MX For Microsoft Install & Config Guide.book - Avaya Support
Install and commission a local area computer network 114072
-
Upload
khangminh22 -
Category
Documents
-
view
1 -
download
0
Transcript of Install and commission a local area computer network 114072
Module 5 – Network Support Skills Author: Rel Date: 27/01/2018 Rev Date: 01/06/2023 Doc Ref: 48573 LM Mod 1 v-1
LEARNER MANUAL PAGE 166
This unit standard is intended:
To provide fundamental knowledge of the areas covered.
For those working in, or entering the workplace in the area of Data Communication &
Networking.
As additional knowledge for those wanting to understand the areas covered.
People credited with this unit standard are able to:
Install local area network devices.
Install local area network system software and application software.
Test the installation of local area computer networks.
The performance of all elements is to a standard that allows for further learning in this area.
LEARNING ASSUMED TO BE IN PLACE AND RECOGNITION OF PRIOR LEARNING
The credit value of this unit is based on a person having prior knowledge and skills to:
Demonstrate competence to resolve technical computer problems
Demonstrate an understanding of wide-area networks (WAN`s), comparing them with local
area networks (LAN`s).
Install and commission a local area computer network 114072
Module 5 – Network Support Skills Author: Rel Date: 27/01/2018 Rev Date: 01/06/2023 Doc Ref: 48573 LM Mod 1 v-1
LEARNER MANUAL PAGE 167
INDEX
Competence Requirements Page Unit Standard 114072 alignment index Here you will find the different outcomes explained which you need to be proved competent in, in order to complete the Unit Standard 114072.
168
Unit Standard 114072 170 Install local area network devices 174 The installation ensures that LAN system software and application software are installed according to manufacturer’s guidelines 186
Test the installation of local area computer networks 192 Self-assessment Once you have completed all the questions after being facilitated, you need to check the progress you have made. If you feel that you are competent in the areas mentioned, you may tick the blocks, if however you feel that you require additional knowledge, you need to indicate so in the block below. Show this to your facilitator and make the necessary arrangements to assist you to become competent.
197
Module 5 – Network Support Skills Author: Rel Date: 27/01/2018 Rev Date: 01/06/2023 Doc Ref: 48573 LM Mod 1 v-1
LEARNER MANUAL PAGE 168
Unit Standard 114072 – Alignment Index S P E C I F I C O U T C O M E S A N D R E L A T E D A S S E S S M E N T C R I T E R I A
SO 1 Install local area network devices
AC 1 The installation ensures that LAN devices complete the manufacturer’s diagnostic tests free of errors
AC 2 The installation ensures that the LAN devices are located and interconnected according to manufacturer’s specifications and installation specifications
AC 3 The installation ensures that the LAN devices are configured and customised according to manufacturer’s specifications and installation specifications
SO 2 The installation ensures that LAN system software and application software are installed according to manufacturer’s guidelines
AC 1 The installation ensures that the LAN system software and application software operates according to manufacturer’s and installation specification
AC 2 The installation ensures that the LAN system software and application software is configured and customised according to installation specification
AC 3 The installation ensures that the LAN system software and application software performs according to manufacturer’s and installation specification
SO 3 Test the installation of local area computer networks
AC 1 The testing ensures that the LAN operates according to manufacturer’s and installation specification
AC 2 The testing procedure meets the manufacturer’s guidelines and installation specification AC 3 The testing ensures that results are recorded according to installation specification
Module 5 – Network Support Skills Author: Rel Date: 27/01/2018 Rev Date: 01/06/2023 Doc Ref: 48573 LM Mod 1 v-1
LEARNER MANUAL PAGE 169
C R I T I C A L C R O S S F I E L D O U T C O M E S
UNIT STANDARD CCFO WORKING Work effectively with others as a member of an organisation. UNIT STANDARD CCFO ORGANISING Organise and manage him/her self and his/her activities responsibly and effectively. UNIT STANDARD CCFO COLLECTING Collect, analyse, organise, and critically evaluate information. UNIT STANDARD CCFO SCIENCE Use science and technology effectively and critically, showing responsibility towards the environment and health of others. UNIT STANDARD CCFO DEMONSTRATING Demonstrate an understanding of the world as a set of related systems by recognising that problem solving contexts do not exists in isolation. UNIT STANDARD CCFO CONTRIBUTING Contribute to his/her full personal development and the social and economic development of the society at large by being aware of the importance of: reflecting on and exploring a variety of strategies to learn more effectively, exploring education and career opportunities and developing entrepreneurial opportunities
E S S E N T I A L E M B E D D E D K N O W L E D G E 1. Performance of all elements is to be carried out in accordance with organisation standards and procedures, unless otherwise stated. Organisation standards and procedures may cover: quality assurance, documentation, security, communication, health and safety, and personal behaviour. An example of the standards expected is the standards found in ISO 9000 Certified Organisations. 2. Performance of all elements complies with the laws of South Africa, especially with regard to copyright, privacy, health and safety, and consumer rights. 3. All activities must comply with any policies, procedures and requirements of the organisations involved, the ethical codes of relevant professional bodies and any relevant legislative and/ or regulatory requirements. 4. Performance of all elements is to be completed within the normal range of time and cost that would be expected in a professional environment (eg. In a commercial or government organisation).
Module 5 – Network Support Skills Author: Rel Date: 27/01/2018 Rev Date: 01/06/2023 Doc Ref: 48573 LM Mod 1 v-1
LEARNER MANUAL PAGE 170
All qualifications and part qualifications registered on the National Qualifications Framework are public property. Thus the only payment that can be made for them is for service and reproduction. It is illegal to sell this material for profit. If the material is reproduced or quoted, the South African Qualifications Authority (SAQA) should be acknowledged as the source.
SOUTH AFRICAN QUALIFICATIONS AUTHORITY
REGISTERED UNIT STANDARD:
Install and commission a local area computer network
SAQA US ID
UNIT STANDARD TITLE
114072 Install and commission a local area computer network
ORIGINATOR
SGB Information Systems and Technology
PRIMARY OR DELEGATED QUALITY ASSURANCE FUNCTIONARY
-
FIELD SUBFIELD
Field 10 - Physical, Mathematical, Computer and Life Sciences Information Technology and Computer Sciences
ABET BAND
UNIT STANDARD TYPE
PRE-2009 NQF LEVEL NQF LEVEL CREDITS
Undefined Regular Level 5 Level TBA: Pre-2009 was L5
9
REGISTRATION STATUS REGISTRATION START DATE
REGISTRATION END DATE
SAQA DECISION NUMBER
Reregistered 2018-07-01 2023-06-30 SAQA 06120/18
LAST DATE FOR ENROLMENT LAST DATE FOR ACHIEVEMENT
2024-06-30 2027-06-30
In all of the tables in this document, both the pre-2009 NQF Level and the NQF Level is shown. In the text (purpose statements, qualification rules, etc), any references to NQF Levels are to the pre-2009 levels unless specifically stated otherwise.
