NTISthis.com

Evidence Guide: UEENEED114A - Design and manage enterprise computer networks

Student: __________________________________________________

Signature: _________________________________________________

Tips for gathering evidence to demonstrate your skills

The important thing to remember when gathering evidence is that the more evidence the better - that is, the more evidence you gather to demonstrate your skills, the more confident an assessor can be that you have learned the skills not just at one point in time, but are continuing to apply and develop those skills (as opposed to just learning for the test!). Furthermore, one piece of evidence that you collect will not usualy demonstrate all the required criteria for a unit of competency, whereas multiple overlapping pieces of evidence will usually do the trick!

From the Wiki University

 

UEENEED114A - Design and manage enterprise computer networks

What evidence can you provide to prove your understanding of each of the following citeria?

Develop design for an enterprise network.

  1. OHS processes and procedures for a given work area are identified, obtained and understood.
  2. The extent of the network to be designed is determined from design brief and/or in consultation with appropriate persons.
  3. Business requirements of the enterprise are analysed taking into account existing and projected business model, organisational and Information Technology management structures.
  4. Consideration is given to factors that will have an impact on the design such as business priorities, growth, growth strategy, regulatory framework, risk, and cost.
  5. Existing and planned technical and environment goals of the enterprise are evaluated and documented. (See Note 1)
  6. Consideration is given to technical factors that will have an impact on the design. (See Note 2)
  7. Client access and end-user needs and usage patterns and disaster recovery requirements are evaluated and documented.
  8. Design specification is written using information obtained from the analysis and evaluations of enterprise business and technical requirements.
  9. Network specification is presented and discussed with person(s) of higher authority.
  10. Alterations to the network specification resulting from the presentation/discussion are negotiated with person(s) of higher authority within the constraints of organisation’s policy.
OHS processes and procedures for a given work area are identified, obtained and understood.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

The extent of the network to be designed is determined from design brief and/or in consultation with appropriate persons.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Business requirements of the enterprise are analysed taking into account existing and projected business model, organisational and Information Technology management structures.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Consideration is given to factors that will have an impact on the design such as business priorities, growth, growth strategy, regulatory framework, risk, and cost.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Existing and planned technical and environment goals of the enterprise are evaluated and documented. (See Note 1)

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Consideration is given to technical factors that will have an impact on the design. (See Note 2)

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Client access and end-user needs and usage patterns and disaster recovery requirements are evaluated and documented.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Design specification is written using information obtained from the analysis and evaluations of enterprise business and technical requirements.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Network specification is presented and discussed with person(s) of higher authority.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Alterations to the network specification resulting from the presentation/discussion are negotiated with person(s) of higher authority within the constraints of organisation’s policy.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Design an enterprise network.

  1. Knowledge and complexities of alternative network infrastructures and currently available technologies are applied to network design. (See Note 3)
  2. Network design is developed to incorporate all required Wide Area Network (WAN) infrastructure, Internet connectivity and implementation and management strategies.
  3. Risk management strategies are sought and obtained for incorporating into the network design.
  4. Network design is reviewed against all inputs and adjusted to rectify any anomalies.
  5. Network design proposal is documented in accordance with organisation policies and procedures.
  6. Network design is presented and discussed with person(s) of higher authority.
  7. Alterations to the network design resulting from the presentation/discussion are negotiated with person(s) of higher authority within the constraints of organisation’s policy.
  8. Final design is documented and approval obtained from appropriate person(s).
Knowledge and complexities of alternative network infrastructures and currently available technologies are applied to network design. (See Note 3)

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Network design is developed to incorporate all required Wide Area Network (WAN) infrastructure, Internet connectivity and implementation and management strategies.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Risk management strategies are sought and obtained for incorporating into the network design.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Network design is reviewed against all inputs and adjusted to rectify any anomalies.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Network design proposal is documented in accordance with organisation policies and procedures.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Network design is presented and discussed with person(s) of higher authority.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Alterations to the network design resulting from the presentation/discussion are negotiated with person(s) of higher authority within the constraints of organisation’s policy.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Final design is documented and approval obtained from appropriate person(s).

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Implement and manage an enterprise network.

  1. OHS risk control measures and procedures for carrying out the work are followed.
  2. Server and client computer hardware are installed and configures in compliance with design specifications and network industry standards. (See Note 4)
  3. User and Group objects are created and group policy implemented. (Notes 5 and 6)
  4. Directory services, data storage, shared resources Internet information services, remote access and network security are managed to ensure effective operation of the network. (Notes 7 to 11)
  5. Approaches to issues/problems are analysed to provide most effective solutions.
  6. Quality of work is monitored against personal performance agreement and/or established organisational or professional standards.
OHS risk control measures and procedures for carrying out the work are followed.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Server and client computer hardware are installed and configures in compliance with design specifications and network industry standards. (See Note 4)

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

User and Group objects are created and group policy implemented. (Notes 5 and 6)

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Directory services, data storage, shared resources Internet information services, remote access and network security are managed to ensure effective operation of the network. (Notes 7 to 11)

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Approaches to issues/problems are analysed to provide most effective solutions.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Quality of work is monitored against personal performance agreement and/or established organisational or professional standards.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Diagnose network malfunctions.

