|
The range statement relates to the unit of competency as a whole. It allows for different work environments and situations that may affect performance. Bold italicised wording, if used in the performance criteria, is detailed below. Essential operating conditions that may be present with training and assessment (depending on the work situation, needs of the candidate, accessibility of the item, and local industry and regional contexts) may also be included. |
Servers may include: | Application/web serversBEA Weblogic serversIBM VisualAge and WebSphereNovell NDS serversEmail serversFile and print serversVoice serversFTP serversFirewall serversProxy/cache servers |
Client may include but is not limited to: | internal departmentsexternal organisationsclubsindividual peopleinternal employees |
Organisational requirements may include but is not limited to: | how and what the organisation wants in regard to work environmentproblem solution processespreventative maintenance and diagnostic policyroles and technical responsibilities in network managementvendor and product service-level support agreements |
Documentation may follow: | ISO/IEC/AS standardsaudit trailsnaming standardsversion controlproject management templates and report writingmaintaining equipment inventoryclient trainingsatisfaction reports |
User may include: | a person within a departmenta department within the organisationa third party |
Cabling may include but is not limited to: | UTPSTPCategory 5e, 6, 7fibre |
Network may include but is not limited to: | large and small LANsnational WANsVPNsthe internetthe use of the PSTN for dial-up modems onlyprivate linesdatavoice |
Network topology may include: | cabled ringstarbushierarchical and hybrid or wireless networks |
Firewalls may include: | hardware appliancesproxy serversindividual PC solutionalso: varying functionality, including network address translation (NAT)/IP Masquerading, routing to specific machines as well as Stateful Packet Inspection (SPI), Denial of Service (DOS) detection and blocking, spoofing, unauthorised associations |
Components may include: | motherboardsCMOS batterycentral processing unit (CPU)CD and DVD drivesinterface cardsdrivesfax/modem cardsRAM upgradesCPU upgrades |
Hardware may include but is not limited to: | mobile equipmentworkstationspersonal computersmodemswireless access points and other connectivity devicesnetworksDSL modemsremote sitesservers |
Tools may include but are not limited to: | network performance softwaredata and voice integration measurementspolicing and shaping toolsfrequency analyserscable testingequipment testingcarrier connection tests |
Security may include but is not limited to: | IPSecLEAPWEPWPAAAADiametertokenssmart cards |
Standards may include: | ISO/IEC/IEEE/IETF/ITU/AS standards,organisational standardsproject standards |
Software may include but is not limited to: | commercial software applicationsorganisation-specific software, packaged software, in-house or customised software |