Please enable JavaScript to use CodeHS

Standards Framework

for Arkansas Networking

61

Standards in this Framework

Standard Description
1.1.1 Analyze how networks are used in various industries (e.g., retail, healthcare, and education).
1.1.2 Compare and contrast entry-level networking jobs, outlining requirements and career paths.
1.1.3 Justify the importance of essential skills and networking certifications (e.g., Network+, CCNA, and MTA) in the job market.
1.2.1 Describe the function of common network devices in a physical or simulated network setup (e.g., NIC, switch, access point, and router).
1.2.2 Use common networking terms in written and oral communication (e.g., host, LAN, WAN, subnet, and bandwidth).
1.2.3 Analyze network traffic in a physical or simulated LAN using packet capture data (e.g. switching, unicast/broadcast communication)
1.2.4 Explain the role of MAC addresses in network communication.
1.2.5 Demonstrate the use of VLANs to segment physical or simulated networks.
1.3.1 Use packet capture data to explain the interaction of OSI model layers (e.g., link layer delivers network layer data which delivers transport layer data and so-on).
1.3.2 Explain the role of Internet Protocol (IP) in network communication.
1.3.3 Compare and contrast TCP and UDP using packet capture data.
1.3.4 Analyze packet capture data to identify the ports and protocols used by different applications.
1.3.5 Describe data flow between networks (e.g., encapsulation/de-encapsulation and routing) in a physical or simulated WAN.
2.1.1 Describe the structure and function of IPv4 and IPv6 addresses (e.g. address classes, network IDs, and host addresses).
2.1.2 Calculate and justify IP addressing schemes for networks of varying complexity (e.g., classful vs CIDR network, subnet calculation given number of devices).
2.1.3 Build physical or simulated networks of varying complexity and justify design choices in given scenarios (e.g. simple wireless home network, complex enterprise network with multiple geographic locations and network segmentation requirements).
2.1.4 Create detailed network diagrams using standard symbols (e.g., router icons, switch shapes, and connection lines).
2.2.1 Analyze and trace the DNS resolution process from domain name to IP address (e.g., by observing DNS queries using packet capture software like Wireshark, comparing DNS responses from different servers, or manually querying authoritative DNS servers with `dig` or `nslookup`).
2.2.2 Describe the function of DHCP from packet capture data.(e.g. DISCOVER, OFFER, REQUEST, ACK).
2.2.3 Identify the operation of HTTP within packet capture data (e.g. GET, POST).
2.2.4 Analyze packet capture data to identify how common protocols (e.g., HTTP, DNS, and SSH) use TCP and UDP.
2.3.1 Configure a DHCP server in a physical or simulated network (e.g., configure IP range, default gateway, and lease time).
2.3.2 Implement a local DNS server in a physical or simulated environment and create and test an A record (e.g. dnsmasq, BIND in WSL or Linux, MaraDNS).
2.3.3 Investigate the use of public DNS services (e.g., Google DNS and Microsoft DNS).
2.3.4 Configure an SSID and network services on a physical or simulated access point or wireless router.
3.1.1 Configure operating system firewalls (e.g., Windows Firewall, MacOS Network Firewall, and ufw) to allow or block applications.
3.1.2 Configure and test a router ACL in a physical or simulated network.
3.1.3 Configure wireless security in a physical or simulated network (e.g., WEP, WPA, and WPA2/3 ).
3.1.4 Compare wireless security protocols by analyzing packet capture data (e.g., WEP vs WPA 4-way handshake).
3.1.5 Analyze packet capture data to understand encryption methods used in wireless security (e.g., TKIP vs AES vs CCMP w/ AES).
3.2.1 Simulate and analyze a man-in-the-middle attack on a physical or simulated network.
3.2.2 Compare HTTP and HTTPS traffic using packet capture data.
3.2.3 Compare SSH and Telnet sessions using packet capture data.
3.2.4 Configure and test a VPN connection between two routers in a physical or simulated network.
3.3.1 Use a network scanning tool to identify open ports and services on a network. (e.g., Nmap port scan).
3.3.2 Identify vulnerabilities associated with default network device configurations (e.g., default passwords and open management interfaces).
3.3.3 Implement basic hardening steps to mitigate identified vulnerabilities in various devices (e.g., changing default passwords, disabling unnecessary services, and closing unused ports).
3.3.4 Analyze security advisories from vendors to address known vulnerabilities in network devices or software (e.g., update firmware and install patches).
4.1.1 Interpret the output of common network commands to identify network status information (e.g., ping, ipconfig, tracert, and nslookup).
4.1.2 Analyze test results to identify potential network performance issues. (e.g., speedtest.net, WiFi analyzer, and cable tester).
4.1.3 Categorize common network error messages and explain the underlying network issues (e.g., "No internet connection", DNS errors, and IP conflicts).
4.2.1 Describe the common causes of wireless connectivity issues (e.g., weak signal strength, wireless interference, and channel congestion).
4.2.2 Analyze how IP address conflicts arise in network scenarios (e.g.,static IP assignments and overlapping DHCP scopes) and describe the methods used to detect them.
4.2.3 Describe troubleshooting steps to isolate the source of internet connection problems (e.g., DNS, router malfunction, and ISP outages).
4.3.1 Explain the importance of detailed documentation in problem resolution.
4.3.2 Communicate technical problems in simple terms (e.g., user descriptions and status updates).
4.3.3 Create basic network status reports (e.g., uptime logs, bandwidth utilization and issue summaries).
4.4.1 Explain why precise identification and documentation of the initial network problem (e.g., "Can't print," "Slow internet", and "No WiFi") is essential for effective troubleshooting.
4.4.2 Describe techniques used to isolate network issues (e.g., reviewing recent changes and using network diagnostic tools).
4.4.3 Explain the importance of making only one change at a time and verifying the results.
4.4.4 Explain the value of documenting problem solutions (e.g., fix steps and prevention tips).
5.1.1 Create strong, unique passwords for various online accounts.
5.1.2 Demonstrate the use of a password manager to improve online security.
5.1.3 Categorize different types of sensitive personal data (e.g., financial, medical, communication) and explain why each category requires specific security measures.
5.1.4 Identify which actions are responsible and irresponsible in terms of bandwidth and data usage in network scenarios (e.g., downloading large files, streaming media, file sharing).
5.2.1 Analyze an acceptable use policy (AUP) and identify ethical guidelines regarding network usage.
5.2.2 Simulate scenarios involving online communication and file sharing and demonstrate respect for user privacy and data confidentiality (e.g., secure file sharing practices, avoiding phishing attempts).
5.2.3 Justify resource allocation in a given network scenario (e.g., data limits in a cloud storage scenario, device storage quotas in a shared network drive).
5.3.1 Implement basic security measures (e.g., access controls, encryption principles) to protect simulated network information like network diagrams and IP address schemes from unauthorized access in a lab setting.
5.3.2 Create clear and concise documentation for simulated network changes (e.g., adding a user, changing a router configuration).
5.3.3 Justify the appropriate level of access and sharing for different types of network documentation and explain the potential ethical implications of over-sharing or under-sharing network information (e.g. “need-to-know”).