  1. OHS risk control measures and procedures for carrying out the work are followed.
  2. Network operation is monitored and malfunctions are diagnosed to ascertain their cause using network diagnostic tools. (Note 12)
  3. Network malfunctions are rectified using effective techniques and drawing knowledge of network topology and complexities of network interactivity.
  4. Approaches to issues/problems are analysed to provide most effective solutions.
  5. Quality of work is monitored against personal performance agreement and/or established organisational or professional standards.
OHS risk control measures and procedures for carrying out the work are followed.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Network operation is monitored and malfunctions are diagnosed to ascertain their cause using network diagnostic tools. (Note 12)

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Network malfunctions are rectified using effective techniques and drawing knowledge of network topology and complexities of network interactivity.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Approaches to issues/problems are analysed to provide most effective solutions.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Quality of work is monitored against personal performance agreement and/or established organisational or professional standards.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Report network management activities.

  1. Written justification is produced for enterprise network services solutions and forwarded to appropriate person/s in accordance with established procedures.
  2. Network service development records are maintained in accordance with established procedures.
Written justification is produced for enterprise network services solutions and forwarded to appropriate person/s in accordance with established procedures.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Network service development records are maintained in accordance with established procedures.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Notes.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Examples are company size, user and resource distribution, various site connectivity, bandwidth, service performance, availability and scalability, data and system access patterns, network roles and responsibilities and security considerations

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Examples are currently available resources, services, network infrastructure, protocols and hosts, Transmission Control Protocol and Internet Protocol hardware, planned upgrades, support and network and systems management.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Examples of network infrastructure are topology, TCP/IP networking strategy, DHCP strategy, Design of name resolution services, Multi-protocol strategy and Distributed File Strategy

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Hardware installation includes using qualified tools, driver signing options, digital signatures on driver files and systems support for legacy hardware devices.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Example of user and group objects are computer accounts, groups configuring accounts via a directory service, searching for objects, use of templates for creating user accounts and resetting accounts

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Examples of group policy implementation are deploying software, updates and assigning and publishing applications.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Examples of directory services are publishing resources, performing searches and configuring printer objects

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Examples of data storage are NTFS and FAT file systems such as New Technology File Systems (NTFS) and File Allocation Table (FAT), quotas, Encrypting File Systems, configuring volumes and basic and dynamic disks, file and folder permissions and compression and domain-based distributed file systems.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Examples of shared resources are folders, web sharing, folder permissions, printers and printer permissions.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Examples of Internet Information Services are virtual directories and servers, Internet and intranet browsing, authentication and Secure Sockets Layer (SSL), File Transfer Protocol (FTP) services and access permissions for intranet server

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Examples of Network security are user account lockout settings, password management, Group Policy to run logon scripts and link objects, auditing and security log file.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Examples of network operations are routing TCP/IP, DHCP, Domain Name Service, name resolution, starting servers, client computers, User and group objects, directory service replication problems, End-User Group Policy and remote access.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Assessed

Teacher: ___________________________________ Date: _________

Signature: ________________________________________________

Comments:

 

 

 

 

 

 

 

 

Instructions to Assessors

Evidence Guide

9) This provides essential advice for assessment of the unit and must be read in conjunction with the performance criteria and the range statement of the unit and the Training Package Assessment Guidelines.

The Evidence Guide forms an integral part of this unit. It must be used in conjunction with all parts of this unit and performed in accordance with the Assessment Guidelines of this Training Package.

Overview of Assessment

9.1)

Longitudinal competency development approaches to assessment, such as Profiling, require data to be reliably gathered in a form that can be consistently interpreted over time. This approach is best utilised in Apprenticeship programs and reduces assessment intervention. It is the industry-preferred model for apprenticeships. However, where summative (or final) assessment is used it is to include the application of the competency in the normal work environment or, at a minimum, the application of the competency in a realistically simulated work environment. It is recognised that, in some circumstances, assessment in part or full can occur outside the workplace. However, it must be in accordance with industry and regulatory policy.

Methods chosen for a particular assessment will be influenced by various factors. These include the extent of the assessment, the most effective locations for the assessment activities to take place, access to physical resources, additional safety measures that may be required and the critical nature of the competencies being assessed.

The critical safety nature of working with electricity, electrical equipment, gas or any other hazardous substance/material carries risk in deeming a person competent. Sources of evidence need to be ‘rich’ in nature to minimise error in judgment.

Activities associated with normal everyday work have a bearing on the decision as to how much and how detailed the data gathered will contribute to its ‘richness’. Some skills are more critical to safety and operational requirements while the same skills may be more or less frequently practised. These points are raised for the assessors to consider when choosing an assessment method and developing assessment instruments. Sample assessment instruments are included for Assessors in the Assessment Guidelines of this Training Package.

Critical aspects of evidence required to demonstrate competency in this unit

9.2)

Before the critical aspects of evidence are considered all prerequisites shall be met.

