Standards in this Framework
Standard | Description |
---|---|
B1.1 | Define the terminology used in the design, assembly, configuration, and implementation of networks. |
B1.2 | List the fundamental elements of the major networking models established by the industry standards of recognized organizations: the Open System Interconnect (OSI) or transmission-control/Internet protocol (TCP/IP) models. |
B1.3 | Identify and explain how data, voice, and video/communications are carried through the most common network media. |
B1.4 | List the characteristics, advantages, and disadvantages of the various networking presentation functions, data formatting, data encryption, and data compression. |
B1.5 | Explain the characteristics of networking hardware and applications and the methods to deploy them. |
B1.6 | Design and document data/communication systems networks. |
B2.1 | Use appropriate wiring and wireless standards and plan, install, and maintain media (copper, fiber, and wireless) for a variety of network systems. |
B2.2 | Demonstrate standard procedures and practices for safely using tools and working safely around the electrical environment in various networking systems. |
B2.3 | Test and maintain wired and wireless network communications components and systems. |
B3.1 | Identify and describe the functions of various network devices, including network connectivity hardware. |
B3.2 | Describe the differences between various network environments: peer-to-peer, client-server, thin client, virtualized, internetworks, intranets, and extranets. |
B3.3 | Distinguish between the topologies and protocols of local area networks and those of wide area networks. |
B3.4 | Confirm operating parameters, apply test procedures, make necessary adjustments, and assemble the components of a network system or subsystem. |
B3.5 | Configure the major addressing and routing protocols used in networking. |
B3.6 | Implement a functional wired and wireless network, including the installation and configuration of components, software, and plug-ins. |
B3.7 | Evaluate, select, and deploy a variety of network architectures, information and communication technologies, and protocols. |
B4.1 | Identify and use network tools to troubleshoot and verify network availability and performance. |
B4.2 | Identify common customer policies and procedures, including those for management of incidents. |
B4.3 | Identify the implications of major protocols and international standards and their impact on network management. |
B4.4 | Apply appropriate technologies to improve network performance for data, voice, and video transmission. |
B4.5 | Apply the proper security patches, updates, and procedures necessary to maintain and support a network. |
B4.6 | Use common help-desk tools and resources, such as incident tracking, knowledge database, and staffing to administer and manage a network. |
B4.7 | Apply known effective methods of disseminating information and instruction to users. |
B4.8 | Use project management skills and tools for managing and maintaining various types of networks. |
B4.9 | Analyze network system interdependencies and constraints. |
B5.1 | Classify and use various electronic components, symbols, abbreviations, and media common to network topology diagrams. |
B5.2 | Interpret, organize, and communicate complex network diagrams by using information collected from detailed drawings. |
B6.1 | Identify and document the appropriate uses of networking services, products, and applications. |
B6.2 | Evaluate the features of communications software products in terms of their appropriateness to organizational tasks. |
B6.3 | Configure compatible systems across various platforms and types of media. |
B7.1 | Describe the effective management of human, financial, and communications resources from the standpoints of the user and the provider. |
B7.2 | Diagram physical and logical layouts of networks that support information and communication technologies. |
B7.3 | Evaluate emerging products, services, and business models in relation to the creation, setup, and management of networks that support information and communication technologies. |
B7.4 | Evaluate, create, and process voice, video, and data transmissions. |
B8.1 | Identify and define command network security threats: hackers, crackers, viruses, worms, and Trojan horses. |
B8.2 | Describe the importance of classifying appropriate monitoring devices and procedures for quick identification and prevention of security violations. |
B8.3 | List the policies and procedures for routine administration, such as user agreement, incident reporting, and recovery for users. |
B8.4 | Identify common potential risks and entrance points, including internal and external risks, and the tools used to neutralize them: firewalls; monitoring; and antivirus, spyware, and spam protection. |
B8.5 | Identify and apply common techniques for disaster prevention and recovery. |