Design and manage enterprise computer networks

Formats and tools

Unit Description
Reconstruct the unit from the xml and display it as an HTML page.
Assessment Tool
an assessor resource that builds a framework for writing an assessment tool
Assessment Template
generate a spreadsheet for marking this unit in a classroom environment. Put student names in the top row and check them off as they demonstrate competenece for each of the unit's elements and performance criteria.
Assessment Matrix
a slightly different format than the assessment template. A spreadsheet with unit names, elements and performance criteria in separate columns. Put assessment names in column headings to track which performance criteria each one covers. Good for ensuring that you've covered every one of the performance criteria with your assessment instrument (all assessement tools together).
Wiki Markup
mark up the unit in a wiki markup codes, ready to copy and paste into a wiki page. The output will work in most wikis but is designed to work particularly well as a Wikiversity learning project.
Evidence Guide
create an evidence guide for workplace assessment and RPL applicants
Competency Mapping Template
Unit of Competency Mapping – Information for Teachers/Assessors – Information for Learners. A template for developing assessments for a unit, which will help you to create valid, fair and reliable assessments for the unit, ready to give to trainers and students
Observation Checklist
create an observation checklist for workplace assessment and RPL applicants. This is similar to the evidence guide above, but a little shorter and friendlier on your printer. You will also need to create a seperate Assessor Marking Guide for guidelines on gathering evidence and a list of key points for each activity observed using the unit's range statement, required skills and evidence required (see the unit's html page for details)

Self Assessment Survey
A form for students to assess thier current skill levels against each of the unit's performance criteria. Cut and paste into a web document or print and distribute in hard copy.
Moodle Outcomes
Create a csv file of the unit's performance criteria to import into a moodle course as outcomes, ready to associate with each of your assignments. Here's a quick 'how to' for importing these into moodle 2.x
Registered Training Organisations
Trying to find someone to train or assess you? This link lists all the RTOs that are currently registered to deliver UEENEED114A, 'Design and manage enterprise computer networks'.
Google Links
links to google searches, with filtering in place to maximise the usefulness of the returned results
Reference books for 'Design and manage enterprise computer networks' on This online store has a huge range of books, pretty reasonable prices, free delivery in Australia *and* they give a small commission to for every purchase, so go nuts :)

Elements and Performance Criteria




Develop design for an enterprise network.


OHS processes and procedures for a given work area are identified, obtained and understood.


The extent of the network to be designed is determined from design brief and/or in consultation with appropriate persons.


Business requirements of the enterprise are analysed taking into account existing and projected business model, organisational and Information Technology management structures.


Consideration is given to factors that will have an impact on the design such as business priorities, growth, growth strategy, regulatory framework, risk, and cost.


Existing and planned technical and environment goals of the enterprise are evaluated and documented. (See Note 1)


Consideration is given to technical factors that will have an impact on the design. (See Note 2)


Client access and end-user needs and usage patterns and disaster recovery requirements are evaluated and documented.


Design specification is written using information obtained from the analysis and evaluations of enterprise business and technical requirements.


Network specification is presented and discussed with person(s) of higher authority.


Alterations to the network specification resulting from the presentation/discussion are negotiated with person(s) of higher authority within the constraints of organisation’s policy.


Design an enterprise network.


Knowledge and complexities of alternative network infrastructures and currently available technologies are applied to network design. (See Note 3)


Network design is developed to incorporate all required Wide Area Network (WAN) infrastructure, Internet connectivity and implementation and management strategies.


Risk management strategies are sought and obtained for incorporating into the network design.


Network design is reviewed against all inputs and adjusted to rectify any anomalies.


Network design proposal is documented in accordance with organisation policies and procedures.


Network design is presented and discussed with person(s) of higher authority.


Alterations to the network design resulting from the presentation/discussion are negotiated with person(s) of higher authority within the constraints of organisation’s policy.


Final design is documented and approval obtained from appropriate person(s).


Implement and manage an enterprise network.


OHS risk control measures and procedures for carrying out the work are followed.


Server and client computer hardware are installed and configures in compliance with design specifications and network industry standards. (See Note 4)


User and Group objects are created and group policy implemented. (Notes 5 and 6)


Directory services, data storage, shared resources Internet information services, remote access and network security are managed to ensure effective operation of the network. (Notes 7 to 11)


Approaches to issues/problems are analysed to provide most effective solutions.


Quality of work is monitored against personal performance agreement and/or established organisational or professional standards.


Diagnose network malfunctions.


OHS risk control measures and procedures for carrying out the work are followed.


Network operation is monitored and malfunctions are diagnosed to ascertain their cause using network diagnostic tools. (Note 12)


Network malfunctions are rectified using effective techniques and drawing knowledge of network topology and complexities of network interactivity.


Approaches to issues/problems are analysed to provide most effective solutions.


Quality of work is monitored against personal performance agreement and/or established organisational or professional standards.


Report network management activities.


Written justification is produced for enterprise network services solutions and forwarded to appropriate person/s in accordance with established procedures.


Network service development records are maintained in accordance with established procedures.


1. Examples are company size, user and resource distribution, various site connectivity, bandwidth, service performance, availability and scalability, data and system access patterns, network roles and responsibilities and security considerations

2. Examples are currently available resources, services, network infrastructure, protocols and hosts, Transmission Control Protocol and Internet Protocol hardware, planned upgrades, support and network and systems management.

3. Examples of network infrastructure are topology, TCP/IP networking strategy, DHCP strategy, Design of name resolution services, Multi-protocol strategy and Distributed File Strategy

4. Hardware installation includes using qualified tools, driver signing options, digital signatures on driver files and systems support for legacy hardware devices.

5. Example of user and group objects are computer accounts, groups configuring accounts via a directory service, searching for objects, use of templates for creating user accounts and resetting accounts

6. Examples of group policy implementation are deploying software, updates and assigning and publishing applications.

7. Examples of directory services are publishing resources, performing searches and configuring printer objects

8. Examples of data storage are NTFS and FAT file systems such as New Technology File Systems (NTFS) and File Allocation Table (FAT), quotas, Encrypting File Systems, configuring volumes and basic and dynamic disks, file and folder permissions and compression and domain-based distributed file systems.

9. Examples of shared resources are folders, web sharing, folder permissions, printers and printer permissions.

10. Examples of Internet Information Services are virtual directories and servers, Internet and intranet browsing, authentication and Secure Sockets Layer (SSL), File Transfer Protocol (FTP) services and access permissions for intranet server

11. Examples of Network security are user account lockout settings, password management, Group Policy to run logon scripts and link objects, auditing and security log file.

12. Examples of network operations are routing TCP/IP, DHCP, Domain Name Service, name resolution, starting servers, client computers, User and group objects, directory service replication problems, End-User Group Policy and remote access.