Evidence for competence in this unit shall be considered holistically. Each element and associated performance criteria shall be demonstrated on at least two occasions in accordance with the ‘Assessment Guidelines – UEE11’. Evidence shall also comprise:

A representative body of work performance demonstrated within the timeframes typically expected of the discipline, work function and industrial environment. In particular this shall incorporate evidence that shows a candidate is able to:

Implement Occupational Health and Safety workplace procedures and practices, including the use of risk control measures as specified in the performance criteria and range statement

Apply sustainable energy principles and practices as specified in the performance criteria and range statement

Demonstrate an understanding of the essential knowledge and associated skills as described in this unit. It may be required by some jurisdictions that RTOs provide a percentile graded result for the purpose of regulatory or licensing requirements.

Demonstrate an appropriate level of skills enabling employment

Conduct work observing the relevant Anti Discrimination legislation, regulations, polices and workplace procedures

Demonstrated consistent performance across a representative range of contexts from the prescribed items below:

Design and manage enterprise networks as described in 8) and including:

A

Analysing business requirements.

B

Analysing technical requirements.

C

Obtaining approval for network design specification.

D

Designing a practical network in compliance with specifications and industry standards.

E

Implementing network design.

F

Diagnosing and rectifying the cause of network malfunctions effectively.

G

Documenting justification for network solutions.

H

Dealing with unplanned events by drawing on essential knowledge and skills to provide appropriate solutions incorporated in a holistic assessment with the above listed items.

Context of and specific resources for assessment

9.3)

This unit should be assessed as it relates to normal work practice using procedures, information and resources typical of a workplace. This should include:

OHS policy and work procedures and instructions.

Suitable work environment, facilities, equipment and materials to undertake actual work as prescribed in this unit.

These should be used in the formal learning/assessment environment.

Note:

Where simulation is considered a suitable strategy for assessment, conditions for assessment must be authentic and as far as possible reproduce and replicate the workplace and be consistent with the approved industry simulation policy.

The resources used for assessment should reflect current industry practices in relation to design and management of enterprise computer networks.

Method of assessment

9.4)

This unit shall be assessed by methods given in Volume 1, Part 3 ‘Assessment Guidelines’.

Note:

Competent performance with inherent safe working practices is expected in the Industry to which this unit applies. This requires assessment in a structured environment which is primarily intended for learning/assessment and incorporates all necessary equipment and facilities for learners to develop and demonstrate the essential knowledge and skills described in this unit.

Concurrent assessment and relationship with other units

9.5)

There are no concurrent assessment recommendations for this unit.

Required Skills and Knowledge

8) This describes the essential skills and knowledge and their level, required for this unit.

Evidence shall show that knowledge has been acquired of safe work practices and designing and managing enterprise networks.

All knowledge and skills detailed in this unit should be contextualised to current industry practices and technologies.

KS01-ED114A Design and manage enterprise computer networks

Evidence shall show an understanding of enterprise computer network design and management processes to an extent indicated by the following aspects:

T1 Analyse business requirements:

Existing and planned business model and organisational structure

Factors impacting on design decisions

T2 Analyse technical requirements:

Evaluation of the company’s existing and planned technical and environmental goals

Client access, end user work needs and usage patterns

Disaster recovery options

T3 Plan for network and application services

Name resolution

IP addressing

Network access policies

Remote access strategies

Support for legacy clients

Application virtualisation

Locally installed software

Web based applications

Terminal services licensing

Remote desktop services infrastructure

T4 Design and manage directory service identity and management components

Directory service logical components

Directory service functional levels

Intra-organisational authorisation and authentication

Schema modifications

Directory service physical topologies

Placement of servers

Definition of physical site boundaries

Site replication parameters

Printer location policies

Directory service administrative model

Delegation of administration

Group strategies

Compliance auditing

Group administration

Organisational structure

Enterprise level policy strategy

Directory service logical component migration strategies

Directory service upgrade and restructuring

Cross component authentication

Backwards compatibility

Implementation planning

Environmental preparation

Branch office deployment

Authentication strategies

Server security

Implement a public key infrastructure (PKI)

Plan for interoperability

Inter-organisational authorisation and authentication

Application authentication interoperability

Cross platform interoperability

T5 Design and manage business continuity and data availability

Plan for business continuity

Service availability

Directory service recovery

Software updates

Compliance management

Patch management strategies

Operating system virtualisation strategies

Server consolidation

Application compatibility

Virtualisation management

Placement of servers

Data management and data access

Data security

Data accessibility

Redundancy

Data collaboration

Range Statement

10) This relates to the unit as a whole providing the range of contexts and conditions to which the performance criteria apply. It allows for different work environments and situations that will affect performance.

This unit shall be demonstrated in relation design and management of any enterprise network consisting of multiple sites and users and is to provide users with email and Internet access, shared resources and security.

Generic terms used throughout this Vocational Standard shall be regarded as part of the Range Statement in which competency is demonstrated. The definition of these and other terms that apply are given in Volume 2, Part 2.1.