Download as:
Rating : ⭐⭐⭐⭐⭐
Price: $10.99
Language:EN
Pages: 163
Words: 27113

Loading and grading levels alter traffic flows

  • Information related to the unit of competency

  • Guidelines and instructions to complete each task and activity

  • The Student Pack is a document for students to complete to demonstrate their competency. This document includes context and conditions of assessment, tasks to be administered to the student, and an outline of the evidence to be gathered from the student.

Student and trainer details

Qualification and unit of competency

Qualification/Course/Program Details
Code:
Name:
Unit of competency
Code: ICTTEN615
Name: Manage network traffic
Releases: 1.0
Release date: 19/Jan/2021

Assessment Submission Method

Student declaration

    • Reproduce this assessment and provide a copy to another member of staff; and

    • Take steps to authenticate the assessment, including communicating a copy of this assessment to a plagiarism checking service (which may retain a copy of the assessment on its database for future plagiarism checking).

Assessment Plan

Completion of the Assessment Plan

  • You have been provided with relevant and detailed feedback.

Every assessment has a “Feedback to Student” section used to record the following information. Your trainer/assessor must also ensure that all sections are filled in appropriately, such as:

Unit Requirements

Pre-Assessment Checklist: Task 1 - Knowledge Test

The purpose of this checklist
The pre-assessment checklist helps students determine if they are ready for assessment. The trainer/assessor must review the checklist with the student before the student attempts the assessment task. If any items of the checklist are incomplete or not clear to the student, the trainer/assessor must provide relevant information to the student to ensure they understand the requirements of the assessment task. The student must ensure they are ready for the assessment task before undertaking it.
Section 1: Information for Students

☐ Make sure you have completed the necessary prior learning before attempting this assessment.

☐ Make sure that you have access to a computer and the internet (if you prefer to type the answers).

☐ Make sure that you have all the required resources needed to complete this assessment task.

Section 2: Reasonable adjustments

☐ I do require reasonable adjustment

☐ I do not require reasonable adjustment

☐ I confirm I have accessed and understand the assessment information as provided in the Training Organisation’s Student Handbook.

☐ I confirm I have been given fair notice of the date, time, venue and/or other arrangements for this assessment.

Task instructions
  • To be assessed as Satisfactory in this assessment task, all questions must be answered correctly.

Assessment Task 1: Knowledge Test

Q1:
  1. What is a customer service policy? Write your answer in 100-150 words.

  2. What is an SLA? Write your answer in 100-150 words.

  1. Support your team

  2. Encourage people to contribute ideas and get involved in decisions

Satisfactory response
Yes ☐ No ☐

Answer:

  1. In a scoped work, WHS (workplace health and safety) is applicable. It is a part of OH&S (occupational health and safety) policy that identify and eliminate any issue related to safety and health of an individual at the workplace. While developing safe practices and deploying safety equipment may initially take time and money, they are critical to the success of your organization. Failure to satisfy these criteria may result in prosecution, fines, and the loss of qualified people. Furthermore, workers' compensation rules require you to provide workers' compensation insurance to your employees. When WHS policies are used as legislation, it helps in maintaining a safe work environment. With the long-term development of the business, it also helps in retaining the workforce, improve work productivity, less injury, less sickness while work, and reduce expense for injuries.

  • Set the scope of the work

  • Review, analyze and set objectives

  • Use smart milestones to develop a schedule

  1. Here are the details –

  1. Support your team

Many businesses have bosses that don't care about their employees and make no attempt to demonstrate interest. This is negative word of mouth. One should be aware of their employees' life, what inspires them, and give aid when they are overburdened.

  1. When we are working on a project, several workplace rules and legislations will be applied to it. Scoped work or project has some defined elements, where we can use assumptions according to the acceptance criteria. This scoped work should follow below listed standard approaches –

  • The scope management plan will be planned well and meet the requirements in project management plan

  • Having a good control over project scope will help us in meeting required performance, offer a chance of improvement.

WHS (workplace health and safety) is the applicable regulation in a scoped work. It is a part of OH&S (occupational health and safety) policy that identify and eliminate any issue related to safety and health of an individual at the workplace. The goal of Work Health and Safety legislation (WHS laws) is to safeguard the health, safety, and welfare of workers, volunteers, and other people who work in or visit a workplace. Each state and territory have its own set of laws. While developing safe practices and deploying safety equipment may initially take time and money, they are critical to the success of your organization. Failure to satisfy these criteria may result in prosecution, fines, and the loss of qualified people. Furthermore, workers' compensation rules require you to provide workers' compensation insurance to your employees. When WHS policies are used as legislation, it helps in maintaining a safe work environment. With the long-term development of the business, it also helps in retaining the workforce, improve work productivity, less injury, less sickness while work, and reduce expense for injuries. The three essential aspects of WHS are - to provide protection for all workers. Duty of care to avoid endangering one's own or others' health or safety, and to rectify OHS concerns as soon as possible. Workers can be consulted to consider the penalty for violating the legislation.

