Support a local area computer network 114043 - geeks4learning
-
Upload
khangminh22 -
Category
Documents
-
view
5 -
download
0
Transcript of Support a local area computer network 114043 - geeks4learning
Module 5 – Network Support Skills Author: Rel Date: 27/01/2018 Rev Date: 01/06/2023 Doc Ref: 48573 LM Mod 1 v-1
LEARNER MANUAL PAGE 21
PURPOSE OF THE UNIT STANDARD
This unit standard is intended for people responsible for the provision of day-to-day network
administration and support, including resolution of network user problems, data backup and
restore, production of network performance statistics, provision of network diagnostic
information, and site surveys in a local area network (LAN) environment:
As fundamental knowledge of the areas covered,
For those working in the Information Technology industry in the area of Network
Administration,
As additional knowledge for those wanting to understand the areas covered.
People credited with this unit standard are able to:
Maintain the performance of a local area computer network (LAN);
Execute procedures on a LAN;
Administer security, maintain the supply of consumables, and plan capacity for a LAN;
Maintain the availability of a LAN, and
Manage changes to a LAN.
The performance of all outcomes is to a standard that allows for further learning in this
environment.
LEARNING ASSUMED TO BE IN PLACE AND RECOGNITION OF PRIOR LEARNING
Open. The credit value of this unit standard is calculated assuming a person has the prior
knowledge and skills to apply the principles of administering local and wide area networks.
UNIT STANDARD RANGE
A "local area computer network" (LAN) is a single network of personal computers within the
same area, e.g. an office or building.
"Procedures" are programmes of computer operating commands.
Support a local area computer network 114043
Module 5 – Network Support Skills Author: Rel Date: 27/01/2018 Rev Date: 01/06/2023 Doc Ref: 48573 LM Mod 1 v-1
LEARNER MANUAL PAGE 22
INDEX
Competence Requirements Page Unit Standard 114043 alignment index Here you will find the different outcomes explained which you need to be proved competent in, in order to complete the Unit Standard 114043.
23
Unit Standard 114043 25 Maintain the performance of a local area network 30 Execute procedures on a local area computer network 39 Administer security systems for a local area network 53 Maintain the supply of consumables for a local area network 63 Plan capacity for a local area network 68 Maintain the availability of a local area network 81 Make changes to a local area network 87 Self-assessment Once you have completed all the questions after being facilitated, you need to check the progress you have made. If you feel that you are competent in the areas mentioned, you may tick the blocks, if however you feel that you require additional knowledge, you need to indicate so in the block below. Show this to your facilitator and make the necessary arrangements to assist you to become competent.
95
Module 5 – Network Support Skills Author: Rel Date: 27/01/2018 Rev Date: 01/06/2023 Doc Ref: 48573 LM Mod 1 v-1
LEARNER MANUAL PAGE 23
Unit Standard 114043 – Alignment Index SPECIFIC OUTCOMES AND RELATED ASSESSMENT CRITERIA SO 1 MAINTAIN THE PERFORMANCE OF A LOCAL AREA NETWORK
AC 1 Monitoring and tuning of the network ensures operation and performance meets the manufacturer’s and organisation specifications
AC 2 Network performance problems are resolved according to organisation specifications AC 3 Accurate and up-to-date documentation is maintained of network resource utilisation SO 2 EXECUTE PROCEDURES ON A LOCAL AREA COMPUTER NETWORK
AC 1 The execution ensures that computer output is produced according to organisation specifications
AC 2 Problems with procedures are identified, and action is taken according to organisation specifications
AC 3 Start-up and shutdown of the network are in accordance with the manufacturer’s and organisation specifications
SO 3 ADMINISTER SECURITY SYSTEMS FOR A LOCAL AREA NETWORK
AC 1 Security exposures and violations are identified, and action is taken according to organisation policies, procedures and requirements
AC 2 Back-ups are made according the organisations policies, procedures and specifications
AC 3 Access to the network is provided according to organisation policies, procedures and specifications
SO 4 MAINTAIN THE SUPPLY OF CONSUMABLES FOR A LOCAL AREA NETWORK
AC 1 A forecast of the consumption of computer system consumables is justified using measurement of historical consumption and anticipated events
AC 2 Supply agreements are established so that the consumable supplies are available to meet demand
AC 3 Stocks of consumable supplies meet forecasted demand AC 4 Overstocks of consumable supplies are avoided SO 5 PLAN CAPACITY FOR A LOCAL AREA NETWORK
AC 1 The plan includes a forecast based on documentation of current network resource utilisation, historical growth and future plans
AC 2 The plan includes recommendations for network changes that allow the network to meet the future capacity requirements
AC 3 The plan identifies and explains the feasibility of the recommendations
AC 4 The plan includes a comparison of actual resource usage with forecast usage according to organisation requirements
SO 6 MAINTAIN THE AVAILABILITY OF A LOCAL AREA NETWORK AC 1 The network is available and accessible according to organisation requirements AC 2 Network availability problems are resolved according to organisation specifications SO 7 MANAGE CHANGES TO A LOCAL AREA NETWORK
AC 1 The management ensures that a plan of a proposed change predicts the impact and risks to the organisation associated with the change
AC 2 The management ensures that a plan of a proposed change establishes when the change should occur to minimise the impacts and risks
AC 3 The management includes a contingency plan that allows the network to be restored to a status acceptable to the user in the event of problems with the change
AC 4 Testing establishes the success of the installation and of the changes according to user and organisation requirements
AC 5 The plan ensures that people affected by the change are notified to minimise disruption to their activity
Module 5 – Network Support Skills Author: Rel Date: 27/01/2018 Rev Date: 01/06/2023 Doc Ref: 48573 LM Mod 1 v-1
LEARNER MANUAL PAGE 24
C R I T I C A L C R O S S F I E L D O U T C O M E S
UNIT STANDARD CCFO IDENTIFYING Identify and solve problems in which responses display decisions using critical and creative thinking by acquiring understanding of a problem or situation by breaking it down systematically into its component parts and identifying the relationships between these parts. UNIT STANDARD CCFO WORKING Work effectively with others as a member of a team, group, organisation and/or community by working co-operatively (rather than competitively) with others to achieve a common goal. UNIT STANDARD CCFO COLLECTING Collect, analyse, organise and critically evaluate information by identifying gaps in the available information required to understand a problem or situation and devising means of remedying such gaps. UNIT STANDARD CCFO COMMUNICATING Communicate effectively using visual, mathematical and/or language skills in the modes of organ and/or written presentation by establishing relationships and maintaining contacts with people from a wide variety of backgrounds. UNIT STANDARD CCFO DEMONSTRATING Demonstrate an understanding of the world as a set of related systems by applying quality standards to all tasks undertaken and ensuring that nothing is overlooked.
E S S E N T I A L E M B E D D E D K N O W L E D G E
Module 5 – Network Support Skills Author: Rel Date: 27/01/2018 Rev Date: 01/06/2023 Doc Ref: 48573 LM Mod 1 v-1
LEARNER MANUAL PAGE 25
All qualifications and part qualifications registered on the National Qualifications Framework are public property. Thus the only payment that can be made for them is for service and reproduction. It is illegal to sell this material for profit. If the material is reproduced or quoted, the South African Qualifications Authority (SAQA) should be acknowledged as the source.
SOUTH AFRICAN QUALIFICATIONS AUTHORITY
REGISTERED UNIT STANDARD:
Support a local area computer network
SAQA US ID
UNIT STANDARD TITLE
114043 Support a local area computer network
ORIGINATOR
SGB Information Systems and Technology
FIELD SUBFIELD
Field 10 - Physical, Mathematical, Computer and Life Sciences Information Technology and Computer Sciences
ABET BAND
UNIT STANDARD TYPE
PRE-2009 NQF LEVEL NQF LEVEL CREDITS
Undefined Regular Level 5 Level TBA: Pre-2009 was L5
10
REGISTRATION STATUS REGISTRATION START DATE
REGISTRATION END DATE
SAQA DECISION NUMBER
Reregistered 2018-07-01 2023-06-30 SAQA 06120/18
LAST DATE FOR ENROLMENT LAST DATE FOR ACHIEVEMENT
2024-06-30 2027-06-30
In all of the tables in this document, both the pre-2009 NQF Level and the NQF Level is shown. In the text (purpose statements, qualification rules, etc), any references to NQF Levels are to the pre-2009 levels unless specifically stated otherwise.
This unit standard does not replace any other unit standard and is not replaced by any other unit standard.
PURPOSE OF THE UNIT STANDARD
This unit standard is intended for people responsible for the provision of day-to-day network administration and support, including resolution of network user problems, data backup and restore, production of network performance statistics, provision of network diagnostic information, and site surveys in a local area network (LAN) environment: As fundamental knowledge of the areas covered, For those working in the Information Technology industry in the area of Network Administration, As additional knowledge for those wanting to understand the areas covered. People credited with this unit standard are able to: Maintain the performance of a local area computer network (LAN); Execute procedures on a LAN; Administer security, maintain the supply of consumables, and plan capacity for a LAN; Maintain the availability of a LAN, and Manage changes to a LAN. The performance of all outcomes is to a standard that allows for further learning in this environment.
LEARNING ASSUMED TO BE IN PLACE AND RECOGNITION OF PRIOR LEARNING
Open. The credit value of this unit standard is calculated assuming a person has the prior knowledge and skills to apply the principles of administering local and wide area networks.
UNIT STANDARD RANGE
A "local area computer network" (LAN) is a single network of personal computers within the same area, e.g. an office or building. "Procedures" are programmes of computer operating commands.
Module 5 – Network Support Skills Author: Rel Date: 27/01/2018 Rev Date: 01/06/2023 Doc Ref: 48573 LM Mod 1 v-1
LEARNER MANUAL PAGE 26
Specific Outcomes and Assessment Criteria:
SPECIFIC OUTCOME 1
Maintain the performance of a local area network.
ASSESSMENT CRITERIA
ASSESSMENT CRITERION 1
1. Monitoring and tuning of the network ensures operation and performance meets the manufacturer`s and organisation specifications.
ASSESSMENT CRITERION 2
2. Network performance problems are resolved according to organisation specifications.
ASSESSMENT CRITERION 3
3. Accurate and up-to-date documentation is maintained of network resource utilisation.
SPECIFIC OUTCOME 2
Execute procedures on a local area computer network.
ASSESSMENT CRITERIA
ASSESSMENT CRITERION 1
1. The execution ensures that computer output is produced according to organisation specifications.
ASSESSMENT CRITERION 2
2. Procedure messages are identified during execution, and actions are taken according to organisation specifications.
ASSESSMENT CRITERION 3
3. Problems with procedures are identified, and action is taken according to organisation specifications.
ASSESSMENT CRITERION 4
4. Potential improvements to procedures are identified, and action is taken according to organisation specifications.
ASSESSMENT CRITERION 5
5. Startup and shutdown of the network are in accordance with the manufacturer`s and organisation specifications.
SPECIFIC OUTCOME 3
Administer security systems for a local area network.
ASSESSMENT CRITERIA
ASSESSMENT CRITERION 1
1. Security exposures and violations are identified, and action is taken according to organisation policies, procedures and requirements.
ASSESSMENT CRITERION 2
2. Back-ups are made according the organisations policies, procedures and specifications.
ASSESSMENT CRITERION 3
3. Access to the network is provided according to organisation policies, procedures and specifications.
SPECIFIC OUTCOME 4
Maintain the supply of consumables for a local area network.
ASSESSMENT CRITERIA
Module 5 – Network Support Skills Author: Rel Date: 27/01/2018 Rev Date: 01/06/2023 Doc Ref: 48573 LM Mod 1 v-1
LEARNER MANUAL PAGE 27
ASSESSMENT CRITERION 1
1. A forecast of the consumption of computer system consumables is justified using measurement of historical consumption and anticipated events.
ASSESSMENT CRITERION 2
2. Supply agreements are established and maintained so that the consumable supplies are available to meet demand.
ASSESSMENT CRITERION 3
3. Stocks of consumable supplies meet forecasted demand.
ASSESSMENT CRITERION 4
4. Overstocks of consumable supplies are avoided.
SPECIFIC OUTCOME 5
Plan capacity for a local area network.
ASSESSMENT CRITERIA
ASSESSMENT CRITERION 1
1. The plan includes a forecast based on documentation of current network resource utilisation, historical growth and future plans.
ASSESSMENT CRITERION 2
2. The plan includes recommendations for network changes that allow the network to meet the future capacity requirements.
ASSESSMENT CRITERION 3
3. The plan identifies and explains the feasibility of the recommendations.
ASSESSMENT CRITERION 4
4. The plan includes a comparison of actual resource usage with forecast usage according to organisation requirements.
SPECIFIC OUTCOME 6
Maintain the availability of a local area network.
ASSESSMENT CRITERIA
ASSESSMENT CRITERION 1
1. The network is available and accessible according to organisation requirements.
ASSESSMENT CRITERION 2
2. Network availability problems are resolved according to organisation specifications.
SPECIFIC OUTCOME 7
Manage changes to a local area network.
ASSESSMENT CRITERIA
ASSESSMENT CRITERION 1
1. The management ensures that a plan of a proposed change predicts the impact and risks to the organisation associated with the change.
ASSESSMENT CRITERION 2
2. The management ensures that a plan of a proposed change establishes when the change should occur to minimise the impacts and risks.
ASSESSMENT CRITERION 3
Module 5 – Network Support Skills Author: Rel Date: 27/01/2018 Rev Date: 01/06/2023 Doc Ref: 48573 LM Mod 1 v-1
LEARNER MANUAL PAGE 28
3. The management includes a contingency plan that allows the network to be restored to a status acceptable to the user in the event of problems with the change.
ASSESSMENT CRITERION 4
4. Testing establishes the success of the installation and of the changes according to user and organisation requirements.
ASSESSMENT CRITERION 5
5. The plan ensures that people affected by the change are notified to minimise disruption to their activity.
UNIT STANDARD ACCREDITATION AND MODERATION OPTIONS
The relevant Education and Training Quality Authority (ETQA) must accredit providers before they can offer programmes of education and training assessed against unit standards. An assessor, accredited by the relevant ETQA, will assess the learner`s competency. Assessment procedures will be supplied by the ETQA in alignment with NSB requirements. All assessment activities must be fair, so that all candidates have equal opportunities. Activities must be free of gender, ethnic or other bias. Assessment procedures, activities and tools must be transparent, affordable and support development within the field, sub-field and NQF. Questions and answers to determine theoretical knowledge are expected. Examination of an assessment portfolio. Reporting skills are demonstrated by effective communication, using verbal (language) and/or writing skills. Direct observation in simulated or actual work conditions. Moderation Process: Moderation of assessment will be overseen by the relevant ETQA according to the moderation guidelines in the relevant qualification and the agreed ETQA procedures Moderation procedures, activities and tools must be transparent, affordable and support development within the field, sub-field and NQF.
UNIT STANDARD ESSENTIAL EMBEDDED KNOWLEDGE
Familiar with Networking and Communications. The planning and management of the interaction between two or more networking systems, computers or other "intelligent" devices. E.g.: ISDN, ATM, Ethernet, TCP/IP. Familiar with Operating Infrastructure. Knowledge of the ICT infrastructure (hardware, databases, operating systems, local area networks etc) used within own organisation. Aware of Telecommunications Protocols. Rules for the inter-operation of networking components. E.g.: TCP/IP, Q931, DASS, QSIG, xDSL. Aware of Network Traffic Analysis. Methods and techniques for the capture of traffic information and the analysis of this information into its constituent elements. Familiar with Desktop Software. The use of everyday desktop software. E.g.: word processing, spreadsheets, graphics. Aware of Report Writing Techniques. Methods and techniques for writing effective reports.
UNIT STANDARD DEVELOPMENTAL OUTCOME
N/A
UNIT STANDARD LINKAGES
N/A
Critical Cross-field Outcomes (CCFO):
UNIT STANDARD CCFO IDENTIFYING
Identify and solve problems in which responses display decisions using critical and creative thinking by acquiring understanding of a problem or situation by breaking it down systematically into its component parts and identifying the relationships between these parts.
UNIT STANDARD CCFO WORKING
Work effectively with others as a member of a team, group, organisation and/or community by working co-operatively (rather than competitively) with others to achieve a common goal.
