NTISthis.com

Evidence Guide: ICANWK417A - Build an enterprise wireless network

Student: __________________________________________________

Signature: _________________________________________________

Tips for gathering evidence to demonstrate your skills

The important thing to remember when gathering evidence is that the more evidence the better - that is, the more evidence you gather to demonstrate your skills, the more confident an assessor can be that you have learned the skills not just at one point in time, but are continuing to apply and develop those skills (as opposed to just learning for the test!). Furthermore, one piece of evidence that you collect will not usualy demonstrate all the required criteria for a unit of competency, whereas multiple overlapping pieces of evidence will usually do the trick!

From the Wiki University

 

ICANWK417A - Build an enterprise wireless network

What evidence can you provide to prove your understanding of each of the following citeria?

Confirm client requirements and network equipment required

  1. Identify and clarify organisational requirements of the client
  2. Evaluate client requirements along with business needs in order to translate into technical requirements
  3. Review existing network design documentation to ensure it is authorised, current and complete
  4. Identify network topology
  5. Identify the components required to be installed to meet the technical requirements
  6. Contact vendors and service suppliers to obtain specifications and availability of identified components
  7. Ensure preliminary work is completed within the required timeframe
Identify and clarify organisational requirements of the client

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Evaluate client requirements along with business needs in order to translate into technical requirements

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Review existing network design documentation to ensure it is authorised, current and complete

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Identify network topology

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Identify the components required to be installed to meet the technical requirements

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Contact vendors and service suppliers to obtain specifications and availability of identified components

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Ensure preliminary work is completed within the required timeframe

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Prepare for installation

  1. Ensure client and users are aware of date and time of installation
  2. Gather, prepare and check installation and safety equipment
  3. Assess on-site safety arrangements for installers and users
Ensure client and users are aware of date and time of installation

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Gather, prepare and check installation and safety equipment

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Assess on-site safety arrangements for installers and users

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Select, install and configure access points and other wireless devices

  1. Select appropriate hardware based on identified components
  2. Install and configure hardware to provide wireless access to network
  3. Ensure connections are secured against intrusion or data access by unauthorised persons, are safe for users, and are protected from the environment
  4. Configure security, monitoring, logging and quality of service features consistent with standards and protocols
  5. Ensure test equipment is calibrated
  6. Test wireless network systems performance and verify that it meets enterprise requirements and is consistent with standards and protocols
Select appropriate hardware based on identified components

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Install and configure hardware to provide wireless access to network

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Ensure connections are secured against intrusion or data access by unauthorised persons, are safe for users, and are protected from the environment

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Configure security, monitoring, logging and quality of service features consistent with standards and protocols

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Ensure test equipment is calibrated

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Test wireless network systems performance and verify that it meets enterprise requirements and is consistent with standards and protocols

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Select, install and configure antennas

  1. Select appropriate antennas based on design plan
  2. Safely install and configure antennas to provide wireless access to network
  3. Measure and assess signal strength within and outside building
  4. Resolve and report radio frequency interference issues
Select appropriate antennas based on design plan

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Safely install and configure antennas to provide wireless access to network

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Measure and assess signal strength within and outside building

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Resolve and report radio frequency interference issues

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Secure wireless network

  1. Identify possible security threats to assets
  2. Configure client server and helper security devices
  3. Configure associations and filters
Identify possible security threats to assets

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Configure client server and helper security devices

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Configure associations and filters

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Train users

  1. Provide training for users to establish and manage network connections
  2. Resolve pairing and log-on difficulties for users
  3. Inform users of wireless network etiquette and traffic capacity issues
  4. Advise users of help-desk contact details
Provide training for users to establish and manage network connections

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Resolve pairing and log-on difficulties for users

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Inform users of wireless network etiquette and traffic capacity issues

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Advise users of help-desk contact details

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Monitor and administer wireless network

  1. Monitor wireless network performance using diagnostic tools, including appropriate software
  2. Debug networking issues to maintain trouble-free wireless connection
  3. Document current settings and store securely consistent with commercial and business requirements
Monitor wireless network performance using diagnostic tools, including appropriate software

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Debug networking issues to maintain trouble-free wireless connection

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Document current settings and store securely consistent with commercial and business requirements

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Finalise build process

  1. Review network for performance issues, planned maintenance or upgrade requirements
  2. Report to client with network documentation and recommendations for performance issues
  3. File documentation according to organisational outlines
Review network for performance issues, planned maintenance or upgrade requirements

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Report to client with network documentation and recommendations for performance issues

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

File documentation according to organisational outlines

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Assessed

Teacher: ___________________________________ Date: _________

Signature: ________________________________________________

Comments:

 

 

 

 

 

 

 

 

Instructions to Assessors

Evidence Guide

The evidence guide provides advice on assessment and must be read in conjunction with the performance criteria, required skills and knowledge, range statement and the Assessment Guidelines for the Training Package.

Overview of assessment

Critical aspects for assessment and evidence required to demonstrate competency in this unit

Evidence of the ability to:

develop and maintain wireless networks.

Context of and specific resources for assessment

Assessment must ensure access to:

network technical requirements

network infrastructure, including wireless hardware and software

appropriate learning and assessment support when required

modified equipment for people with special needs.

Method of assessment

A range of assessment methods should be used to assess practical skills and knowledge. The following examples are appropriate for this unit:

verbal or written questioning to assess candidate’s knowledge of:

wireless topologies

wireless security networks

wireless security strategies

review of candidate’s client report and supporting documentation with recommendations.

Guidance information for assessment

Holistic assessment with other units relevant to the industry sector, workplace and job role is recommended, where appropriate.

Assessment processes and techniques must be culturally appropriate, and suitable to the communication skill level, language, literacy and numeracy capacity of the candidate and the work being performed.

Indigenous people and other people from a non-English speaking background may need additional support.

In cases where practical assessment is used it should be combined with targeted questioning to assess required knowledge.

Required Skills and Knowledge

Required skills

analytical skills to design, develop and implement various wireless network solutions

communication skills to:

communicate with users

liaise with vendors and obtain prices and product details

train users

numeracy skills to prepare a cost-benefit analysis

planning and organisational skills to plan and manage project according to time lines and cost schedules

problem-solving skills to troubleshoot and debug

technical skills to:

implement local area networks (LANs)

implement wireless networking strategies and configure wireless network software and hardware.

Required knowledge

detailed knowledge of:

audit and intrusion detection systems

auditing and penetration testing techniques

bandwidth and quality of service

factors affecting signal quality

layer 2 and layer 3 design issues

small office home office (SOHO) and enterprise LANs

transmission control protocols or internet protocols (TCPs/IPs) and applications

wireless security strategies

wireless topologies

wireless local area network (WLAN) and wireless area network (WAN) solutions

overview knowledge of:

features of security threats

network protocols and operating systems

security protocols, standards and data encryption.

Range Statement

The range statement relates to the unit of competency as a whole. It allows for different work environments and situations that may affect performance. Bold italicised wording, if used in the performance criteria, is detailed below. Essential operating conditions that may be present with training and assessment (depending on the work situation, needs of the candidate, accessibility of the item, and local industry and regional contexts) may also be included.

Requirements may include:

how and what the organisation wants in regard to work environment

preventative maintenance and diagnostic policy

problem solution processes

roles and technical responsibilities in network management

vendor and product service level support agreements.

Client may include:

external organisations

individuals

internal departments

internal employees.

Documentation may follow:

audit trails

client training

International Organization for Standardization (ISO), International Electrotechnical Commission (IEC) and Australian Standards (AS) standards

maintaining equipment inventory

naming standards

project-management templates and report writing

satisfaction reports

version control.

Network topology may include:

cabled, connected or single zone

carrier links

free space optics

indoor and outdoor installations

local multi-point distribution service (LMDS)

multi-channel multi-point distribution service (MMDS)

multiple zone

satellite connections

stand-alone or multi-zone wireless networks.

Components may include:

hardware, such as:

antennas and other connectivity devices

digital subscriber line (DSL) modems

mobile equipment

modem wireless access points

networks

personal computers

power controllers

remote sites

servers

uninterruptible power supplies (UPS)

workstations

cabling, such as:

category 5e, 6 and 7

coaxial

fibre optic

software, such as:

commercial applications

customised

in-house

organisation specific

packaged

wireless access.

Users may include:

community members

department

department within the organisation

third party.

Hardware may include:

access points

bridges

other wireless devices.

Security may include:

authentication, authorisation and accounting (AAA)

diameter

IP security (IPSec)

lightweight extensible authentication protocol (LEAP)

privacy key management (PKM)

secure sockets layer (SSL)

smart cards

tokens

wi-fi protected access (WPA)

wired equivalent privacy (WEP).

Standards may include:

International Organization for Standardization (ISO), International Electrotechnical Commission (IEC), Institute of Electrical and Electronics Engineers (IEEE), Internet Engineering Task Force (IETF), International Telecommunication Union (ITU) and Australian Standards (AS)

organisational

project.

Assets may include:

data and information

intellectual property

physical assets.

Tools may include:

cable testing

carrier-connection tests

data and voice-integration measurements

equipment testing

frequency and spectrum analysers

network performance software

policing and shaping tools

power meters

radiation meter.

Commercial and business requirements may include:

availability

backup and recovery of data

confidentiality

firewalls

hacking prevention

integrity

password logons

remote access to internal network.