  • Improved employee work satisfaction

  • Increased resilience for individual employees, teams, and the organisation as a whole Significant reduction in sick absence due to work-related injuries

  • Provide standard operating procedures

  • A communication framework with chain of information sharing

  • create safe ways of working

  • guarantee that machines, buildings, and substances are used, handled, and stored safely

Q2:

2.1. What is system monitoring alerts and alarms. Write your answer in 150-200 words.

2.2. What is route and circuit in computer networks. Write your answer in 50-100 words.

2.7. Explain network traffic engineering. Write your answer in 100-150 words.

2.8. Discuss workplace documentation related to network traffic. Write your answer in 150-200 words.

Satisfactory response
Yes ☐ No ☐

- NMS provide real time monitoring of resources and in-depth analytics of collected data.

- It enables a network to grow more by adding some abilities to it.

2.6 The semi-permanent control is applied to control the semi-permanent virtual circuits in a large network. In a large network, multiple paths are available there between a recipient and transmitter. Two types of switching techniques are used to control the semi-permanent circuits, as packet and circuit switching technique. The switching approach will choose the best data transport path. Switching is used to connect systems so that they may communicate with one another.

2.7 The volume of data travelling over a computer network at any particular time is referred to as network traffic. Network traffic, also known as data traffic, is divided into data packets and transmitted over a network before being reassembled by the receiving device or computer. Traffic engineering is the process by which a network operator designs the pathways used to transmit traffic flows that differ from those picked automatically by the routing protocol in use in that network. There are several ways to control network traffic, for example, by creating security policies for authentication or unauthenticated users, specify some rules to allow or deny a user/host, and implementing threat protection to keep safe the network from intrusions.

Q3:
Satisfactory response
Yes ☐ No ☐

3.1 A network management system or NMS is a set of application that enable a network admin to effectively manage some independent components resided inside a large network. The NMS then provide some network management features like control functions, allocation, planning, coordinate, deployment, and monitoring of network resources. A network management system has some key elements that includes a network manager, MIB (management information bases), some remote managed devices, remote agents to report MIB data and action control system, and some communication protocols. The NMS has five major functions that are management of performance, security, configuration, fault or issues and accounting management.

3.2 While creating a network, some sort of administration is required, based on some principles. This will help a designer in delivering a good experience to the end user. These principles may vary based on the designing requirements, and to meet a required result. Some principles include –

- A list of required services should be prepared for reliable communication

These principles will have so many benefits to a user such as, it help in mitigating crisis, build capacity for continuous improvement, better decision-making, reliability of data and services.

Q4:
  1. Deep Packet Inspection-based blocking

  2. URL-based blocking

4.3. Explain the following eight (8) network dimensioning principles:

  1. Recognise Customer needs

  2. Fully Document the Design

  3. Implement the Design

Satisfactory response
Yes ☐ No ☐

This type of blocking will create barriers in the network for example, a firewall can allow or block traffic based on IP address or protocol. IP address blocking is a security mechanism that stops a specific or set of IP addresses from connecting to a mail, web, or Internet server. This is often done to prevent any unwanted sites or hosts from entering the server or node and causing harm to the network or individual PCs. While protocol-based blocking uses other low-level network identifiers, such as a TCP/IP port number that might identify a specific program on a server or a kind of application protocol.

  1. Deep Packet Inspection-based blocking

Platform-based blocking is an approach that requires the participation of the platform's owner, such as Google or Microsoft. In this strategy, queries to a search engine from a certain group of Internet users will yield a different set of results than the rest of the Internet, filtering away references to information that is, in some manner, offensive. In certain circumstances, the definition of what should be prohibited is based on local regulations and government requirements, but it might also be due to concerns expressed by the search engine operator. A search engine, for example, may restrict links to malware or information deemed improper by its own terms of service.

  1. DNS-based blocking

  1. Recognize Customer needs

This principle focusing on recognizing customer needs rather than focusing on the function and features of the LAN. Determine the features and needs of each distinct physical device. Determine the architecture and infrastructure by taking into account the power, bandwidth, and application needs of each endpoint.

  1. Plan the network implementation

At this stage, we can plan to deploy the network and implement it in real-time. Planning of the network is done in the previous step, covering all the assessments, analysis, device identification and network topology. All these components are now implemented in a network design.

  1. Implement the Design

When the document is prepared, submitted and approved to be implement, we can proceed with the implementation phase. We will then proceed with the implementation of the network that starts with site survey, cable planning, device placement, making connection, making configuration, testing and monitoring.

Q5:
  1. Simplex

  2. Half Duplex

  1. Digital signal

Write your answer in 150-200 words.

Satisfactory response
Yes ☐ No ☐

5.2 Here is the detail of two types of transmission signals:

a. Analogue signal – This is a signal type in which signals will increase and decrease as per the data is being transmitted. Analog signals are a type of continuous time-varying signal that is divided into composite and simple signals. A simple analogue signal is nothing more than a sine wave that cannot be decomposed, whereas a composite analogue signal can be decomposed into multiple sine waves.

Q6:
  1. Bus Topology

  2. Star Topology

6.3. What do you understand by switching? Write your answer in 50-100 words.

6.4. Discuss the following three (3) types of switching:

6.5. Explain routing and discuss the types of routing. Write your answer in 150-200 words.

6.6. Discuss the following two (2) network transmission techniques:

Satisfactory response
Yes ☐ No ☐

6.2 Here are the five basic network topologies –

a. Bus topology – Bus topology, also known as line topology, is a network topology in which all network devices are connected by a single network cable or coaxial cable. The bus, backbone, or trunk is the single cable through which all data is transmitted between devices.

