NTISthis.com

Evidence Guide: ICTTEN512 - Design and implement an enterprise voice over

Student: __________________________________________________

Signature: _________________________________________________

Tips for gathering evidence to demonstrate your skills

The important thing to remember when gathering evidence is that the more evidence the better - that is, the more evidence you gather to demonstrate your skills, the more confident an assessor can be that you have learned the skills not just at one point in time, but are continuing to apply and develop those skills (as opposed to just learning for the test!). Furthermore, one piece of evidence that you collect will not usualy demonstrate all the required criteria for a unit of competency, whereas multiple overlapping pieces of evidence will usually do the trick!

From the Wiki University

 

ICTTEN512 - Design and implement an enterprise voice over

What evidence can you provide to prove your understanding of each of the following citeria?

Plan and design VoIP infrastructure to meet business requirements

  1. Ascertain end-user requirements in consultation with client
  2. Select VoIP infrastructure in line with business and end-user requirements, within budget limitations
  3. Select protocols for converged networks
  4. Select hardware, software, network and security requirements according to agreed business and end-user specifications
  5. Investigate factors affecting bandwidth and calculate bandwidth usage for various codecs, including considerations of overhead, connection quality and connection speeds
Ascertain end-user requirements in consultation with client

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Select VoIP infrastructure in line with business and end-user requirements, within budget limitations

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Select protocols for converged networks

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Select hardware, software, network and security requirements according to agreed business and end-user specifications

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Investigate factors affecting bandwidth and calculate bandwidth usage for various codecs, including considerations of overhead, connection quality and connection speeds

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Install and configure VoIP infrastructure to meet business requirements

  1. Implement telephone number mapping (ENUM), number portability, end-point addressing, path selection, calling classes and overlapping number ranges
  2. Install, configure and test gatekeepers
  3. Install and test convergent terminal equipment and software
  4. Install software, and configure and test VoIP services
  5. Configure security access levels to safeguard data, making use of appropriate tools
Implement telephone number mapping (ENUM), number portability, end-point addressing, path selection, calling classes and overlapping number ranges

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Install, configure and test gatekeepers

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Install and test convergent terminal equipment and software

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Install software, and configure and test VoIP services

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Configure security access levels to safeguard data, making use of appropriate tools

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Configure UC network

  1. Obtain topology and components of UC network
  2. Analyse potential of IP multimedia subsystem (IMS) network architecture to enable convergence of voice, video and data applications and various mobile network technologies over IP based layer
  3. Incorporate use of a communications server to provide real-time multimedia communications
  4. Select common video conferencing codecs according to standards and practices
  5. Select voice and video conferencing hardware
  6. Implement IP-private branch exchange (PBX) functionalities in the UC network
Obtain topology and components of UC network

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Analyse potential of IP multimedia subsystem (IMS) network architecture to enable convergence of voice, video and data applications and various mobile network technologies over IP based layer

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Incorporate use of a communications server to provide real-time multimedia communications

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Select common video conferencing codecs according to standards and practices

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Select voice and video conferencing hardware

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Implement IP-private branch exchange (PBX) functionalities in the UC network

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Test and evaluate performance of convergent networks

  1. Develop possible network congestion solutions for common network congestions to meet the specified quality of service (QoS)
  2. Provide solutions for problems with contacting emergency services
  3. Analyse network traffic and resolve problems using packet sniffer, monitoring software and hardware solutions
  4. Troubleshoot convergent communications over wireless networks
  5. Analyse types and effects of attacks, including man-in-the- middle attacks
  6. Plan ways to counteract denial of service (DoS) and distributed DoS (DDoS) attacks
  7. Predict the impact of virtual local area network (VLAN) hopping, media access control (MAC) address movements, additions and changes on network
Develop possible network congestion solutions for common network congestions to meet the specified quality of service (QoS)

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Provide solutions for problems with contacting emergency services

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Analyse network traffic and resolve problems using packet sniffer, monitoring software and hardware solutions