This unit standard does not replace any other unit standard and is not replaced by any other unit standard.
PURPOSE OF THE UNIT STANDARD
This unit standard is intended: To provide fundamental knowledge of the areas covered. For those working in, or entering the workplace in the area of Data Communication & Networking. As additional knowledge for those wanting to understand the areas covered. People credited with this unit standard are able to: Install local area network devices. Install local area network system software and application software. Test the installation of local area computer networks. The performance of all elements is to a standard that allows for further learning in this area.
Module 5 – Network Support Skills Author: Rel Date: 27/01/2018 Rev Date: 01/06/2023 Doc Ref: 48573 LM Mod 1 v-1
LEARNER MANUAL PAGE 171
LEARNING ASSUMED TO BE IN PLACE AND RECOGNITION OF PRIOR LEARNING
The credit value of this unit is based on a person having prior knowledge and skills to: Demonstrate competence to resolve technical computer problems Demonstrate an understanding of wide-area networks (WAN`s), comparing them with local area networks (LAN`s).
UNIT STANDARD RANGE
N/A
Specific Outcomes and Assessment Criteria:
SPECIFIC OUTCOME 1
Install local area network devices.
ASSESSMENT CRITERIA
ASSESSMENT CRITERION 1
1. The installation ensures that the LAN devices complete the manufacturer`s diagnostic tests free of errors.
ASSESSMENT CRITERION 2
2. The installation ensures that the LAN devices are located and interconnected according to manufacturer`s specifications and installation specifications.
ASSESSMENT CRITERION 3
3. The installation ensures that the LAN devices are configured and customised according to manufacturer`s specifications and installation specifications.
SPECIFIC OUTCOME 2
The installation ensures that the LAN system software and application software performs accordingly.
OUTCOME RANGE
The installation ensures that LAN system software and application software are installed according to manufacturer`s guidelines.
ASSESSMENT CRITERIA
ASSESSMENT CRITERION 1
1. The installation ensures that the LAN system software and application software operates according to manufacturer`s and installation specification.
ASSESSMENT CRITERION 2
2. The installation ensures that the LAN system software and application software is configured and customised according to installation specification.
ASSESSMENT CRITERION 3
3. The installation ensures that the LAN system software and application software performs according to manufacturer`s and installation specification.
SPECIFIC OUTCOME 3
Test the installation of local area computer networks.
Module 5 – Network Support Skills Author: Rel Date: 27/01/2018 Rev Date: 01/06/2023 Doc Ref: 48573 LM Mod 1 v-1
LEARNER MANUAL PAGE 172
ASSESSMENT CRITERIA
ASSESSMENT CRITERION 1
1. The testing ensures that the LAN operates according to manufacturer`s and installation specification.
ASSESSMENT CRITERION 2
2. The testing procedure meets the manufacturer`s guidelines and installation specification.
ASSESSMENT CRITERION 3
3. The testing ensures that results are recorded according to installation specification.
UNIT STANDARD ACCREDITATION AND MODERATION OPTIONS
The relevant Education and Training Quality Authority (ETQA) must accredit providers before they can offer programs of education and training assessed against unit standards. Moderation of assessment will be overseen by the relevant ETQA according to the moderation guidelines in the relevant qualification and the agreed ETQA procedures.
UNIT STANDARD ESSENTIAL EMBEDDED KNOWLEDGE
1. Performance of all elements is to be carried out in accordance with organisation standards and procedures, unless otherwise stated. Organisation standards and procedures may cover: quality assurance, documentation, security, communication, health and safety, and personal behaviour. An example of the standards expected is the standards found in ISO 9000 Certified Organisations. 2. Performance of all elements complies with the laws of South Africa, especially with regard to copyright, privacy, health and safety, and consumer rights. 3. All activities must comply with any policies, procedures and requirements of the organisations involved, the ethical codes of relevant professional bodies and any relevant legislative and/ or regulatory requirements. 4. Performance of all elements is to be completed within the normal range of time and cost that would be expected in a professional environment (eg. In a commercial or government organisation).
UNIT STANDARD DEVELOPMENTAL OUTCOME
N/A
UNIT STANDARD LINKAGES
N/A
Critical Cross-field Outcomes (CCFO):
UNIT STANDARD CCFO WORKING
Work effectively with others as a member of an organisation.
UNIT STANDARD CCFO ORGANISING
Organise and manage him/her self and his/her activities responsibly and effectively.
UNIT STANDARD CCFO COLLECTING
Collect, analyse, organise, and critically evaluate information.
UNIT STANDARD CCFO SCIENCE
Module 5 – Network Support Skills Author: Rel Date: 27/01/2018 Rev Date: 01/06/2023 Doc Ref: 48573 LM Mod 1 v-1
LEARNER MANUAL PAGE 173
Use science and technology effectively and critically, showing responsibility towards the environment and health of others.
UNIT STANDARD CCFO DEMONSTRATING
Demonstrate an understanding of the world as a set of related systems by recognising that problem solving contexts do not exists in isolation.
UNIT STANDARD CCFO CONTRIBUTING
Contribute to his/her full personal development and the social and economic development of the society at large by being aware of the importance of: reflecting on and exploring a variety of strategies to learn more effectively, exploring education and career opportunities and developing entrepreneurial opportunities.
UNIT STANDARD ASSESSOR CRITERIA
N/A
REREGISTRATION HISTORY
As per the SAQA Board decision/s at that time, this unit standard was Reregistered in 2012; 2015.
UNIT STANDARD NOTES
Supplementary information: 1. "LAN" refers to a single network of personal computers within the same area,such as an office or building. 2. "Industry Recommended Procedure" refers to a procedure used and recommendedby an organisation involved in the computer industry.
Module 5 – Network Support Skills Author: Rel Date: 27/01/2018 Rev Date: 01/06/2023 Doc Ref: 48573 LM Mod 1 v-1
LEARNER MANUAL PAGE 174
AC 1
he installation ensures that the LAN devices complete the
manufacturer`s diagnostic tests free of errors.
Fast and inexpensive LAN technology has achieved widespread adoption in the
computer world and is now shaping the future of test system development and
operation. LAN-based systems provide several advantages for test-and-measurement
applications: lower-cost hardware and cabling; pervasive availability throughout most
enterprises; remote or shared system control; fast data transfers; file, drive and printer
sharing; and browser-based interaction with individual instruments
The advantages of LAN technology make it a good choice for meeting the I/O needs of test
systems. With LAN adapters built into most current-generation PCs, the computing portion
of the system requires minimal physical configuration to support test system deployment.
This situation is driving the addition of LAN connectors and adapters to current- and next-
generation test equipment
Once all the items have been placed at their desired places and they have been checked for
appropriateness with their users, it is a good idea to test these machines one by one. Making
use of the manufacturers instructions and guides, you will have the network manufacturer’s
diagnostic tools with which to check for any signs of error.
All equipment must also be placed in such an area as described by the manufacturer to
ensure that they are not in any way damaged by the elements or any physical damage. Once
the hardware is in place and the cards have been place din their areas, the network must be
configured according to the manufacturer’s installation specifications.
AC 2
T
Install local area network devices Time: 90 minutes Activity: Self and Group
Module 5 – Network Support Skills Author: Rel Date: 27/01/2018 Rev Date: 01/06/2023 Doc Ref: 48573 LM Mod 1 v-1
LEARNER MANUAL PAGE 175
he installation ensures that the LAN devices are located and
interconnected according to manufacturer`s specifications and
installation specifications.
What is a LAN?
The typical definition of Local Area Network (LAN) is "two or more connected stations (PCs,
servers, computer…) in the same limited area, sharing data and peripheral devices, and
operating at the speed of 1 Mbps (Million bits per second) to about 1 Gbps (Billion bits per
second)." The most popular LANs include 10 Mbps & 100 Mbps Ethernet, 4 Mbps & 16 Mbps
Token Ring.
What are the hardware components of a LAN?
The hardware components of a LAN consist of:
PCs/workstations and servers
Network Interface Card (NIC)
Cabling and connectors, for example, coaxial cable and BNC connector, Unshielded Twisted
Pair (UTP) and RJ-45 connector
Hub, concentrator, and more complicated network devices such as Bridge, LAN Switch and
Router
What are the software components of a LAN?
The software components of a LAN can be grouped into two categories:
1. Inside PCs/workstations and servers
NIC Drivers
Network Operating System for servers, for example, Novell® Netware 4.1 or Microsoft
Windows® NT
Network Operating System for clients (PCs/workstations), for example, Novell® Netware 4.1
client or Microsoft Windows® 95
Networking protocol software, for example, TCP/IP, Novell® IPX
Application software, for example, emails, Internet Web Browser
2. Inside network devices (Hub/Bridge/LAN Switch/Router)
Network Management Software, for example, Simple Network Management Protocol (SNMP),
Remote Network Monitoring (RMC)
Forwarding/routing & control software, for examples, transparent bridging, spanning tree
and IP routing software
T
Module 5 – Network Support Skills Author: Rel Date: 27/01/2018 Rev Date: 01/06/2023 Doc Ref: 48573 LM Mod 1 v-1
LEARNER MANUAL PAGE 176
What is a Network Interface Card (NIC)?
A Network Interface Card, or NIC, is a circuit board inserted into each network station
(PC/workstation or server) to allow communication with other stations. Depending on the
stations, the bus of a NIC could be ISA, PCI, EISA, MCA, S-bus…and so on.
What is a Hub?
A Hub is a central device used on star network topology that repeats or amplifies signals,
allowing the network to be lengthened or expanded with additional stations. For example, an
Ethernet hub normally has 8 or 12 or 16 RJ-45 ports, each port can be connected to a PC or
workstation or server. Also, the hub’s BNC port can be connected to a coaxial cable to
lengthen the network.
What is a Bridge?
A Bridge is a device used to connect two or more LANs. It operates at the Media Access
Control Layer (layer 2), checking and forwarding data packets between different LANs.
What is a LAN Switch?
A LAN Switch is a device using switching hardware to speed-up the checking and forwarding
of data packets between LANs. LAN Switch is functionally like a bridge, but its speed and
performance is faster and better than a bridge.
What is a Router?
A Router is a device that operates at the network layer (layer 3), routing data between similar
or dissimilar networks. A router is more powerful than a bridge or LAN Switch because the
router checks the network protocols and addresses (for example, IP or IPX).
What is a Network Management?
Network Management are functions that manage and control networks. It consists of five
major functions:
Fault Management
Accounting Management
Configuration Management
Performance Management
Security Management
Module 5 – Network Support Skills Author: Rel Date: 27/01/2018 Rev Date: 01/06/2023 Doc Ref: 48573 LM Mod 1 v-1
LEARNER MANUAL PAGE 177
What is SNMP?
SNMP, or Simple Network Management Protocol, is a standard protocol adopted for the
network management of Internet and TCP/IP based networks.
What is RMON?
RMON are the functions that monitor the network performance, errors and other summary
information. RMON functions can be implemented in a network device (HUB, LAN switch) or
a station (PC, Server).
What is JAVA?
JAVA is a network programming language designed to solve problems in the area of client-
server programming. It is ideal for programming on the Internet. JAVA capability is included
in most new generation Internet Web Browser, e.g. Netscape Navigator 2.0 and higher and
Microsoft® Explorer 3.0 and above.
Define a JAVA-based Network Management System.
A JAVA-based Network Management System is an integration of JAVA language and network
management functions. The network management software is written in JAVA language and
stored in a network device (HUB, LAN switch). The user can manage the network by an
Internet Web Browser. The operation of network management is as simple as browsing WWW
server.
What is a RMON software probe?
A RMON software probe is a RMON-like software that runs on PCS. The software can do the
function of monitoring the network traffics, errors and other statistics. It can also store the
records for later analysis.
Setting up a network
In order to create an Ethernet network, certain components are necessary for the computers
within the network to communicate with each other. The required components to create an
Ethernet network are:
10Base-T Ethernet Network Interface Card (NIC)
Ethernet hub
BNC T-connectors (usually provided)
50-Ohm terminators (usually provided)
Thin Ethernet (Thinnest) coaxial cable (usually provided)
Module 5 – Network Support Skills Author: Rel Date: 27/01/2018 Rev Date: 01/06/2023 Doc Ref: 48573 LM Mod 1 v-1
LEARNER MANUAL PAGE 178
Network Interface Card
A Network Interface Card (NIC) is an add-on adapter card that is installed to the PCI or ISA
slot on the PC’s motherboard. The NIC sorts data on the computer into bundles and
transmits them to another computer while allowing the user to access the data within the
bundle simultaneously. The most common NIC used today is the 10Base-T Ethernet card
that is connected to an Ethernet hub.
Hub
All Ethernet 10Base-T networks are connected with an Ethernet hub. The hub manages the
traffic that passes between computers on a network and is connected to all computers that
are part of the network.
Other networking components
Other networking components are used to connect a PC or even a laptop to an Ethernet
network. AUI-BNC transceivers can be used to connect a PC or a laptop to a different
network interface. Some NIC can support a combination of interface, such as an AUI and a
BNC as well as a RJ45. Sometimes a combo transceiver may be used to connect to a NIC on
a PC or a laptop on one end and to another network system on the other over the supported
interface.
Most network interface cards today have PnP (Plug and Play) capability. The following
procedures assume that your NIC is PnP-compatible and that your PC’s operating system is
Windows® 95. Once the NIC is installed and you have powered on your computer, Windows®
95 will automatically detect the new modem and assist you with its configuration. If this is
not the case, refer to the documentation that came with your NIC for proper configuration
procedures such as setting IRQ settings.
Module 5 – Network Support Skills Author: Rel Date: 27/01/2018 Rev Date: 01/06/2023 Doc Ref: 48573 LM Mod 1 v-1
LEARNER MANUAL PAGE 179
AC 3
he installation ensures that the LAN devices are configured and
customised according to manufacturer`s specifications and installation
specifications.
A step-by-step guide to setting up a home network
The introduction of a new piece of hardware is the perfect time to set up or reorganise your
home network. For many people, this is the most painful part of the tech experience. Let's
face it, networking a new piece of tech you got for the holidays is the latter-day "some
assembly required."
No matter what networking hardware makers tell you, setting up your home network
involves more than just purchasing and plugging in a router. But that doesn't mean that it
has to be a nightmare, either. You can set up a managed and centrally controlled network in
a few (relatively) easy steps – you just have to know what you're doing, and do it the right
way.
And it's worth doing it right. It's worth learning how to configure proper IP addressing, lock
down the network from intruders, create accounts for everyone who gets access, and set up
sharing for files and folders. If you can do those things (and you can) you'll have a centrally
controlled, robust network with better security. Plus, having a good handle on your network
allows for more efficient control over remote access to devices and data on the network. For
parents, the ability to see what children are accessing and control what they access is
possible, if you've got a structured home network.
Of course, the wireless router is the central point of a home network. Although hardware
vendors are making router setup easier than ever with, you can still burrow deeper into the
router's configuration pages to establish security, access controls, and granular
management. At any rate, you can set up a tightly managed, secure home network. All you
have to do is follow these five steps.
1. Connect your router
The router is the gateway between the Internet and your home network. It is also the means
by which all the devices on your network communicate with one another. You will also want
to ensure that any device that will connect to the router also has an appropriate network
adapter. These devices are your network "clients." New laptops will have 802.11n adapters
(some will support 802.11ac, even). For older laptops or desktops you can purchase
T
Module 5 – Network Support Skills Author: Rel Date: 27/01/2018 Rev Date: 01/06/2023 Doc Ref: 48573 LM Mod 1 v-1
LEARNER MANUAL PAGE 180
compatible adapters. Once you've got the right router, you have to set it up, and the first step
is to physically connect your router to a modem provided by your ISP with an Ethernet cable.
First, unplug or turn off the cable or DSL modem.
Power up your wireless router and connect the network cable that most likely comes with it
into the port on the router that is labelled "Internet" or "WAN."
Connect the other end to the cable or DSL modem and power up the modem.
Don't attempt to connect any devices such as laptops or tablets until you have a good strong
signal indicating a WAN connection on both the router and modem.
2. Access the router's interface and lock it down
The next step involves getting into the router's interface (some companies call this the
management console). This is done by connecting a laptop to the router and then accessing
the interface via a browser. How do you go about this? Routers ship with a default IP
address, administrator account and password.
For example, most Cisco/Linksys routers have the default IP address of 192.168.1.1, and the
default administrator account is "admin," and the password is also "admin." What you want
to do is change your laptop's IP settings to match those of the router's to connect to it for
configuration. This allows the laptop to communicate with the router, so you can access your
router's software for setup via the laptop.
Connect an Ethernet cable to one of the LAN ports on the router and the other end to the
Ethernet port of your laptop. On a Windows 7 machine that's connected to the router by
Ethernet, for example, you would go into the Control Panel and click to open "Network and
Internet" and then "Network and Sharing Centre."
From the left-hand window, click "Change adapter settings."
Right click on "Local Area Connection" (not the Wireless Network Connection) and select
"Properties."
Highlight “Internet Protocol Version 4 (TCP/IP v4)” and once again, click "Properties."
Set the first radio button to "Use the following IP address:" and enter the information as
shown in the image above.
Once you've applied the changes, open up a browser and go the web address of (in our
example) the Cisco/Linksys interface by typing http://192.168.1.1 and using the account
name "admin" and password "admin." Then you are all set to configure security and other
settings.
Module 5 – Network Support Skills Author: Rel Date: 27/01/2018 Rev Date: 01/06/2023 Doc Ref: 48573 LM Mod 1 v-1
LEARNER MANUAL PAGE 181
Most router companies use the same default IP address, admin account, and passwords on
all their routers. Your router's documentation will tell you the specific IP address and
account login information.
3. Configure security and IP addressing
After you've accessed the router, the next order of business is getting the security, SSID and
IP addressing settings right. Getting security right is a must, unless you want a neighbour
stealing your bandwidth and possibly your data. IP addressing is important because these
addresses are used for devices on your network to communicate with the router. You make
all of these changes within the router's management interface.
These settings are typically under the "Basic" settings of the interface. They may also be
under "Security" or "Wireless Settings." Router interfaces vary, so if you can't find the
settings to configure within the router’s interface pages when following the below steps,
check with the router manufacturer. Okay, on with the steps:
Change the default administrator password. Some networking equipment forces you to do so
once you've accessed the web-based interface, but many consumer routers don't. The
settings for the admin password are usually under the "System" tab or page of the interface.
You can just enter in a new password in the new password field.
Change the router's default SSID. The SSID is the broadcasted name of your wireless
network. That's the name that shows up as the network's name when you scan for available
networks. Use a unique name that your neighbours aren't using for their routers to avoid
confusion.