UNIT STANDARD CCFO COLLECTING
Collect, analyse, organise and critically evaluate information by identifying gaps in the available information required to understand a problem or situation and devising means of remedying such gaps.
Module 5 – Network Support Skills Author: Rel Date: 27/01/2018 Rev Date: 01/06/2023 Doc Ref: 48573 LM Mod 1 v-1
LEARNER MANUAL PAGE 29
UNIT STANDARD CCFO COMMUNICATING
Communicate effectively using visual, mathematical and/or language skills in the modes of organ and/or written presentation by establishing relationships and maintaining contacts with people from a wide variety of backgrounds.
UNIT STANDARD CCFO DEMONSTRATING
Demonstrate an understanding of the world as a set of related systems by applying quality standards to all tasks undertaken and ensuring that nothing is overlooked.
UNIT STANDARD ASSESSOR CRITERIA
N/A
REREGISTRATION HISTORY
As per the SAQA Board decision/s at that time, this unit standard was Reregistered in 2012; 2015.
UNIT STANDARD NOTES
1. Performance of all elements is to be carried out in accordance with organisation standards and procedures, unless otherwise stated. Organisation standards and procedures may cover: quality assurance, documentation, security, communication, health and safety, and personal behaviour. An example of the standards expected is the standards found in ISO 9000 Certified Organisations. 2. Performance of all elements is to be completed within the normal range of time that would be expected in a professional environment, e.g. in a commercial or government organisation. 3. Performance of all elements is to be within the normal range of cost, or cost estimate, that would be expected in a commercial environment. 4. Performance of all elements complies with the laws of South Africa, especially with regard to copyright, privacy, health and safety, and consumer rights.
Module 5 – Network Support Skills Author: Rel Date: 27/01/2018 Rev Date: 01/06/2023 Doc Ref: 48573 LM Mod 1 v-1
LEARNER MANUAL PAGE 30
AC 1
onitoring and tuning of the network ensures operation and performance
meets the manufacturer`s and organisation specifications.
Design, install and evaluate Networks
The network administrator is responsible for planning, designing, installing, and evaluating
networks and workstations. Very often the administrator is also involved in researching
purchasing information on hardware and software acquisitions.
Planning and design
Planning for your network installation is one of the most important steps. Before you begin
designing the network you need to identify what your company needs are. This will help
guide you through the process and make sure you don't overlook any important details. Here
are a few important points that you should consider when designing your network.
Network design underlies the performance of your enterprise IP network. This guide offers
you a comprehensive roadmap to designing IP-based networks, from the basic principles
involved to the more complex finishing touches.
Network topology
Topology is a term that refers the shape of the network and the layout of cabling from a
bird's eye view, much as a floor plan identifies the layout of offices and hallways in a
building. See which network topology is right for your network.
Physical and logical network design
A physical layout of the network shows the physical location of and the connections between
devices participating on the network.
In such diagrams, workstations are usually represented with small computer icons, servers
with full tower cases, and switches and other similar devices are displayed as small
rectangular boxes with their RJ-45 ports in the front (sometimes, switches are displayed
without ports, depending on the angle at which we are viewing the network on the page).
M
Maintain the performance of a LAN Time: 90 minutes Activity: Self and Group
Module 5 – Network Support Skills Author: Rel Date: 27/01/2018 Rev Date: 01/06/2023 Doc Ref: 48573 LM Mod 1 v-1
LEARNER MANUAL PAGE 31
A logical layout shows all logical aspects of the network. This includes logical networks,
assigned IP addresses to various hosts and devices, routing tables and a lot more. In logical
diagrams, there is very little interest in the actual interfaces and physical cables, so these
details are usually omitted. Golden rules of network administration
1. If it isn't broke, don't mess with it!
2. When in doubt -- reboot.
3. Never, ever change anything late in the day.
4. Never, ever change anything on Friday.
5. Always be able to undo what you are about to do.
6. If you don't understand it, don't mess with it on a production system. Use test
systems for experimenting.
7. Dedicate a system disk devoted only to the system software. Put applications on other
drives.
8. A project is not done until it's tested by you and by end-users.
9. A project is not done until it's documented.
10. All projects take twice as long as you plan.
11. Use default settings whenever possible.
12. Do not roll out new software without training end users. Roll out an employee's new
application immediately after they have received training to reinforce what they have learned.
13. If you're fighting fires all the time, find the source.
14. Avoid poor decisions from above.
15. Backup, backup, backup.
AC 2
etwork performance problems are resolved according to organisation
specifications.
Backup management
The network administrator is responsible for network backups as well as testing
backup and disaster recovery processes. This is crucial for recovery from power or hardware
failure, data and/or network problems, and physical disasters.
Backup guidelines:
In many ways, backups are the heart of any design of critical systems. Handled properly,
they represent the last line of defense against just about any catastrophe. Even if your
building or your entire city is wiped out, your business can be restored on other computers
from properly generated and protected backup tapes. But there are several "if" conditions
that must be satisfied for everything to work out properly and data to be recoverable.
N
Module 5 – Network Support Skills Author: Rel Date: 27/01/2018 Rev Date: 01/06/2023 Doc Ref: 48573 LM Mod 1 v-1
LEARNER MANUAL PAGE 32
There are a number of basic backup guidelines. By keeping them in mind as you design your
backup environment, you will make the best advantage of your backups, and they will serve
you best when you need them:
1. Mirroring does not replace backups.
2. The most common use of restores isn't after a catastrophe.
3. Regularly test your ability to restore.
4. Keep those tape heads clean.
5. Beware of dirty tapes.
6. Pay attention to Mean Time Between Failure (MTBF) numbers for tapes.
7. Tapes decompose over time.
8. Make two copies of critical tapes.
9. Make sure you can still read old media.
Backup management headaches
The amount of data that companies are producing is growing exponentially. The sheer
quantity of data doesn't make it any less important to the company. So every bit needs to be
backed up in case of an accidental deletion, a hardware failure or, as we have been reminded
recently, an actual disaster. Everyone knows the data needs to be preserved, but how does
an network administrator go about doing that without devoting all his time to backup
management?
It's definitely an issue that hasn't gone unnoticed among the many backup software
companies. Backup software is a multimillion-dollar industry, and wading through the
vendor rhetoric can be a challenge in and of itself. Here we take a look at the biggest backup
management headaches and challenges for network administrators:
1. Shrinking backup window.
2. Inability to force an enterprise-wide centralized backup policy.
3. Inability to backup desktops and laptops confidently.
4. Network bandwidth limitations.
5. Rapidly growing data, and finding a place for it all.
6. Tape management for recovery.
7. Restoring quickly.
8. Difficulty of backing up complex, heterogeneous environments.
9. Remote management.
10. Tape security.
Disaster recovery plan
Module 5 – Network Support Skills Author: Rel Date: 27/01/2018 Rev Date: 01/06/2023 Doc Ref: 48573 LM Mod 1 v-1
LEARNER MANUAL PAGE 33
1. It is critical that you obtain and maintain senior executive support for disaster
recovery (DR).
2. Determine which senior executive(s) will have overall responsibility for disaster recover
and have this person appoint a DR coordinator.
3. Appoint a disaster recover team leader for each operational unit.
4. Identify functions, process and systems. Determine critical systems, applications and
business processes that must continue through disaster recover.
5. Prepare impact analysis on interruptions on critical systems.
6. Review physical security.
7. Review backup systems and data security.
8. Review policies on personnel termination and transfer.
9. Identify systems supporting mission-critical functions.
10. Identify vulnerabilities (e.g. physical attacks, floods, fire, earthquakes, etc.)
11. Access probability of system failure or disruption.
12. Prepare risk and security analysis.
13. Develop a strategic outline for recovery.
14. Detail all the steps in your workflow for each critical business function.
15. Review onsite and offsite backup and recovery procedures.
16. Select, equip, duplicate and prepare staff for an alternate facility.
17. Develop recovery plan.
18. Test the plan. Schedule to update and maintain the plan on a routine basis.
Managing network traffic during backups
Backup and verification operations can create significant increases in network traffic. This
can lead to reduced performance of your servers and all of the segments of the network
involved in the backup.
One solution to the problem of course is scheduling backups at a time when network usage
is low, like before or after hours. Since this may not always be possible, you can perform
backups in smaller incremental steps during normal hours.
Module 5 – Network Support Skills Author: Rel Date: 27/01/2018 Rev Date: 01/06/2023 Doc Ref: 48573 LM Mod 1 v-1
LEARNER MANUAL PAGE 34
AC 3
ccurate and up-to-date documentation is maintained of network
resource utilisation.
Network documentation and auditing
The first step toward administering a network is to have accurate and complete
documentation of the network. Documenting a network will reduce administration time for
issues such as updates, user problems and disaster recovery. There are four basic parts of a
network that should be documented:
LAN Software
LAN Hardware
Network Diagram
User Names (ID numbers) and network numbers.
All documents should be kept in a secured location. Make sure that you have a policy in
place and a person assigned to the responsibility of keeping all documentation up to date
and accurate.
Documenting your network
1. Obtain or construct a building diagram/floor plan.
2. Obtain or construct a physical network diagram.
3. Obtain or construct a logical network diagram. (Software packages can research and
record all hardware information.)
4. Hardware information should include make, serial numbers, and numbers of ports as
well as MAC and NIC numbers.
5. Research and record all configuration, protocol and DNS information.
6. Print copies of configurations files; keep those copies on tape for removable disk.
7. Document specific software configurations.
8. Research and record all corporate contact and vendor information.
9. Product and maintain device log sheets for all applicable network devices.
10. Product and maintain a network cabling labelling scheme. Do not base the labelling
on names of users.
11. Product and maintain procedure documentation.
12. Product and maintain computer and network acceptable use policies.
13. Product and maintain computer and network security policies.
14. Product and maintain a disaster recovery plan.
15. Schedule to update and maintain these items on a regular basis.
16. Never share these documents with unauthorized individuals -- ever!
A
Module 5 – Network Support Skills Author: Rel Date: 27/01/2018 Rev Date: 01/06/2023 Doc Ref: 48573 LM Mod 1 v-1
LEARNER MANUAL PAGE 35
Network diagrams
Documenting your network doesn't exactly sound like the most exciting way to spend your
time, does it? It involves creating a diagram, usually with a documentation tool such as Visio
or LanFlow, that illustrates how your servers, routers and switches are connected, either
logically or physically. However, comprehensive network documentation can be of vital
importance. In addition to serving as a network blueprint, it can also help you remember
what you did to your network, and just as importantly, why. This can make maintaining
your network and troubleshooting problems a much easier and smoother process.
Network cabling documentation
Picture these scenarios: A quick and simple network change turns into disaster when instead
of disconnecting the correct cable, you actually disconnect the cable to a critical server. A
security audit requires you to document the physical path location of cables carrying
sensitive information and who has access to those cables. But your documentation of cable
location and the identity of all the endpoints to which they are connected is out of date.
Network auditing
Network auditing may be a time-consuming chore that you probably don't have time for. It's
more than likely, however, that someone has already gone to the trouble and is scanning
your network for weak points to attack. It could be someone within your organisation;
statistics show that more than 60% of computer crimes originate inside the enterprise. So
remember that the best defence is a good offence, and you cannot raise a good defence
unless you know where your network is weak.
Before a network services audit can begin, a network inventory must be conducted. An
inventory includes collecting host identification information, such as IP address, network
interface hardware (NIC) address and DNS entries, for all network nodes. While some of this
information will be on hand in most environments, often it will have errors. In most cases,
NIC information and MAC addresses will not be recorded.
Even if you think you have the information, it's a good idea to conduct the inventory and
verify the information as a first step to an audit. This allows you to build a complete picture
of the environment and, as an additional benefit, will reveal inconsistencies that should be
cleaned up.
Module 5 – Network Support Skills Author: Rel Date: 27/01/2018 Rev Date: 01/06/2023 Doc Ref: 48573 LM Mod 1 v-1
LEARNER MANUAL PAGE 36
Performing a network audit
1. Use outside vendors to conduct and audit. This will ensure that there is no
favouritism or politics in the results, and provide credibility with senior management. Ensure
the vendor or contractor you use covers the items listed below as a minimum. Find out who
will be conducting the audit and review resume and references from past audited companies.
Ensure goals of the audit are adhered to.
2. It is highly recommended that you perform an internal audit prior to outside audit so
you can compare results.
3. Establish and document baseline performance of all network components.
4. Review, document and analyse controls over Internet, intranet and network resources.
5. Review and document all network connections, client/server, LAN, WAN, etc.
6. Review and document controls over network operations and management, load/traffic
management and problem reporting and resolution.
7. Review and assess network segmentation and identify and audit any internal firewalls.
8. Review and assess a single point of failure analysis. How is your network affected by
critical equipment? Do you have backups installed and ready?
9. Prepare a risk assessment and develop and implement a risk mitigation plan.
10. Review and document all software licenses required/possessed for all locations.
11. Verify and record all installed software. Remove all unauthorized software and secure
hardware and software to prevent future downloads or installations.
Network management and troubleshooting
It is the network administrator's responsibility to make sure the network is working properly
and efficiently. You'll also provide maintenance and support for your end-users equipment,
regardless if it's on site or remote.
Golden rules of network administration
1. If it isn't broke, don't mess with it!
2. When in doubt -- reboot.
3. Never, ever change anything late in the day.
4. Never, ever change anything on Friday.
5. Always be able to undo what you are about to do.
6. If you don't understand it, don't mess with it on a production system. Use test
systems for experimenting.
7. Dedicate a system disk devoted only to the system software. Put applications on other
drives.
8. A project us not done until it's tested by you and by end-users.
Module 5 – Network Support Skills Author: Rel Date: 27/01/2018 Rev Date: 01/06/2023 Doc Ref: 48573 LM Mod 1 v-1
LEARNER MANUAL PAGE 37
9. A project is not done until it's documented.
10. All projects take twice as long as you plan.
11. Use default settings whenever possible.
12. Do not roll out new software without training end users. Roll out an employee's new
application immediately after they have received training to reinforce what they have learned.
13. If you're fighting fires all the time, find the source.
14. Avoid poor decisions from above.
15. Backup, backup, backup.
The task of maintaining an operational network delivering predictable, reliable services to
meet enterprise needs has always been and remains the day-to-day task of legions of
network management and operations professionals. The task becomes more difficult and
more critical to business success as a result of escalating demands for better performance,
increased reliability and dynamic adaptability.
These demands result from a proliferation of more complex, more distributed, and more
dynamic business services. To meet customer demands, services are exhibiting a growing
addiction to network-based solutions (for e.g., VoIP) and an emerging interest in
sophisticated, bandwidth-intensive applications such as IP Multimedia Services.
Desktop management
Desktop management is one of the big headaches of the IT world. Systems administrators
face a number of challenges in controlling the corporate desktop. Tracking an entire
company's PCs, which can range into the thousands, isn't an easy task.
Making sure every employee has a functional desktop and coordinating rollouts of software
updates and operating system migrations across those PCs is no picnic either. But following
some common-sense principles can make desktop management easier for all parties
involved.
Spyware
It could happen to you. Your PCs could be infested with spyware or adware. The key is to
know where to look and what to record as spyware digs through your hard disk, memory and
Windows registry. By following a regular process you can keep spyware at bay
Module 5 – Network Support Skills Author: Rel Date: 27/01/2018 Rev Date: 01/06/2023 Doc Ref: 48573 LM Mod 1 v-1
LEARNER MANUAL PAGE 38
Network security and viruses
The administrator often acts as the security officer of the network. It is your responsibility to
investigate and resolve unsuccessful login attempts, intruder detection lockouts,
compromised passwords, viruses, spam and security policies
Perform a security audit
1. Use outside vendors to conduct and audit. This will ensure that there is no
favouritism or politics in the results, and provide credibility with senior management. Ensure
the vendor or contractor you use covers the items listed below as a minimum. Find out who
will be conducting the audit and review resume and references from past audited companies.
Ensure goals of the audit are adhered to.
2. Assess physical security: Video monitoring, data and portable media handling, paper
shredding methods and policies, physical layout and location of data centre, security of LAN
closets, cleaning crew access, key and access controls and logging and challenge the
procedures.