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Troubleshoot convergent communications over wireless networks

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Analyse types and effects of attacks, including man-in-the- middle attacks

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Plan ways to counteract denial of service (DoS) and distributed DoS (DDoS) attacks

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Predict the impact of virtual local area network (VLAN) hopping, media access control (MAC) address movements, additions and changes on network

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Test and verify security access levels

  1. Analyse types of intrusion detection
  2. Monitor and evaluate capability and reliability of security systems
  3. Make system alterations to ensure protection against known and potential threats
  4. Verify and test user settings conform to security policies
  5. Back-up, upgrade and scan systems to minimise attacks
Analyse types of intrusion detection

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Monitor and evaluate capability and reliability of security systems

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Make system alterations to ensure protection against known and potential threats

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Verify and test user settings conform to security policies

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Back-up, upgrade and scan systems to minimise attacks

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Complete documentation and sign-off procedures

  1. Complete required records and notify client
  2. Remove installation waste and debris from worksite and dispose of according to environmental requirements to maintain safe worksite conditions
  3. Reinstate site according to client and company requirements
Complete required records and notify client

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Remove installation waste and debris from worksite and dispose of according to environmental requirements to maintain safe worksite conditions

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Reinstate site according to client and company requirements

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Assessed

Teacher: ___________________________________ Date: _________

Signature: ________________________________________________

Comments:

 

 

 

 

 

 

 

 

Instructions to Assessors

Evidence Guide

ELEMENT

PERFORMANCE CRITERIA

Elements describe the essential outcomes.

Performance criteria describe the performance needed to demonstrate achievement of the element.

1. Plan and design VoIP infrastructure to meet business requirements

1.1 Ascertain end-user requirements in consultation with client

1.2 Select VoIP infrastructure in line with business and end-user requirements, within budget limitations

1.3 Select protocols for converged networks

1.4 Select hardware, software, network and security requirements according to agreed business and end-user specifications

1.5 Investigate factors affecting bandwidth and calculate bandwidth usage for various codecs, including considerations of overhead, connection quality and connection speeds

2. Install and configure VoIP infrastructure to meet business requirements

2.1 Implement telephone number mapping (ENUM), number portability, end-point addressing, path selection, calling classes and overlapping number ranges

2.2 Install, configure and test gatekeepers

2.3 Install and test convergent terminal equipment and software

2.4 Install software, and configure and test VoIP services

2.5 Configure security access levels to safeguard data, making use of appropriate tools

3. Configure UC network

3.1 Obtain topology and components of UC network

3.2 Analyse potential of IP multimedia subsystem (IMS) network architecture to enable convergence of voice, video and data applications and various mobile network technologies over IP based layer

3.3 Incorporate use of a communications server to provide real-time multimedia communications

3.4 Select common video conferencing codecs according to standards and practices

3.5 Select voice and video conferencing hardware

3.6 Implement IP-private branch exchange (PBX) functionalities in the UC network

4. Test and evaluate performance of convergent networks

4.1 Develop possible network congestion solutions for common network congestions to meet the specified quality of service (QoS)

4.2 Provide solutions for problems with contacting emergency services

4.3 Analyse network traffic and resolve problems using packet sniffer, monitoring software and hardware solutions

4.4 Troubleshoot convergent communications over wireless networks

4.5 Analyse types and effects of attacks, including man-in-the- middle attacks

4.6 Plan ways to counteract denial of service (DoS) and distributed DoS (DDoS) attacks

4.7 Predict the impact of virtual local area network (VLAN) hopping, media access control (MAC) address movements, additions and changes on network

5. Test and verify security access levels

5.1 Analyse types of intrusion detection

5.2 Monitor and evaluate capability and reliability of security systems

5.3 Make system alterations to ensure protection against known and potential threats

5.4 Verify and test user settings conform to security policies

5.5 Back-up, upgrade and scan systems to minimise attacks

6. Complete documentation and sign-off procedures

6.1 Complete required records and notify client

6.2 Remove installation waste and debris from worksite and dispose of according to environmental requirements to maintain safe worksite conditions

6.3 Reinstate site according to client and company requirements

Required Skills and Knowledge

ELEMENT

PERFORMANCE CRITERIA

Elements describe the essential outcomes.

Performance criteria describe the performance needed to demonstrate achievement of the element.

1. Plan and design VoIP infrastructure to meet business requirements

1.1 Ascertain end-user requirements in consultation with client

1.2 Select VoIP infrastructure in line with business and end-user requirements, within budget limitations

1.3 Select protocols for converged networks

1.4 Select hardware, software, network and security requirements according to agreed business and end-user specifications

1.5 Investigate factors affecting bandwidth and calculate bandwidth usage for various codecs, including considerations of overhead, connection quality and connection speeds

2. Install and configure VoIP infrastructure to meet business requirements

2.1 Implement telephone number mapping (ENUM), number portability, end-point addressing, path selection, calling classes and overlapping number ranges

2.2 Install, configure and test gatekeepers

2.3 Install and test convergent terminal equipment and software

2.4 Install software, and configure and test VoIP services

2.5 Configure security access levels to safeguard data, making use of appropriate tools

3. Configure UC network

3.1 Obtain topology and components of UC network

3.2 Analyse potential of IP multimedia subsystem (IMS) network architecture to enable convergence of voice, video and data applications and various mobile network technologies over IP based layer

3.3 Incorporate use of a communications server to provide real-time multimedia communications

3.4 Select common video conferencing codecs according to standards and practices

3.5 Select voice and video conferencing hardware

3.6 Implement IP-private branch exchange (PBX) functionalities in the UC network

4. Test and evaluate performance of convergent networks

4.1 Develop possible network congestion solutions for common network congestions to meet the specified quality of service (QoS)

4.2 Provide solutions for problems with contacting emergency services

4.3 Analyse network traffic and resolve problems using packet sniffer, monitoring software and hardware solutions

4.4 Troubleshoot convergent communications over wireless networks

4.5 Analyse types and effects of attacks, including man-in-the- middle attacks

4.6 Plan ways to counteract denial of service (DoS) and distributed DoS (DDoS) attacks

4.7 Predict the impact of virtual local area network (VLAN) hopping, media access control (MAC) address movements, additions and changes on network

5. Test and verify security access levels

5.1 Analyse types of intrusion detection

5.2 Monitor and evaluate capability and reliability of security systems

5.3 Make system alterations to ensure protection against known and potential threats

5.4 Verify and test user settings conform to security policies

5.5 Back-up, upgrade and scan systems to minimise attacks

6. Complete documentation and sign-off procedures

6.1 Complete required records and notify client

6.2 Remove installation waste and debris from worksite and dispose of according to environmental requirements to maintain safe worksite conditions

6.3 Reinstate site according to client and company requirements

Evidence of ability to:

design and implement infrastructure for enterprise voice over internet protocol (VoIP) and unified communications (UC) systems to meet business requirements using converged networks

evaluate network traffic protocols and bandwidth considerations

configure a UC network

assess performance of convergent networks

test and verify security access levels.

Note: If a specific volume or frequency is not stated, then evidence must be provided at least once.

To complete the unit requirements safely and effectively, the individual must:

compare session initiation protocol (SIP), H.323 protocol and media gateway control protocol (MGCP) or media gateway control (Megaco)

define latency, jitter and wander, and implement methods for reducing or eliminating them using jitter buffer, quality of service (QoS), traffic shaping and virtual local area networks (VLANs)

describe the format of a SIP uniform resource identifier (URI)

evaluate and implement SIP trunking to connect enterprise internet protocol (IP)-based communications systems over long distances

identify common G.7xx codes and describe the impact of compression on voice quality

define components of SIP

examine functions of signalling protocols for converged networks

summarise the following:

the client business domain, business function and organisation

current and emerging industry accepted hardware and software products

current and emerging transmission technologies and protocols

networking technologies.