Assign security. Newer routers may be set by default to automatically configure security by
using WPS (Wi-Fi Protected Setup). Since the goal here is to have full control of your
network, switch from "WPS" to "Manual." Once in manual mode, go into the router's wireless
security page.
There is no excuse, except in very limited circumstances when dealing with legacy
technology, to not use WPA/WPA2. WPA security requires clients connecting to it to use a
key or passphrase, which you create within the router's interface on the same page you set
up security.
Module 5 – Network Support Skills Author: Rel Date: 27/01/2018 Rev Date: 01/06/2023 Doc Ref: 48573 LM Mod 1 v-1
LEARNER MANUAL PAGE 182
Some routers allow you to enter a string of 64 hexadecimal digits which provides strong
security, but most have you create an 8 to 63 letter passphrase. If you are creating a
passphrase (or password) be sure to create a strong password that would be hard to guess.
Set up IP addressing. For most networks, the router can be kept at its default DHCP setting.
This means the router will dole out IP addresses to clients that connect to the network,
leaving you without any IP addressing management to do. For extra security, it's not a bad
idea to change the router's default IP, making it more resistant to snooping.
Remember, hackers know what the default IP addresses of the most common routers are
(even though it's really tough for them to get to, due to the fact that your IP addresses on
your network are private). For instance, I would change my Cisco/Linksys router's network
from 192.168.1.1 to something like 192.168.1.3.
Disconnect the laptop and reboot it. When the laptop comes back from reboot you should see
the SSID name of your wireless network and be able to connect to it with the passphrase you
created. Congratulations – you're connected wirelessly. But you're not done with your setup
yet!
Advanced steps: DHCP reservation
For those who anticipate connecting servers, NAS device or any device that you may access
from outside your network, best practice is to configure DHCP Reservation. That may be a
scary sounding term for newbies, but all it means is that you are telling the router that a
specific device always uses a specific IP address, which is set aside or "reserved" for it.
For example, my router IP is 192.168.1.1.
I can give my email server an IP address of 192.168.1.2. I can give a third device, say my
NAS server for instance, an IP address of 192.168.1.3, and so on. You don't want to change
the first three sets of numbers though, for most basic home networks. IP addressing has
specific rules about formatting, so you want to retain the first three sets of numbers, called
"octets."
You’ll also want to put in the device's MAC address that you are reserving. The MAC address
is usually printed on a sticker affixed to a device. Again, reserving the IP addresses means
those addresses will never be distributed to clients via DHCP and are "held" for the devices
you specify.
Module 5 – Network Support Skills Author: Rel Date: 27/01/2018 Rev Date: 01/06/2023 Doc Ref: 48573 LM Mod 1 v-1
LEARNER MANUAL PAGE 183
Reserving IP addresses is good practice for devices you want to access remotely, because
otherwise when the IP address leases expire you won't be able to perform remote access.
Don't forget to assign the reserved IPs as static addresses on the devices for which you made
reservations. There are various ways to do this – on Windows servers and machines you can
assign an IP address though the Network settings Control Panel. Other devices, such as
NASes, have areas in their management console where you can assign an IP address. It really
depends on what device you want to set a static address for, so check with the vendor if you
aren't sure.
If you are using the router as an access point, bridge or to extend the signal of an existing
router on a network, you will want to turn off DHCP completely. Having two routers
performing DHCP on the same network can result in a myriad of connection issues. However,
for most home networks, having the router set to use DHCP will suffice.
4. Set up sharing and control
Now that you have a network set up, you can set up a way for everyone to access data on the
network. With Windows 7 clients, this is achieved by creating a HomeGroup, a user-friendly
way to create a workgroup. A HomeGroup is a group of computers on a home network that
can share files and printers. Using a HomeGroup makes sharing easier. You can share
pictures, music, videos, documents, and printers with other people in your HomeGroup.
Other people can't change the files that you share unless you give them permission. You can
help protect your HomeGroup with a password, which you can change at any time.
Computers must be running Windows 7 or Windows 8 (more about the latter in a moment) to
participate in a HomeGroup. HomeGroup is available in all editions of Windows 7. In
Windows 7 Starter and Windows 7 Home Basic, you can join a HomeGroup, but you can't
create one.
When a Windows 7 laptop first connects to the network, the user will be prompted to set the
current network location. Ensure that the location is set to "Home network" (you can check it
in Network and Sharing Centre) because HomeGroup only works on networks set to the
Home location.
Module 5 – Network Support Skills Author: Rel Date: 27/01/2018 Rev Date: 01/06/2023 Doc Ref: 48573 LM Mod 1 v-1
LEARNER MANUAL PAGE 184
Open up "HomeGroup" in the Control Panel, and then click "Create a HomeGroup." For every
Windows 7 client that you want to give access to the HomeGroup, open HomeGroup in the
Control Panel of those machines and then click "Join now" (those machines have to
physically or wirelessly connected to the network).
During the process of setting up or joining a HomeGroup, you can choose the libraries,
printers, or files and folders you want to share (see the next step for details).
For Windows 8, you create a HomeGroup by moving the mouse to the top right corner of the
screen, then click Settings, then Change PC Settings. Click on HomeGroup, then you can
click on Create. As above, you can then select the libraries and devices you want to share
with the HomeGroup.
If you have a network with an older version of Windows running, then you are going to create
a standard Workgroup. Click Start, right click My Computer, and then click Properties. In
System Properties, click the Computer Name tab. Click "Change," select "Workgroup," and
enter a workgroup name. Click OK to apply the change. Do the same thing for all computers
that you want sharing data on the network.
5. Set up user accounts
In most business networks, users access the network by logging in with their user account
and password. Corporate IT networks set up user accounts to keep tabs on who is accessing
the network and when they are accessing it. User accounts provide a way to establish user
access control. Perhaps there's some data on the network some users should have access to
and some shouldn't. Maybe some users should only be able to read certain files, while others
should be able to change files.
You can establish this same kind of access in your home network, should you wish,
especially once you have a HomeGroup or Workgroup defined. It's not something most home
network users will really need to do, but we’ll cover it briefly, as it is quite easy to set up user
accounts in Windows:
In Windows 7's Control Panel, select the User Accounts icon. User accounts will let
you configure your account and its settings.
To add and configure other users, from User Accounts, click on "Manage User
Accounts," and then click on the "Advanced" tab.
Under "Advanced User Management" click "Advanced" to open up Local Users and
Groups.
Module 5 – Network Support Skills Author: Rel Date: 27/01/2018 Rev Date: 01/06/2023 Doc Ref: 48573 LM Mod 1 v-1
LEARNER MANUAL PAGE 185
Right click on either "Users" or "Groups" to add either to your network.
If you have a number of people accessing your network and you want to control access
to the data on it, you may also want to set up permissions for files and folders. Create
a user account for every family member and then right click on the folder, click
"Properties" and then the "Sharing" tab. You can add the family members that you
want to give access to any particular folder, and exclude the ones you don't. You can
also right click on each Library to select the specific users you want to share with.
Right click on a printer to pull up the "Sharing" tab to set up shared access.
Unless you have a lot of users connecting to your network, as we mentioned
previously you most likely won't need to create user groups, but it's a good idea if you
do anticipate a number of users connecting (as is the case for a small business) and
you want to give certain groups access to certain files and folders.
If you've gotten this far and performed all the steps that apply to you, you should have
a functional, secure, and robust network set up. Congratulations!
Module 5 – Network Support Skills Author: Rel Date: 27/01/2018 Rev Date: 01/06/2023 Doc Ref: 48573 LM Mod 1 v-1
LEARNER MANUAL PAGE 186
AC 1
he installation ensures that the LAN system software and application
software operates according to manufacturer`s and installation
specification.
Each organisation must have a written backup plan including a backup schedule, backup
process and a list of mission critical applications. Organisation should consider their current
electronic archiving process (the storing of files for future retrieval, not the process of sending
documents to the Archives) while developing their backup plan.
Organisations cannot use the backup process as an electronic archiving method; a separate
electronic archiving process and plan must be developed. The backup plan must be reviewed
annually and periodically tested by the agency network administrator. Each agency must
maintain a notification list of designated staff to be contacted in an emergency. A copy of this
list must be kept in a secure location, such as with off-site backups, and be readily
accessible in case of an emergency.
Definitions
Full Backup – Complete, full backup of all files. Complete backup of all servers is
done once a week. Offsite storage of backup media allows for full disaster recovery.
Differential Backup –This backup includes any changes or additions to data since
the previous full backup.
Workstation Backup – Each user is assigned a network storage area. The H:\
drive assigned to each user is located on a server. This area is included in the daily
and weekly backup plan. Applications set up according to BIT standards are designed
to save information to the users assigned H:\ drive directory by default. If you
accidentally erase one of your files, notify the BIT Help Desk immediately.
User Responsibility - Any information stored locally (C:\) on the users workstation
must be backed up by the user. Information stored locally (C:\) by the user should be
placed in a common work area. C:\Work\ as an example. This will help insure that
the data is not lost in the event of any system changes.
T
Ensure LAN system software and application software are installed according to Guidelines
Time: 90 minutes Activity: Self and Group
Module 5 – Network Support Skills Author: Rel Date: 27/01/2018 Rev Date: 01/06/2023 Doc Ref: 48573 LM Mod 1 v-1
LEARNER MANUAL PAGE 187
LAN testing must occur on a regular basis and should happen at all nodes at least once a
month. The ability to move files internally as well as the speed that is achieved with each of
the nodes must be recorded and documented. All cables must be checked as well as their
ports which they connect with, on a monthly basis. This will help ensure that they are
properly maintained.
When a problem occurs in communication carried out by a user, information concerning the
problem is notified to the user. A network management system transfers a problem
notification program to a network device adjacent to a place experiencing the problem. The
problem notification program notifies "communication impossible" to a terminal of a
transmission source of data output from an output port of the network device.
AC 2
he installation ensures that the LAN system software and application
software is configured and customised according to installation
specification.
A network system having a plurality of terminal devices and a plurality of network devices for
relaying data among said terminal devices, said terminal devices being used by users of said
network system, wherein each network devices includes:
first means for detecting a problem in said network device;
second means for detecting a terminal device which is a transmission source of data
output to an output port of said network device in which said problem has occurred;
and
means for notifying problem information representing occurrence of said problem in
said network device to said terminal device which is the transmission source of data
output to said output port detected by said second means for detecting, thereby
informing the user of said terminal device of said problem.
Circuit - A type of communications in which a dedicated channel (or circuit) is established
for the duration of a transmission. The most ubiquitous circuit-switching network is the
telephone system, which links together wire segments to create a single unbroken line for
each telephone call. The other common communications method is packet switching, which
divides messages into packets and sends each packet individually.
T
Module 5 – Network Support Skills Author: Rel Date: 27/01/2018 Rev Date: 01/06/2023 Doc Ref: 48573 LM Mod 1 v-1
LEARNER MANUAL PAGE 188
The Internet is based on a packet-switching protocol, TCP/IP. Circuit-switching systems are
ideal for communications that require data to be transmitted in real-time. Packet-switching
networks are more efficient if some amount of delay is acceptable. Circuit-switching
networks are sometimes called connection-oriented networks. Note, however, that although
packet switching is essentially connectionless, a packet switching network can be made
connection-oriented by using a higher-level protocol. TCP, for example, makes IP networks
connection-oriented.
Packet - Refers to
protocols in which
messages are divided into
packets before they are
sent. Each packet is then
transmitted individually
and can even follow
different routes to its
destination.
Once all the packets
forming a message arrive
at the destination, they
are recompiled into the
original message. Most
modern Wide Area
Network (WAN) protocols,
including TCP/IP, X.25, and Frame Relay, are based on packet-switching technologies. In
contrast, normal telephone service is based on a circuit-switching technology, in which a
dedicated line is allocated for transmission between two parties.
Circuit-switching is ideal when data must be transmitted quickly and must arrive in the
same order in which it's sent. This is the case with most real-time data, such as live audio
and video. Packet switching is more efficient and robust for data that can withstand some
delays in transmission, such as e-mail messages and Web pages. A new technology, ATM,
attempts to combine the best of both worlds -- the guaranteed delivery of circuit-switched
networks and the robustness and efficiency of packet-switching networks.
Module 5 – Network Support Skills Author: Rel Date: 27/01/2018 Rev Date: 01/06/2023 Doc Ref: 48573 LM Mod 1 v-1
LEARNER MANUAL PAGE 189
Packet Switching refers to protocols in which messages are divided into packets before they
are sent. Each packet is then transmitted individually and can even follow different routes to
its destination. Once all the packets forming a message arrive at the destination, they are
recompiled into the original message.
Most modern Wide Area Network (WAN) protocols, including TCP/IP, X.25, and Frame Relay,
are based on packet-switching technologies. In contrast, normal telephone service is based
on a circuit-switching technology, in which a dedicated line is allocated for transmission
between two parties. Circuit-switching is ideal when data must be transmitted quickly and
must arrive in the same order in which it's sent.
This is the case with most real-time data, such as live audio and video. Packet switching is
more efficient and robust for data that can withstand some delays in transmission, such as
e-mail messages and Web pages. A new technology, ATM, attempts to combine the best of
both worlds, the guaranteed delivery of circuit-switched networks and the robustness and
efficiency of packet-switching networks.
A comparison of latency and throughput in telecommunications can address a common
misunderstanding that having greater throughput means a "faster" connection. However,
throughput, latency, the type of information transmitted, and the way that information is
applied all affect the perceived speed of a connection.
AC 3
he installation ensures that the LAN system software and application
software performs according to manufacturer`s and installation
specification.
Terms
Latency is the delay between the initiation of a network transmission by a sender and the
initial receipt of that transmission by a receiver. It is typically commensurate with the
distance the signal must travel, but is also affected by delays introduced in network routing,
including queues, multiple routes, packet loss, etc. and also
Throughput is the rate at which the transmission occurs. It is typically commensurate with
the channel capacity of the lowest-bandwidth portion of the transmission conduit.
T
Module 5 – Network Support Skills Author: Rel Date: 27/01/2018 Rev Date: 01/06/2023 Doc Ref: 48573 LM Mod 1 v-1
LEARNER MANUAL PAGE 190
Interplay of factors
Latency and throughput together affect the perceived speed of a connection. However, the
perceived speed of a connection can still vary widely, depending in part on the type of
information transmitted and how it is used.
For example, to view a web page over a 56 kbit/s modem transmitted from a server 4,800 km
away, latency over the Internet is fairly low – typically about a quarter of a second – and an
average web page of 30–100 kilobytes will transfer in 10–30 seconds. However, to transfer the
contents of a DVD over a modem could take a week or more at this rate. Simply packing the
DVD into an envelope and mailing it could be faster.
Using a T1 line with similar latencies, one could download the same web page in under a
second. To download a 5 GB DVD over this 1.5 Mbit/s connection would take about 7.4
hours. Latency can also directly affect throughput. In TCP connections, the large Bandwidth-
delay product of high latency connections, combined with relatively small TCP window sizes
on many devices, effectively causes the throughput of a high latency connection to drop
sharply with latency.
This can be remedied with various techniques, such as increasing the TCP congestion
window size, or more drastic solutions, such as packet coalescing, TCP acceleration, and
forward error correction, all of which are commonly used for high latency satellite links.
Queuing
Tagged Command Queuing (TCQ) is a technology built into certain ATA and SCSI hard
drives. It allows the operating system to send multiple read and write requests to a hard
drive. ATA TCQ is not identical in function to the more efficient Native Command Queuing
(NCQ) used by SATA drives. SCSI TCQ does not suffer from the same limitations as ATA TCQ.
Before TCQ, an operating system was only able to send one request at a time. In order to
boost performance, it had to decide the order of the requests based on its own, possibly
incorrect, idea of what the hard drive was doing. With TCQ, the drive can make its own
decisions about how to order the requests (and in turn relieve the operating system from
having to do so). The result is that TCQ can improve the overall performance of a hard drive
if it is implemented correctly.
Module 5 – Network Support Skills Author: Rel Date: 27/01/2018 Rev Date: 01/06/2023 Doc Ref: 48573 LM Mod 1 v-1
LEARNER MANUAL PAGE 191
With the increasing use of computers the usage and need of digital signal processing has
increased. In order to use an analogue signal on a computer it must be digitized with an
analogue to digital converter (ADC). Sampling is usually carried out in two stages,
discretisation and quantisation. In the discretisation stage, the space of signals is partitioned
into equivalence classes and discretisation is carried out by replacing the signal with
representative signal of the corresponding equivalence class. In the quantisation stage the
representative signal values are approximated by values from a finite set.
The faster the chip in your computer, the more processes it can handle at a time, the more
work can be done simultaneously. Increasing the speed of your chip (this can only be done
by buying a newer, faster chip) will enhance the speed that your computer processes the
information.
The larger the hard rive, the larger the speed that it can read and write to its’ memory
(cache), which means it can store data at a faster pace than a smaller (or lower cached) hard
drive. This can increase the speed that data is saved at, increasing the speed of the user.
When you keep your computer updated with the latest media devices, it will be able to read
these devices faster, enabling you to access the information at a faster speed, thus
decreasing the time spent on processing information.
RAM (random access memory) is memory which is used by your computer to randomly
allocate to programs and processes. The more RAM added to your computer, the more it can
access information from other programs, and the faster you are able to toggle between the
programs, accessing and saving information and data
Module 5 – Network Support Skills Author: Rel Date: 27/01/2018 Rev Date: 01/06/2023 Doc Ref: 48573 LM Mod 1 v-1
LEARNER MANUAL PAGE 192
AC 1
he testing ensures that the LAN operates according to manufacturer`s
and installation specification.
What is an Administrator?
A person who manages a local area communications network (LAN) within an
organization, Responsibilities include network security, installing new applications,
distributing software upgrades, monitoring daily activity, enforcing licensing agreements,
developing a storage management
program and providing for routine
backups. An individual
responsible for maintaining a
multi-user computer system,
including a local-area network
(LAN). Typical duties include:
Adding and configuring
new workstations
Setting up user accounts
Installing system-wide
software
Performing procedures to
prevent the spread of
viruses
Allocating mass storage
space
The system administrator is
sometimes called the sysadmin or
the systems administrator. Small
organizations may have just one
system administrator, whereas
larger enterprises usually have a whole team of system administrators.
T
Test the installation of local area computer networks Time: 120 minutes Activity: Self and Group
Module 5 – Network Support Skills Author: Rel Date: 27/01/2018 Rev Date: 01/06/2023 Doc Ref: 48573 LM Mod 1 v-1
LEARNER MANUAL PAGE 193
AC 2
he testing procedure meets the manufacturer`s guidelines and
installation specification.
LAN Troubleshooting
In order to ascertain the usage and health of user LANs for planning and problem
determination, it is necessary to be able to monitor the LAN. This can be accomplished either
from a Network Management Station communicating with SNMP enabled devices on the LAN,
or with a standalone network monitor such as the Network General Sniffer. Currently,
administrators monitor Ethernet (primarily IP) traffic between the local LAN and the FDDI
backbone.
This is accomplished using our Network Management System (NetView/6000)
communicating via SNMP with the campus backbone routers. In most cases this type of
monitoring is wholly inadequate as it does not include the majority of the traffic which is
local to the LAN. To adequately monitor the LAN, LAN administrators and planners should
consider the following management capabilities when purchasing/installing network
components.
LAN Monitoring from a Network Management System
Local hub with SNMP (repeater MIB and/or bridge MIB): allows traffic and error
statistics collection
Local hub with SNMP (RMON MIB): allows monitoring of MAC layer traffic and errors
Local hub with SNMP (RMON2 MIB): allows monitoring of all OSI layers (including
MAC, Network, protocol and application)
Network probe which can monitor local traffic and errors; if the probe has RMON2
support, it can monitor all OSI layers; the probe can be accessed remotely for data
collection and error reporting
Local Standalone LAN Monitoring
Attach a network monitor such as a Network General Sniffer to analyze network problems in
real time.
The network planner should also be aware of the consequence of installing switched hubs.
These introduce a whole new set of problems associated with the very nature of switching.
T
Module 5 – Network Support Skills Author: Rel Date: 27/01/2018 Rev Date: 01/06/2023 Doc Ref: 48573 LM Mod 1 v-1
LEARNER MANUAL PAGE 194
In order to monitor the ports on the switch, it should have at least one of the following
options:
1. RMON/RMON2 SNMP agent built into the switch.
2. Monitor (roving) port built into the switch.
This allows monitoring of one or more of the switch ports by an attached network probe or
monitor as noted above. Network Administrators must be prepared to assist LAN
administrators in monitoring their LANs using our Network Management System and/or by
temporarily installing our Ethernet probe or Ethernet Network General Sniffer on the local
network.
Very often a Mainframe computer will have to be set up to ensure that all the backing up file
storage is safe and done in line with the organisational requirements. A mainframe computer
is a very large and expensive computer capable of supporting hundreds, or even thousands,
of users simultaneously. In the hierarchy that starts with a simple microprocessor (in
watches, for example) at the bottom and moves to supercomputers at the top, mainframes
are just below supercomputers.
In some ways, mainframes are more powerful than supercomputers because they support
more simultaneous programs. But supercomputers can execute a single program faster than
a mainframe. The distinction between small mainframes and minicomputers is vague,
depending really on how the manufacturer wants to market its machines.
The Administrator will have to administer the domain controller which is as defined by
Microsoft, in Active Directory server roles, computers that function as servers within a
domain can have one of two roles: member server or domain controller. Abbreviated as DC,
domain controller is a server on a Microsoft Windows or Windows NT network that is
responsible for allowing host access to Windows domain resources.
The domain controllers in your network are the centrepiece of your Active Directory, directory
service. It stores user account information, authenticates users and enforces security policy
for a Windows domain. An active directory service stems from Microsoft that is a part of
Windows 2000. It is an implementation of Internet standard directory and naming protocols
that uses a database engine for transactional support, and also supports a variety of
application programming interface standards.
Module 5 – Network Support Skills Author: Rel Date: 27/01/2018 Rev Date: 01/06/2023 Doc Ref: 48573 LM Mod 1 v-1
LEARNER MANUAL PAGE 195
Whereas, as defined by Microsoft, in Active Directory server roles, computers that function as
servers within a domain can have one of two roles: member server or domain controller. A
member server is a computer that runs an operating system in the Windows 2000 Server
family or the Windows Server 2003 family, belongs to a domain, and is not a domain
controller.
Member servers typically function as the following types of servers:
File servers
Application servers
Database servers
Web servers
Certificate servers
Firewalls
Remote-access servers
AC 3
he testing ensures that results are recorded according to installation
specification.
Once you find your solution, you'll need to create a procedure for how you will back
up your data and how you will handle restoration in the case of data loss.
To make sure you have effective data backup and recovery systems in place, you'll need to
plan in detail for disaster recovery, make sure that all your employees are fully aware of the
effort to back up files, and test the system. Decide on a Backup Schedule whether you do it
yourself or hire a service to do it, you'll need to decide on a schedule for backing up.
Your backup schedule will consist of the following:
Full backups. This is a complete set of all of the data you want to back up. You'll want
to keep a current backup of your entire system around, but you don't need to do these
backups daily, as most of your files don't change every day, and full backups are time-
consuming.
Differential backups. This is the set of any files that have changed since the last full
backup. These backups take less time and space than a full backup but more than an
incremental backup.
Incremental backups. This is the set of files that have changed since the previous
backup (whether it is a differential, incremental, or full backup). These backups take
the least time and space, but, in the event of data loss, you'll need to restore data from
T
Module 5 – Network Support Skills Author: Rel Date: 27/01/2018 Rev Date: 01/06/2023 Doc Ref: 48573 LM Mod 1 v-1
LEARNER MANUAL PAGE 196
several backups (the last full backup, last differential, and all the incremental
backups since the last differential) and restore them in precisely the correct order.
First, decide how often to back up by considering how much data you can afford to lose.
Then, if you are using a hardware drive (tape, CD, or DVD), you'll need to decide on a
rotation schedule for your backups (how often you overwrite backed-up data). You'll also
want to periodically schedule some permanent backups for media that aren't rotated and
replaced with a more recent backup. This will allow you to go back further in time if you
need to. For instance, some viruses don't cause noticeable damage for weeks.
You will want to keep the following backups updated at all times:
Three daily incremental backups
1-week-old full backup
1-month-old full backup
If you aren't using a remote backup service, you'll need to have someone take physical media
off-site each day/week.
Prepare for Effective Data Backup and Recovery to make sure you have an effective data
backup and recovery system, you'll need to plan in detail for disaster recovery, make sure
that all your employees are fully aware of the effort to back up files to prevent data loss as
much as possible, and test to make sure that your data backup method is meeting your
needs.
Module 5 – Network Support Skills Author: Rel Date: 27/01/2018 Rev Date: 01/06/2023 Doc Ref: 48573 LM Mod 1 v-1
LEARNER MANUAL PAGE 197
You are now ready to go through a check list. Be honest with yourself
Tick the box with either a √ or an X to indicate your response
□ I am able to install LAN devices
□ I am able to ensure the installation meets the required manufacturer’s guidelines
□ I am able to test the installation on LAN’s
You must think about any point you could not tick. Write this down as a goal.
Decide on a plan of action to achieve these goals. Regularly review these goals.
My Goals and Planning: __________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________