand the role of an e-mail server Understand the role of an e-mail gateway Describe the SMTP protocol Describe the POP3 protocol Describe the Internet Message Access Protocol (IMAP) protocol C.4.5 Multimedia Impact C.4.5.1 Know the network impact of the most important multimedia tools C.4.5.2 Know about the resource needs of a major multimedia application C.4.5.3 Describe the characteristics of a server computer system that has to host a multimedia application C.5 Wireless and Mobile Computing C.5.1 Principles of Wireless Communication C.5.1.1 Describe technologies used for wireless communications C.5.1.2 Describe the major wireless standards C.5.1.3 Know the problems characterising wireless and mobile computing C.5.2 Wireless Networks C.5.2.1 Describe the main components of a Wireless LAN C.5.2.2 Know the compatibility of different technologies C.5.2.3 Describe the main components of a satellite-based network C.5.3 Protocols for Mobile Stations C.5.3.1 Describe the functions of the main protocols for mobile stations (Mobile IP, Wireless Application Protocol (WAP), Bluetooth) C.5.3.2 Understand the range of applicability of each protocol C.6 Network Management C.6.1 Principles of Network Management C.6.1.1 Describe the main functions of a Network Management System EUCIP Ltd. 2006 Page 6 of 8 Ref: EUCIPV2.6_2006

C.6.1.2 Describe the different parameters which can be managed in a network (performance, failures, configuration settings) C.6.1.3 Describe the different architectures of Network Management systems C.6.2 The Simple Network Management Protocol C.6.2.1 Describe the main components of the simple network management protocol (SNMP) and their interaction C.6.2.2 Describe the main services provided by the protocol C.6.2.3 Describe the main limitations of the protocol C.6.3 Tools for Network Management C.6.3.1 Name the most important Network Management tools C.6.3.2 Understand the differences between a System Management tool and a Network Management tool C.6.3.3 Understand the system requirements for operating a Network Management tool C.7 Service Delivery and Support C.7.1 Customer Relationships and Service Level Agreements C.7.1.1 Describe the Service Level Management process and identify its benefits C.7.1.2 Name the main elements of a Service Level Agreement C.7.1.3 Compare the uses and purposes of Service Level Agreements, underpinning contracts and Operational Level Agreements C.7.2 Capacity and Contingency Planning C.7.2.1 Describe the three sub-processes (business, service and resource) as defined within ITIL-based Capacity Management and explain the importance of each C.7.2.2 Identify the purpose and describe the main elements of a Capacity Plan C.7.2.3 Explain the concepts of risk, threat and vulnerability and give examples of each C.7.2.4 Give examples of risk reduction measures C.7.2.5 Identify the purpose and describe the main elements of a contingency/service continuity plan C.7.3 Availability Management C.7.3.1 Identify the purpose and benefits of Availability Management as referenced in ITIL and define the main terms used (availability, reliability, failure, recovery) EUCIP Ltd. 2006 Page 7 of 8 Ref: EUCIPV2.6_2006

C.7.3.2 Compare some of the commonly-used measures of availability (percentage availability, frequency of failure, mean time between failures, impact of failure) C.7.3.3 Name the main Availability Management methods and techniques (such as Component Failure Impact Analysis (CFIA), CRAMM, Fault Tree Analysis (FTA)) C.7.4 Service Desk C.7.4.1 Explain the purpose of a Service Desk in a service support organisation C.7.4.2 C.7.4.3 Identify the different types of Service Desk and describe the circumstances in which each is appropriate Define the main elements of an ITIL-based incident management system C.7.5 Change Management C.7.5.1 Explain the importance of managing change in an IT environment C.7.5.2 C.7.5.3 Construct a basic ITIL -based change management procedure Define the purpose of a Request for Change and propose the essential elements that it should contain EUCIP Ltd. 2006 Page 8 of 8 Ref: EUCIPV2.6_2006