6.3 Switching is the process of routing packets from one port to another that leads to the destination. When data enters a port, it is referred to as ingress, and when data exits a port, it is referred to as egress. A communication system may consist of several switches and nodes. There are three type sof switching, namely packet, message, and circuit switching.

6.4 Here are the three types of switching:

a. Static routing – in this routing type, we have to manually add routes in the routing table. It is the most basic routing method which provide minimal overhead, security and minimal use of bandwidth.

b. Default routing – in this routing, a router will send all the packets to the next hope or router. It does not matter that the packets belong to that network or not. Either it forward the packets to the router, configured as a default gateway.

Q7:

Answer the following questions regarding the network traffic contingency plans.

7.1. What do you understand by contingency plan. Write your answer in 100-150 words.

Satisfactory response
Yes ☐ No ☐
  • It helps us in better prepare the future for worst condition

  • It offers better flexibility to manage the challenges that may arise in future

    1. Nobody wants Plan A to go wrong. However, having a solid plan B in place is the greatest approach to be ready for any eventuality. With a robust backup plan in place, we can successfully respond to unforeseen circumstances and get back on track as soon as feasible. A contingency plan is a proactive technique that can assist you in dealing with bad occurrences and ensuring business continuity. Here are the stages to developing a contingency plan for unexpected catastrophes and recovery measures to keep the business running smoothly. Here are the steps to create the contingency plan for an organization –

    • Prepare a list of risks associated with the business. This list will have all the risks with their impact. For a large-scale planning, we can involve several team members and work with them to identify the risks.

    • Share the approved contingency plan with your team and make sure that everyone knows what to do in an unfavorable situation, as quick as possible

    • Monitor the prepared plan with regular reviews and make sure it will remain accurate. We need to take into account new risks and opportunities that may include all the changing business requirements.

Q8: Describe the various network management systems suitable for conducting traffic evaluations. Write your answer in 250-300 words. Satisfactory response
Yes ☐ No ☐
The purpose of this checklist
The pre-assessment checklist helps students determine if they are ready for assessment. The trainer/assessor must review the checklist with the student before the student attempts the assessment task. If any items of the checklist are incomplete or not clear to the student, the trainer/assessor must provide relevant information to the student to ensure they understand the requirements of the assessment task. The student must ensure they are ready for the assessment task before undertaking it.
Section 1: Information for Students

☐ Make sure your trainer/assessor clearly explained the assessment process and tasks to be completed.

☐ Make sure you understand what evidence is required to be collected and how.

☐ The due date of this assessment task is in accordance with your timetable.

☐ In exceptional (compelling and compassionate) circumstances, an extension to submit an assessment can be granted by the trainer/assessor. Evidence of the compelling and compassionate circumstances must be provided together with your request for an extension to submit your assessment work.

Section 2: Reasonable adjustments

Declaration (Student to complete)

☐ I confirm that the purpose and procedures of this assessment task has been clearly explained to me.

☐ I confirm that I am ready for assessment.

Student Name: ______________________________________

Task instructions
  • This is an individual assessment.

  • The trainer/assessor assures simulated environmental conditions for the students/trainee for producing at least two information communications technology (ICT) network architecture designs.

  • The student must follow the word limits specified in the templates.

  • Conduct traffic measurements

  • Develop and implement contingencies to control traffic flow

  • Activity 2: Interrogate system monitoring alerts and alarms and identify areas of the route and circuit unavailability

  • Activity 3: Assess planned and unplanned outages to determine network unavailability and verify restoration times

  • Activity 8: Conduct traffic measurements across all required routes

  • Activity 9: Analyse results, historical data and traffic volume requirements

  • Activity 14: Develop contingency plans to allow for problems during network changes

  • Activity 15: Implement software changes according to planned network strategy

  • Activity 20: Analyse measurements and provide a report to relevant personnel with recommendations for further changes

  • Activity 21: Review and monitor strategies and initiate corrective action where required

  • Activity 26: Identify potential network traffic problems and make recommendations to network planners

  • Activity 27: Complete reports with recommendations and forward them to relevant personnel.

TrueFort uses an application-centric approach to protect cloud, hybrid, and legacy environments from hidden risks. They believe the largest, most-targeted part of the enterprise cyberattack is its application environment—and it aims to secure that by using telemetry from a client’s existing agents to deliver solutions to its infrastructure, thereby improving risk postures. The platform also supports an open ecosystem model that allows clients to use agents from tools including CrowdStrike and Carbon Black. Its full-stack cloud workload capabilities, patented advanced behavioural analytics, policy automation, real-time insight into the application environment, and bring-your-own-agent approach have solidified it as a lead competitor in the space.

New Project along with organisational requirements:

  • Evaluate network capacity and traffic congestion

  • Develop traffic control strategies

  • The purpose of this assessment task is to conduct the management of network traffic on at least two network systems.

  • This assessment task will be completed in your training organisation’s IT lab. Your trainer/assessor will supervise you in performing this assessment task.

Work details, Planned network strategy and Scope

Planned network strategy for LAN (Local Area Network) at both computer labs:

Customer Complaints
Planned and Unplanned outages

Planned outages for lab1:

  • Every Friday 10:00 AM – 11:00 AM

  • Servers are scheduled for maintenance.

  • There is a network connectivity outage for 1 hour.

  • DDoS attack on the rise (takes 2-3 hours to restore)

Security arrangements

a) Firewall – Monitoring of web traffic or even traffic between 2 internal networks allows you to detect and control abnormal and harmful It can help you block all the traffic that is unnecessary for business needs. An active firewall policy not only limits the unbeneficial traffic but also stops the traffic moving from all malicious sites, thereby protecting the network and enterprise data. While there are many firewall solutions out there, select the one that suits your organization’s needs. Here the depth and breadth of the protection required will form the key parameters for firewall selection.

Legislation

Data Protection and the APPs

The Privacy Act APPs comprise legally binding obligations for APP entities for:

  • Notifying individuals about their collected information (APP5);

  • Using or disclosing personal information (APP6), including for direct marketing (APP7);

  • Permitting individuals to access (APP12) and correct (APP13) their personal information.

Industry Standard codes relating to Data and technology are further divided into the following categories by committee:

Standards and Regulations

In July 2019, APRA issued CPS 234 on Information Security. This regulation requires APRA-regulated financial, insurance and superannuation entities to comply with legally binding minimum standards of information security, including by:

  • Specifying information security roles and responsibilities for the entities’ board, senior management, governing bodies and individuals;

APRA-regulated entities are required to externally audit their organisation’s compliance with CPS 234 and report to APRA in 2021.

If organisations are non-compliant, they may be required to issue breach notices and create rectification plans. If organisations are unable to comply with the standards following this process, APRA may undertake a more formal enforcement process which may include enforceable undertakings or court proceedings.

Data Protection

The Privacy Act APPs provide a legally binding framework for APP entities to the collection, processing, use, storage and dissemination personal information.

"Personal information" under the Privacy Act is defined broadly as information or an opinion about an identified or reasonably identifiable individual. Personal information also includes "sensitive information", which includes information or opinions on an individual’s race, ethnicity, politics, religion, sexual orientation, health, trade associations and criminal records. Sensitive information is often afforded a higher level of protection than other personal information.

The Privacy Act applies to "APP entities" which, subject to some exceptions, including federal government agencies, private sector organisations with an annual turnover of over AUD3 million and smaller entities with data-intensive business practices (including private health providers, businesses that sell or purchase personal information and service providers to the federal government). 

  • privacy legislation enacted at the state and territory level, which is largely similar to the Privacy Act;

  • the My Health Records Act, which imposes specific obligations for health information collected and stored in Australia’s national online health database;

Funding Parameters
Maximum Grant $15000
Maximum total project cost $8500
Minimum % of overall match that must be cash 10%
Budgeted levels
Use of funds in % 50%
Cash $10000
Plan amendments
  • Determine your network management software capability.

  • Customise your network management software to meet your objectives, if necessary.

Enterprise network management policy

The Calsoft Solutions Network Management Policy applies to individuals who are involved in the configuration, maintenance, or expansion of the Calsoft Solutions network infrastructure.

Policy

Appropriate technical solutions must be implemented to protect Confidential information from the unauthorised transfer, modification, or disclosure (i.e. next-gen firewalls, IDS/IPS, DLP).

A map or diagram of the network and data flow, including external connections, must be maintained. This map or diagram must be updated after any changes to the network occur. This diagram should be reviewed every 6 months to ensure it continues to represent the network architecture

Resource usage must be monitored to ensure the required system performance.

Information processing facilities must address redundancy sufficient to meet availability requirements.

Network devices must be installed and configured following Calsoft Solutions implementation standards.

The use of departmental network devices is not permitted without the written authorisation from Calsoft Solutions IT Management.

Wireless networks must be segmented using appropriate technical controls.

Authentication settings (passwords, encryption keys, etc.) must be changed periodically as well as anytime it is suspected that such information has been compromised or if anyone with knowledge of the information leaves the organisation.

Calsoft Solutions wireless network users must not tamper with network access points or security settings.

Users must not connect to another wireless network and the Calsoft Solutions wireless network simultaneously.

Personnel found to have violated this policy may be subject to disciplinary action, up to and including termination of employment and related civil or criminal penalties.

Any vendor, consultant, or contractor found to have violated this policy may be subject to sanctions up to and including removal of access rights, termination of the contract(s), and related civil or criminal penalties.

  • You will identify potential network traffic problems and make recommendations

  • You will provide information for capacity planning.

  • Conduct traffic measurements

  • Develop and implement contingencies to control traffic flow

  • Activity 2: Interrogate system monitoring alerts and alarms and identify areas of the route and circuit unavailability

  • Activity 3: Assess planned and unplanned outages to determine network unavailability and verify restoration times

  • Activity 8: Conduct traffic measurements across all required routes

  • Activity 9: Analyse results, historical data and traffic volume requirements

  • Activity 14: Develop contingency plans to allow for problems during network changes

  • Activity 15: Implement software changes according to planned network strategy

  • Activity 20: Analyse measurements and provide a report to relevant personnel with recommendations for further changes

  • Activity 21: Review and monitor strategies and initiate corrective action where required

  • Activity 26: Identify potential network traffic problems and make recommendations to network planners

  • Activity 27: Complete reports with recommendations and forward them to relevant personnel.

