Assessment cover sheet

109 views 9:38 am 0 Comments June 2, 2023

Assessment cover sheet

Assessment Cover Sheet

Learner’s name:

Assessors Name:

Date Submitted:

The following questions are to be completed by the assessor:

Is the Learner ready for assessment?

Yes

No

Has the assessment process been explained?

Yes

No

Does the Learner understand which evidence is to be collected and how?

Yes

No

Have the Learner’s rights and the appeal system been fully explained?

Yes

No

Have you discussed any special needs to be considered during assessment?

Yes

No

The following documents must be completed and attached:

Knowledge Test Questions, Written Activity and Checklist

The learner will complete the written activity provided to them by the assessor. The Written Activity Checklist will be completed by the assessor.

S

NYS

Practical Activity Checklist

The learner will demonstrate a range of skills and the assessor will observe where appropriate to the unit. The Practical Activity Checklist will be completed by the assessor.

S

NYS

Learner Declaration

I agree to undertake assessment in the knowledge that information gathered will only be used for professional development purposes and can only be accessed by the RTO

I declare that:

The material I have submitted is my own work

I have kept a copy of all relevant notes and reference material that I used in the production of my work

I have given references for all sources of information that are not my own, including the words, ideas, and images of others

Learner Signature:

Date:

Result and Feedback

Feedback to Learner:

Overall Outcome Competent Not yet Competent

Assessor Signature:

Date:

Task 1 – Knowledge test questions and written activity

Your task is to write the answers to each of the following questions.

Question 1: Explain what you understand by the term customer service policies and service level agreement. Answer within 100 – 150 words.Special Needs Assistance

The customer service level agreement is for the service provider with the external customers. It is called the external service agreement.

For the customer-based SLA, the customer and the service provider tend to come with the agreement which is based on the negotiated terms for the services which tends to be provided. The customer service level agreement includes the different exact details which are for the services which are by the customers. Hence, the provisions are for the service availability and the standards for the handling of escalation of the procedures with the related terms of the cancellation. The internal SLA is for the organization and the internal customers which is for the different department and the sites.

Question 2: Explain any two network management principles. Answer within 50 – 100 words.

Configuration Management: This is for the handling of the inventory management with the different network topology services. It is for the designing, implementation and then processing the tickets. With this, there is a proper change of management and the directory services.

Fault Management: This is for the alarm message for the distributed applicable personnel with the error condition detection and the troubleshooting phase. This is for the technician for the problem info, parts required and also the location with the full extent of the correction phase.

Question 3. Answer the following:

How does network traffic blocking works? Answer within 50 -100 words.

IP based blocking tends to place the major network barriers with the firewalls. Hence, the block is for the traffic with the setting of the IP addresses. The protocol based blocking tends to make use of the other lower level for the identifiers of network with the TCP/IP port number for the identifying on the applications for the server and also the types of the application protocol.

How does network congestion occur, and what are its effects? Answer within30 – 50 words.

The network congestion is when there is a need working in the data and the querying theory which comes with the reduction of the service quality with the network node or the link for carrying the data. The effects are the factor with the packet loss and the blockage for the new connections as well.

C.) What is the role of dimensioning in networking? Answer within 50 – 100 words.

This is for the involvement of the network topology with the plan of the routing, and the matrix of the traffic with the GoS requirements. It is for the use of the information for the determining of the maximised call handling with the switches for the handling of capacity with the maximised number of the channels that is needed in between the switches.

Question 4: Explain the term traffic engineering used in networking. Answer within 50 – 80 words.

This is for the optimized performance for the network telecommunication through the dynamic analysis, prediction and the regulation of the data behaviour which is being transited over the network. This is also for the tele-traffic engineering and the management of traffic as well.

Question 5: Provide brief information about traffic patterns used in networking. Answer within 100 – 150 words.

This is for the traffic in between the networks and then understanding about the internal network for the whole and the part for the internal or the company network. This is mainly from the NetFlow of the data which is being exported and then collected too. There is a need to focus on the people moving through the different spaces which comes with the living it in and then passing through. Not only this, but there is also entry door for the space and then continuing for the secondary door with the other room.

Question 6: Answer the following:

Explain the different types of transmission, which is done in networking. Answer within 80 – 120 words.

The data transmission is for the direction for the flow of the information on the deciding on the data direction. The direction for exchange for the information with the characterized with the synchronous and the asynchronous. The simple is for the data transmission mode with the flow only for the one direction with the communication with the unidirectional. The transmission mode has not been popular with not performing on the two-way communication with the sender and the receiver for the mode.

B.) Provide brief information signal and types of signals encountered in networking. Answer within 80 – 120 words.

The signals are for the electromagnetic and the light wave with the represent on the transferring of the data with the one device to the other. It is for the through the communication pattern. The communication signals with the sending on the data from one location to the other. The two types are for the digital signal with the results with the analogy signals with the values with the time instants. The digital signals are quantized with the analogy signals are continuous.

Question 7: Answer the following:

Explain any two network topologies. Answer within 80 – 120 words.

The network topologies are for:

The physical topologies are for the way on the computers and the nodes with the connected with each other in the computer network. The arrangement for the various elements for the link and nodes etc, with the device location with the handling on the computer installation network.

Logical Topology: The approach is based on the data flow with from one computer to another. The network protocol and then defined with the devices communicating on the internal factors.

Explain any two switching techniques. Answer within 50 -100 words.

The circuit switching is for the path setup with the only delay with the data transmission speed, with no problem with congestion and the garbled message. The disadvantages with the long setup time that is needed. The request is for the receiver with the acknowledgement before the transmissions.