3. Assess network security: Proper segmentation of LAN and WAN, proper passwords,
limited use of protocols -- only those necessary are installed, IDS systems within the
organization, firewalls, redundancy and failover or clustering of servers, routers and
switches, restricted us of dial-up anywhere in your organization – including prohibition of
telnet or other unnecessary protocols.
4. Application security: Encryption, default accounts renamed, deleted, changed
passwords, all software and Web/email servers hardened, patched, updated and secured.
5. Policy and procedures: Acceptable use policies, security incident handling procedures,
incident escalations, remote access policy, firewall management policy, disaster recover
policy. Security awareness training for all employees is a never-ending process.
Security policies
A well-designed security policy is a powerful tool in your network security arsenal. Using
built-in tools found in Windows, you can create and enforce your own custom security policy
for all of the systems in your network
Module 5 – Network Support Skills Author: Rel Date: 27/01/2018 Rev Date: 01/06/2023 Doc Ref: 48573 LM Mod 1 v-1
LEARNER MANUAL PAGE 39
AC 1
he execution ensures that computer output is produced according to
organisation specifications
Count the number of computers you need to hardwire. When setting up a LAN,
you'll need to know how many computers will be connecting to the network via
Ethernet. This will determine the number of ports you'll need. If you have four or less
computers that you need to hardwire, you'll just need a router. If you have more than four,
you'll likely need to get a switch to extend the number of ports available on your router.
Decide if you want to create a wireless network. If you want to allow devices to connect
wirelessly, you'll need a router that can broadcast a wireless network. Most routers you'll
find at the store or online have wireless capabilities. Network switches do not allow wireless
devices to connect, and can only be used for hardwired LANs or to extend the number of
ports available to the router.
Determine if you want all network devices to have internet access. If you want all of the
connected devices to have access to the internet, you'll need a router to handle the
connections. If you don't need the devices to have a network connection, you can just use a
network switch.
Measure the distances for all hardwired devices. This isn't much of an issue in most homes,
but network cables cannot run longer than 100m. If you have to run cable farther than this,
you'll need switches in between. Consider your future needs. If you're filling all of the ports
on your hardware, consider future-proofing to allow for more devices in the future.
Setting Up a Basic LAN
Gather your network hardware. To create a LAN, you'll need a router or switch, which will
act as the hub of your network. These devices route information to the correct computers.
A router will automatically handle assigning IP addresses to each device on the network, and
is necessary if you intend to share your internet connection with all the connected devices. It
is highly recommended that you build your network with a router, even if you're not sharing
an internet connection.
T
Execute procedures on a LAN Time: 90 minutes Activity: Self and Group
Module 5 – Network Support Skills Author: Rel Date: 27/01/2018 Rev Date: 01/06/2023 Doc Ref: 48573 LM Mod 1 v-1
LEARNER MANUAL PAGE 40
A network switch is like a simpler version of a router. It will allow connected devices to talk
to each other, but will not automatically assign IP addresses and will not share an internet
connection. Switches are best used to expand the number of LAN ports available on the
network, as they can be connected to the router.
Set up your router. You don't need to do much to set up a router for a basic LAN. Just plug it
into a power source, preferably close to your modem if you plan on sharing the internet
connection through it.
Connect your modem to your router (if necessary). If you're sharing the internet connection
from your modem, connect the modem to the WAN/INTERNET port on the router. This is
usually a different colour from the other ports. Connect your switch to your router (if
necessary). If you're using a switch to expand the number of ports available on the router,
plug an Ethernet cable into any LAN port on the router and any LAN port on the switch. This
will expand the network to the rest of the LAN ports on the switch.
Connect your computers to open LAN ports. Use Ethernet cables to connect each computer
to an open LAN port on your router or switch. It doesn't matter what order the ports are
connected in. Ethernet cables cannot reliably transfer data at lengths larger than 100m.
Setup one PC as a DHCP server if you're just using a switch. If you're only using a switch as
your network hub, setting up one computer as a DHCP (Dynamic Host Configuration
Protocol) server will allow all of the connected computers to easily obtain IP addresses.
You can quickly create a DHCP server on one of your computers by installing a third-party
utility.
The rest of the computers on the network will obtain IP addresses automatically once the
server is running, as long as they are set to do so. Verify the network connection on each
computer. After each computer obtains an IP address, they'll be able to talk to each other on
the network. If you're using a router to share your internet connection, each computer will be
able to access the internet.
Set up file and printer sharing. Once your network is up, you won't see anything on other
computers unless that computer has shared files. You can designate files, folders, drives,
printers, and other devices as shared so that anyone on the network, or just specific users,
can access them.
Module 5 – Network Support Skills Author: Rel Date: 27/01/2018 Rev Date: 01/06/2023 Doc Ref: 48573 LM Mod 1 v-1
LEARNER MANUAL PAGE 41
AC 2
rocedure messages are identified during execution, and actions are
taken according to organisation specifications.
Communication over the network
The Elements of Communication
Communication begins with a message, or information, that must be sent from one
individual or device to another. People exchange ideas using many different communication
methods. All of these methods have three elements in common. The first of these elements is
the message source, or sender. Message sources are people, or electronic devices, that need
to send a message to other individuals or devices.
The second element of communication is the destination, or receiver, of the message. The
destination receives the message and interprets it. A third element, called a channel, consists
of the media that provides the pathway over which the message can travel from source to
destination. Consider, for example, the desire to communicate using words, pictures, and
sounds. Each of these messages can be sent across a data or information network by first
converting them into binary digits, or bits.
These bits are then encoded into a signal that can be transmitted over the appropriate
medium. In computer networks, the media is usually a type of cable, or a wireless
transmission. The term network in this course will refer to data or information networks
capable of carrying many different types of communications, including traditional computer
data, interactive voice, video, and entertainment products.
Communicating the Messages
In theory, a single communication, such as a music video or an e-mail message, could be
sent across a network from a source to a destination as one massive continuous stream of
bits. If messages were actually transmitted in this manner, it would mean that no other
device would be able to send or receive messages on the same network while this data
transfer was in progress.
These large streams of data would result in significant delays. Further, if a link in the
interconnected network infrastructure failed during the transmission, the complete message
would be lost and have to be retransmitted in full. A better approach is to divide the data
into smaller, more manageable pieces to send over the network. This division of the data
stream into smaller pieces is called segmentation.
P
Module 5 – Network Support Skills Author: Rel Date: 27/01/2018 Rev Date: 01/06/2023 Doc Ref: 48573 LM Mod 1 v-1
LEARNER MANUAL PAGE 42
Segmenting messages has two primary benefits. First, by sending smaller individual pieces
from source to destination, many different conversations can be interleaved on the network.
The process used to interleave the pieces of separate conversations together on the network
is called multiplexing. Second, segmentation can increase the reliability of network
communications.
The separate pieces of each message need not travel the same pathway across the network
from source to destination. If a particular path becomes congested with data traffic or fails,
individual pieces of the message can still be directed to the destination using alternate
pathways. If part of the message fails to make it to the destination, only the missing parts
need to be retransmitted.
The downside to using segmentation and multiplexing to transmit messages across a
network is the level of complexity that is added to the process. Imagine if you had to send a
100-page letter, but each envelope would only hold one page. The process of addressing,
labelling, sending, receiving, and opening the entire hundred envelopes would be time-
consuming for both the sender and the recipient.
In network communications, each segment of the message must go through a similar process
to ensure that it gets to the correct destination and can be reassembled into the content of
the original message. Various types of devices throughout the network participate in
ensuring that the pieces of the message arrive reliably at their destination.
Components of the Network
The path that a message takes from source to destination can be as simple as a single cable
connecting one computer to another or as complex as a network that literally spans the
globe. This network infrastructure is the platform that supports our human network. It
provides the stable and reliable channel over which our communications can occur. Devices
and media are the physical elements or hardware of the network.
Hardware is often the visible components of the network platform such as a laptop, a PC, a
switch, or the cabling used to connect the devices. Occasionally, some components may not
be so visible. In the case of wireless media, messages are transmitted through the air using
invisible radio frequency or infrared waves. Services and processes are the communication
programs, called software, that run on the networked devices. A network service provides
information in response to a request.
Module 5 – Network Support Skills Author: Rel Date: 27/01/2018 Rev Date: 01/06/2023 Doc Ref: 48573 LM Mod 1 v-1
LEARNER MANUAL PAGE 43
Services include many of the common network applications people use every day, like e-mail
hosting services and web hosting services. Processes provide the functionality that directs
and moves the messages through the network. Processes are less obvious to us but are
critical to the operation of networks.
End Devices and their Role on the Network
The network devices that people are most familiar with are called end devices. These devices
form the interface between the human network and the underlying communication network.
Some examples of end devices are:
Computers (work stations, laptops, file servers, web servers)
Network printers
VoIP phones
Security cameras
Mobile handheld devices (such as wireless barcode scanners, PDAs)
In the context of a network, end devices are referred to as hosts. A host device is either the
source or destination of a message transmitted over the network. In order to distinguish one
host from another, each host on a network is identified by an address. When a host initiates
communication, it uses the address of the destination host to specify where the message
should be sent. In modern networks, a host can act as a client, a server, or both.
Software installed on the host determines which role it plays on the network. Servers are
hosts that have software installed that enables them to provide information and services, like
e-mail or web pages, to other hosts on the network. Clients are hosts that have software
installed that enables them to request and display the information obtained from the server.
Intermediary Devices and their Role on the Network
In addition to the end devices that people are familiar with, networks rely on intermediary
devices to provide connectivity and to work behind the scenes to ensure that data flows
across the network. These devices connect the individual hosts to the network and can
connect multiple individual networks to form an internetwork. Examples of intermediary
network devices are:
Network Access Devices (Hubs, switches, and wireless access points)
Internetworking Devices (routers)
Communication Servers and Modems
Security Devices (firewalls)
Module 5 – Network Support Skills Author: Rel Date: 27/01/2018 Rev Date: 01/06/2023 Doc Ref: 48573 LM Mod 1 v-1
LEARNER MANUAL PAGE 44
The management of data as it flows through the network is also a role of the intermediary
devices. These devices use destination host address, in conjunction with information about
the network interconnections, to determine the path that messages should take through the
network. Processes running on the intermediary network devices perform these functions:
Regenerate and retransmit data signals
Maintain information about what pathways exist through the network and
internetwork
Notify other devices of errors and communication failures
Direct data along alternate pathways when there is a link failure
Classify and direct messages according to QoS priorities
Permit or deny the flow of data, based on security settings
Network Media
Communication across a network is carried on a medium. The medium provides the channel
over which the message travels from source to destination. Modern networks primarily use
three types of media to interconnect devices and to provide the pathway over which data can
be transmitted.
These media are:
Metallic wires within cables
Glass or plastic fibers (fiber optic cable)
Wireless transmission
The signal encoding that must occur for the message to be transmitted is different for each
media type. On metallic wires, the data is encoded into electrical impulses that match
specific patterns. Fiber optic transmissions rely on pulses of light, within either infrared or
visible light ranges.
In wireless transmission, patterns of electromagnetic waves depict the various bit values.
Different types of network media have different features and benefits. Not all network media
has the same characteristics and is appropriate for the same purpose. Criteria for choosing a
network media are:
The distance the media can successfully carry a signal.
The environment in which the media is to be installed.
The amount of data and the speed at which it must be transmitted.
The cost of the media and installation
Module 5 – Network Support Skills Author: Rel Date: 27/01/2018 Rev Date: 01/06/2023 Doc Ref: 48573 LM Mod 1 v-1
LEARNER MANUAL PAGE 45
LANs, WANs, and Internetworks
Local Area Networks
Networks infrastructures can vary greatly in terms of:
The size of the area covered
The number of users connected
The number and types of services available
An individual network usually spans a single geographical area, providing services and
applications to people within a common organizational structure, such as a single business,
campus or region. This type of network is called a Local Area Network. A LAN is usually
administered by a single organization. The administrative control that governs the security
and access control policies are enforced on the network level.
Wide Area Networks
When a company or organization has locations that are separated by large geographical
distances, it may be necessary to use a telecommunications service provider (TSP) to
interconnect the LANs at the different locations. Telecommunications service providers
operate large regional networks that can span long distances. Traditionally, TSPs transported
voice and data communications on separate networks.
Increasingly, these providers are offering converged information network services to their
subscribers. Individual organizations usually lease connections through a
telecommunications service provider network. These networks that connect LANs in
geographically separated locations are referred to as Wide Area Networks (WANs). Although
the organization maintains all of the policies and administration of the LANs at both ends of
the connection, the policies within the communications service provider network are
controlled by the TSP.
WANs use specifically designed network devices to make the interconnections between LANs.
Because of the importance of these devices to the network, configuring, installing and
maintaining these devices are skills that are integral to the function of an organization's
network. LANs and WANs are very useful to individual organizations. They connect the users
within the organization. They allow many forms of communication including exchange e-
mails, corporate training, and other resource sharing.
Module 5 – Network Support Skills Author: Rel Date: 27/01/2018 Rev Date: 01/06/2023 Doc Ref: 48573 LM Mod 1 v-1
LEARNER MANUAL PAGE 46
AC 3
roblems with procedures are identified, and action is taken according to
organisation specifications
A faulty Wi-Fi connection doesn’t have to ruin your day. There are plenty of ways
you can restore a lost internet connection. Follow these network troubleshooting
tips and you’ll be up and running in no time.
1. Check Your Settings
First, check your Wi-Fi settings. Go to Settings > Network & Internet > Wi-Fi. Switch Wi-Fi to
the On position. Phones and tablets also have settings that turn Wi-Fi on and off. Make sure
that it is turned on so you can connect to the network. You also want to check if Airplane
Mode is turned on.
2. Check Your Access Points
Check your WAN (wide area network) and LAN (local area network) connections. In layman’s
terms, these are the Ethernet cables that go to and from your router. If you suspect that the
cables are the culprit, try swapping them out with new ones.
3. Go Around Obstacles
Walls, furniture, and other obstructions can be the reason why you’re unable to go online.
Moving closer to the router can re-establish the connection. If moving closer to the router
does not solve the issue, then at least we can remove it from the list of suspects.
4. Restart the Router
Sometimes restarting the router can help fix connectivity issues. This is even truer in cases
where the router has not been turned off in a while. A quick restart can jolt the router back
into working like it used to. If that doesn’t work, you might also consider resetting the router.
But only do so if you’re okay with it being restored to its factory settings. You will have to
reconfigure everything including the SSID and password.
5. Check the Wi-Fi Name and Password
Check the network name (otherwise known as SSID) and password of the network
connection. If you’re used to connecting automatically when in range of a router but are no
longer able to, changes may have been made to the network while you’re away.
It could be as simple as administrators updating the password or the SSID could have been
changed to a different one.
P
Module 5 – Network Support Skills Author: Rel Date: 27/01/2018 Rev Date: 01/06/2023 Doc Ref: 48573 LM Mod 1 v-1
LEARNER MANUAL PAGE 47
6. Check DHCP Settings
Routers are usually set up as DHCP servers. This setting lets computers join a network
automatically. With DHCP turned on, users will no longer have to mess with IP Address and
DNS Server settings manually. To edit your DHCP settings, go to Windows Settings >
Network & Internet > Wi-Fi. Under Wi-Fi, click Manage Known Networks. Select a network
and click Properties. Under IP Settings, click Edit. From the drop-down menu, select
Automatic (DHCP). Note: Selecting Manual will let you set your DNS Server Address and IP
Address settings manually.
7. Update Windows
Your network problems could be caused by your system. If that is the case, Windows could
have possibly released a fix. Try updating your Windows machine to the latest release.
Go to Windows Settings > Update & Security > Windows Update. Click Check for Updates. If
there are updates available, Windows will download and install them.
8. Open Windows Network Diagnostics
Windows has a tool called Windows Network Diagnostics that lets users troubleshoot
connection issues. Go to Windows Settings > Network & Internet > Status. Under Change
Your Network Settings, click Network Troubleshooter. Windows Network Diagnostics will run
a couple of tests to see what’s possibly causing your Wi-Fi issues. Windows will let you know
if it does not find any issue. Otherwise, you will be given a list of possible actions to take to
resolve the problem. This tool, or a version of it, should be available in Windows 7 to
Windows 10.
AC 4
otential improvements to procedures are identified, and action is taken
according to organisation specifications.
When designing a new computer network, whether for five people or 500, it's
important to weigh the needs and desires of those who will be using the network
with the budget of those who will be paying for it. Some important things to consider that
may not be on anyone's wish list include balancing security issues with the desire for easy
access to information; building redundancy into the network in anticipation of breakdowns;
and standardizing hardware and software to keep maintenance costs in check. In case
something terrible happens, a disaster recovery plan should be in place. In case things go
well for the organization, room for future growth should be built into the network design.
P
Module 5 – Network Support Skills Author: Rel Date: 27/01/2018 Rev Date: 01/06/2023 Doc Ref: 48573 LM Mod 1 v-1
LEARNER MANUAL PAGE 48
Important things to consider include balancing security issues with the desire for easy
access to information; building redundancy into the network in anticipation of breakdowns;
and standardizing hardware and software to keep maintenance costs in check.
Connectivity and Security
Network connectivity today means more than Ethernet cables and wireless access points.
People today are more connected while mobile than ever before and many of them want
access to company email and data while they are out of the office. Balancing those needs
while maintaining security is a challenge that needs to be addressed in the design phase of
any network.
This includes where data is stored, either in-house or offsite with cloud-based solutions,
what types of information should be accessible, who should be able to access it, and which
types of devices should be included. Firewalls and access servers need to be secure without
slowing down operations.
Redundancy and Backing Up
Redundancy means having backup devices in place for any mission-critical components in
the network. Even small organizations should consider using two servers. Two identical
servers, for example, can be configured with fail-safes so that one will take over if the other
fails or requires maintenance. A good rule of thumb is to have redundant components and
services in place for any part of a network that cannot be down for more than an hour.
If an organization hosts it own Web servers, or cannot be without Internet connectivity, a
second connection should be in place. Having an extra switch, wireless router, and a spare
laptop onsite is a good practice for ensuring that downtime is kept to a minimum.
Standardization of Hardware and Software
Standardization of the hardware and software used in a network is important for ensuring
the network runs smoothly. It also reduces costs associated with maintenance, updates and
repairs. Conducting a full audit of the current computer systems, software and peripherals
will help to determine which should be standardized.
A CEO or director may require special consideration, but if 90 percent of the employees use
the same notebooks, with the same word processing and email programs, a software or
hardware patch across the organization can be conducted much less expensively than if
everyone used a different computer model with different software installed on each.
Module 5 – Network Support Skills Author: Rel Date: 27/01/2018 Rev Date: 01/06/2023 Doc Ref: 48573 LM Mod 1 v-1
LEARNER MANUAL PAGE 49
Disaster Recovery Plan
A detailed disaster recovery plan should be a part of any network design. This includes, but
is not limited to, provisions for back-up power and what procedures should be followed if the
network or server crashes. It should also include when data is backed up, how it is backed
up and where copies of the data are stored. A comprehensive disaster recovery plan includes
office disasters, building disasters, and metropolitan-wide disasters.
In most cases, important data should be backed up daily. Many organizations do a full
weekly backup, with daily incremental backups that copy any files that have been modified
since the last weekly backup. Backup files should be stored in a secure location off-site in
the event of a building disaster, such as a fire.
Future Growth of the Organization
While it is not always possible to anticipate how large an organization may be five years in
the future, some allowances for future growth must be built into the network design. For
example, Microsoft Small Business Server can be an excellent choice for many small
organizations.
However, if your office already has sixty employees, Small Business Server could soon be a
wasted investment, as it has a limit of only 75 users. Network design should factor in at least
20 percent growth per year, including everything from switch ports to data backup systems.
AC 5
tartup and shutdown of the network are in accordance with the
manufacturer`s and organisation specifications.
Working with startup, shutdown, logon, and logoff scripts using the Local Group
Policy Editor. This topic describes how to use the Local Group Policy Editor (gpedit)
to manage four types of event-driven scripting files.
Introduction
Group Policy allows you to associate one or more scripting files with four triggered events:
Computer startup
Computer shutdown
User logon
User logoff
S
Module 5 – Network Support Skills Author: Rel Date: 27/01/2018 Rev Date: 01/06/2023 Doc Ref: 48573 LM Mod 1 v-1
LEARNER MANUAL PAGE 50
You can use Windows PowerShell scripts, or author scripts in any other language supported
by the client computer. Windows Script Host (WSH) supported languages are also used,
including VBScript and Jscript.
Additional considerations
For more information about scripting, see the Group Policy Script Center
Local Group Policy Editor and the Resultant Set of Policy snap-in are available in Windows
Server 2008 R2 and Windows 7 Professional, Windows 7 Ultimate, and Windows 7
Enterprise.
How to assign computer startup scripts
To assign computer startup scripts
Open the Local Group Policy Editor.
In the console tree, click Scripts (Startup/Shutdown). The path is Computer
Configuration\Windows Settings\Scripts (Startup/Shutdown).
In the results pane, double-click Startup.
In the Startup Properties dialog box, click Add.
In the Add a Script dialog box, do the following:
In the Script Name box, type the path to the script, or click Browse to search for the
script file in the Netlogon shared folder on the domain controller.
In the Script Parameters box, type any parameters that you want, the same way as
you would type them on the command line. For example, if your script includes
parameters called //logo (display banner) and //I (interactive mode), type //logo //I.
In the Startup Properties dialog box, specify the options that you want:
Startup Scripts for <Group Policy object>: Lists all the scripts that currently are
assigned to the selected Group Policy object (GPO). If you assign multiple scripts, the
scripts are processed in the order that you specify. To move a script up in the list,
click it and then click Up. To move a script down in the list, click it and then click
Down.
Add: Opens the Add a Script dialog box, where you can specify any additional scripts
to use.
Edit: Opens the Edit Script dialog box, where you can modify script information, such
as name and parameters.
Remove: Removes the selected script from the Startup Scripts list.
Show Files: Displays the script files that are stored in the selected GPO.
Module 5 – Network Support Skills Author: Rel Date: 27/01/2018 Rev Date: 01/06/2023 Doc Ref: 48573 LM Mod 1 v-1
LEARNER MANUAL PAGE 51
Additional considerations
To complete this procedure, you must have Edit setting permission to edit a GPO. By default,
members of the Domain Administrators security group, the Enterprise Administrators
security group, or the Group Policy Creator Owners security group have Edit setting
permission to edit a GPO.
Startup scripts are run under the Local System account, and they have the full rights that
are associated with being able to run under the Local System account. Beginning in Windows
Vista, startup scripts are run asynchronously, by default. This is a different behaviour from
earlier operating systems. Setting startup scripts to run synchronously may cause the boot
process to run slowly.
In Windows 7 and Windows Vista, startup scripts that are run asynchronously will not be
visible. Enabling the Run Startup Scripts Visible policy setting will have no effect when
running startup scripts asynchronously. Local Group Policy Editor and the Resultant Set of
Policy snap-in are available in Windows Server 2008 R2 and Windows 7 Professional,
Windows 7 Ultimate, and Windows 7 Enterprise.
How to assign computer shutdown scripts
To assign computer shutdown scripts
Open the Local Group Policy Editor.
In the console tree, click Scripts (Startup/Shutdown). The path is Computer
Configuration\Windows Settings\Scripts (Startup/Shutdown).
In the results pane, double-click Shutdown.
In the Shutdown Properties dialog box, click Add.
In the Add a Script dialog box, do the following:
In Script Name, type the path to the script, or click Browse to search for the script file
in the Netlogon shared folder on the domain controller.
In Script Parameters, type any parameters that you want, the same way as you would
type them on the command line. For example, if your script includes parameters
called //logo (display banner) and //I (interactive mode), type //logo //I.
In the Shutdown Properties dialog box, specify the options that you want:
Shutdown Scripts for <Group Policy object>: Lists all the scripts that are currently
assigned to the selected Group Policy object (GPO). If you assign multiple scripts, the
scripts are processed in the order that you specify. To move a script up in the list,
click it and then click Up. To move a script down in the list, click it and then click
Down.
Module 5 – Network Support Skills Author: Rel Date: 27/01/2018 Rev Date: 01/06/2023 Doc Ref: 48573 LM Mod 1 v-1
LEARNER MANUAL PAGE 52
Add: Opens the Add a Script dialog box, where you can specify any additional scripts
to use.
Edit: Opens the Edit Script dialog box, where you can modify script information, such
as name and parameters.
Remove: Removes the selected script from the Shutdown Scripts list.
Show Files: Displays the script files that are stored in the selected GPO
Module 5 – Network Support Skills Author: Rel Date: 27/01/2018 Rev Date: 01/06/2023 Doc Ref: 48573 LM Mod 1 v-1
LEARNER MANUAL PAGE 53
AC 1
ecurity exposures and violations are identified, and action is taken according
to organisation policies, procedures and requirements.
Before you can make your LAN available, you need to be able to install it. The following steps
will take you through the installation, one step at a time.
Overview
All of the computers and devices on your network should have Internet addresses between
192.168.x.2 and 192.168.x.254. When you are configuring your network, you have two
choices:
Manually set the IP address to a specific number (static IP) or
Set the client IP address (via the DHCP server).
If you configure devices with static IP
addresses, make sure you only use
an address between 192.168.1.2 -
192.168.1.99. You should use your
Internet Service Provider's DNS
servers.
Network Settings
Step 1 - Control Panel
Click on the Start button,
then follow the menu to
Settings > Control Panel
Double-click on the Network
Connections
Right click on Local Area
Connection and go to Properties
Step 2 - Select IP Properties
S
Administer security systems for a LAN Time: 120 minutes Activity: Self and Group
Module 5 – Network Support Skills Author: Rel Date: 27/01/2018 Rev Date: 01/06/2023 Doc Ref: 48573 LM Mod 1 v-1
LEARNER MANUAL PAGE 54
Select TCP/IP and click on the Properties button
Step 3 - IP Address
On the IP Address tab, you can select Obtain an IP address automatically it will
automatically assign an IP address for you. Alternatively, you can choose Specify an IP
address (as shown in the screenshot). Make sure you pick an address between 192.168.1.2
to 192.168.1.99. The subnet mask is always 255.255.255.0.
Step 4 - DNS Settings
If you decided to let the Windows assign your IP address automatically, then you can select
Disable DNS. Windows will automatically configure these settings. If you decided to specify
your IP address, then you will need to
add 192.168.1.1 to the DNS Server
Search Order list. You should also add a
host name and then add "lan" as the
domain. You should add the DNS servers
given by your Internet service provider
Module 5 – Network Support Skills Author: Rel Date: 27/01/2018 Rev Date: 01/06/2023 Doc Ref: 48573 LM Mod 1 v-1
LEARNER MANUAL PAGE 55
Network & Its
availability
Make sure that you
the amount of
points available to
the needs of your
organisation. There
is no use for
employees if these
points are not available to them, to conduct their duties on.
A speed check should be done on the individual nodes from time to time to ensure that they
are maintaining the correct speed, and to ensure that the employees using them are not
slowed down, due to slower networking speeds. As per the agreement with your internet
service provider (ISP), your connection should be strong enough and be able to handle the
traffic it is supposed to. Alternate arrangements will have to be made it these speeds and
traffic cannot be handled.
AC 2
ack-ups are made according the organisations policies, procedures and
specifications.
Forecasting and Ensuring change
With the constant upgrading of both hard- and software in the organisation, it is advisable
that there are continuous upgrades done on the systems to ensure that you are able to
provide the users of the computers with the fastest possible speeds and the highest levels of
security. Changes in the networks must be done in a systematic manner to ensure that
minimal time is lost by employees held up, while their systems are being upgraded.
The best manner to conduct such upgrades is after normal office hours, where all the
systems in one department is changed and set up correctly. The systems should then be
checked one at a time to ensure that they are properly working and functioning, as they were
before. Keeping in mind that the mainframe of the organisation itself will not be changed, but
merely the network, there will be no significant changes. Therefore the data on the
computers and the network will not be affected, but it is advisable to make a back-up in any
way.
B
Module 5 – Network Support Skills Author: Rel Date: 27/01/2018 Rev Date: 01/06/2023 Doc Ref: 48573 LM Mod 1 v-1
LEARNER MANUAL PAGE 56
With the formal back-
up being done, if
there are any
problems which
occur, then there will
be a form of back-up
for the company
which they can fall
back on, which
means that there will
be no information
loss on the side of the
organisation.
With the change of the network, the entire process should be planned in phases to ensure
that there is minimal disruption to the employees with this change.
Doing it department by department will also assist in the eradication of problems, if there are
any. One should start the upgrade with the department using the most traffic on the network
to ensure that their systems are always up to date and provide them with the required
speeds.
Contingency plans for the disruption of the employees must be worked, if the change does
not happen as effortlessly as what is anticipated. Any problems with change solutions should
include the fall-back plan where the old version is used to make the necessary changes to
the new system and in that way ensure that there are no disruptions to production.
Once the new network has been installed, it is required that the network be tested to ensure
that there are no problems with it. This should be done by testing that all the workstations
have their connectivity to both the internet as well as the server and by testing the speed
that the network delivers to its individual users.
Module 5 – Network Support Skills Author: Rel Date: 27/01/2018 Rev Date: 01/06/2023 Doc Ref: 48573 LM Mod 1 v-1
LEARNER MANUAL PAGE 57
Network software testing comprises of two parts:
Sender Generates TCP and UDP traffic in 'unitary' mode where each connection is
configured separately or 'automatic' mode where all connections are generated as a
whole.
Sender Unitary Mode
The user chooses protocol (TCP or UDP) and data source with mathematical laws
(Pareto, Uniform, Exponential), file or packet generator with configurable contents.
Inter-packet delay and packet size may be selected. Received data and RTT (round
trip time) information may be saved.
Sender Automatic Mode
In this mode, the user may choose the number of connections to activate plus
starting time, the volume of transmitted data and packet size of enabled
connections.
Receiver Receives IP connections and may be disabled or configured to echo, absorb or file
absorb.
Testing network cable
ACR - The first thing to understand about testing
data cables is the ACR. This stands for
attenuation to crosstalk ratio. The pink area in
the graph is the attenuation. Attenuation is the
reduction in signal strength over the length of the
cable and frequency range. The blue area is the
crosstalk. Crosstalk is the external noise that is
introduced into the cable. So, if the two areas
meet, the data signal will be lost because the
crosstalk noise will be at the same level as the
attenuated signal. ACR is the most important
result when testing a link because it represents the overall performance of the cable. The
question becomes "What causes the signal to attenuate and where does the crosstalk come
from?"
Module 5 – Network Support Skills Author: Rel Date: 27/01/2018 Rev Date: 01/06/2023 Doc Ref: 48573 LM Mod 1 v-1
LEARNER MANUAL PAGE 58
Length
The length of a cable is one of the more obvious causes
of attenuation because the longer it is, the more
resistance it has, and therefore less of the signal will
get through. To measure the length, a cable tester uses
Time Domain Reflectometry (TDR). A pulse is sent
down the cable and when it reaches the far end it
reflects back.
By measuring the time it takes to travel down the
cable and back again, the tester can determine how
long the cable is. To do this, the tester also needs to
know how fast the pulsed signal is travelling. This is
called the Nominal Velocity of Propagation (NVP) and is
expressed as a percentage of the speed of light.
The NVP is usually somewhere between 60% and 90%
of the speed of light, with most Cat 5E cables being
around 70%. Due to the twists in the cable, the
measured length will be greater than the physical length, so if a run looks like it might be
over 80m it would be wise to check it before it is tied up and terminated.
Attenuation
This is the decrease in signal strength (expressed as negative dB) from one end of a cable to
the other. The main causes of attenuation are impedance, temperature, skin effect and
dielectric loss.
Impedance
Impedance is the combination of resistance, inductance and capacitance in a cable. It is
measured in Ohms and opposes the flow of current.
Skin effect
Skin effect is phenomena which happen at high frequencies where the signal tries to escape
from the confines of the copper and into the air. The signal travels along the outer 'skin' of
the copper which effectively reduces the cross sectional area of the cable and therefore
increases its resistance.
Module 5 – Network Support Skills Author: Rel Date: 27/01/2018 Rev Date: 01/06/2023 Doc Ref: 48573 LM Mod 1 v-1
LEARNER MANUAL PAGE 59
Wire map
This test is to ensure that the two ends have been terminated pin for pin, i.e. that pin 1 at
the patch panel goes to pin 1 at the outlet, pin 2 goes to pin 2 etc. etc. The wire map also
checks for continuity, shorts, crossed pairs, reversed pairs and split pairs. A split pair is
probably the only thing that requires an explanation here, as they are undetectable with a
simple continuity tester. This is because pin for pin they seem to be correct. A balanced line
operation requires that the signal is transmitted over a pair of wires that are twisted
together. With a 'split pair' the signal would be split between two different pairs.
Return loss
When a cable is manufactured, there are slight imperfections in the copper. These
imperfections all contribute to the Structural Return Loss (SRL) measurement. Each one
causes an impedance mismatch, which adds to the cable's attenuation.
DC loop resistance
This is simply the resistance between the two conductors of a twisted pair which is looped
back at the far end. The primary purpose of this test is to make sure that there are no high
resistance connections in the link. Once you have completed the network upgrade, it is
suggested that a couple of computers are connected in a mesh-fashion to check their
connectivity and the success of the upgrade. A mesh network topology connects every PC,
or client machine, to every other machine in the topology. Using this configuration,
connectivity can be maintained in almost any situation. If there is a break in any of the
connections, there is at least one other way for those machines to communicate.
Because of this topology's complex nature, it is very difficult to network more than a few
machines, and it can be very expensive. It is most advantageous for the likes of financial
institutions where information is most critical. Because a mesh topology requires that each
client be connected to every other client, the chance that a client would lose communication
to the others is extremely small.
These networks are very expensive to install and very complex to implement, and are
common in banks, where constant uptime is critical. The mesh topology provides the most
redundancy in networking because it physically connects each PC with every other PC. It is
very complex and therefore very costly, but if you get a break between any of the PCs, you've
got at least one other way of connecting them.
Module 5 – Network Support Skills Author: Rel Date: 27/01/2018 Rev Date: 01/06/2023 Doc Ref: 48573 LM Mod 1 v-1
LEARNER MANUAL PAGE 60
AC 3
ccess to the network is provided according to organisation policies,
procedures and specifications.
Why we need administration tools
As a Network Administrator you will be responsible for the smooth running of the network.
Networks are now critical in many organisations and failure cannot be tolerated. You must
be proactive in your role and use all necessary tools to ensure that the network operates as
the organisation expects it to.
Many of these administration tools will be built into either the operating system or the
network hardware itself. In addition, third party organisations may provide generic
administration tools that work with different operating systems and hardware and so provide
a central point of control to perform a number of administration tasks.
In selecting appropriate administration tools, you will need to consider:
The organisational policies and procedures
The type and level of services required
Whether to recommend to management that they invest in any third party products.
In this topic we will show you how to review organisational policies to identify the need for
network administration. You will then see how to identify the appropriate tools and to make
suggestions to fill in any gaps in requirements.
Reviewing organisational policies on network use and administration
Policy review
What will you be looking for?
Most organisations should have developed policies and procedures which detail how the
network is to be operated and maintained. As the network administrator you should be
aware of the requirements that these place on you and while it is great service to exceed
requirements, you should be making sure that you at least meet expected outcomes.
So the first thing you need to do is to review the relevant parts of these documents. You may
find that the policies and procedures manual is a printed, hard copy document or you may
find that it is online and accessible across the Intranet. Either way you have a duty to be
aware of the contents of these documents and be especially cognisant of those that directly
impact your administration role.
A
Module 5 – Network Support Skills Author: Rel Date: 27/01/2018 Rev Date: 01/06/2023 Doc Ref: 48573 LM Mod 1 v-1
LEARNER MANUAL PAGE 61
The Service Level Agreement (SLA)
Your organisation may also have a published a Service Level Agreement (SLA) between the
network group and the user community. This will also contain essential information about
the performance and operation of the network that you will need to know in order to develop
your administration routines and thus identify the resources and systems that you require.
There are likely to be three main areas to consider when identifying administration policy
requirements:
1 regular administration requirements that should be undertaken as a matter of course
2 ad-hoc administration requirements such as certain troubleshooting routines that are
needed on demand
3 performance related administration which is required to ensure that the network
continues to deliver to users.
The SLA should also include details of performance metrics to identify whether the
administration is meeting targets. If this is the case then you may want to also review these
statistics.
Reflection
Can you think of other documents that the administrator could review to identify
administration policy requirements?
Feedback
There could be help desk statistics or incident logs that may be used to identify problems
that could be the result of poor administration routines. If any network or IT committees
meet regularly, the minutes of these meetings may again have identified administration
issues.
What is administration?
As you look through the various documents you will need to identify those policies or SLA
requirements that are squarely administration activities and those that fall into other
categories such as help desk procedures, response times, etc. While the exact determination
of your role as an administrator will vary from organisation to organization, in this topic we
will be looking at the following tasks as part of an administrator’s job:
Configuration and documentation of network settings
Checking applications are network capable
Designing and building network folder structures
Securing user accesses
Module 5 – Network Support Skills Author: Rel Date: 27/01/2018 Rev Date: 01/06/2023 Doc Ref: 48573 LM Mod 1 v-1
LEARNER MANUAL PAGE 62
Managing user accounts
Maintaining network services
Managing virus prevention strategies.
Network risk analysis
Ongoing network security.
Before you undertake any of these roles you will need to know what the policies say, or what
the SLA requires, in each area. Then you can review the tools to assist you in your regular,
ad-hoc or performance related work.
Reflection
What else may an administrator be required to do?
Feedback
Administrators could also be required to:
Recommend hardware purchases and/or upgrades.
Carry out backups and restores.
Monitor network traffic and analyse performance.
Advise on standard operating environments across client computers.
Maintain Wide Area Networks (WAN).
Manage the intranet website.
As you can see the role of a network administrator is varied and challenging
Module 5 – Network Support Skills Author: Rel Date: 27/01/2018 Rev Date: 01/06/2023 Doc Ref: 48573 LM Mod 1 v-1
LEARNER MANUAL PAGE 63
AC 1
forecast of the consumption of computer system consumables is
justified using measurement of historical consumption and anticipated
events.
LAN consumables are items that can be used for the running and upkeep of the network.
These items are required for the network but they are quite expensive to keep in stock for an
indefinite period, in anticipation for use. The longer you keep these items in stock, the more
the probability is that they will be outdated when you need to use them. Therefore it is of
utmost important that you only keep in stick exactly what you need, and to be able to
exchange items with your suppliers when there are newer versions available.
Examples of LAN consumables which should be kept in stock, are:
LAN cards (PCI)
LAN Cables
By keeping in mind the amount of these items used on average, in the past, you would be
able to estimate accurately how many you should keep in stock for emergency use. Keep in
mind that the suppliers are more than willing to deliver during the same day of ordering, so
extensive stock tallies are not required.
AC 2
upply agreements are established and maintained so that the
consumable supplies are available to meet demand.
The best manner to ensure that there is a constant supply of items required is to
come to agreement with the supplier to supply you on a need to use-basis. Coming
to an agreement with the supplier is the ultimate goal of this type of exercise, where the
supplier will secure the agreement with you to supply you with the agreed items.
It is generally accepted to ask the supplier to have a look at your network so that they can
familiarise themselves with it, in order for them to provide you with assistance and advice
when required.
A
S
Maintain supply of consumables for a LAN Time: 120 minutes Activity: Self and Group
Module 5 – Network Support Skills Author: Rel Date: 27/01/2018 Rev Date: 01/06/2023 Doc Ref: 48573 LM Mod 1 v-1
LEARNER MANUAL PAGE 64
AC 3
tocks of consumable supplies meet forecasted demand.
A local area network (LAN) is a computer network that interconnects computers
within a limited area such as a residence, school, laboratory, university campus or
office building. By contrast, a wide area network (WAN) not only covers a larger
geographic distance, but also generally involves leased telecommunication circuits.
Ethernet and Wi-Fi are the two most common technologies in use for local area networks.
Historical network technologies include ARCNET, Token ring, and AppleTalk.
Cabling
Early Ethernet (10BASE-5 and 10BASE-2) used coaxial cable. Shielded twisted pair was used
in IBM's Token Ring LAN implementation. In 1984, StarLAN showed the potential of
simple unshielded twisted pair by using Cat3 cable—the same cable used for telephone
systems. This led to the development of 10BASE-T (and its successors) and structured
cabling which is still the basis of most commercial LANs today.
While optical fiber cable is common for links between network switches, use of fiber to the
desktop is rare.
Wireless media
In a wireless LAN, users have unrestricted movement within the coverage area. Wireless
networks have become popular in residences and small businesses, because of their ease of
installation. Most wireless LANs use Wi-Fi as it is built into smartphones, tablet
computers and laptops. Guests are often offered Internet access via a hotspot service.
Technical aspects
Network topology describes the layout of interconnections between devices and network
segments. At the data link layer and physical layer, a wide variety of LAN topologies have
been used, including ring, bus, mesh and star.
Simple LANs generally consist of cabling and one or more switches. A switch can be
connected to a router, cable modem, or ADSL modem for Internet access. A LAN can include
a wide variety of other network devices such as firewalls, load balancers, and network
intrusion detection. Advanced LANs are characterized by their use of redundant links with
switches using the spanning tree protocol to prevent loops, their ability to manage differing
traffic types via quality of service (QoS), and their ability to segregate traffic with VLANs.
S
Module 5 – Network Support Skills Author: Rel Date: 27/01/2018 Rev Date: 01/06/2023 Doc Ref: 48573 LM Mod 1 v-1
LEARNER MANUAL PAGE 65
At the higher network layers, protocols such as NetBIOS, IPX/SPX, AppleTalk and others
were once common, but the Internet protocol suite (TCP/IP) has prevailed as the standard of
choice. LANs can maintain connections with other LANs via leased lines, leased services, or
across the Internet using virtual private network technologies. Depending on how the
connections are established and secured, and the distance involved, such linked LANs may
also be classified as a metropolitan area network (MAN) or a wide area network (WAN).
AC 4
verstocks of consumable supplies are avoided.
Avoid it
Obviously, the best way to eliminate the cost of surplus inventory is to avoid it all
together. Industrial distributors know that's often easier said than done. By
reacting quickly to accurate customer and vendor intelligence, improving the procurement
and inventory processes, and changing ineffective processes and procedures, you can
succeed in avoiding some level of surplus inventory.
One Midwest industrial fastener distributor succeeded in doing just that. The distributor
planned inventory requirements and stocking levels using customer-supplied forecasts.
Customers provide their estimated annual usage and a normal replenishment quantity. By
combining these estimates with actual demand history, the distributor determined a stocking
level and passed that information onto its manufacturers.
Manufacturers then used this data to ensure on-hand quantities reflected forecasted needs
and produced only what was required. The distributor improved service levels and could now
order just in time. In this case, inventory managers cut inventory stocking levels by up to 50
percent while service levels remained stable.
As with any improvement project, distributors must begin by determining where within their
organization lies the largest opportunity to avoid surplus inventory. Companies may want to
consider improvements in the following areas.
Collect accurate customer and vendor intelligence-and react quickly. Industrial distributors
must find ways to understand customer requirements and current trends or promotions in
order to generate accurate sales forecasts. The more quickly you know about an order
change, a quality or cost issue or a service concern, the more quickly you can react.
O
Module 5 – Network Support Skills Author: Rel Date: 27/01/2018 Rev Date: 01/06/2023 Doc Ref: 48573 LM Mod 1 v-1
LEARNER MANUAL PAGE 66
An online, fully integrated Web site that allows customers to access product information,
review and update demand requirements, enter orders or change existing orders gives you
immediate, real-time access to customer decisions. A well-trained sales force tuned into
customer needs can also be a valuable source of intelligence.
On the vendor side, you must maintain constant communication with suppliers to ensure
timely knowledge about discontinued products, product recalls, planned obsolescence and
warranty issues. Ideally, you and your suppliers should have visibility into one another's
pipelines so that all parties have real-time information to make the best business decisions.
Exchanging production and requirements information through daily reports or e-mail file
transfers may improve communication. Establishing a vendor rating program based on
suppliers' responsiveness, accuracy of information and other criteria may also help.
Get demand and inventory information under control.
Managing the tremendous amount of information that revolves around demand, products
and inventory is probably the single most difficult-yet most critical-task to accomplish in
order to avoid surplus inventory. Industrial distributors must maintain accurate demand
statistics by item, product, period, location and customer. It's critical to implement a
business system that allows tracking of promotional, internal transfer, component, special
order and direct demand. Order cancellations and substitution demand can erroneously
boost demand data.
Classify items based on product life cycle such as "new," "rising," or "declining." Also classify
items by customer agreement and demand pattern as well as by criticality, which refers to
slow-moving service items required to retain business.
Paint an accurate "big picture." Once you have your demand and inventory information
under control, get the details of the "big picture" in order. Understand each combination of
stocking location, buyer, product category, supplier and functional classifications.
For example, anticipate demand surges or droughts or take advantage of current costs to
avoid anticipated price increases. Balance consumption rates against efficient production
and fulfilment rates, and transportation inventories need to cover all stops along a product's
journey.
Module 5 – Network Support Skills Author: Rel Date: 27/01/2018 Rev Date: 01/06/2023 Doc Ref: 48573 LM Mod 1 v-1
LEARNER MANUAL PAGE 67
Manage stocking inventory by days of supply, lost control for shelf life and aging analysis.
Non-stocking inventory (or items that should have zero on-hand balances) should include
only direct ship, special order, obsolete or de-listed items. Review and change company
policies to minimize surplus inventory. Review existing company policies, which should
provide safeguards against surplus inventory-not encourage additional purchasing and
stocking.
Policies dictating purchasing and replenishment decisions should keep the "days of supply"
requirement low and adjust forecasting to reflect different product life cycle stages. Avoid
vendor super sales unless there is significant ROI. Take the time to find flexible vendors that
accept forecasting requirements and will ship based on demanded quantities instead of pre-
determined minimum quantities. Be sure that supplier backorders can be cancelled within a
generous time frame.
Stocking policies should include "no returns after" and "no returns before" deadlines. Create
incentives to encourage customers to accept a total quantity of special items. Implement
customer end-of-life and final sales agreements, which require customers to purchase all on-
hand quantities at a set time. Enforce strict write-off policies to ensure timely stock
elimination and then immediately scrap the products
Module 5 – Network Support Skills Author: Rel Date: 27/01/2018 Rev Date: 01/06/2023 Doc Ref: 48573 LM Mod 1 v-1
LEARNER MANUAL PAGE 68
AC 1
he plan includes a forecast based on documentation of current network
resource utilisation, historical growth and future plans.
Capacity planning for the core network is the process of ensuring that sufficient
bandwidth is provisioned such that the committed core network service-level
agreement (SLA) targets of delay, jitter, loss, and availability can be met. In the core network,
where link bandwidths are high and traffic is highly aggregated, the SLA requirements for a
traffic class can be translated into bandwidth requirements, and the problem of SLA
assurance can effectively be reduced to that of bandwidth provisioning. Hence, the ability to
meet SLAs is dependent on ensuring that core network bandwidth is adequately provisioned,
which depends in turn on core capacity planning.
The simplest core capacity planning processes use passive measurements of core link
utilization statistics and apply rules of thumb, such as upgrading links when they reach 50
percent average utilization, or some other general utilization target. The aim of such simple
processes is to attempt to ensure that the core links are always significantly overprovisioned
relative to the offered average load, on the assumption that this will ensure that they are also
sufficiently overprovisioned relative to the peak load, that congestion will not occur, and
hence that the SLA requirements will be met.
There are, however, two significant consequences of such a simple approach. First, without a
network wide understanding of the traffic demands, even an approach that upgrades links
when they reach 50 percent average utilization may not be enough to ensure that the links
are still sufficiently provisioned to meet committed SLA targets when network element (for
example, link and node) failures occur.
Second, and conversely, rule-of-thumb approaches such as this may result in more capacity
being provisioned than is actually needed. Effective core capacity planning can overcome
both of these issues. Effective core capacity planning requires a way of measuring the
current network load, as well as a way of determining how much bandwidth should be
provisioned relative to the measured load in order to achieve the committed SLAs.
T
Plan capacity for a LAN Time: 120 minutes Activity: Self and Group
Module 5 – Network Support Skills Author: Rel Date: 27/01/2018 Rev Date: 01/06/2023 Doc Ref: 48573 LM Mod 1 v-1
LEARNER MANUAL PAGE 69
Hence, in this white paper we present a holistic methodology for capacity planning of the
core network that takes the core traffic demand matrix and the network topology into
account. This methodology determines how much capacity the network needs in order to
meet the committed SLA requirements, taking network element failures into account if
necessary, while minimizing the capacity and cost associated with overprovisioning.
The methodology presented here can be applied whether Differentiated Services (DiffServ) is
deployed in the core or not. Where DiffServ is not deployed, capacity planning is performed
on aggregate. Where DiffServ is deployed, although the fundamental principles remain the
same, capacity planning per traffic class is needed to ensure that class SLA targets are not
violated.
Capacity Planning Methodology
Capacity planning involves the following steps:
1. Collect the core traffic demand matrices (either on aggregate or per class) and add
traffic growth predictions to create a traffic demand forecast.
2. Determine the appropriate bandwidth overprovisioning factors (either on aggregate or
per class), relative to the measured demand matrices, to ensure that committed SLAs can be
met.
3. Run simulations to overlay the forecasted demands onto the network topology, taking
failure cases into account if necessary, to determine the forecasted link loadings. Analyse the
results, comparing the forecasted link loadings against the provisioned bandwidth and
taking the calculated overprovisioning factors into account, to determine the future capacity
provisioning plan required to achieve the desired SLAs.
Collecting the Traffic Demand Matrices
The core traffic demand matrix is the matrix of ingress-to-egress traffic demands across the
core network. Traffic matrices can be measured or estimated to different levels of
aggregation: by IP prefix, by router, by point of presence (POP), or by autonomous system
(AS).
The benefit of a core traffic matrix over simple per-link statistics is that the demand matrix
can be used in conjunction with an understanding of the network routing model to predict
the impact that demand growth can have and to simulate “what-if” scenarios, in order to
understand the impact that the failure of core network elements can have on the (aggregate
or per-class) utilization of the rest of the links in the network.
Module 5 – Network Support Skills Author: Rel Date: 27/01/2018 Rev Date: 01/06/2023 Doc Ref: 48573 LM Mod 1 v-1
LEARNER MANUAL PAGE 70
With simple per-link statistics, when a link or node fails, in all but very simple topologies it
may not be possible to know over which links the traffic affected by the failure will be
rerouted. Core network capacity is increasingly being provisioned with the failure of single
network elements taken into account.
To understand traffic rerouting when an element fails, one must have a traffic matrix that
aggregates traffic at the router-to-router level. If DiffServ is deployed, a core traffic matrix
aggregated per class of service (CoS) is highly desirable.
The core traffic demand matrix can be an internal traffic matrix (that is, router to router) or
an external traffic matrix (that is, router to AS), as illustrated in Figure 2, which shows the
internal traffic demand matrix from one distribution router (DR) and the external traffic
demand matrix from another.
The internal traffic matrix is useful for understanding the impact that internal network
element failures will have on the traffic loading within the core. An internal matrix could also
be edge to edge (for example, DR to DR) or just across the inner core (for example, core router
[CR] to CR); a DR-to-DR matrix is preferred, as this can also be used to determine the impact
of failures within a POP.
The external traffic matrix provides additional context, which could be useful for managing
peering connection capacity provision, and for understanding where internal network failures
might affect the external traffic matrix, due to closest-exit (also known as “hot potato”)
routing.
AC 2
he plan includes recommendations for network changes that allow the
network to meet the future capacity requirements
There are a number of possible approaches for collecting the core traffic demand
matrix statistics. The approaches differ in terms of their ability to provide an
internal or external matrix, whether they can be applied to IP or MPLS, and whether they can
provide a per-CoS traffic matrix.
Further, the capabilities of network devices to provide the information required to determine
the core traffic matrix can vary depending on the details of the particular vendor’s
implementation. The sections that follow discuss some of the possible approaches for
determining the core traffic demand matrix.
T
Module 5 – Network Support Skills Author: Rel Date: 27/01/2018 Rev Date: 01/06/2023 Doc Ref: 48573 LM Mod 1 v-1
LEARNER MANUAL PAGE 71
IP Flow Statistics Aggregation
The IP Flow Information eXport (IPFIX) protocol has been defined within the Internet
Engineering Task Force (IETF) as a standard for the export of IP flow information from
routers, probes, and other devices. If edge devices such as distribution routers are capable of
accounting at a flow level (that is, in terms of packet and byte counts), a number of potential
criteria could be used to aggregate this flow information - potentially locally on the device - to
produce a traffic matrix.
When the Border Gateway Protocol (BGP) is used within an AS, for example, each router at
the edge of the AS is referred to as a BGP “peer.” For each IP destination address that a peer
advertises via BGP, it also advertises a BGP next-hop IP address, which is used when
forwarding packets to that destination.
To forward a packet to that destination, another BGP router within the AS needs to perform
a recursive lookup, first looking in its BGP table to retrieve the BGP next-hop address
associated with that destination address and then looking in its Interior Gateway Protocol
(IGP) routing table to determine how to get to that particular BGP next-hop address. Hence,
aggregating IPFIX flow statistics based on the BGP next-hop IP address used to reach a
particular destination would produce an edge router to edge router traffic matrix.
MPLS LSP Accounting
When MPLS is used, a label switched path (LSP) implicitly represents an aggregate traffic
demand. When BGP is deployed in conjunction with label distribution by the Label
Distribution Protocol (LDP), in the context of a BGP MPLS VPN service, for example, and each
provider edge (PE) router is a BGP peer, an LSP from one PE to another implicitly represents
the PE-to-PE traffic demand.
The distribution routers in the generalized network reference model we use in this paper will
normally be PE routers in the context of an MPLS VPN deployment. Hence, if traffic
accounting statistics are maintained per LSP, these can be retrieved, using Simple Network
Management Protocol (SNMP), for example, to produce the PE-to-PE core traffic matrix.
If MPLS traffic engineering is deployed with a full mesh of traffic engineering (TE) tunnels,
each TE tunnel LSP implicitly represents the aggregate demand of traffic from the head-end
router at the source of the tunnel to the tail-end router at the tunnel destination.
Module 5 – Network Support Skills Author: Rel Date: 27/01/2018 Rev Date: 01/06/2023 Doc Ref: 48573 LM Mod 1 v-1
LEARNER MANUAL PAGE 72
Hence, if traffic accounting statistics are maintained per TE tunnel LSP, these can be
retrieved, using SNMP, for example, to understand the core traffic matrix. If DiffServ-aware
TE is deployed with a full mesh of TE tunnels per class of service, the same technique could
be used to retrieve a per-traffic-class traffic matrix.
Demand Estimation
Demand estimation is the application of mathematical methods to measurements taken from
the network, such as core link usage statistics, in order to infer the traffic demand matrix
that generated those usage statistics.
A number of methods have been proposed for deriving traffic matrices from link
measurements and other easily measured data, and there are a number of commercially
available tools that use these or similar techniques to derive the core traffic demand matrix.
If link statistics are available on a per-traffic-class basis, these techniques can be applied to
estimate the per-CoS traffic matrix.
Examples of demand estimation include the gravity model, tomogravity, and Cariden’s
patented Demand Deduction. The accuracy and usefulness of the results depend on many
factors, including how much measured traffic is available, and of what type. Demand
Deduction is especially accurate in the practical cases of predicting the overall utilization
after a failure, a topology change, or a metric change.
Retrieving and Using the Statistics
Whichever approach is used to determine the core traffic matrix, the next decision to be
made is how often to retrieve the measured statistics from the network. The retrieved
statistics will normally be in the form of packet and byte counts, which can be used to
determine the average traffic demands over the previous sampling interval.
The longer the sampling interval (that is, the less frequently the statistics are retrieved), the
greater the possibility that significant variation in the traffic during the sampling interval
may be hidden due to the effects of averaging.
Conversely, the more frequently the statistics are retrieved, the greater the load on the
system retrieving the data, the greater the load on the device being polled, and the greater
the polling traffic on the network. Hence, in practice the frequency with which the statistics
are retrieved is a balance that depends on the size of the network; in backbone networks it is
common to collect these statistics every 5, 10, or 15 minutes.
Module 5 – Network Support Skills Author: Rel Date: 27/01/2018 Rev Date: 01/06/2023 Doc Ref: 48573 LM Mod 1 v-1
LEARNER MANUAL PAGE 73
The measured statistics can then be used to determine the traffic demand matrix during
each interval. In order to make the subsequent stages of the process manageable, it may be
necessary to select some traffic matrices from the collected data set.
A number of possible selection criteria could be applied; one possible approach is to sum the
individual (that is, router-to-router) traffic demands within each interval, and to take the
interval that has the greatest total traffic demand, (that is, the peak). Alternatively, to be
sensitive to outliers (for example, due to possible measurement errors), a high percentile
interval such as the 95th percentile (P95) could be taken, that is, the interval for which more
than 95 percent of the intervals have a lower value.
In order to be representative, the total data set should be taken over at least a week, or
preferably over a month, to ensure that trends in the traffic demand matrices are captured.
In the case of a small network, it might be feasible to use all measurement intervals (for
example, all 288 daily measurements for 5-minute intervals), rather than to use only the
peak (or percentile of peak) interval. This will give the most accurate simulation results for
the network.
In geographically diverse networks, regional peaks in the traffic demand matrix may occur at
a time of the day when the total traffic in the network is not at its maximum. In a global
network, for example, the European region may be busy during morning office hours in
Europe, while at the same time the North American region is relatively lightly loaded.
It is not very easy to detect regional peaks automatically, and one alternative approach is to
define administrative capacity planning network regions (for example, United States, Europe,
and Asia), and apply the previously described procedure per region, to give a selected per-
region traffic matrix.
Once the traffic matrix has been determined, other factors may need to be taken into
account, such as anticipated traffic growth. Capacity planning will typically be performed
looking sufficiently far in advance that new bandwidth can be provisioned before network
loading exceeds acceptable levels.
If it takes three months to provision or upgrade a new core link, for example, and capacity
planning is performed monthly, the capacity planning process would need to try to predict
bandwidth requirements at least four months in advance.
Module 5 – Network Support Skills Author: Rel Date: 27/01/2018 Rev Date: 01/06/2023 Doc Ref: 48573 LM Mod 1 v-1
LEARNER MANUAL PAGE 74
If expected network traffic growth within the next four months was 10 percent, for example,
the current traffic demand matrix would need to be multiplied by a factor of at least 1.1.
Service subscription forecasts may be able to provide more granular predictions of future
demand growth, possibly predicting the increase of particular traffic demands.
AC 3
he plan identifies and explains the feasibility of the recommendations.
Determining Appropriate Overprovisioning Factors
The derived traffic matrices described in the previous section are averages taken
over the sample interval; hence, they lack information on the variation in traffic
demands within each interval.
There will invariably be bursts within the measurement interval that are above the average
rate. If traffic bursts are sufficiently large, temporary congestion may occur, causing delay,
jitter, and loss, which may result in the violation of SLA commitments even though the link
is, on average, not 100 percent utilized.
To ensure that bursts above the average do not affect the SLAs, the actual bandwidth may
need to be overprovisioned relative to the measured average rates. Hence, a key capacity
planning consideration is to determine the amount by which bandwidth needs to be
overprovisioned relative to the measured average rate, in order to meet a defined SLA target
for delay, jitter, and loss. We define this as the overprovisioning factor (OP).
The overprovisioning factor required to achieve a particular SLA target depends on the arrival
distribution of the traffic on the link, and the link speed. Opinions remain divided on what
arrival distribution describes traffic in IP networks. One view is that traffic is self-similar,
which means that it is bursty on many or all timescales (that is, regardless of the time period
the traffic is measured over, the variation in the average rate of the traffic stream is the
same).
An alternative view is that IP traffic arrivals follow a Poisson (or more generally Markovian)
arrival process. For Poisson distributed traffic, the longer the time period over which the
traffic stream is measured, the less variation there is in the average rate of the traffic stream.
Conversely, the shorter the time interval over which the stream is measured, the greater the
visibility of burst or the burstiness of the traffic stream.
T
Module 5 – Network Support Skills Author: Rel Date: 27/01/2018 Rev Date: 01/06/2023 Doc Ref: 48573 LM Mod 1 v-1
LEARNER MANUAL PAGE 75
For Poisson traffic, queuing theory shows that as link speeds increase and traffic is more
highly aggregated, queuing delays reduce for a given level of utilization. For self-similar
traffic, however, if the traffic is truly bursty at all timescales, the queuing delay would not
decrease with increased traffic aggregation.
However, while views on whether IP network traffic tends toward self-similar or Poisson are
still split, this does not fundamentally affect the capacity planning methodology we are
describing. Rather, the impact of these observations is that, for high-speed links, the
overprovisioning factor required to achieve a specified SLA target would need to be
significantly greater for self-similar traffic than for Poisson traffic.
Note: A number of studies, both theoretical and empirical, have sought to quantify the
bandwidth provisioning required to achieve a particular target for delay, jitter, and loss,
although none of these studies has yet been accepted as definitive. In the rest of this section,
by way of example, we use the results attained in the study by Telkamp to illustrate the
capacity planning methodology. We chose these results because they probably represent the
most widely used guidance with respect to core network overprovisioning.
To determine the overprovisioning factors required to achieve various SLA targets,
researchers captured a number of sets of packet-level measurements from an operational IP
backbone carrying Internet and VPN traffic. The traces were used in simulation to determine
the bursting and queuing of traffic at small timescales over this interval, as a means of
identifying the relationship between measures of link utilization that can be easily obtained
with capacity planning techniques (for example, 5-minute average utilizations) and queuing
delays experienced in much smaller timeframes.
By using traces of actual traffic, they avoided the need to make assumptions about the
nature of the traffic distribution. Each set of packet measurements or “trace” contained
timestamps in microseconds of the arrival time for every packet on a link, over an interval of
minutes. The traces, each with a different average rate, were then used in a simulation in
which multiple traces were multiplexed together and the resulting trace was run through a
simulated fixed-speed queue (for example, at 622 Mbps).
Module 5 – Network Support Skills Author: Rel Date: 27/01/2018 Rev Date: 01/06/2023 Doc Ref: 48573 LM Mod 1 v-1
LEARNER MANUAL PAGE 76
In this example, three traces with 5-minute average rates of 126 Mbps, 206 Mbps, and 240
Mbps are multiplexed together, resulting in a trace with a 5-minute average rate of 572
Mbps, which is run through a 622-Mbps queue (that is, at a 5-minute average utilization of
92 percent). The queue depth was monitored during the simulation to determine how much
queuing delay occurred. This process was then repeated with different mixes of traffic;
because each mix had a different average utilization, multiple data points were produced for
a specific interface speed.
After performing this process for multiple interface speeds, the researchers derived results
showing the relationship between average link utilization and the probability of queuing
delay. The graph in Figure 5 uses the results of this study to show the relationship between
the measured 5-minute average link utilization and queuing delay for a number of link
speeds. The delay value shown is the P99.9 delay, meaning that 999 out of 1000 packets will
have a delay caused by queuing that is lower than this value.
The x-axis in Figure 5 represents the 5-minute average link utilization; the y-axis represents
the P99.9 delay. The lines show fitted functions to the simulation results for various link
speeds, from 155 Mbps to 2.5 Gbps. Note that other relationships would result if the
measured utilization was averaged over longer time periods (such as 10 minutes or 15
minutes), as in these cases there may be greater variations that are hidden by averaging, and
hence lower average utilizations would be needed to achieve the same delay.
The results in Figure 5 show that for the same relative levels of utilization, shorter delays are
experienced for 1-Gbps links than for 622-Mbps links; that is, the level of overprovisioning
required to achieve a particular delay target reduces as link bandwidth increases, which is
indicative of Poisson traffic.
Taking these results as an example, we can determine the overprovisioning factor that is
required to achieve particular SLA objectives. For example, if we assume that DiffServ is not
deployed in the core network, and we want to achieve a target P99.9 queuing delay of 2 ms
on a 155-Mbps link, then using Figure 5, we can determine that the 5-minute average link
utilization should not be higher than approximately 70 percent or 109 Mbps (that is, an OP
of 1/0.7 = 1.42 is required), meaning that the provisioned link bandwidth should be at least
1.42 times the 5-minute average link utilization.
Module 5 – Network Support Skills Author: Rel Date: 27/01/2018 Rev Date: 01/06/2023 Doc Ref: 48573 LM Mod 1 v-1
LEARNER MANUAL PAGE 77
To achieve the same objective for a 1-Gbps link, the 5-minute average utilization should be
no more than 96 percent or 960 Mbps (OP = 1.04).
Table 1. P99.9 Delay Multiplication Factors
Number of Hops Delay Multiplication Factor
1 1.0
2 1.7
3 1.9
4 2.2
5 2.5
6 2.8
7 3.0
8 3.3
Although the study by Telkamp did not focus on voice traffic, in similar studies by the same
authors for voice over IP (VoIP)-only traffic (with silence suppression), the OP factors required
to achieve the same delay targets were similar. We can apply the same principle on a per-
class basis when DiffServ is deployed. To assure a P99.9 queuing delay of 1 ms for a class
serviced with an assured forwarding (AF) per-hop behaviour (PHB), providing a minimum
bandwidth assurance of 622 Mbps (that is, 25 percent of a 2.5-Gbps link), the 5-minute
average utilization for the class should not be higher than approximately 85 percent, or 529
Mbps.
Considering another example, to ensure a P99.9 queuing delay of 500 microseconds for a
class serviced with an expedited forwarding (EF) PHB implemented with a strict priority
queue on a 2.5-Gbps link, as the scheduler servicing rate of the strict priority queue is 2.5
Gbps, the 5-minute average utilization for the class should not be higher than approximately
92 percent, or 2.3 Gbps (OP = 1.09) of the link rate. Note that these results are for queuing
delay only and exclude the possible delay impact on EF traffic due to the scheduler and the
interface first in, first out (FIFO) behaviour.
Module 5 – Network Support Skills Author: Rel Date: 27/01/2018 Rev Date: 01/06/2023 Doc Ref: 48573 LM Mod 1 v-1
LEARNER MANUAL PAGE 78
The delay that has been discussed so far is per link and not end-to-end across the core. In
most cases, traffic will traverse multiple links in the network and hence will potentially be
subject to queuing delays multiple times. Telkamp’s results show that the P99.9 delay was
not additive over multiple hops; rather, Table 1 shows the delay “multiplication factor”
experienced over a number of hops relative to the delay over a single hop.
If the delay objective across the core is known, the overprovisioning factor that needs to be
maintained per link can be determined. The core delay objective is divided by the
multiplication factor from Table 1 to find the per-hop delay objective. This delay can then be
looked up in the graph in Figure 5 to find the maximum utilization for a specific link capacity
that will meet this per-hop queuing delay objective.
Consider, for example, a network comprising 155-Mbps links with a P99.9 delay objective
across the core network of 10 ms, and a maximum of 8 hops. Table 1 shows that the 8 hops
cause a multiplication of the per-link number by 3.3, so the per-link objective becomes 10
ms/3.3 = 3 ms.
AC 4
he plan includes a comparison of actual resource usage with forecast
usage according to organisation requirements.
Collecting and Reporting Capacity Information
Collecting and reporting capacity information should be linked to the three
recommended areas of capacity management:
What-if analysis, which centers on network change and how the change affects the
environment
Baselining and trending
Exception management
Within each of these areas, develop an information collection plan. In the case of network or
application what-if analyses, you need tools to mimic the network environment and to
understand the affect of the change relative to potential resource issues within the device
control plane or the data plane. In the case of baselining and trending, you need snapshots
for devices and links showing current resource utilization.
T
Module 5 – Network Support Skills Author: Rel Date: 27/01/2018 Rev Date: 01/06/2023 Doc Ref: 48573 LM Mod 1 v-1
LEARNER MANUAL PAGE 79
You then review the data over time to understand potential upgrade requirements. This
allows network administrators to properly plan upgrades before capacity or performance
problems arise. When problems do arise, you need exception management to alert the
network administrators so they can tune the network or fix the problem.
This process can be divided into the following steps:
Determine your needs.
Define a process.
Define capacity areas.
Define the capacity variables.
Interpret the data.
Determine your Needs
Developing a capacity and performance management plan requires understanding the
information you need and the purpose of that information. Split the plan into three required
areas: one each for what-if analysis, baselining/trending, and exception management. Within
each of these areas, discover what resources and tools are available and what is needed.
Many organization fail with tool deployments because they consider the technology and
features of the tools but don't consider the people and expertise needed to manage the tools.
Include the required people and expertise in your plan, as well as process improvements.
These people may include system administrators to manage the network management
stations, data base administrators to help with database administration, trained
administrators to use and monitor the tools, and higher level network administrators to
determine policies, thresholds, and information collection requirements.
Define a Process
You also need a process to ensure that the tool is used successfully and consistently. You
may require process improvements to define what network administrators should do when
threshold violations occur or what process to follow for baselining, trending, and upgrading
the network. Once you determine the requirements and resources for successful capacity
planning, you can consider the methodology. Many organizations choose to outsource this
type of functionality to a network services organization such as INS or build the expertise in-
house because they consider the service a core competency.
Module 5 – Network Support Skills Author: Rel Date: 27/01/2018 Rev Date: 01/06/2023 Doc Ref: 48573 LM Mod 1 v-1
LEARNER MANUAL PAGE 80
Define Capacity Areas
The plan for capacity planning should also include a definition of capacity areas. These are
areas of the network that can share a common capacity planning strategy: for example, the
corporate LAN, WAN field offices, critical WAN sites, and dial-in access. Defining different
areas is helpful for several reasons:
Different areas may have different thresholds. For example, LAN bandwidth is much cheaper
than WAN bandwidth so utilization thresholds should be lower.
Different areas may require monitoring different MIB variables. For instance, FECN and
BECN counters in Frame Relay are critical in understanding frame-relay capacity problems.
It may be more difficult or time consuming to upgrade some areas of the network. For
example, international circuits can have much longer lead times and need a corresponding
higher level of planning.
Define the Capacity Variables
The next important area is defining the variables to monitor and the threshold values that
require action. Defining the capacity variables significantly depends on the devices and
media used within the network. In general parameters such as CPU, memory and link
utilization are valuable. However, other areas may be important for specific technologies or
requirements. These may include queue depths, performance, frame-relay congestion
notification, backplane utilization, buffer utilization, netflow statistics, broadcast volume,
and RMON data. Keep in mind your long term plans, but start with only a few key areas to
help ensure success.
Interpret the Data
Understanding the collected data is also key to providing a high-quality service. For instance,
many organizations don't fully understand peak and average utilization levels. The following
diagram shows a capacity parameter peak based on a 5 minute SNMP collection interval,
(shown in green).
Even though the reported value was less than the threshold (shown in red) peaks still can
occur within the collection interval that are above the threshold value (shown in blue). This is
significant because during the collection interval, the organization may be experiencing peak
values that affect performance or capacity of the network. Be careful to select a meaningful
collection interval that is useful and that does not cause excessive overhead.
Another example is average utilization. If employees are only in the office from eight to five,
but the average utilization is 7X24, the information may be misleading
Module 5 – Network Support Skills Author: Rel Date: 27/01/2018 Rev Date: 01/06/2023 Doc Ref: 48573 LM Mod 1 v-1
LEARNER MANUAL PAGE 81
AC 1
he network is available and accessible according to organisation
requirements.
LAN stands for Local Area Network, LAN (Local Area Network) is a network which is
established to meet the needs of small areas. It can be applied to home, offices,
airports and in small college computer labs. The idea of developing LAN is to utilize the fast
data transfer over a small geographical area. LAN (Local Area Network) was developed with a
view to establish better interconnections within the individual computer units. LAN (Local
Area Network) network is preferred due to its fast access and affordability. LAN (Local Area
Network) is employed to build successful sophisticated network for data sharing.
How LAN Works
Early LAN (Local Area Network) networks were formed using coaxial cable, coax is an electric
cable and it is used to carry radio signals. LAN (Local Area Network) setup is developed by
connecting two or more than two computers with each other using a physical connection in
order to share files and data overtime. The basic application of this cable is to connect the
radio transmitters with their antennas.
However it is also used for developing internet connections and for distributing cable
channels. Most common type of developing LAN (Local Area Network) network is the
Ethernet. Ethernet is usually termed as a major data and physical link layer technology.
Ethernet is often associated with the name of engineer Robert Metcalfe. Ethernet today can
give the maximum data rate of up to 100 Mbps.
Ethernet has proved to be an effective way to serve as a data transfer medium for internet
protocols. Usually Ethernet cables are extended to the length of 100 meters, but this is not
the ultimate limit. Ethernet cables can be extended according to the need. When you decide
to develop a LAN (Local Area Network), try to use the specialized software like the Microsoft
windows. Microsoft widows provide special internet sharing features which help LAN (Local
Area Network).
T
Maintain the availability of a LAN Time: 120 minutes Activity: Self and Group
Module 5 – Network Support Skills Author: Rel Date: 27/01/2018 Rev Date: 01/06/2023 Doc Ref: 48573 LM Mod 1 v-1
LEARNER MANUAL PAGE 82
Wireless Local Area Network (WLAN)
The wireless connection that enables you to connect with your LAN (Local Area Network),
while you move around is known as WLAN or wireless local area network. The worldwide
trend of carrying and using laptops has decreased the use of traditional LANs. Moreover the
office workers who possess laptops often prefer WLAN, so that they can do their office work
at home while they remain connected to their LAN.
WLAN are admired due to their ease of installment and wireless arrangements. The first
wireless LAN was ALOHA net, which was invented by Norman Abramson In 1970.wireless
distribution system is the one in which many different access points are linked without the
Hassel of wires involved. Wireless LANs are of many types. Wireless LAN can be peer to peer
or can be an adhoc network.
Application of LAN and benefits of LAN
Applications of LAN (Local Area Network) is widely used in universities, some banks, in
homes and in some air reservation systems. LAN enables you to store data in any central
computer from where it can be shared throughout the organization. File transfer and
recovery is easy in a LAN (Local Area Network) network because backup files are stored in a
single server.
Restricted LAN PCs offers enough security to the data because only authentic users can
share and access data. LAN (Local Area Network) helps you to save the installation cost of
various soft wares, because resources are managed and shared centrally. Moreover expensive
hardware devices such as laser printers, CD writers and scanners can be used equally from
each individual unit.
User files can be accessed from many different workstations. The ease of sharing resources
and hardware devices reduces the cost of employing independent printers and scanners. This
sharing reduces cost and increases productivity. The risk of data loss is reduced due to the
effective physical backup system. The recovery of lost data with the help of data recovery soft
wares involves additional cost. However physical backup support also helps to cover this
additional cost.
Module 5 – Network Support Skills Author: Rel Date: 27/01/2018 Rev Date: 01/06/2023 Doc Ref: 48573 LM Mod 1 v-1
LEARNER MANUAL PAGE 83
AC 2
etwork availability problems are resolved according to organisation
specifications.
Networks are networks. Despite best efforts to keep things smooth all the time
every day, things happen. Here’s a look at some common network issues, some
tips for quickly resolving them, and even better, how to prevent them from occurring again.
1. Duplicate IP Addresses
When two devices attempt to share a single IP, you see the dreaded “Address Already in Use”
error — with no ability to access the network. The Quick Fix: The blame for this often rests
with your router’s default DHCP configuration. DHCP is probably trying to assign your new
device an address at the beginning of your subnet, and another device may already occupy
these low-numbered addresses with static IPs.
If you’ve just introduced a new device or server to your network, it may have its own DHCP
server. Simply disable the DHCP server on that device to restore sanity to your network. The
Preventive Measure: You can take one simple step to avoid IP conflicts by modifying your
router’s configuration to begin assigning DHCP addresses near the top end of your subnet,
leaving the lower addresses available for devices that require static IPs.
2. IP Address Exhaustion
To troubleshoot this issue, use the ipconfig command. If the workstation has assigned itself
an IP address that begins with 169.x.x.x, it means that no IP address was available from the
DHCP server. The Quick Fix: Some users on cable internet might not have a local router, in
which case IP addresses are assigned on a limited basis directly from your ISP. You have
probably run out of allowed IP addresses from your ISP. The solution to this is to purchase
either a standalone router or WiFi access point with an integrated router. This creates your
own local pool of internal addresses, ensuring you won’t run out.
If you already have a local router with DHCP, the default address pool might be too small for
your network. By accessing the DHCP settings on the router, you can adjust the size of the
address pool to meet your network’s needs. The Preventive Measure: It’s important that any
internet-connected network have a local router in operation with NAT and DHCP, both for
security reasons and to prevent IP address exhaustion. The router needs to be the only
device connected to the modem, with all other devices connecting through the router.
N
Module 5 – Network Support Skills Author: Rel Date: 27/01/2018 Rev Date: 01/06/2023 Doc Ref: 48573 LM Mod 1 v-1
LEARNER MANUAL PAGE 84
3. DNS Problems
Errors such as The Network Path Cannot Be Found, IP Address Could Not Be Found, or DNS
Name Does Not Exist, can usually be traced to a DNS configuration issue. The command line
utility nslookup can be used to quickly show a workstation’s DNS settings. The Quick
Fix: Workstations and other network devices can be configured to use their own DNS servers,
ignoring the server assigned by DHCP. Checking the ‘Internet Protocol Version 4 (TCP/IP)’
settings for your adapter will show if an incorrect DNS server is specified, so just select
“Obtain DNS server address automatically” instead.
The Prevention Measure: Your local router might be configured to operate as a DNS Server,
creating a DNS pass-through to your ISPs servers. On busy networks, this may overload the
capabilities of the router. Change your network’s DHCP settings to directly access your DNS
servers.
4. Single Workstation Unable to Connect to the Network
If only a single workstation is displaying the “No internet” message when opening a web
browser, we can usually assume that the rest of the network is healthy and turn our
attention to any hardware and software that is particular to this system. The Quick Fix: To
resolve this network issue, start by eliminating the obvious communication barriers such as
a bad cable, poor WiFi signal, failing network card or incorrect drivers. Ensure that the
workstation’s network adapter is configured with the correct IP, subnet, and DNS servers.
If that doesn’t solve the problem, check any firewall software on the device to ensure that
necessary ports are open to the external network. Common ports include 80 and 443 for web
traffic, plus 25, 587, 465, 110, and 995 for email. The Preventive Measure: It’s usually best
to leave all workstation TCP/IP settings to “Automatically assigned.” Use a DHCP server to
hand out a uniform configuration to all devices on the network. If a static IP is needed on a
particular workstation or server, most DHCP servers allow the ability to create static IP
mappings.
5. Unable to Connect to Local File or Printer Shares
Sharing problems are among the most difficult network problems to solve, due to the number
of components that need to be configured properly. Most commonly, sharing problems arise
due to conflicts between mixed security environments. Even different versions of the same
operating system sometimes use slightly different security models, which can make
interconnection of workstations difficult.
Module 5 – Network Support Skills Author: Rel Date: 27/01/2018 Rev Date: 01/06/2023 Doc Ref: 48573 LM Mod 1 v-1
LEARNER MANUAL PAGE 85
The Quick Fix: We can cure sharing problems most efficiently by drilling down through the
possibilities in this order:
Ensure that the required services are running. On Windows systems, the server, TCP/IP
NetBIOS Helper, workstation, and computer browser services all need to be running. On
Linux machines, Samba is the primary component required to share with Windows systems.
Check your firewall(s). It’s very common for a workstation’s firewall to be configured to block
file and printer sharing traffic, especially if a new antivirus package is installed that
introduces its own firewall. Firewall issues can also exist at the hardware level, so ensure
that routers or managed switches are passing share traffic within the subnet. Speaking of
subnet….
Ensure all workstations are on the same subnet. This problem typically only appears on
complex networks, however, even simple networks sometimes have static-IP equipment with
an improperly configured subnet. The result is that external traffic will move about just fine,
while internal traffic will hit unexpected roadblocks.
All Windows network adapters will need File and Printer Sharing for Microsoft Networks,
Client for Microsoft Networks, and NetBIOS over TCP/IP enabled. Once the above checks
have passed, it’s finally time to check the most likely culprit, permissions. There are multiple
layers of access required, each with their own interface within the OS. Check for:
Systems configured with the wrong workgroup or domain.
Incorrectly configured HomeGroup.
Network type set to Public.
Incorrect NTFS permissions.
6. Local Network is Unable to Connect to the internet
This situation can either be intermittent or persistent. Often times, the most difficult aspect
of dealing with any external network problem is finding the company responsible. And then
tasking them to solve the issue, particularly with intermittent failures that are difficult to
trace. It can sometimes be such a problem that organizations will have to switch internet
providers in order to solve the issue.
The Quick Fix: A router and modem reboot is the first order of business. The tracert then
utility can be used to identify communication breaks. It will clearly hiccup on the particular
router hop that is causing the problem. Contact your ISP with your findings, providing
screenshots as necessary.
Module 5 – Network Support Skills Author: Rel Date: 27/01/2018 Rev Date: 01/06/2023 Doc Ref: 48573 LM Mod 1 v-1
LEARNER MANUAL PAGE 86
The Preventive Measure: To avoid the finger-pointing that can prevent rapid resolution of
external issues, do some research to ensure that you procure connectivity only from local
Tier 1 providers. Other ISPs are more than happy to sell you service, however, they are
simply piggybacking the Tier 1 connection, since they don’t actually own the infrastructure
in your area. The goal is to remove as many middle-men as possible, so that when (not if) you
experience a problem, one phone call is all that is required to identify the issue and get
technicians to work on it.
7. Slow Internet Performance
Slow performance is typically due to congestion, or sometimes poor quality connections that
have corroded or otherwise deteriorated. Congestion may not be directly related to bandwidth
exhaustion, as a single overloaded port on a switch or router can diminish network
performance. This can be especially true on leased lines where dedicated bandwidth is to be
expected, but speed tests indicate the network is not reaching its rated potential.
The Quick Fix: Use speed test websites, conducting tests from geographically remote servers.
This can pinpoint areas of congestion on the ISP’s network. In the case of cable internet, the
local network is shared amongst your neighbours, committing your ISP to a costly bandwidth
upgrade when saturation occurs. Report your findings to your ISP so that they can take
steps to resolve the issue.
DNS servers are an often overlooked aspect of internet performance. Using incorrect DNS
servers can result in routing congestion or load balancing problems. While you should
typically use your ISP’s DNS settings whenever possible, they may actually be routing traffic
through overloaded web caches. You can temporarily adjust your DNS settings to use
OpenDNS instead.
The Preventive Measure: if internet performance is critical, you’ll need to procure adequate
connectivity. While cable internet may be inexpensive, you could be setting yourself up for
frequent jeers from employees. A local DSL operator may offer improved reliability for a
slightly higher cost, but for the most consistent performance, you may find that an expensive
leased line is a requirement for your organization
Module 5 – Network Support Skills Author: Rel Date: 27/01/2018 Rev Date: 01/06/2023 Doc Ref: 48573 LM Mod 1 v-1
LEARNER MANUAL PAGE 87
AC 1
he management ensures that a plan of a proposed change predicts the
impact and risks to the organisation associated with the change.
Setting up a local network and file sharing in Windows 7
Use the steps in this section to set up a home network using standard RJ-45
hardware and cables. When using steps involving Windows, log in using the main
administrative account. Normally this is the first account that was created when the
computer was first turned on.
Before you begin setting up a local network
Confirm that you have the following hardware and follow these steps:
Network interface card (NIC) or an on-the-motherboard network port for each computer. HP
and Compaq computers are network ready with NICs installed. Confirm the computer has a
RJ-45 network port on the back.
Network hub (or router). A separate network hub may not be necessary if your home is
already equipped with RJ-45 jacks in the walls or if your DSL or cable modem provides RJ-
45 ports (select models). If you need a network hub, consult with a network specialist at your
local computer store to determine a hub that meets your needs.
A crossover cable can be used to connect two computers without a hub. However, it only
allows two computers to connect and is not expandable.
Network cables for each computer.
Disconnect the Internet. If you have a DSL or cable modem, disconnect it.
Disable any firewall software. Firewall software may interfere with network setup. You can
enable the firewall after network setup is complete.
Step 1: Connecting the network hardware and cables to set up a local network
Do the following to set up the network hardware and connect the networking cables.
Set up and turn on the power for the network hub or other networking device. (Follow the
instructions provided by the manufacturer).
Connect the computers to the networking device. If a crossover cable is used, connect the
cable to the RJ45 network ports on each computer.
Connect the computer power cords and turn the computers on.
T
Make changes to a LAN Time: 120 minutes Activity: Self and Group
Module 5 – Network Support Skills Author: Rel Date: 27/01/2018 Rev Date: 01/06/2023 Doc Ref: 48573 LM Mod 1 v-1
LEARNER MANUAL PAGE 88
Step 2: Turning on Network discovery and file sharing in Windows 7
Turn on Network discovery and file sharing on each computer that you want to access on the
network. Follow these steps to begin setting up the network:
Click Start , and then click Control Panel.
Under Network and Internet, click Choose Homegroup and sharing options.
In the Homegroup settings window, click Change advanced sharing settings.
Turn on network discovery and file and printer sharing. Review the other settings and turn
them on or off.
Click Save changes.
Step 3: Sharing drives, folders, and files in a Windows 7 network
To share non-public folders with other computers on a local network, follow these steps:
Click Start , and then click Computer.
Browse to the folder you want to share.
Right-click the folder, select Share with, and then click Homegroup (Read), Homegroup
(Read/Write), or Specific people.
If you chose Specific people, the File Sharing window displays.
Click the down arrow and select the account you want to share with, and then click Add.
NOTE:
A User Account Control might open. You must accept this Window to make the necessary
changes.
Click an arrow under Permission Level to set the permission level for each account or group.
Step 4: Testing a local network in Windows 7
Open the Windows 7 network window and browse through the shared folders in each
computer on the network. If the computer is able to read and access files from a remote
computer, the remote computer is set up correctly. Browse to every available computer from
each computer on the network. If there are any issues, go back through these steps and
verify that the settings are correct. When all computers are able to network to each other on
the network, continue with the next step to enable Internet access and the firewall.
Step 5: Enabling Internet access and firewall for a local network
Once you have verified that your home network is capable of transferring files, connect and
enable Internet connections for computers with Internet access.
Module 5 – Network Support Skills Author: Rel Date: 27/01/2018 Rev Date: 01/06/2023 Doc Ref: 48573 LM Mod 1 v-1
LEARNER MANUAL PAGE 89
CAUTION:
Make sure that each computer with Internet access is well protected from security threats. At
the minimum, each computer should have its Internet connection protected with a firewall
and Windows should be updated with the latest critical updates from Microsoft Windows
Update. If malicious activity comes though one computer, the activity can quickly spread
through the entire network.
AC 2
he management ensures that a plan of a proposed change establishes
when the change should occur to minimise the impacts and risks
Accessing shared files and directories in Windows 7
Do the following to access shared files and directories in a local network:
Ensure network discovery and file sharing is turned On.
Click Start , click Control Panel, click Network and Internet, and then click Network and
Sharing Center.
Double-click Network.
The Network window opens and displays computers with shared folders that are detected on
local networks.
Double-click the computer you want to access.
NOTE:
When accessing shared files or directories the following error message window may display:
This error can be caused by the following:
Password Protection is On and the Guest account is On.
The account does not have permission to access the share. This typically occurs when
specific permissions are set up on systems with multiple share folders.
NOTE:
Windows 7 file sharing displays all the shared folders, even those you do not have permission
to access.
To resolve the error, verify the following:
The account has the proper permissions to access the computer.
The computer name and account name are spelled correctly.
Make sure that Firewall software on any connected computer is set to allow access.
T
Module 5 – Network Support Skills Author: Rel Date: 27/01/2018 Rev Date: 01/06/2023 Doc Ref: 48573 LM Mod 1 v-1
LEARNER MANUAL PAGE 90
AC3
he management includes a contingency plan that allows the network to
be restored to a status acceptable to the user in the event of problems
with the change
Contingency planning
The key elements of a contingency plan are “protection, detection, and recoverability.”
A contingency plan acknowledges that disaster can happen: the organization must design a
plan to accommodate the survival of organizational operations in the event of flood, fire,
earthquake, electrical disturbance, or other unexpected events that can disrupt the
organization’s systems. Risk analysis should offer guidance on the likelihood of various
contingencies, and in what resources to invest providing such recovery methods as off-site
systems, backups and so on. Several references discuss contingency planning.
Every effective contingency plan must consider backing up data files.
Most critical to the firm is that a contingency plan:
Exists;
Is communicated to employees; and
Is tested regularly.
The network disaster recovery plan is usually in the form a formal document that is
created by network administrator and other key IT /network management staff.
Depending on the underlying network and organization requirements, it may include
plans and procedures for recovering:
Local area networks (LAN), wide area networks (WAN) and wireless networks
Network-based applications and services
Servers and computer systems
The disaster can be a natural and/or physical disaster, such as flooding or fire, or a
"virtual" disaster in the form of viruses or hacker attacks.
The plan may also include possible threats, network weaknesses and/or
vulnerabilities, which if exploited can result in network outage or degradation and the
procedures to counter them.
T
Module 5 – Network Support Skills Author: Rel Date: 27/01/2018 Rev Date: 01/06/2023 Doc Ref: 48573 LM Mod 1 v-1
LEARNER MANUAL PAGE 91
AC 4
esting establishes the success of the installation and of the changes
according to user and organisation requirements.
After installing LAN Speed Test v4, it begins in (Lite) mode. LAN Speed Test (Lite) is
fully functional with no time limits, etc. - only some of the more advanced features
are disabled. LAN Speed Test was designed from the ground up to be a simple but powerful
tool for measuring file transfer, hard drive, USB Drive, and Local Area Network (LAN) speeds
(wired & wireless). First, you pick a folder to test to. This folder can be on a local drive or
USB drive, etc. to test the drive speed, or a shared folder on your network to test your
network speed.
Next, LAN Speed Test builds a file in memory, then transfers it both ways (without effects of
Windows/Mac file caching) while keeping track of the time, and then does the calculations
for you. For more advanced users, you can test to LAN Speed Test Server instead of a shared
folder to take the slower hard drives out of the process as you are testing from one
computer's RAM to another computer's RAM. Simple concept and easy to use. You'll find that
LAN Speed Test will quickly become one of your favourite network tools!
Some of LAN Speed Test v4 features include...
Test the speed of your Local Network by testing to/from network shared folders
Test the speed of your local drives (USB Drives, hard drives, etc.)
Compatible with LST Server (v1.5 or later) for real network performance results
without hard drive limitations – Even test your WAN (Internet) speed with LST Server
Very fast! Most tests are less than 1 minute
Completely Portable - No installation needed
Can be run from a hard drive, USB Flash drives, Network Share, etc.
Compatible with Windows 7 or later and Windows Server 2008 or later
Compatible with Mac 10.7.5 (Lion) or later
LAN Speed Test and LAN Speed Test (Lite) are now the same download
Packets up to 9 GB in size and up to 1000 packets *
Chunk size adjustable up to 1 MB (for advanced testers)
View results by Average, Maximum, and Minimum throughputs *
Progress bar and cancel button allowing user to cancel at any time
Ability to choose Network Interface Card for computers with multiple NICs
Ability to view each packet's results in a chart or by details *
Ability to view results as Gbps, Mbps, Kbps, GBps, MBps, or KBps *
T
Module 5 – Network Support Skills Author: Rel Date: 27/01/2018 Rev Date: 01/06/2023 Doc Ref: 48573 LM Mod 1 v-1
LEARNER MANUAL PAGE 92
Email results manually, automatically, or only when under a certain speed *
Log results to .csv file with user configurable file location. All entries are SQL
compatible for easy importing into SQL Server, MySql, etc.) *
Option to log Avg, Max, & Min automatically *
View/Edit Log built right into LAN Speed Test *
Network Scan (see other devices on your network, keep notes about them, etc.) *
Run multiple tests automatically - any number of tests from 1 sec to 24 hrs apart *
Open/Save all options and results to .csv file
Command Line Mode - All testing options available from command line *
Command Line Builder (automatically builds the command line options that you need
based on your current settings)
LAN Speed Test's user interface has been greatly improved - Plus it's fully high DPI -
aware
AC 5
he plan ensures that people affected by the change are notified to
minimise disruption to their activity.
What is Networking and Communication?
Data communications refers to the transmission of this digital data between two or
more computers and a computer network or data network is a telecommunications network
that allows computers to exchange data. The physical connection between networked
computing devices is established using either cable media or wireless media. The best-known
computer network is the Internet.
What are the types of Computer Networks?
In computer networks, the data is passed in the form of packets. The devices that transmit
or receive this data, such as a phone or a computer, are referred to as nodes. There are three
main types of networks:
1. Local Area Network (LAN): It is usually a small network that is restricted to a small
geographic area. A computer network available only to the residents of a building can be
called a LAN.
2. Wide Area Network (WAN): As the name implies, these networks cover a broad range of
geographic area. WANs are used to connect LANs and other types of networks together so
that users and computers can communicate with computers in other regions. An example of
a WAN is the much-used and loved, Internet.
T
Module 5 – Network Support Skills Author: Rel Date: 27/01/2018 Rev Date: 01/06/2023 Doc Ref: 48573 LM Mod 1 v-1
LEARNER MANUAL PAGE 93
3. Metropolitan Area Network (MAN): MAN is a network that connects the users with
computer resources in a geographic area that is larger than LAN but not quite as large as
WAN.
What are the basic components of Computer Networks?
1.Servers - Servers are computers that hold shared files, programs, and the network
operating system. Servers provide access to network resources to all the users of the
network. There are many different kinds of servers, and one server can provide several
functions. For example, there are file servers, print servers, mail servers, communication
servers, database servers, print servers, fax servers and web servers, to name a few.
2.Clients - Clients are computers that access and use the network and shared network
resources. Client computers are basically the customers (users) of the network, as they
request and receive services from the servers.
3.Transmission Media - Transmission media are the facilities used to interconnect computers
in a network, such as twisted-pair wire, coaxial cable, and optical fiber cable. Transmission
media are sometimes called channels, links or lines.
4.Shared data - Shared data are data that file servers provide to clients such as data files,
printer access programs and e-mail.
5.Shared printers and other peripherals - Shared printers and peripherals are hardware
resources provided to the users of the network by servers. Resources provided include data
files, printers, software, or any other items used by clients on the network.
6.Network Interface Card - Each computer in a network has a special expansion card called a
network interface card (NIC). The NIC prepares (formats) and sends data, receives data, and
controls data flow between the computer and the network. On the transmit side, the NIC
passes frames of data on to the physical layer, which transmits the data to the physical link.
On the receiver's side, the NIC processes bits received from the physical layer and processes
the message based on its contents.
7.Local Operating System - A local operating system allows personal computers to access
files, print to a local printer, and have and use one or more disk and CD drives that are
located on the computer.
Module 5 – Network Support Skills Author: Rel Date: 27/01/2018 Rev Date: 01/06/2023 Doc Ref: 48573 LM Mod 1 v-1
LEARNER MANUAL PAGE 94
8.Network Operating System - The network operating system is a program that runs on
computers and servers, and allows the computers to communicate over the network.
9.Hub - Hub is a device that splits a network connection into multiple computers. It is like a
distribution center. When a computer request information from a network or a specific
computer, it sends the request to the hub through a cable. The hub will receive the request
and transmit it to the entire network. Each computer in the network should then figure out
whether the broadcast data is for them or not.
10.Switch - Switch is a telecommunication device grouped as one of computer network
components. It uses physical device addresses in each incoming messages so that it can
deliver the message to the right destination or port
Module 5 – Network Support Skills Author: Rel Date: 27/01/2018 Rev Date: 01/06/2023 Doc Ref: 48573 LM Mod 1 v-1
LEARNER MANUAL PAGE 95
You are now ready to go through a check list. Be honest with yourself
Tick the box with either a √ or an X to indicate your response
I am able to maintain the performance of a local area computer network (LAN);
I am able to execute procedures on a LAN;
I am able to administer security, maintain the supply of consumables, and plan
capacity for a LAN;
I am able to maintain the availability of a LAN, and
I am able to manage changes to a LAN
You must think about any point you could not tick. Write this down as a goal.
Decide on a plan of action to achieve these goals. Regularly review these goals.
My Goals and Planning: __________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________