  • To obtain work details, planned network strategy and scope from the relevant personnel and arrange for site access in compliance with required security arrangements, legislation, codes, regulations and standards

  • To interrogate system monitoring alerts and alarms and identify areas of the route and circuit unavailability

  • To activate and deactivate semi-permanent controls active in the network regularly to simulate irregular traffic

  • To conduct traffic measurements across all required routes

  • To develop strategies for recovery where traffic congestion occurs

  • To develop contingency plans to allow for problems during network changes

  • To conduct monitoring of changes and take measurements to assess outcomes of variations

  • To analyse measurements and provide a report to relevant personnel with recommendations for further changes

  • To predict future potential traffic trends and requirements using data on current and historical traffic patterns

  • To identify potential network traffic problems and make recommendations to network planners

Activity 1: Obtain work details, planned network strategy and scope from the relevant personnel and arrange for site access in compliance with required security arrangements, legislation, codes, regulations and standards.

This part of the activity requires you to obtain work details, planned network strategy and scope from the relevant personnel and arrange for site access in compliance with required security arrangements, legislation, codes, regulations and standards and document the outcomes using ‘Template 1’.

The trainer/assessor must observe the student conducting the meeting.

After preparing the meeting agenda, you are then required to send an e-mail to the meeting participants to invite them to the meeting.

After e-mailing the meeting agenda to the participants of the meeting, you are then required to conduct a meeting with them.

Before the meeting
  • Use the meeting agenda template provided to prepare the meeting agenda.

During the meeting
  1. Welcome the participants

After the meeting

2. Document the discussions using ‘Template’ provided based on the feedback received, if any.

Meeting script:

Work details, Planned network strategy and Scope (150-200 words)

In this task, we are assigned the task of conducting network traffic management for the two local area networks (LANs). These LANs are installed in two computer labs. We must undertake traffic measurements, develop and implement contingency plans to control traffic flow, identify potential network traffic problems, offer recommendations, and give data for capacity planning.

Planned network strategy for LAN (Local Area Network) at both computer labs:

Security arrangements (300-350 words)

a) Firewall – These are the security devices used to monitor network traffic between two internal LANs. It controls harmful and abnormal traffic based on pre-configured firewall rules. It can assist you in blocking all unneeded traffic for commercial purposes. An active firewall policy not only limits unbeneficial traffic but also prevents traffic from all harmful sites from entering the network, thereby securing the network and company data. There are numerous sorts of firewall solutions available to keep us safe.

b) Powerful antivirus – As there are so many antiviruses are available which offer good level of security. Depending up on the organization’s requirements, we can select the best antivirus for them that is capable of remote monitoring, support cloud hosting, and practically capable of secure the entire infrastructure.

Legislation (100-150 words)
There are two legislations are applicable on the given case study organization. The data protection APP act is a legal obligation applicable on monitoring of a network and compromising with some personal details of a user. There are a total of thirteen parts of this APP legislation that are applied on the organization. Another applicable legislation includes some industry standard codes which help in determining and provide and standard approach to select and install hardware and software equipment like cable, technology, broadcast setting, graphic, and all other recommended networking devices. both of these legislations will help in safeguarding user privacy, a legal binding with applicable laws and security and availability of service due to the use of standard devices according to the industry standard.
Codes for cyber security operations (50-100 words)
In respect to the cyber security operations, there are two legislations are applicable on the given scenario. These applicable cyber security codes are data protection act, APP, and some industry standard codes. There are thirteen APP codes (range from 1 to 13) are applicable to protect user’s privacy and personal details while monitoring. Some industry standard codes are also applicable, which include some committee codes related to cabling, broadcasting service, ethernet technology, ACA standards, and information security.
Standards (400-450 words)

Data protection standards –

When developing rules for the collection, use, and storage of specific information, organizations should consider their obligations under the Privacy Act, Archives Act 1983 (Archives Act), and TIA Act. The OAIC's Privacy Framework, as described in Section 3.2 Consensus or Commonly Applied Framework, may be regarded as a de facto norm for data protection.

  • Maintaining tools to detect and respond to information security incidents in a timely manner

  • Notifying APRA of any material information security incidents

Regulations (250-300 words)

Here are the regulations applicable on data protection:

NDB scheme –

These laws are applicable on the organizations dealing with personal information in Australia. Here are the applicable laws:

  • Privacy legislation; applicable at state and territory level

Meeting agenda template:

Venue: Zoom meeting

Date: 01/07/2022 10:00 AM

No. Points Discussed Actions Suggested Target Date
1 Scope of the project Scope is defined for the work 03/07/2022
2 Work details Work details are analysed and recorded 06/07/2022
3 Strategic network planning Complete the network planning and results are recorded 10/07/2022
4 Compliances and regulations Regulatory compliances are searched and develop to meet the project requirements 14/07/2022
5 Security policies and codes Search and noted down the security codes and applicable policies 19/07/2022
6 Standards, regulations and codes applicable Search the relevant codes, standards and regulations and recorded properly 23/07/2022

Performance Criteria/Performance Checklist: Activity 1

This activity requires you to interrogate system monitoring alerts and alarms and identify areas of the route and circuit unavailability.

This activity is required to be performed at both LAN network systems of both computer labs.

    • High CPU or memory usage

    • Overloaded or crashed servers

    • Ethernet ports (Check the ethernet ports are working, and traffic is flowing through)

Further, you must:

System monitoring alerts and alarms for the below issues using Solarwinds tool (250-300 words)
Response time delays The maximum response time delay detected with the server is 1400 milliseconds. While the minimum response time delay is 700 milliseconds.
High CPU or memory usage
Overloaded or crashed servers The server was overloaded, as per detected logs, many time while access amdb database service. The max CPU time is 14696.65 milli seconds.
Failures of critical hardware like routers, switches, gateways, and proxies There are no logs found for failure of any hardware like switch, router, gateway or proxies.
Areas of the route and circuit unavailability
(50-80 words)
The IP address of the system IP address of the system is 172.17.160.1 (PGSQL)
Hub or Switch No hub or switch is configured in the network
Ethernet ports No wired connectivity detected in the network, among devices. So no ethernet ports are there.

Response time delay

IP address of the system

Activity 3: Assess planned and unplanned outages to determine network unavailability and verify restoration times.

This activity is required to be performed at both LAN network systems of both computer labs.

To do so, you need to:

Planned and Unplanned outages (40-80 words)

According to the given scenario, planned outage will be 2 minutes when the whole system will go down.

Planned outages for lab2:

Performance Criteria/Performance Checklist: Activity 3

Description of the activity

This activity is a continuation of Activity 3.

  • Obtain and interrogate network management system for the below issues and document using Template 4:

    • Poor network performance.

  • Take a screenshot of each step implemented to obtain and interrogate the network management system and identify traffic status and submit it to the trainer/assessor.

This task cannot be done due to the lack of networking resources, required for this task.

Obtain and interrogate network management system for the below issues (100-150 words)
Identify traffic status using Solarwinds tool (100-150 words)

Performance Criteria/Performance Checklist: Activity 4

Activity 5: Analyse system alert and identify real and potential traffic problems.

This part of the activity requires you to analyse system alerts and identify real and potential traffic problems, and document the outcomes using ‘Template 5’.

To do so, you need to:

  • Analyse system alert from system logs and events and document using Template 5.

Template 5: Analyse system alert and identify real and potential traffic problems.

System alert from logs and events (50-100 words)
Real and potential traffic problems (30-50 words)

Real traffic problems

Activity 6: Analyze customer complaints and traffic measurement data to identify network problems.

This part of the activity requires you to analyses customer complaints and traffic measurement data to identify network problems and document the outcomes using ‘Template 6’.

This activity requires you to use the Solar winds tool.

To do so, you need to:

    • Local Network is Unable to Connect to the internet

    • Unable to Connect to Local File or Printer Shares

    • Duplicate IP Addresses

Template 6: Analyse customer complaints and traffic measurement data to identify network problems.

Customer complaints (100-150 words)
  • Local network is unable to connect to internet – local network may have some connectivity issue so that is not able to connect to the internet.

  • Server not reachable – many users reported that when they are trying connecting to the server, this error was there.

Traffic measurement data (100-150 words)
While analyzing traffic using Solar Winds, we detected that high network traffic is flowing in the local and external network. This could be a result of slower network speed, dis-connectivity or no connectivity issue. For this reason, when a new user trying connecting to the network, it shows an error of IP address exhausted. This error is due to the exhausted IP address limit of DHCP server and it will not able to connect a greater number of systems in the network. The IP address conflict error was detected due to same IP address is assigned to two users and both are not able to communicate in the local network to any other system.
Network problems (50-100 words)

IP Address Exhaustion

Duplicate IP Addresses

Service not available

Performance Criteria/Performance Checklist: Activity 6

Description of the activity

This activity is a continuation of Activity 6.

  • OpenCommand Prompt, right-click the top result, and select Run as administrator.

  • Type the following command to identify the name of the adapter you want to enable and press Enter:

  • Document the outcomes using Template 7.

  • Submit the outcomes to the trainer/assessor.

Activate and deactivate semi-permanent controls active in the network regularly to simulate irregular traffic (300-350 words)
  • When the CMD prompt is opened with administrator rights, we need to use ‘netsh’ command to complete this activity

  • Here, type command – ‘netsh’ > ‘interface’ and press Enter

  • To enable a network adapter, we use command –

Netsh interface set interface Wi-Fi enable

Performance Criteria/Performance Checklist: Activity 7

This activity requires you to conduct traffic measurements across all required routes.

This activity is required to be performed at both computer labs.

    • Passive measurement of traffic

  • Document the outcomes using Template 8.

Traffic measurement approaches (150-200 words)

Passive Measurement of Traffic

Performance Criteria/Performance Checklist: Activity 8

This part of the activity requires you to analyse results, historical data and traffic volume requirements and document the outcomes using ‘Template 9’.

Description of the activity

To do so, you need to:

  • Analyse results and historical data obtained from Activity 8.

Further, you must:

  • Document the outcomes of test conducted using Template 9.

Analyse results, historical data and traffic volume requirements (150-200 words)
Network Availability Testing
Network Speed Testing
Bandwidth Usage Testing

This part of the activity requires you to determine specific thresholds, loading and grading levels to alter traffic flows and document the outcomes using ‘Template 10’.

Description of the activity

  • Review the results from Activity 9.

  • Determine specific thresholds, loading and grading levels to alter traffic flows.

Template 10: Determine specific thresholds, loading and grading levels to alter traffic flows.

Thresholds, Loading and Grading levels
Thresholds
Loading
Grading levels

Performance Criteria/Performance Checklist: Activity 10

Description of the activity

This activity is a continuation of Activity 10.

Template 11: Obtain funding parameters and budgeted levels, and determine plan amendments.

Funding Parameters
Maximum Grant $150,000
Maximum total project cost $260,000
Minimum % of overall match that must be cash 50%
Budgeted levels
Use of funds in % 31%
Cash $58,000
Plan amendments (30-50 words)

Execution of the plan will be done as per plan.

Activity 12: Confirm that traffic control strategies to prevent traffic problems.

This activity is required to be performed at both computer labs.

To do so, you need to:

Template 12: Confirm that traffic control strategies to prevent traffic problems.

Confirming Traffic control strategies to prevent traffic problems using the below techniques (250-300 words)

Open Loop Congestion Control

This activity requires you to develop strategies for recovery where traffic congestion occurs.

This activity is required to be performed at both computer labs.

  • Use a CDN (Content Delivery Network) that will optimise resources by placing more requests on edge servers

  • Prioritise traffic on your network (for instance, VoIP services is always high-priority)

  • Check for any attack attempts in your connection logs

  • Use a VPN such as Private Internet Access to bypass congestion (if the issue is on your ISP’s side)

Strategies for recovery where traffic congestion occurs (100-150 words)

Performance Criteria/Performance Checklist: Activity 13

This activity is a continuation of Activity 13.

This activity requires you to develop contingency plans to allow for problems during network changes.

    • Determine probability of each risk identified.

    • Determine and document response to each risk identified.

Contingency plans (300-350 words)

Performance Criteria/Performance Checklist: Activity 14

Description of the activity

This activity is a continuation of Activity 14.

  • Implement software changes according to planned network strategy and document using Template 15:

    • Configuration of SNMP capability.

Implement Software changes (50-100 words)
Configuration of SNMP capability.
Shutting down the problematic software
Updating device’s firmware

This part of the activity requires you to develop short-term ad hoc solutions where only a temporary solution is required and document the outcomes using ‘Template 16’.

Description of the activity

To do so, you need to:

  • Develop short-term ad hoc solutions and document using Template 15:

    • Traffic optimisation following tariff plan

Template 16: Develop short-term ad hoc solutions where only a temporary solution is required.

Develop short-term ad hoc solutions (250-300 words)

Description of the activity

This activity is a continuation of Activity 16.

  • Implement one of the temporary solutions developed in Activity 16.

  • Remove the solution after 1 hour and confirm it can be reversed.

Confirm that reversal action can be initiated (200-250 words)

Activity 18: Implement contingency plan where required according to organisational requirements.

This activity is required to be performed at both computer labs.

This activity requires you to use the Solarwinds tool.

    • Recovery phase

  • Document the outcomes using Template 18.

Steps to obtain sign off on final business solution (300-350 words)

Performance Criteria/Performance Checklist: Activity 18

This part of the activity requires you to conduct monitoring of changes and take measurements to assess outcomes of variations and document the outcomes using ‘Template 19’.

Description of the activity

To do so, you need to:

  • Conduct monitoring of changes and take measurements and document using Template 19.

Conduct monitoring of changes and take measurements (50-100 words)

Activity 20: Analyse measurements and provide a report to relevant personnel with recommendations for further changes.

This activity is required to be performed at both computer labs.

This activity requires you to use the Solarwinds tool and Ms Word.

    • TCP NewReno

    • TCP CUBIC

Recommendations to use the below techniques for future changes (50-100 words)
Template to Write an email (250-300 words)

Performance Criteria/Performance Checklist: Activity 20

This activity requires you to review and monitor strategies and initiate corrective action where required.

This activity is required to be performed at both computer labs.

Further, you must take a screenshot of each step implemented and submit it to the trainer/assessor via e-mail.

Template 21: Review and monitor strategies and initiate corrective action where required.

Initiate corrective action (80-100 words)

This part of the activity requires you to measure and analyse traffic loads to assess congestion problems and determine possible impact, and document the outcomes using ‘Template 22’.

Description of the activity

To do so, you need to:

  • Measure and analyse traffic loads to assess congestion problems and document using Template 22:

  • Determine possible impact and document using Template 22:

    • Packet Loss

Template 22: Measure and analyse traffic loads to assess congestion problems and determine possible impact.

Measure and analyse traffic loads to assess congestion problems (100-150 words)

Poor Network Design/Mis-Configuration

Determine possible impact (100-150 words)

Packet Loss

Jitter

This part of the activity requires you to control traffic flow and prevent processor overloads, and document the outcomes using ‘Template 23’.

Description of the activity

To do so, you need to:

  • Control traffic flow and prevent processor overloads and document using Template 23.

Control traffic flow and prevent processor overloads. (100-150 words)

Activity 24: Evaluate potential traffic increases for impact on the network and develop contingencies to control traffic flow if required.

This part of the activity requires you to evaluate potential traffic increases for impact on the network and develop contingencies to control traffic flow if required, and document the outcomes using ‘Template 24’.

This activity requires you to use the Solarwinds tool.

To do so, you need to:

    • Client or Server Health

  • Develop contingencies to control traffic flow considering the below practices and document using Template 24:

    • Program Improvement

Template 24: Evaluate potential traffic increases for impact on the network and develop contingencies to control traffic flow if required.

Evaluate potential traffic increases for impact on the network (400-450 words)
Develop contingencies to control traffic flow (150-200 words)

1. Program Management

2. Planning

This part of the activity requires you to predict future potential traffic trends and requirements using data on current and historical traffic patterns and document the outcomes using ‘Template 25’.

Description of the activity

To do so, you need to:

  • Analyse current and historical traffic patterns obtained in previous activities using the below methods and document using Template 25:

Template 25: Predict future potential traffic trends and requirements using data on current and historical traffic patterns.

Current and historical traffic patterns (80-100 words)

Poisson’s Model:

Future potential traffic trends and requirements (80-100 words)

This activity requires you to identify potential network traffic problems and make recommendations to network planners.

This activity is required to be performed at both computer labs.

    • Too many devices

    • Bandwidth hogs

Potential network traffic problems (80-100 words)

Outdated or non-compatible hardware

Too many devices

Make recommendations to network planners (80-100 words)

This part of the activity requires you to complete reports with recommendations and forward them to relevant personnel, and document the outcomes using ‘Template 27’.

Description of the activity

    • Future potential traffic trends and requirements

    • Potential network traffic problems

Template to Write an email (250-300 words)

Potential network traffic problems

Reports with recommendations

  1. Assessment Results Sheet

Outcome
First attempt:

Outcome (make sure to tick the correct checkbox):

Satisfactory (S) ☐ or Not Satisfactory (NS) ☐

Date: _______(day)/ _______(month)/ _______(year)

Student Declaration
  • I understand that if I disagree with the assessment outcome, I can appeal the assessment process, and either re-submit additional evidence undertake gap training and or have my submission re-assessed.

  • All appeal options have been explained to me.

Student Signature
Date
Trainer/Assessor Name
Trainer/Assessor Declaration

☐ Ongoing professional development in VET

I declare that I have conducted an assessment of this student’s submission. The assessment tasks were deemed current, sufficient, valid and reliable. I declare that I have conducted a fair, valid, reliable, and flexible assessment. I have provided feedback to the student.

Trainer/Assessor Signature
Date
Office Use Only
Reasonable Adjustment Strategies Matrix (Trainer/Assessor to complete)
Category Possible Issue

Reasonable Adjustment Strategy

(select as applicable)

LLN

Verbal assessment

Presentations

Non-English Speaking Background

Reading

Writing

Use short sentences that do not contain large amounts of information

Clarify information by rephrasing, confirm understanding

Indigenous

Knowledge and understanding

Flexibility

Flexible delivery

Using group rather than individual assessments

Age

Trainer/Assessor should refer to the student’s experience

Ensure that the time available to complete the assessment takes account of the student’s needs

Changes to course design, e.g. substituting an assessment task

Modifications to the physical environment, e.g. installing lever taps, building ramps, installing a lift

Educational background

Discuss with the Student previous learning experience

Ensure learning and assessment methods meet the student’s individual need

Disability

Limited study skills and/or learning strategies

Identify the issues

Changes in teaching practices, e.g. wearing an FM microphone to enable a student to hear lectures

Supply of specialised equipment or services, e.g. a note-taker for a student who cannot write

Trainer/Assessor Name
Trainer/Assessor Declaration I declare that I have attached all relevant evidence to provide reasonable adjustment. The training package guidelines and criteria have not been compromised in the process of providing reasonable adjustment to the student. I declare that I have conducted a fair, valid, reliable, and flexible assessment. I have provided explanation of reasonable adjustments strategy used, as required.
Trainer/Assessor Signature
Date

Please complete this evaluation form as thoroughly as you can, in order for us to continuously improve our training quality. The purpose of the evaluation form is to evaluate the areas below:

  • logistics and support

No. Criteria/Question

Disagree

Neutral

B Trainer/Assessor Evaluation
1 The trainer/assessor was prepared and knowledgeable on the subject of the program
2 The trainer/assessor encouraged student participation and input
3 The trainer/assessor made use of a variety of methods, exercises, activities and discussions
4 The trainer/assessor used the material in a structured and effective manner
5 The trainer/assessor was approachable and respectful of the learners
6 The trainer/assessor was punctual and kept to the schedule
7 The trainer/assessor was easy to understand and used the correct language
Additional Comments on Training
Copyright © 2009-2023 UrgentHomework.com, All right reserved.