The packet switching is for the major problems with the need for the dedicated approach for the line for transmission. The packet switching, data is broken into the small packets with each packet with source and the address of destination with the travel from one router to the next router.

Explain routing techniques. Answer within 50 – 100 words.

The routing is for the process with the handling of the performance through the layer 3 for the handling for the devices for delivering on the packet with the choosing on the optimized path. It is for one network to the other. Hence, the 3 types of the routing with the static routing with the process with the manually adding of the routes for the routing table.

D.) Explain transmission techniques. Answer within 80 – 120 words.

The methods are used for the transmit data between digital devices with the serial transmission and parallel transmission. The serial data transmission sending the data with the bits on the other over the single channel. It is for the parallel data transmission with the multiple data with the same time for the multiple channels.

Question 8: Answer the following:

What is a network management system? List the three types of services provided by the network management system. Answer within 30 – 50 words.

The network management is for the processes, tools and the applications with the use for the administer, operating and then maintaining the network infrastructure. It is for the performance management with the fault analysis that are for the inclusion on the network management.

The three types are for the network management are the address, security and traffic management.

B.) What are the steps with the help of which network traffic can be monitored?

The network traffic analyser tools with the analysing and monitoring of the traffic. It is for the NetFort LanGuardian, SolarWind Netflow Analyzer, WireShark, Paessler Packet Capture Tool, Microsoft Message Analyzer.

Question 9. Give any three examples of network traffic problems?

The examples are for the network traffic problems which are:

The outdated and the non-compatible hardware with the enterprise demands.

The bandwidth hogs

Handling the poor design of network and the subnets as well.

Question 10. In what ways you should communicate in the workplace to discuss changes?

The clear and the communicating change for the employees.

Use care for the organizational change.

Handling the setting of expectations with the change management communication.

Tell employees about what needs to be done.

Question 11. What are the different policies or techniques used by different congestion control techniques?

The policy of re-transmission with the packets that are based on the lost or corrupted with the packet needs for the transmission.

Window Policy is for the effect on the congestion, with the several packets with the go-back-n window. The selective repeat window with the sending for the specific packet which might have been lost.

Discarding policy and the acknowledgement policy with the time partially discarding on the corruption with the audio file transmission with the maintaining of the audio file quality.

Question 12. What is a contingency plan, and what steps need to be followed to develop a contingency plan? Answer within 40 – 80 words.

The business operations and prioritized with the basis on the impact and the probability with creation of action plan. The occurrence, review and then updating them frequently.

Questions 13: Complete the following table and write the function of the elements of networking:

Elements

Functions (Write at least three)

System monitoring alerts and alarm

The monitoring of equipment for the sites for the central location

The devices are for the network equipment with sending alarm with the factors on going wrong.

The alarm types with monitoring on the infinite approach.

Route and circuit availabilities

Device and monitoring plans

Collecting the incoming alarms

Organizing on the incoming alarms

System outages

Partial failure of the hardware and the software components

Power Maintenance

Scheduled maintenance with the upgrades on the software and hardware.

Network management systems

Avoiding costly networking disruptions

Improvements on the IT productivity

Improvement on the network security

Traffic patterns

Busy and the heavy traffic with the higher bandwidth which is consumed.

There is non-real-time traffic with the working hours.

Interactive traffic with the competitive bandwidth with slow response for the prioritization with traffic.

Semi-permanent controls

The control plane software and hardware module.

Line cards with for the switching fabric with the control processor cards.

The no signal hardware fault results in the loss and the user degradation.

Traffic engineering

The support for the resource reservation for the IP network.

The information provided for the IP/MPLS with the control plane components.

IP forwarding state with the transferring on the IP packets for the incoming port of router.

Workplace documentation related to network traffic

The documentation for the project scope with the strategies with project needs.

The expectation and the acceptance

Identifying the constrains

Questions 14: Complete the following table and write the features of the elements of networking:

Elements

Features (Write at least three)

System monitoring alerts and alarm

The monitoring of equipment for the sites for the central location

The devices are for the network equipment with sending alarm with the factors on going wrong.

The alarm types with monitoring on the infinite approach.

Route and circuit availabilities

Device and monitoring plans

Collecting the incoming alarms

Organizing on the incoming alarms

System outages

Partial failure of the hardware and the software components

Power Maintenance

Scheduled maintenance with the upgrades on the software and hardware.

Network management systems

Avoiding costly networking disruptions

Improvements on the IT productivity

Improvement on the network security

Traffic patterns

Busy and the heavy traffic with the higher bandwidth which is consumed.

There is non-real-time traffic with the working hours.

Interactive traffic with the competitive bandwidth with slow response for the prioritization with traffic.

Semi-permanent controls

The control plane software and hardware module.

Line cards with for the switching fabric with the control processor cards.

The no signal hardware fault results in the loss and the user degradation.

Traffic engineering

The support for the resource reservation for the IP network.

The information provided for the IP/MPLS with the control plane components.

IP forwarding state with the transferring on the IP packets for the incoming port of router.

Workplace documentation related to network traffic

The documentation for the project scope with the strategies with project needs.

The expectation and the acceptance

Identifying the constraints

Question 15: Answer the following:

What is meant by a contingency plan? Answer must be between 40-80 words.

The contingency plan is for the component for the business continuity with the recovery for disaster and the management of risks. The contingency plan for the IT that are for the contingency planning policy statement, with the business impact analysis. It is for the predictive controls with the contingency strategies

What is the purpose of having a contingency plan? Answer must be between 30-60 words.

The contingency plans is for the formal policy with the that comes with the authority and the guidance with the necessary on the effective for the continency plan. The identification of the preventive controls with the reducing on the effects of system disruption with the system that comes with the development of information system on the damaged system unique. It is for the ensure on the planned testing, and exercises.

Write the steps, which need to be taken to develop a contingency plan for network traffic. Answer must be between 80-130 words.

Assessing the risks: It is for the identifying on the critical functions with the risks with prioritizing on the risks.

Creating the contingency is for the determining on the pre-condition, and then handling the needs for the stakeholder.

Maintaining the contingency plan with the new risks for the emergency with the existing risks for the new products for the market.

Question 16: Briefly explain the following legislation, codes, work practices, standards associated with the designing of the network:

WHS Act 2011

The endorsement with variety and the denial of codes with the important service. The Act is for the tracing on the coding of the hone with the utilized court proceedings. The endorsing coding with the beneath for the WHS Act with the handling for the respect for the code with the hazards or control and dependency for deciding with the circumstances for the code that relates too.

Telecommunications Regulations 2001

The telecommunication is for this for the notification, objection with the carriers who tend to work on the elective courses for the action. It is for the parties with the setting on the matters with the carrier and through the communication of broadcast. The regulations are for the non-discrimination commitment, and the authorised conduct, with the Broadcast Communication Act.

Safe work practices

The written methods are for the performance on the tasks with the minimized risks for the people, equipment, and material, environment, and processes. It is for the safe job procedures for the specific steps for guiding on the workers with the start to finish for the chronological order.

Question 17: Briefly explain the following network strategies:

Distributed network: The network system over with computer programming with the software and data with the working on more than one computer. The communication is for the complex messages on the nodes with the dependency on one other.

LAN: The interconnected computers with handling the users with the unrestricted movement with handling the coverage area. It is for the residences for the small business with the devices and the network segments with the data link layer and the physical layer with the topologies with including on ring, bus, mesh.

Answer must be between 80-130 words.

Task 1 – Knowledge test questions and Written Activity Checklist

Knowledge test questions and Written Activity Checklist

For this assessment, the learner must complete the Knowledge test questions and Written activity.

The Knowledge test questions and Written activity is a stand-alone activity that will allow the learner to display the requirements of the performance criteria and knowledge evidence in this unit that are essential when deciding overall competency.

Learner Name:

Assessor Name:

Has the learner satisfactorily completed the written activity?

Yes

No

Did the Learner provide evidence of their ability to:

Question 1: Explain what do you understand by the term customer service policies and service level agreement. Answer within 100 – 150 words.

Question 2: Explain any two network management principles. Answer within 50 – 100 words.

Question 3. Answer the following:

A.) How does network traffic blocking works? Answer within 50 -100 words.

B.) How does network congestion occur, and what are its effects? Answer within30 – 50 words.

C.) What is the role of dimensioning in networking? Answer within 50 – 100 words.

Question 4: Explain the term traffic engineering used in networking. Answer within 50 – 80 words.

Question 5: Provide brief information about traffic patterns used in networking. Answer within 100 – 150 words.

Question 6: Answer the following:

A.) Explain the different types of transmission, which is done in networking. Answer within 80 – 120 words.

B.) Provide brief information signal and types of signals encountered in networking. Answer within 80 – 120 words.

Question 7: Answer the following:

A.) Explain any two network topologies. Answer within 80 – 120 words.

B.) Explain any two switching techniques. Answer within 50 -100 words.

C.) Explain routing techniques. Answer within 50 – 100 words.

D.) Explain transmission techniques. Answer within 80 – 120 words.

Question 8: Answer the following:

A.) What is a network management system? List the three types of services provided by the network management system. Answer within 30 – 50 words.

B.) What are the steps with the help of which network traffic can be monitored?

Question 9. Give any three examples of network traffic problems?

Question 10. In what ways you should communicate in the workplace to discuss changes?

Question 11. What are the different policies or techniques used by different congestion control techniques?

Question 12. What is the contingency plan, and what steps need to be followed to develop a contingency plan? Answer within 40 – 80 words.

Questions 13: Complete the given table and write the function of the elements of networking

Questions 14: Complete the given table and write the features of the elements of networking

Question 15: Answer the following:

A.) What is meant by a contingency plan? Answer must be between 40-80 words.

B.) What is the purpose of having a contingency plan? Answer must be between 30-60 words.

C.) Write the steps, which need to be taken to develop a contingency plan for network traffic. Answer must be between 80-130 words.

Question 16: Briefly explain the following legislation, codes, work practices, standards associated with the designing of the network:

WHS Act 2011

Telecommunications Regulations 2001

Safe work practices

Answer must be between 150-200 words.

Question 17: Briefly explain the following network strategies:

Distributed network

LAN

Answer must be between 80-130 words.

Feedback to Learner:

Result Satisfactory Not Yet Satisfactory

Assessor’s Signature:

Date:

Task 2 – practical activity

The following task must be demonstrated in conditions that are safe and replicate the workplace. Noise levels, production flow, interruptions and time variances must be typical of those experienced in the website technologies field of work, and include access to:

Computer

Internet

Equipment and materials

MS office

Web browser software

Project Task:

Scenario:

Career Training is acknowledged as an industry training leader delivering nationally recognised and specialised courses. Career Training is a private registered training organisation (RTO) based in Geraldton, Western Australia with satellite offices in Broome, Derby and Perth.

Registered training organisations (RTOs) are those training providers registered by ASQA (or, in some cases, a state regulator) to deliver vocational education and training (VET) services.

RTOs are recognised as providers of quality-assured and nationally recognised training and qualifications.

Only RTOs can:

Deliver nationally recognised courses and accredited Australian Qualifications Framework (AQF) VET qualifications,

Apply for Australian, state and territory funding to deliver vocational education and training.

RTOs can offer qualifications at the following levels:

Certificates I, II, III and IV

Diploma

Advanced Diploma

Vocational Graduate Certificate

Vocational Graduate Diploma.

Career training has a dedicated network system, which is used by the RTO to use internet services. Career training has given access to staff and students for accessing internet services through a dedicated network.

Career training has around 40 staff members who are using the network regularly and around 150 students.

Career training is now facing difficulty in the network, as many staff and students have raised the issues related to the network. The issues raised are:

The slow speed of the Internet

Traffic congestion in peak time

Availability of network is not adequate

Career training is aware that the current network was installed three years ago when the staff members and students were less, so the network operated very smoothly. But now the staff and student number have increased due to which the issues are occurring. Career training knows the general causes of network congestion, which are:

Low bandwidth

Out-dated hardware

A large number of devices are connected

Career training has also encountered the internet speed, which is required to operate certain devices. The network traffic requirements for some of the devices, which are encountered by the network developer, are:

Low – 100 Kbps (kilobits per second) or less: E-fax machines, VoIP phones, laptops and computers for emailing and simple web surfing

Medium – 100-500 Kbps: More intensive web browsing, streaming, emailing, and downloading

High – 500Kbps – 2.0Mbps (megabits per second): Devices that use cloud-based platforms and software programs

Intensive – 2.0Mbps and higher: HD video conference devices and platforms

Career training also has some tools and websites to test the security, availability, monitor and measure the network.

Access control

Anti-malware system

Email security

SolarWinds

PRTC Network Monitor

ManageEngine

Network Bandwidth analyser pack

NetFlow Traffic analyser

ISP website to check network availability

You have been part of Career training for the past one year as a network planner. You have been assigned the task to overcome the network issues. You need to develop strategies to overcome the network issues, ways to control network congestion and give future issues that can arise in the network. You need to complete the following activities to resolve the issues related to the network.

Activity 1: Obtaining work details

You need to go through the scenario and research over the internet before starting the activity.

In this activity, you need to conduct a meeting with your manager to obtain information about the work that needs to be performed, legislation, standards and codes that need to be followed while performing the work.

You will act as a network planner who will provide information about the work details; that is, what task will be performed, what legislation is required while performing the task. You also need to provide information about the security arrangements and scope of the project.

Your classmates will act as a manager who provides information about the network strategies for the project. He/she will also provide information about why it is important to comply with legislation, standards and codes while performing the work.

In the meeting, you need to discuss the following:

Obtain detail information about work

Discuss network strategies

Highlight the scope of the project

Obtain site access

Discuss security arrangements

Highlight which legislation, standards and codes to follow

You need to complete the meeting in 7-10 minutes. Your trainer will observe your performance and complete the following performance checklist. You also need to complete the following meeting minutes template and write the information related to the meeting discussion.

You need to submit the completed meeting minutes document to your assessor.

Meeting minute template

Minutes of Meeting

The project is for the sequencing of the tasks with the certain outcome which is about the temporary with the dependency on the complexity with the management on the person or the hundreds. It is for the temporary characteristics with the initiation and the concept with the evidence on the project with the addressing of problem with the project that includes progressive elaboration. Hence, the continued investigation and the improving on the planning processes with the effective solutions for progress and the designing projects.

Meeting Objective:

Obtained detail information about work

The project is for the components for the project, with the handling the straightforward records with the tracing of the project thoughts. It is for the ways to obtain with the project brief on the scope with the handling of the company profile and the description of the project. Hence, the approach is for the specific, measurable, achievable, realistic, and timely.

Discussed network strategies

The network strategies are for the handling of the foremost critical part for the organizing on the project. It is for the handling on the strategic distance for the last-minute costs. The anticipation is for the characterising on the scope for the project with the layout for the ventures with the errands, and the budgets. The project scope is for the arrangement of the scope for the layout of the deliverables, highlights, errands, and the targets.

Highlighted scope of the project

The scope is for the internal and the external deliverable with the team or the client, with the out of scope. The approach is for the key elements for the design briefs with the overview for the client commerce. It is for the venture overviewing on the objectives and the goals with the desire and then handling the trust to achieve.

Obtained site access

The site access is for the handling the target audience with the clients involved with the collaboration of the item. The project scope is for the arrangement is for the decision and the reports for the lists for the venture objectives, with the terms of references.

Discussed security arrangements

The security factors are for the compliance with the network privacy with the giving of the user more freedom for using the devices. It is for the data for moving the network with the given time. The traffic measurements are for the analysing and the recording, and the networking with the handling of monitoring and measurements. The active measurement systems dealing with the packet delay, loss and the re-ordering or the availability.

Highlighted which legislation, standards, and codes to follow

The extended factors are for the enactment, disobedient with the comes on the Broadcast communication. It is for the Customer protection and the Benefits standards Act 1999 with the giving of the widespread for the benefit commitment that involves the Australian Competition and Consumer Commission ACCC with the distribution on the non-discrimination obligations.

Completed the given meeting minutes template

The limited bandwidth is for the curbing on the use of the non-essential applications with handling the hogging bandwidth, with the prioritizing on the critical traffic as well.

The sustained network is for the network availability with the users who are not affected and then meet the service level agreements as well. Not only this, but there is also a need to retain the bandwidth for the voice and the transmission of the view with proper quality.

Completed the meeting in the given timeframe

The limited factors are related to the curing use of the non-essential applications with the hogging bandwidth and then prioritize on the mission traffic. There is a need to sustain on the normalized network availability with the bottlenecks where the users are not mainly affected and then they tend to meet the different service level agreements. The retaining enough bandwidth is for the voice and the transmission of the video for the better experience quality.

Use active listening to understand the manager’s point of view

From manager point of view, there are NetFlow Analyzer that tends to make use of the QoS that will be based on the creation of the class-based criteria and the reconfiguring of the policies that will help in ensuring the business-critical applications. QoS applications and the management are for the traffic shaping which is also not the one-time process and then needs to be monitored or adjusted with the assurance for the consistent network performance.

Allow other people to discuss the issue

The issues need to be discussed based on the service outages and then there are users focusing on the inability to request for the new service with continuing for the use of the existing services as well. The network outage is for the handling of the acts of nature like the floods with the planned and the unplanned outages that involves the unforeseen failures for the network elements with the handling of the internal to the router hardware and the software components like the crash from the control plane software.

Attendees:

Registered training organisations (RTOs) are those training providers registered by ASQA (or, in some cases, a state regulator

Venue:

Geraldton, Western Australia with satellite offices in Broome, Derby and Perth.

Date: 20/05/2021

No

Points Discussed

Actions Suggested

Target Date

1

Online gaming action

ISP for speed test

09/05/2021

2

Videoconferencing

Network and service outages

10/05/2021

3

Network Management System

Working on network operations and provisioning, or security

20/05/2021

Performance criteria checklist for unit assessment task:

Trainer/ Assessor to complete

Does the candidate meet the following criteria

Yes

No

Trainer/Assessor Comments

Conduct a meeting:

Obtained detail information about work

Discussed network strategies

Highlighted scope of the project

Obtained site access

Discussed security arrangements

Highlighted which legislation, standards and codes to follow

Completed the given meeting minutes template

Completed the meeting in the given timeframe

Use active listening to understand the manager’s point of view

Allow other people to discuss the issues

Activity 2: Evaluation of network traffic problems and capacity

This activity is in continuation with the previous activity.

You need to perform this activity in the computer lab. Your trainer will provide all the equipment required for performing this activity.

In this activity, you need to prepare a report in which you will provide brief information about the network of Career training and what is the status of the traffic on the network. The report needs to include information about the testing that is done on the network.

You need to perform the following tasks to complete the report:

Security of the network

Network availability

Planned and unplanned outages of network

Restoration time

Monitor network traffic

Identify the network problems

Identify customer complaints about network

Identify threshold, loading and grading level of network

Measure traffic on the network

Controls to regulate traffic

Once you have performed the tasks, you need to prepare a report in which you just need to put the tools, software and website which you used to test the network and get the information about the network traffic.

Your trainer will provide you with the template of the report, and the trainer will also complete a performance checklist at the end of the activity. You need to submit the completed template to the trainer.

Template: Network traffic problems and Network capacity evaluation

Tools used to check the security of the network

NPM

PING which is for the measuring of the loss of packet and the packet delays and the traceroutes

Alert times.

Ways to check network availability

Checking of planned and unplanned network outages

Unplanned network is for the unforeseen failure for the elements of network

Failure includes the faults which are found to be internal for the components of hardware and software like the control plane software crash

Planned network for network element with router that is taken out of service for upgrade of software.

Tools to monitor network traffic

SolarWinds BAP

Datadog Network Performance Monitoring

ManageEngine OpManager

Network problems

Poor network design

Over-utilization of the devices

Fault devices

Security attack

Customer complaints

Handling the stronger markets than the others.

Consolidating the others with the feedback results

Problem with the internet speed.

Tools used to measure network traffic

TCP

UDP

Traceroute, pathchar and netperf

Performance criteria checklist for unit assessment task:

Trainer/ Assessor to complete

Does the candidate meet the following criteria

Yes

No

Trainer/Assessor Comments

Network evaluation:

Performed the task effectively

Researched the security of the network

Checked network availability

Obtained information about planned and unplanned outages of the network

Listed restoration time

Monitored network traffic

Identified threshold, loading and grading level of network

Identified the network problems

Identified customer complaints about network

Measured traffic on the network

Used controls properly to regulate traffic

Activity 3: Strategies to overcome network traffic problems

This activity is continuing from the previous activity.

In this activity, you need to develop strategies to deal with network traffic problems. For this activity, you need to develop a report, which should include information about the strategies that will be used to overcome the network traffic problems.

To develop the strategies, you need to gather the following information:

Historical data about network traffic

Network traffic volume requirements

Strategies to control traffic

Strategies to prevent network congestion

Strategies to recover network from network congestion

Your trainer will provide you with the template of the report. You need to research over the internet and take the help of a case study to complete the template. Once the template is completed, you need to submit it to your trainer.

Template: Strategies to overcome network traffic problems

Historical data about network traffic

Causes for network congestion

Over-subscription

Poor network design/misconfiguration

Over-utilised devices

Faulty devices

Security attack

Network traffic volume requirements

Wireless security with the sensitivity for the test related to the data and then the encryption which is needed

Local Caching software which is optional tool for reduced networking

Bandwidth for the measuring of the network capacity

Strategies to control traffic and network congestion

Controlling network traffic

Working on NetFlow Analyzer

Handling the single flow and the activity in the network

Monitoring the bandwidth and the traffic network.

Dealing with traffic congestion and recovering network

Complete visibility

Improved quality of service

Proactive discovery of security threats

Predicting and preventing bandwidth bottlenecks

Network traffic flow

Activity 4: Discussion about network strategies and contingency plan

This activity is continuing from the previous activity.

In this activity, you need to conduct a meeting with your manager to discuss the strategies developed in the previous activity and changes that need to be made in the strategies.

You will act as a network developer, and one of your classmates will act as your manager.

In the meeting you need to discuss the following points:

Discuss information collected in activity 2

Highlight issues related to the strategies

Discuss the budgeting of the project

Discuss contingency plan that can be developed to overcome the issues

Your manager will highlight and will provide suggestions for the strategies and contingency plan.

You need to complete the meeting in 7-10 minutes. Your trainer will observe your performance and complete the following performance checklist. You also need to complete the following meeting minutes template and write the information related to the meeting discussion.

You need to submit the completed meeting minutes document to your assessor.

Meeting minute template

Minutes of Meeting

The minute of the meeting includes the contingency plan with the overcoming of the issues with Career Training is acknowledged for the industry training leader with the recognition on the specialized courses. It is for the RTO that is for the delivery that comes with the recognized courses and the accredited Australian Qualification Framework with the VET qualifications. It is applicable for the Australian state and the territory funding for the vocational education and training. The career training is for the network system with the RTO that’s for the use of internet services.

Meeting Objective:

Discuss information collected in activity 2

The evolution of the network traffic problems and capacity with the IT contingency plan with the development for the policy statement. It tends to for providing on the authority and then guiding the necessary development for the effective plans for contingency. It is for the conduct on the business impact analysis with the prioritizing on information systems and components with the critical for the support on the mission and the business functions. The development of the information system includes the contingency plan with the detailed guidance for the restoring of the factors with the contingency plan with the detailed guidance and procedures.

Highlight issues related to the strategies

The issues are about the network traffic analysis with the solution with the key features with the broad visibility or the entity tracking. It is for the comprehensive baseline with the every-changing modernized IT environment. The consequential promise is for the network traffic analysis with the emergence for the NTA products which comes with security professionals with no longer focusing on the multiple sources of data with the DHCP and DNS logs, and the management of configuration on the databases.

Discuss the budgeting of the project

The budgeting is based on the monitoring the traffic with the use of the router with the going to find the IP address with the running of ipconfig. The key network traffic is for the analysis features with the broader visibility that comes with the traditional TCP/Ip which comes for the style packets with the virtual network traffic and then handling the encrypted traffic analysis. It is for the entity tracking with offering the tracking and the profile for the entities for the network. This comes with devices, users, applications and the destination with the machine learning or the analytics with attribution for behaviour and relationship.

Discuss contingency plan that can be developed to overcome the issues

The choice is for the potential threats with the critical operations that comes with the harm on the critical operations. The loss of the key staff with the technical failure with the change on the government policies. The identification is for the risks is for the natural disasters with the product issues, supplier, and the PR issues with the legal issues as well. The prioritizing factors is for the events with the occurrence on the consistency for the impact of the organization.

Attendees:

Career Training is for the RTO based on Geraldton, Western Australia with satellite office in Broome, Derby and Perth.

Venue:

office in Broome, Derby and Perth.

Date: 09/05/2021

No

Points Discussed

Actions Suggested

Target Date

1

Slow speed of internet

Handling access control

09/05/2020

2

Handling congestion traffic

Working on the anti-malware systems

10/05/2020

3

Network Availability

Focusing on the larger devices which is connected.

11/05/2020

Performance criteria checklist for unit assessment task:

Trainer/ Assessor to complete

Does the candidate meet the following criteria

Yes

No

Trainer/Assessor Comments

Conduct a meeting:

Discussed information collected in activity 2

Highlighted issues related to the strategies

Discussed the budgeting of the project

Discussed contingency plan that can be developed to overcome the issues

Completed the given meeting minutes template

Completed the meeting in the given timeframe

Use active listening to understand the manager’s point of view

Allow other people to discuss the issues

Activity 5: Contingency plan

This activity is continuing from the previous activity. You need to develop a contingency plan for dealing with the network problem, which will occur during the changes that will be made in the network.

For completing this activity successfully, you need to prepare a contingency plan, which needs to include ways to deal with the network problems. Your trainer will provide you with the template for the contingency plan.

You need to research the internet and understand the criteria and gather information from previous activities to complete the task. Once the template is complete, you need to submit it to the trainer for assessment.

Template: Contingency plan template

What will be the issue

Probability

Contingency plan

Malware attack on the system

Browsing experience for the night than the during the day.

The repeated problems are for the subnet network performance with the hostile activity.

Unauthorised people are accessing the network due to which network traffic is increasing

The results are medium.

The approach is for the uncovering of the individual for the risks with not controlling and the fatalities of probability.

The bandwidth of the signal is low, which results in traffic

High with the network congestion is poor design or device misconfiguration.

The bandwidth is for the ensured planning maintenance with the system enhancement and organizational changes.

Activity 6: Implementation of the strategies and contingency plan

This activity is in continuation with the previous activity.

After completing the previous activities, you came up with the strategies with the help of which network traffic can be controlled. In this activity, you need to implement those strategies and contingency plan on the network to deal with traffic congestion problems.

For completing this activity, you need to implement the following things in the network:

Implement software changes

The adoption is for the communication and the tools of collaboration where the methodology is for the placing on the managing of change. It is for the software implementation with the methodology that provides the steps with the necessary factors to ensure about the sustained adoption for the user with the implemented systems. The ADKAR change model is for the personalizing n the messaging and communication for the teams. The goals are for the communication with the teams adopting to the new software with the large organization.

Implement strategies to control traffic congestion

The continuous improvement is for the running on the new software with the full speed that tends to continue the better working on the software each day. It is for the long-term implementation with the start by the prioritizing on the capabilities with handling the mastering needs. It will help on influencing the training and providing benchmarks with the benchmarks with the regular check ins. The training is for the continuous improvement with the right kind of training that is found to be better than the poor training.

Develop solutions for temporary problems

The best practices with the installation of continuous improvement with the actual adoption with the temporary solution. The workshop style is for the informal setup with the conducive to collaborative learning with the brainstorming sessions with the user share success stories and then working on the solving of issues. It is for encouraging of the users to work on the reference guides with the offering by the vendors.

Allow reversal action if the implementation doesn’t work

The communicating and notification are for the implementation with the primary location of business which is affected through the fire and flood. It is for the shift of the operations with the good communication plan with the arise of the new locations and the good communication plan. It is for the previously agreed mode for the telephone and the email and SMS. The contact details with the contingency planning on the execution of project.

Implement contingency plan

The implementation contingency plan is for the performance for the different tasks. The project follows the good knowledge for the sharing practices, with the good documentation. It will tend to facilitate the induction with the new support staff for the assistance. The important is for the communication to the client for the regular person with not affecting the delivery schedule of project. The implementation on the contingency with the need to handle the client communication. It is for the mitigation on the risks that is under control.

Your trainer will observe you while you are performing the activity. At the end of the activity, the trainer needs to complete a performance checklist.

Performance criteria checklist for unit assessment task:

Trainer/ Assessor to complete

Does the candidate meet the following criteria

Yes

No

Trainer/Assessor Comments

Implementation of strategies and contingency plan:

Performed activity effectively

Covered all the requirements

Implemented software changes

Implemented strategies to control traffic congestion

Developed solutions for temporary problems

Allowed reversal action if the implementation doesn’t work

Implemented contingency plan

Activity 7: Analysis of network traffic

This activity is in continuation with the previous activity.

In this activity, you need to analyse and test the network again after the implementation of strategies and a contingency plan.

Again, you need to perform this activity in the computer lab. Your trainer will provide all the equipment required for performing this activity.

In this activity, you need to test the network after the implementation of strategies to monitor the traffic and identify problems associated with the network. Your trainer will observe you while performing this activity.

You need to perform the following tasks to complete the activity:

Monitor changes made in the network

Measure the outcome of changes

Test security of the network

Analyse flow of traffic

Check for traffic congestion

Make recommendations

Control traffic flow to prevent processor overload

Once you have performed the tasks, you need to prepare a report in which you just need to put the tools, software and website which you used to test the network and get the information about the network traffic.

Your trainer will provide you with the template of the report, and the trainer will also complete a performance checklist at the end of the activity. You need to submit the completed template to the trainer.

Template: Network traffic problems and Network capacity evaluation

Tools used to check the security of the network

NPM

PING which is for the measuring of the loss of packet and the packet delays and the traceroutes

Alert times.

Ways to check network availability

Checking of planned and unplanned network outages

Unplanned network is for the unforeseen failure for the elements of network

Failure includes the faults which are found to be internal for the components of hardware and software like the control plane software crash

Planned network for network element with router that is taken out of service for upgrade of software.

Tools to monitor network traffic

SolarWinds BAP

Datadog Network Performance Monitoring

ManageEngine OpManager

Network problems

Poor network design

Over-utilization of the devices

Fault devices

Security attack

Customer complaints

Handling the stronger markets than the others.

Consolidating the others with the feedback results

Problem with the internet speed.

Performance criteria checklist for unit assessment task:

Trainer/ Assessor to complete

Does the candidate meet the following criteria

Yes

No

Trainer/Assessor Comments

Network evaluation:

Monitored changes

Measured the outcome of changes

Performed the task effectively

Used tools inappropriate manner

Tested security of the network

Analysed flow of traffic

Checked for traffic congestion

Made recommendations

Used congestion control strategies to control congestion

Activity 8: Contingency plan

This activity is continuing from the previous activity. You need to develop a contingency plan for controlling the flow of traffic.

The contingency plan needs to address the ways to deal with the traffic flow problems, and your trainer will provide you with the template.

You need to research the internet and understand the criteria and gather information from previous activities to complete the task. Once the template is complete, you need to submit it to the trainer for assessment.

Template: Contingency plan template

What will be the issue

Probability

Contingency plan

Unauthorised people are still accessing the network due to which network traffic is increasing

High

If a key team member is rendered out

of action, there should be another team member capable of stepping in to perform important tasks.

If the project follows good knowledge sharing practices and has good documentation,

Traffic congestion at peak time

Low

it will facilitate

induction of new support staff (developers / testers) for assistance. It is important to communicate

to the client that the absence of the regular person will not affect the project delivery schedule.

Activity 9: Future traffic problems

This activity is in continuation with the previous activity.

After completing the contingency plan, you need to prepare a report in which you need to outline the traffic problems that can occur in future.

In the report, you need to provide the following information:

Introduction

Future traffic problems

Recommendation

Conclusion

You need to complete this report by researching over the internet and performing the activity, and understanding the behaviour of network traffic.

Your trainer will provide you with the template of the report, and you need to complete that template by doing the research. Once the template is completed, you need to submit it to the trainer for assessment.

Template: Report on future traffic problems

Introduction

The service monitors the network with the installation of the agent programs with the monitoring of network. Hence, there are single site LANs and the multi-site WANs which is for the cloud resources. Most of the network monitors are the Datadof services with the reliability on the SNMP servers for the live statistics. It tends to enable the monitoring to seek for the devices and then get into the services.

Future traffic problems

The percentage change is for the traffic that is detected over the time.

Greater capacity of the planning tool with the handling of the inefficient cabling and the overloading of the links and calibrated load balancers

Problem with the production of the overloaded servers.

The remapping on the Vs with the ensuring of the constant capacity availability with spotting the changes as needed and then moved or removed from network.

Recommendations

The tracking is for the system logs with the network and interpreting the records for analysis

The approach is for the exploring of methods with the accommodation them with the managing on the network utilization.

There is a need to work on the monitoring of the site LANs with the multi-site WANs.

Conclusion

it will facilitate induction of new support staff (developers / testers) for assistance. It is important to communicate to the client that the absence of the regular person will not affect the project delivery schedule.

Activity 10: Discussion of traffic problems and recommendations

This activity is in continuation with the previous activity.

In this activity, you need to conduct a meeting with your manager about potential traffic problems, which can arise in future.

You will act as a network developer, and one of your classmates will act as your manager.

In the meeting you need to discuss the following points:

Discuss traffic problems that can occur in future

Highlight the potential traffic problems

Discuss ways to deal with these problems

Provide recommendations

List the recommendations

Your manager will identify future traffic problems and will also help to provide recommendations.

You need to complete the meeting in 7-10 minutes. Your trainer will observe your performance and complete the following performance checklist. You also need to complete the following meeting minutes template and write the information related to the meeting discussion.

You need to submit the completed meeting minutes document to your assessor.

Meeting minute template

Minutes of Meeting

The minute of meeting is for the network traffic problems and then making the recommendations for the network planners. It is for the network teams with the upgrading on the network capacity with the speed for the enterprise demands. The team is for the upgrade of the switches on the servers, routers with optimised hardware layout.

Meeting Objective:

Discuss traffic problems that can occur in future

The potential network traffic with the outdated or the non-compatible hardware with upgrading on the network capacity and the speed with the matching on the demands. The approach is for the team on upgrading on the switches, servers, and the routers.

There are too many devices with capacity for the putting on limits for the bandwidth and the traffic.

Bandwidth hogs with the purpose, consuming on the data with the other devices. The difference with the average data usage with the hog’s usage with the minor or significant approach.

Highlight the potential traffic problems

The potential traffic problems are for the fault with the network designing. The network layouts with the need for the optimization on the network connection. It is for the maximised performance and then handling the coverage areas.

Discuss ways to deal with these problems

The devices with the specific level of capacity with the limitations on the bandwidth with the handling on the performance. It is for the connection to the network for the network. The overloading is for the requests with the data. The NPM with the information on more device than the network with the dealing factors.

List the recommendations

Ways to reduce network congestion

Monitor Your Network Traffic.

Network Segmentation.

Use a Content Delivery Network.

Reconfigure TCP/IP Settings.

Backpressure Routing.

Choke Packet.

Implicit Congestion Notification.

Explicit Congestion Notification.

Attendees:

Career Training is for the RTO based on Geraldton, Western Australia with satellite office in Broome, Derby and Perth.

Venue:

office in Broome, Derby and Perth.

Date: 09/05/2021

No

Points Discussed

Actions Suggested

Target Date

1

Slow speed of internet

Handling access control

09/05/2020

2

Handling congestion traffic

Working on the anti-malware systems

10/05/2020

3

Network Availability

Focusing on the larger devices which is connected.

11/05/2020

Performance criteria checklist for unit assessment task:

Trainer/ Assessor to complete

Does the candidate meet the following criteria

Yes

No

Trainer/Assessor Comments

Conduct a meeting:

Discussed traffic problems that can occur in future

Highlighted the potential traffic problems

Discussed ways to deal with these problems

Provided recommendations

Listed recommendations

Completed the given meeting minutes template

Completed the meeting in the given timeframe

Use active listening to understand the manager’s point of view

Allow other people to discuss the issues

Activity 11: Delivery of updated reports

This activity is in continuation with the previous activity.

After the completion of the activity 9, you need to update the reports according to the recommendations made in the meeting and write an email to the Manage (Trainer) to update him that the reports are being updated and has been attached in the email. In the email, you need to attach all the relevant documents required for managing network traffic.

A VPN, or Virtual Private Network, is a service that protects your data and provides you with more privacy when you’re online by routing your internet connection through a server. A VPN can protect you from hackers, or even online ads, and is a secure option, particularly if you’re often using public wi-fi.

Some internet service providers (ISP) use broadband traffic management to moderate upload bandwidth if this is the case for your ISP, you can use a VPN, which will prevent your ISP from recognising how large your files are, enabling you to send them.

Every so often, your network team will have to upgrade network capacity and speeds to match your enterprise’s demands. If your team does not upgrade its hardware along with it, you could be opening the door to bottlenecks. Whenever possible, your team should upgrade your switches, servers, routers, etc. to have the most optimal hardware layout. This also extends to wire and cable connections between devices. Ethernet cables, for example, have different categories that determine their maximum data speed. If your Ethernet cables are not able to handle the data speeds your network requires, they can slow down your network tremendously.

Activity 12: Regular network traffic management

Additional scenario

It has 6 months now that Career training has monitored the traffic on the network. The staff, students and services on internet services has increased. The speed of the internet is dropping, and the contingency plan is not working either. You need to repeat all the activities one till 11 and come measure the traffic on the network, and develop the contingency plan.

Task 2 – practical activity Checklist

Practical Activity Checklist

For this assessment, the learner must complete the practical activity.

The practical activity is a stand-alone activity that will allow the learner to display the knowledge and performance evidence that is essential when deciding overall competency.

Learner Name:

Assessor Name:

Has the learner satisfactorily completed the practical activity?

Yes

No

Did the Learner provide evidence of their ability to:

Activity 1: Obtaining work details

Activity 2: Evaluation of network traffic problems and capacity

Activity 3: Strategies to overcome network traffic problems

Activity 4: Discussion about network strategies and contingency plan

Activity 5: Contingency plan

Activity 6: Implementation of the strategies and contingency plan

Activity 7: Analysis of network traffic

Activity 8: Contingency plan

Activity 9: Future traffic problems

Activity 10: Discussion of traffic problems and recommendations

Activity 11: Delivery of updated reports

Activity 12: Regular network traffic management

Feedback to Learner:

Result Satisfactory Not Yet Satisfactory

Assessor’s Signature:

Date:

Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , ,