Unit of Competency Mapping – Information for Teachers/Assessors – Information for Learners

ICANWK605A Mapping and Delivery Guide
Design and configure secure integrated wireless systems

Version 1.0
Issue Date: April 2024


Qualification -
Unit of Competency ICANWK605A - Design and configure secure integrated wireless systems
Description This unit describes the performance outcomes, skills and knowledge required to use appropriate tools, equipment, software and protocols to produce a verified radio frequency (RF) design plan for a wireless local area network (WLAN) and to design, configure and troubleshoot secure integrated wireless systems.
Employability Skills This unit contains employability skills.
Learning Outcomes and Application This unit applies to those who plan and conduct a wireless network site survey to verify RF coverage design for installation and to the installation, operation and troubleshooting of small to medium enterprise wireless networks.Relevant job roles include wireless network installer, wireless network support specialist and wireless network engineer.
Duration and Setting X weeks, nominally xx hours, delivered in a classroom/online/blended learning setting.
Prerequisites/co-requisites Not applicable.
Competency Field
Development and validation strategy and guide for assessors and learners Student Learning Resources Handouts
Activities
Slides
PPT
Assessment 1 Assessment 2 Assessment 3 Assessment 4
Elements of Competency Performance Criteria              
Element: Plan and conduct a site survey for setting up a wireless network
  • Assess client requirements to plan for selecting appropriate WLAN technology and network elements
  • Evaluate existing network infrastructure and produce a wireless network topology to determine upgrade or new installation requirements
  • Prepare basic RF deployment considerations related to site survey design of data or voice over WLAN applications
  • Produce a survey model including deployment characteristics to meet client requirements
  • Produce a spectral analysis predictive layer 1 site survey verified by a physical site survey
  • Analyse the survey results produced with an RF network design for a secure wireless network
  • Conduct an RF field trial for final evaluation of network topology and network element placements
       
Element: Prepare design specifications and plan for secure enterprise WLANs
  • Prepare for work according to relevant legislation, OHS, codes, regulations and standards
  • Produce design specifications and layout for wireless network using spread spectrum technology for enhanced network security
  • Review design plans to ensure sound WLAN RF principles and compliance with wireless regulatory bodies, standards and certifications
       
Element: Configure and test a controller-based WLAN
  • Produce a controller based wireless architecture from a possible range of industry-based wireless network architectures
  • Configure and test a WLAN controller and access points using controller-based AP discovery and association to enable roaming facilities
  • Configure the basics of a stand-alone access point
  • Configure and test client operating system WLAN configuration and install vendor specific software and utilities where applicable
       
Element: Configure and test WLAN security
  • Review the general framework of wireless security and security components for securing the WLAN
  • Configure and test identification assignments to network elements
  • Configure and test authentication methods using different sources of authentication
  • Configure and test encryption methods to comply with network security policies
       
Element: Conduct WLAN maintenance and troubleshooting
  • Evaluate WLAN troubleshooting methods for controllers, access points, and client methodologies
  • Use networking tools to maintain and troubleshoot network
  • Transfer device configurations and operating system (OS) using maintenance tools and commands
       


Evidence Required

List the assessment methods to be used and the context and resources required for assessment. Copy and paste the relevant sections from the evidence guide below and then re-write these in plain English.

The evidence guide provides advice on assessment and must be read in conjunction with the performance criteria, required skills and knowledge, range statement and the Assessment Guidelines for the Training Package.

Overview of assessment

Critical aspects for assessment and evidence required to demonstrate competency in this unit

Evidence of the ability to:

plan and conduct a WLAN site survey

produce design specifications and layout of wireless network

configure and test a controller-based WLAN

test wireless security configurations.

Context of and specific resources for assessment

Assessment must ensure access to:

site where network installation may be conducted

hardware and software

organisational guidelines

computers

stand-alone and lightweight WLAN controllers and AP

hardware and software WLAN site survey tools

appropriate learning and assessment support when required

modified equipment for people with special needs.

Method of assessment

A range of assessment methods should be used to assess practical skills and knowledge. The following examples are appropriate for this unit:

direct observation of the candidate installing, configuring and testing a new or updated network

evaluation of documentation prepared by the candidate outlining testing procedures, test results, recommendation to network changes and completion records

verbal or written questioning of required knowledge.

Guidance information for assessment

Holistic assessment with other units relevant to the industry sector, workplace and job role is recommended, where appropriate.

Assessment processes and techniques must be culturally appropriate, and suitable to the communication skill level, language, literacy and numeracy capacity of the candidate and the work being performed.

Indigenous people and other people from a non-English speaking background may need additional support.

In cases where practical assessment is used it should be combined with targeted questioning to assess required knowledge.


Submission Requirements

List each assessment task's title, type (eg project, observation/demonstration, essay, assignment, checklist) and due date here

Assessment task 1: [title]      Due date:

(add new lines for each of the assessment tasks)


Assessment Tasks

Copy and paste from the following data to produce each assessment task. Write these in plain English and spell out how, when and where the task is to be carried out, under what conditions, and what resources are needed. Include guidelines about how well the candidate has to perform a task for it to be judged satisfactory.

Required skills

communication skills to liaise with internal and external personnel on technical, operational and business-related matters

literacy skills to:

interpret technical documentation

write reports as required

numeracy skills to:

take test measurements and interpret results

evaluate performance and interoperability of network

planning and organisational skills to:

coordinate the process in liaison with others

plan, prioritise and monitor own work

problem-solving and contingency-management skills to:

troubleshoot and debug WAN issues

adapt configuration procedures to requirements of network

reconfigure depending on differing operational contingencies, risk situations and environments

research skills to investigate appropriate hardware to meet requirements

technical skills to:

select and configure networking devices

assess and implement security requirements

use networking tools and site survey tools.

Required knowledge

authentication and encryption methods

configuration, verification and troubleshooting procedures to undertake:

router-operation and routing

VLAN switching and inter-switching communications

configuration of WLAN securities

current wireless regulations, standards and certifications

internetwork operating system (IOS) and IP networking models

RF and WLAN technology and network design

RF propagation and implementation issues

spread spectrum technologies

wireless network topologies and elements

wireless networking protocols

WLAN devices and their specification and use

WLAN radio frequencies characteristics and their measuring techniques.

The range statement relates to the unit of competency as a whole. It allows for different work environments and situations that may affect performance. Bold italicised wording, if used in the performance criteria, is detailed below. Essential operating conditions that may be present with training and assessment (depending on the work situation, needs of the candidate, accessibility of the item, and local industry and regional contexts) may also be included.

Client requirements may include:

accessibility

dropout rates

future scalability

grade of service (GoS)

infrastructure costs

interoperability to existing network

network growth

network RF coverage

network security

network traffic

operating budget

quality of service (QoS)

serviceability

service level agreement (SLA).

WLAN technology may include:

channels reuse and overlap

carrier sense multiple access/collision avoidance (CSMA/CA)

dynamic satellite survey (DSS)

multiple-input multiple-output (MIMO)

orthogonal frequency division multiplexing (OFDM)

rate-shifting

worldwide interoperability for microwave access (WiMAX)

wireless network topologies

wireless personal devices:

Bluetooth

cordless phones

personal digital assistant (PDA)

smartphone

wireless technology developed as an open global standard (ZigBee).

Network elements may include:

adaptors

access point (AP)

client

communications cables and connectors

controller

host

hubs

routers

servers

switches.

Network infrastructure may include:

additional antenna

lightning protection

mounting considerations

outdoor grounding

physical security

power over ethernet (PoE)

power including renewable sources

rack capacity

switch port capacity.

Wireless network topology may include:

basic mesh

bridging

basic service set (BSS)

extended service set (ESS)

independent basic service set (IBSS)

point-to-multipoint using BSS

point-to-point using IBSS.

RF deployment considerations may include:

AP location

basic RF site survey design related to channel re-use

building material

cell overlap

common RF interference sources such as devices

signal strength.

Survey model may include:

data

point-to-multipoint bridging

video point-to-point bridging

voice.

Deployment characteristics may include:

dense deployment

high mobility versus nomadic

internal meshing.

Physical site survey may include:

actual AP

RF power

simulated data rate to conduct the site survey

test radio equipment.

RF network design may include:

AP count

controller and licence requirements

location and type of network elements

location of additional APs for monitoring and sniffing

propagation patterns and attenuation

WLAN radio frequencies and characteristics.

Spread spectrum technology may include:

channels reuse and overlap

carrier sense multiple access or collision avoidance (CSMA/CA)

direct sequence spectrum (DSS)

multiple-input multiple-output (MIMO)

modulation

orthogonal frequency division multiplexing (OFDM)

rate-shifting

techniques:

direct sequence (DS)

frequency hopping (FH)

hybrids, combination of FH and DS

time hopping (TH).

WLAN RF principles may include:

antenna types

effective isotropic radiated power (EIRP)

reflection

refraction

RF gain/loss.

Wireless regulatory bodies, standards and certifications may include:

802.11a/b/g/n

European Telecommunications Standards Institute (ETSI)

Federal Communications Commission (FCC)

Wi-Fi Alliance.

Wireless network architectures may include:

lightweight access point (LWAP)

split media access control (MAC)

stand-alone AP versus controller-based AP.

WLAN controller and access points may include:

channel

command line interface (CLI)

graphical user interface (GUI)

interfaces

network time protocol (NTP)

power

wireless LANs (WLANs).

Controller-based AP discovery and association may include:

dynamic host configuration protocol (DHCP)

domain name system (DNS)

master-controller

n+1 redundancy

over the air provisioning (OTAP)

primary-secondary-tertiary.

Roaming may include:

Cisco centralised key management or proactive key caching (CCKM/PKC)

inter-controller

intra-controller

layer 2

layer 3.

Client operating system WLAN configuration may include:

Linux

Mac

Windows.

Security components may include:

authentication

encryption

intrusion prevention system (IPS)

management frame protection (MFP).

Identification assignments may include:

802.1q trunking

interface

service set identifier (SSID)

virtual local area network (VLAN)

wireless LAN identifier (WLANID).

Authentication methods may include:

802.1X

extensible authentication protocol-flexible authentication via secure tunnelling (EAP-FAST)

frame types:

associated or unassociated

control

data

management

guest

lightweight extensible authentication protocol

open (LEAP)

protected extensible authentication protocol (PEAP)

pre-shared key (PSK)

shared

wi-fi protected access (WPA) with extensible authentication protocol-transport layer security (WPA or WPA2 with EAP-TLS).

Sources of authentication may include:

local or external (EAP)

pre-shared key (PSK)

remote authentication dial-in user service (RADIUS).

Encryption methods may include:

advanced encryption standard (AES)

WPA or WPA2 with temporal key integrity protocol (TKIP).

Networking tools may include:

client troubleshooting

vendor debug

vendor logging.

Copy and paste from the following performance criteria to create an observation checklist for each task. When you have finished writing your assessment tool every one of these must have been addressed, preferably several times in a variety of contexts. To ensure this occurs download the assessment matrix for the unit; enter each assessment task as a column header and place check marks against each performance criteria that task addresses.

Observation Checklist

Tasks to be observed according to workplace/college/TAFE policy and procedures, relevant legislation and Codes of Practice Yes No Comments/feedback
Assess client requirements to plan for selecting appropriate WLAN technology and network elements 
Evaluate existing network infrastructure and produce a wireless network topology to determine upgrade or new installation requirements 
Prepare basic RF deployment considerations related to site survey design of data or voice over WLAN applications 
Produce a survey model including deployment characteristics to meet client requirements 
Produce a spectral analysis predictive layer 1 site survey verified by a physical site survey 
Analyse the survey results produced with an RF network design for a secure wireless network 
Conduct an RF field trial for final evaluation of network topology and network element placements 
Prepare for work according to relevant legislation, OHS, codes, regulations and standards 
Produce design specifications and layout for wireless network using spread spectrum technology for enhanced network security 
Review design plans to ensure sound WLAN RF principles and compliance with wireless regulatory bodies, standards and certifications 
Produce a controller based wireless architecture from a possible range of industry-based wireless network architectures 
Configure and test a WLAN controller and access points using controller-based AP discovery and association to enable roaming facilities 
Configure the basics of a stand-alone access point 
Configure and test client operating system WLAN configuration and install vendor specific software and utilities where applicable 
Review the general framework of wireless security and security components for securing the WLAN 
Configure and test identification assignments to network elements 
Configure and test authentication methods using different sources of authentication 
Configure and test encryption methods to comply with network security policies 
Evaluate WLAN troubleshooting methods for controllers, access points, and client methodologies 
Use networking tools to maintain and troubleshoot network 
Transfer device configurations and operating system (OS) using maintenance tools and commands 

Forms

Assessment Cover Sheet

ICANWK605A - Design and configure secure integrated wireless systems
Assessment task 1: [title]

Student name:

Student ID:

I declare that the assessment tasks submitted for this unit are my own work.

Student signature:

Result: Competent Not yet competent

Feedback to student

 

 

 

 

 

 

 

 

Assessor name:

Signature:

Date:


Assessment Record Sheet

ICANWK605A - Design and configure secure integrated wireless systems

Student name:

Student ID:

Assessment task 1: [title] Result: Competent Not yet competent

(add lines for each task)

Feedback to student:

 

 

 

 

 

 

 

 

Overall assessment result: Competent Not yet competent

Assessor name:

Signature:

Date:

Student signature:

Date: