Assessment Cover Sheet |
||||||
Learner’s name: |
||||||
Assessors Name: |
Date Submitted: |
|||||
The following questions are to be completed by the assessor: |
||||||
Is the Learner ready for assessment? |
Yes |
No |
||||
Has the assessment process been explained? |
Yes |
No |
||||
Does the Learner understand which evidence is to be collected and how? |
Yes |
No |
||||
Have the Learner’s rights and the appeal system been fully explained? |
Yes |
No |
||||
Have you discussed any special needs to be considered during assessment? |
Yes |
No |
||||
The following documents must be completed and attached: |
||||||
Knowledge Test Questions, Written Activity and Checklist The learner will complete the written activity provided to them by the assessor. The Written Activity Checklist will be completed by the assessor. |
S |
NYS |
||||
Practical Activity Checklist The learner will demonstrate a range of skills and the assessor will observe where appropriate to the unit. The Practical Activity Checklist will be completed by the assessor. |
S |
NYS |
||||
Learner Declaration |
||||||
I agree to undertake assessment in the knowledge that information gathered will only be used for professional development purposes and can only be accessed by the RTO |
||||||
I declare that: The material I have submitted is my own work I have kept a copy of all relevant notes and reference material that I used in the production of my work I have given references for all sources of information that are not my own, including the words, ideas, and images of others |
||||||
Learner Signature: |
Date: |
|||||
Result and Feedback |
||||||
Feedback to Learner:
|
||||||
Overall Outcome Competent Not yet Competent |
||||||
Assessor Signature: |
Date: |
Task 1 – Knowledge test questions and written activity
Your task is to write the answers to each of the following questions.
Question 1: Explain what you understand by the term customer service policies and service level agreement. Answer within 100 – 150 words.Special Needs Assistance
The customer service level agreement is for the service provider with the external customers. It is called the external service agreement.
For the customer-based SLA, the customer and the service provider tend to come with the agreement which is based on the negotiated terms for the services which tends to be provided. The customer service level agreement includes the different exact details which are for the services which are by the customers. Hence, the provisions are for the service availability and the standards for the handling of escalation of the procedures with the related terms of the cancellation. The internal SLA is for the organization and the internal customers which is for the different department and the sites.
Question 2: Explain any two network management principles. Answer within 50 – 100 words.
Configuration Management: This is for the handling of the inventory management with the different network topology services. It is for the designing, implementation and then processing the tickets. With this, there is a proper change of management and the directory services.
Fault Management: This is for the alarm message for the distributed applicable personnel with the error condition detection and the troubleshooting phase. This is for the technician for the problem info, parts required and also the location with the full extent of the correction phase.
Question 3. Answer the following:
How does network traffic blocking works? Answer within 50 -100 words.
IP based blocking tends to place the major network barriers with the firewalls. Hence, the block is for the traffic with the setting of the IP addresses. The protocol based blocking tends to make use of the other lower level for the identifiers of network with the TCP/IP port number for the identifying on the applications for the server and also the types of the application protocol.
How does network congestion occur, and what are its effects? Answer within30 – 50 words.
The network congestion is when there is a need working in the data and the querying theory which comes with the reduction of the service quality with the network node or the link for carrying the data. The effects are the factor with the packet loss and the blockage for the new connections as well.
C.) What is the role of dimensioning in networking? Answer within 50 – 100 words.
This is for the involvement of the network topology with the plan of the routing, and the matrix of the traffic with the GoS requirements. It is for the use of the information for the determining of the maximised call handling with the switches for the handling of capacity with the maximised number of the channels that is needed in between the switches.
Question 4: Explain the term traffic engineering used in networking. Answer within 50 – 80 words.
This is for the optimized performance for the network telecommunication through the dynamic analysis, prediction and the regulation of the data behaviour which is being transited over the network. This is also for the tele-traffic engineering and the management of traffic as well.
Question 5: Provide brief information about traffic patterns used in networking. Answer within 100 – 150 words.
This is for the traffic in between the networks and then understanding about the internal network for the whole and the part for the internal or the company network. This is mainly from the NetFlow of the data which is being exported and then collected too. There is a need to focus on the people moving through the different spaces which comes with the living it in and then passing through. Not only this, but there is also entry door for the space and then continuing for the secondary door with the other room.
Question 6: Answer the following:
Explain the different types of transmission, which is done in networking. Answer within 80 – 120 words.
The data transmission is for the direction for the flow of the information on the deciding on the data direction. The direction for exchange for the information with the characterized with the synchronous and the asynchronous. The simple is for the data transmission mode with the flow only for the one direction with the communication with the unidirectional. The transmission mode has not been popular with not performing on the two-way communication with the sender and the receiver for the mode.
B.) Provide brief information signal and types of signals encountered in networking. Answer within 80 – 120 words.
The signals are for the electromagnetic and the light wave with the represent on the transferring of the data with the one device to the other. It is for the through the communication pattern. The communication signals with the sending on the data from one location to the other. The two types are for the digital signal with the results with the analogy signals with the values with the time instants. The digital signals are quantized with the analogy signals are continuous.
Question 7: Answer the following:
Explain any two network topologies. Answer within 80 – 120 words.
The network topologies are for:
The physical topologies are for the way on the computers and the nodes with the connected with each other in the computer network. The arrangement for the various elements for the link and nodes etc, with the device location with the handling on the computer installation network.
Logical Topology: The approach is based on the data flow with from one computer to another. The network protocol and then defined with the devices communicating on the internal factors.
Explain any two switching techniques. Answer within 50 -100 words.
The circuit switching is for the path setup with the only delay with the data transmission speed, with no problem with congestion and the garbled message. The disadvantages with the long setup time that is needed. The request is for the receiver with the acknowledgement before the transmissions.
The packet switching is for the major problems with the need for the dedicated approach for the line for transmission. The packet switching, data is broken into the small packets with each packet with source and the address of destination with the travel from one router to the next router.
Explain routing techniques. Answer within 50 – 100 words.
The routing is for the process with the handling of the performance through the layer 3 for the handling for the devices for delivering on the packet with the choosing on the optimized path. It is for one network to the other. Hence, the 3 types of the routing with the static routing with the process with the manually adding of the routes for the routing table.
D.) Explain transmission techniques. Answer within 80 – 120 words.
The methods are used for the transmit data between digital devices with the serial transmission and parallel transmission. The serial data transmission sending the data with the bits on the other over the single channel. It is for the parallel data transmission with the multiple data with the same time for the multiple channels.
Question 8: Answer the following:
What is a network management system? List the three types of services provided by the network management system. Answer within 30 – 50 words.
The network management is for the processes, tools and the applications with the use for the administer, operating and then maintaining the network infrastructure. It is for the performance management with the fault analysis that are for the inclusion on the network management.
The three types are for the network management are the address, security and traffic management.
B.) What are the steps with the help of which network traffic can be monitored?
The network traffic analyser tools with the analysing and monitoring of the traffic. It is for the NetFort LanGuardian, SolarWind Netflow Analyzer, WireShark, Paessler Packet Capture Tool, Microsoft Message Analyzer.
Question 9. Give any three examples of network traffic problems?
The examples are for the network traffic problems which are:
The outdated and the non-compatible hardware with the enterprise demands.
The bandwidth hogs
Handling the poor design of network and the subnets as well.
Question 10. In what ways you should communicate in the workplace to discuss changes?
The clear and the communicating change for the employees.
Use care for the organizational change.
Handling the setting of expectations with the change management communication.
Tell employees about what needs to be done.
Question 11. What are the different policies or techniques used by different congestion control techniques?
The policy of re-transmission with the packets that are based on the lost or corrupted with the packet needs for the transmission.
Window Policy is for the effect on the congestion, with the several packets with the go-back-n window. The selective repeat window with the sending for the specific packet which might have been lost.
Discarding policy and the acknowledgement policy with the time partially discarding on the corruption with the audio file transmission with the maintaining of the audio file quality.
Question 12. What is a contingency plan, and what steps need to be followed to develop a contingency plan? Answer within 40 – 80 words.
The business operations and prioritized with the basis on the impact and the probability with creation of action plan. The occurrence, review and then updating them frequently.
Questions 13: Complete the following table and write the function of the elements of networking:
Elements |
Functions (Write at least three) |
System monitoring alerts and alarm |
The monitoring of equipment for the sites for the central location The devices are for the network equipment with sending alarm with the factors on going wrong. The alarm types with monitoring on the infinite approach. |
Route and circuit availabilities |
Device and monitoring plans Collecting the incoming alarms Organizing on the incoming alarms |
System outages |
Partial failure of the hardware and the software components Power Maintenance Scheduled maintenance with the upgrades on the software and hardware. |
Network management systems |
Avoiding costly networking disruptions Improvements on the IT productivity Improvement on the network security |
Traffic patterns |
Busy and the heavy traffic with the higher bandwidth which is consumed. There is non-real-time traffic with the working hours. Interactive traffic with the competitive bandwidth with slow response for the prioritization with traffic. |
Semi-permanent controls |
The control plane software and hardware module. Line cards with for the switching fabric with the control processor cards. The no signal hardware fault results in the loss and the user degradation. |
Traffic engineering |
The support for the resource reservation for the IP network. The information provided for the IP/MPLS with the control plane components. IP forwarding state with the transferring on the IP packets for the incoming port of router. |
Workplace documentation related to network traffic |
The documentation for the project scope with the strategies with project needs. The expectation and the acceptance Identifying the constrains |
Questions 14: Complete the following table and write the features of the elements of networking:
Elements |
Features (Write at least three) |
System monitoring alerts and alarm |
The monitoring of equipment for the sites for the central location The devices are for the network equipment with sending alarm with the factors on going wrong. The alarm types with monitoring on the infinite approach. |
Route and circuit availabilities |
Device and monitoring plans Collecting the incoming alarms Organizing on the incoming alarms
|
System outages |
Partial failure of the hardware and the software components Power Maintenance Scheduled maintenance with the upgrades on the software and hardware. |
Network management systems |
Avoiding costly networking disruptions Improvements on the IT productivity Improvement on the network security |
Traffic patterns |
Busy and the heavy traffic with the higher bandwidth which is consumed. There is non-real-time traffic with the working hours. Interactive traffic with the competitive bandwidth with slow response for the prioritization with traffic. |
Semi-permanent controls |
The control plane software and hardware module. Line cards with for the switching fabric with the control processor cards. The no signal hardware fault results in the loss and the user degradation. |
Traffic engineering |
The support for the resource reservation for the IP network. The information provided for the IP/MPLS with the control plane components. IP forwarding state with the transferring on the IP packets for the incoming port of router. |
Workplace documentation related to network traffic |
The documentation for the project scope with the strategies with project needs. The expectation and the acceptance Identifying the constraints |
Question 15: Answer the following:
What is meant by a contingency plan? Answer must be between 40-80 words.
The contingency plan is for the component for the business continuity with the recovery for disaster and the management of risks. The contingency plan for the IT that are for the contingency planning policy statement, with the business impact analysis. It is for the predictive controls with the contingency strategies
What is the purpose of having a contingency plan? Answer must be between 30-60 words.
The contingency plans is for the formal policy with the that comes with the authority and the guidance with the necessary on the effective for the continency plan. The identification of the preventive controls with the reducing on the effects of system disruption with the system that comes with the development of information system on the damaged system unique. It is for the ensure on the planned testing, and exercises.
Write the steps, which need to be taken to develop a contingency plan for network traffic. Answer must be between 80-130 words.
Assessing the risks: It is for the identifying on the critical functions with the risks with prioritizing on the risks.
Creating the contingency is for the determining on the pre-condition, and then handling the needs for the stakeholder.
Maintaining the contingency plan with the new risks for the emergency with the existing risks for the new products for the market.
Question 16: Briefly explain the following legislation, codes, work practices, standards associated with the designing of the network:
WHS Act 2011
The endorsement with variety and the denial of codes with the important service. The Act is for the tracing on the coding of the hone with the utilized court proceedings. The endorsing coding with the beneath for the WHS Act with the handling for the respect for the code with the hazards or control and dependency for deciding with the circumstances for the code that relates too.
Telecommunications Regulations 2001
The telecommunication is for this for the notification, objection with the carriers who tend to work on the elective courses for the action. It is for the parties with the setting on the matters with the carrier and through the communication of broadcast. The regulations are for the non-discrimination commitment, and the authorised conduct, with the Broadcast Communication Act.
Safe work practices
The written methods are for the performance on the tasks with the minimized risks for the people, equipment, and material, environment, and processes. It is for the safe job procedures for the specific steps for guiding on the workers with the start to finish for the chronological order.
Question 17: Briefly explain the following network strategies:
Distributed network: The network system over with computer programming with the software and data with the working on more than one computer. The communication is for the complex messages on the nodes with the dependency on one other.
LAN: The interconnected computers with handling the users with the unrestricted movement with handling the coverage area. It is for the residences for the small business with the devices and the network segments with the data link layer and the physical layer with the topologies with including on ring, bus, mesh.
Answer must be between 80-130 words.
Task 1 – Knowledge test questions and Written Activity Checklist
Knowledge test questions and Written Activity Checklist |
|||
For this assessment, the learner must complete the Knowledge test questions and Written activity. The Knowledge test questions and Written activity is a stand-alone activity that will allow the learner to display the requirements of the performance criteria and knowledge evidence in this unit that are essential when deciding overall competency. |
|||
Learner Name: |
|||
Assessor Name: |
|||
Has the learner satisfactorily completed the written activity? |
|||
Yes |
No |
||
Did the Learner provide evidence of their ability to: |
|||
Question 1: Explain what do you understand by the term customer service policies and service level agreement. Answer within 100 – 150 words. |
|
|
|
Question 2: Explain any two network management principles. Answer within 50 – 100 words. |
|
|
|
Question 3. Answer the following: A.) How does network traffic blocking works? Answer within 50 -100 words. |
|
|
|
B.) How does network congestion occur, and what are its effects? Answer within30 – 50 words. |
|
|
|
C.) What is the role of dimensioning in networking? Answer within 50 – 100 words. |
|
|
|
Question 4: Explain the term traffic engineering used in networking. Answer within 50 – 80 words. |
|
|
|
Question 5: Provide brief information about traffic patterns used in networking. Answer within 100 – 150 words. |
|
|
|
Question 6: Answer the following: A.) Explain the different types of transmission, which is done in networking. Answer within 80 – 120 words. |
|
|
|
B.) Provide brief information signal and types of signals encountered in networking. Answer within 80 – 120 words. |
|
|
|
Question 7: Answer the following: A.) Explain any two network topologies. Answer within 80 – 120 words. |
|
|
|
B.) Explain any two switching techniques. Answer within 50 -100 words. |
|
|
|
C.) Explain routing techniques. Answer within 50 – 100 words. |
|
|
|
D.) Explain transmission techniques. Answer within 80 – 120 words. |
|
|
|
Question 8: Answer the following: A.) What is a network management system? List the three types of services provided by the network management system. Answer within 30 – 50 words. |
|
|
|
B.) What are the steps with the help of which network traffic can be monitored? |
|
|
|
Question 9. Give any three examples of network traffic problems? |
|
|
|
Question 10. In what ways you should communicate in the workplace to discuss changes? |
|
|
|
Question 11. What are the different policies or techniques used by different congestion control techniques? |
|
|
|
Question 12. What is the contingency plan, and what steps need to be followed to develop a contingency plan? Answer within 40 – 80 words. |
|
|
|
Questions 13: Complete the given table and write the function of the elements of networking |
|
|
|
Questions 14: Complete the given table and write the features of the elements of networking |
|
|
|
Question 15: Answer the following: A.) What is meant by a contingency plan? Answer must be between 40-80 words. |
|
|
|
B.) What is the purpose of having a contingency plan? Answer must be between 30-60 words. |
|
|
|
C.) Write the steps, which need to be taken to develop a contingency plan for network traffic. Answer must be between 80-130 words. |
|
|
|
Question 16: Briefly explain the following legislation, codes, work practices, standards associated with the designing of the network: WHS Act 2011 Telecommunications Regulations 2001 Safe work practices Answer must be between 150-200 words. |
|
|
|
Question 17: Briefly explain the following network strategies: Distributed network LAN Answer must be between 80-130 words. |
|
|
|
Feedback to Learner:
|
|||
Result Satisfactory Not Yet Satisfactory |
|||
Assessor’s Signature: |
Date: |
Task 2 – practical activity
The following task must be demonstrated in conditions that are safe and replicate the workplace. Noise levels, production flow, interruptions and time variances must be typical of those experienced in the website technologies field of work, and include access to:
Internet
Equipment and materials
MS office
Web browser software
Scenario:
Career Training is acknowledged as an industry training leader delivering nationally recognised and specialised courses. Career Training is a private registered training organisation (RTO) based in Geraldton, Western Australia with satellite offices in Broome, Derby and Perth.
Registered training organisations (RTOs) are those training providers registered by ASQA (or, in some cases, a state regulator) to deliver vocational education and training (VET) services.
RTOs are recognised as providers of quality-assured and nationally recognised training and qualifications.
Only RTOs can:
Deliver nationally recognised courses and accredited Australian Qualifications Framework (AQF) VET qualifications,
Apply for Australian, state and territory funding to deliver vocational education and training.
RTOs can offer qualifications at the following levels:
Certificates I, II, III and IV
Diploma
Advanced Diploma
Vocational Graduate Certificate
Vocational Graduate Diploma.
Career training has a dedicated network system, which is used by the RTO to use internet services. Career training has given access to staff and students for accessing internet services through a dedicated network.
Career training has around 40 staff members who are using the network regularly and around 150 students.
Career training is now facing difficulty in the network, as many staff and students have raised the issues related to the network. The issues raised are:
The slow speed of the Internet
Traffic congestion in peak time
Availability of network is not adequate
Career training is aware that the current network was installed three years ago when the staff members and students were less, so the network operated very smoothly. But now the staff and student number have increased due to which the issues are occurring. Career training knows the general causes of network congestion, which are:
Low bandwidth
Out-dated hardware
A large number of devices are connected
Career training has also encountered the internet speed, which is required to operate certain devices. The network traffic requirements for some of the devices, which are encountered by the network developer, are:
Low – 100 Kbps (kilobits per second) or less: E-fax machines, VoIP phones, laptops and computers for emailing and simple web surfing
Medium – 100-500 Kbps: More intensive web browsing, streaming, emailing, and downloading
High – 500Kbps – 2.0Mbps (megabits per second): Devices that use cloud-based platforms and software programs
Intensive – 2.0Mbps and higher: HD video conference devices and platforms
Career training also has some tools and websites to test the security, availability, monitor and measure the network.
Access control
Anti-malware system
Email security
SolarWinds
PRTC Network Monitor
ManageEngine
Network Bandwidth analyser pack
NetFlow Traffic analyser
ISP website to check network availability
You have been part of Career training for the past one year as a network planner. You have been assigned the task to overcome the network issues. You need to develop strategies to overcome the network issues, ways to control network congestion and give future issues that can arise in the network. You need to complete the following activities to resolve the issues related to the network.
Activity 1: Obtaining work details
You need to go through the scenario and research over the internet before starting the activity.
In this activity, you need to conduct a meeting with your manager to obtain information about the work that needs to be performed, legislation, standards and codes that need to be followed while performing the work.
You will act as a network planner who will provide information about the work details; that is, what task will be performed, what legislation is required while performing the task. You also need to provide information about the security arrangements and scope of the project.
Your classmates will act as a manager who provides information about the network strategies for the project. He/she will also provide information about why it is important to comply with legislation, standards and codes while performing the work.
In the meeting, you need to discuss the following:
Obtain detail information about work
Discuss network strategies
Highlight the scope of the project
Obtain site access
Discuss security arrangements
Highlight which legislation, standards and codes to follow
You need to complete the meeting in 7-10 minutes. Your trainer will observe your performance and complete the following performance checklist. You also need to complete the following meeting minutes template and write the information related to the meeting discussion.
You need to submit the completed meeting minutes document to your assessor.
Meeting minute template
Minutes of Meeting The project is for the sequencing of the tasks with the certain outcome which is about the temporary with the dependency on the complexity with the management on the person or the hundreds. It is for the temporary characteristics with the initiation and the concept with the evidence on the project with the addressing of problem with the project that includes progressive elaboration. Hence, the continued investigation and the improving on the planning processes with the effective solutions for progress and the designing projects. Meeting Objective: Obtained detail information about work The project is for the components for the project, with the handling the straightforward records with the tracing of the project thoughts. It is for the ways to obtain with the project brief on the scope with the handling of the company profile and the description of the project. Hence, the approach is for the specific, measurable, achievable, realistic, and timely. Discussed network strategies
The network strategies are for the handling of the foremost critical part for the organizing on the project. It is for the handling on the strategic distance for the last-minute costs. The anticipation is for the characterising on the scope for the project with the layout for the ventures with the errands, and the budgets. The project scope is for the arrangement of the scope for the layout of the deliverables, highlights, errands, and the targets.
Highlighted scope of the project
The scope is for the internal and the external deliverable with the team or the client, with the out of scope. The approach is for the key elements for the design briefs with the overview for the client commerce. It is for the venture overviewing on the objectives and the goals with the desire and then handling the trust to achieve.
Obtained site access
The site access is for the handling the target audience with the clients involved with the collaboration of the item. The project scope is for the arrangement is for the decision and the reports for the lists for the venture objectives, with the terms of references.
Discussed security arrangements
The security factors are for the compliance with the network privacy with the giving of the user more freedom for using the devices. It is for the data for moving the network with the given time. The traffic measurements are for the analysing and the recording, and the networking with the handling of monitoring and measurements. The active measurement systems dealing with the packet delay, loss and the re-ordering or the availability.
Highlighted which legislation, standards, and codes to follow
The extended factors are for the enactment, disobedient with the comes on the Broadcast communication. It is for the Customer protection and the Benefits standards Act 1999 with the giving of the widespread for the benefit commitment that involves the Australian Competition and Consumer Commission ACCC with the distribution on the non-discrimination obligations.
Completed the given meeting minutes template The limited bandwidth is for the curbing on the use of the non-essential applications with handling the hogging bandwidth, with the prioritizing on the critical traffic as well. The sustained network is for the network availability with the users who are not affected and then meet the service level agreements as well. Not only this, but there is also a need to retain the bandwidth for the voice and the transmission of the view with proper quality. Completed the meeting in the given timeframe
The limited factors are related to the curing use of the non-essential applications with the hogging bandwidth and then prioritize on the mission traffic. There is a need to sustain on the normalized network availability with the bottlenecks where the users are not mainly affected and then they tend to meet the different service level agreements. The retaining enough bandwidth is for the voice and the transmission of the video for the better experience quality. Use active listening to understand the manager’s point of view
From manager point of view, there are NetFlow Analyzer that tends to make use of the QoS that will be based on the creation of the class-based criteria and the reconfiguring of the policies that will help in ensuring the business-critical applications. QoS applications and the management are for the traffic shaping which is also not the one-time process and then needs to be monitored or adjusted with the assurance for the consistent network performance. Allow other people to discuss the issue The issues need to be discussed based on the service outages and then there are users focusing on the inability to request for the new service with continuing for the use of the existing services as well. The network outage is for the handling of the acts of nature like the floods with the planned and the unplanned outages that involves the unforeseen failures for the network elements with the handling of the internal to the router hardware and the software components like the crash from the control plane software. Attendees: Registered training organisations (RTOs) are those training providers registered by ASQA (or, in some cases, a state regulator Venue: Geraldton, Western Australia with satellite offices in Broome, Derby and Perth.
Date: 20/05/2021 |
|||
No |
Points Discussed |
Actions Suggested |
Target Date |
1 |
Online gaming action |
ISP for speed test |
09/05/2021 |
2 |
Videoconferencing |
Network and service outages |
10/05/2021 |
3 |
Network Management System |
Working on network operations and provisioning, or security |
20/05/2021 |
Performance criteria checklist for unit assessment task:
Trainer/ Assessor to complete |
|||
Does the candidate meet the following criteria |
Yes |
No |
Trainer/Assessor Comments |
Conduct a meeting: Obtained detail information about work Discussed network strategies Highlighted scope of the project Obtained site access Discussed security arrangements Highlighted which legislation, standards and codes to follow Completed the given meeting minutes template Completed the meeting in the given timeframe Use active listening to understand the manager’s point of view Allow other people to discuss the issues |
Activity 2: Evaluation of network traffic problems and capacity
This activity is in continuation with the previous activity.
You need to perform this activity in the computer lab. Your trainer will provide all the equipment required for performing this activity.
In this activity, you need to prepare a report in which you will provide brief information about the network of Career training and what is the status of the traffic on the network. The report needs to include information about the testing that is done on the network.
You need to perform the following tasks to complete the report:
Security of the network
Network availability
Planned and unplanned outages of network
Restoration time
Monitor network traffic
Identify the network problems
Identify customer complaints about network
Identify threshold, loading and grading level of network
Measure traffic on the network
Controls to regulate traffic
Once you have performed the tasks, you need to prepare a report in which you just need to put the tools, software and website which you used to test the network and get the information about the network traffic.
Your trainer will provide you with the template of the report, and the trainer will also complete a performance checklist at the end of the activity. You need to submit the completed template to the trainer.
Template: Network traffic problems and Network capacity evaluation
Tools used to check the security of the network NPM PING which is for the measuring of the loss of packet and the packet delays and the traceroutes Alert times. |
Ways to check network availability Checking of planned and unplanned network outages Unplanned network is for the unforeseen failure for the elements of network Failure includes the faults which are found to be internal for the components of hardware and software like the control plane software crash Planned network for network element with router that is taken out of service for upgrade of software. |
Tools to monitor network traffic
SolarWinds BAP Datadog Network Performance Monitoring ManageEngine OpManager |
Network problems Poor network design Over-utilization of the devices Fault devices Security attack |
Customer complaints Handling the stronger markets than the others. Consolidating the others with the feedback results Problem with the internet speed. |
Tools used to measure network traffic TCP UDP Traceroute, pathchar and netperf |
Performance criteria checklist for unit assessment task:
Trainer/ Assessor to complete |
|||
Does the candidate meet the following criteria |
Yes |
No |
Trainer/Assessor Comments |
Network evaluation: Performed the task effectively Researched the security of the network Checked network availability Obtained information about planned and unplanned outages of the network Listed restoration time Monitored network traffic Identified threshold, loading and grading level of network Identified the network problems Identified customer complaints about network Measured traffic on the network Used controls properly to regulate traffic |
Activity 3: Strategies to overcome network traffic problems
This activity is continuing from the previous activity.
In this activity, you need to develop strategies to deal with network traffic problems. For this activity, you need to develop a report, which should include information about the strategies that will be used to overcome the network traffic problems.
To develop the strategies, you need to gather the following information:
Historical data about network traffic
Network traffic volume requirements
Strategies to control traffic
Strategies to prevent network congestion
Strategies to recover network from network congestion
Your trainer will provide you with the template of the report. You need to research over the internet and take the help of a case study to complete the template. Once the template is completed, you need to submit it to your trainer.
Template: Strategies to overcome network traffic problems
Historical data about network traffic Causes for network congestion • Over-subscription • Poor network design/misconfiguration • Over-utilised devices • Faulty devices • Security attack |
Network traffic volume requirements Wireless security with the sensitivity for the test related to the data and then the encryption which is needed Local Caching software which is optional tool for reduced networking Bandwidth for the measuring of the network capacity |
Strategies to control traffic and network congestion Controlling network traffic Working on NetFlow Analyzer Handling the single flow and the activity in the network Monitoring the bandwidth and the traffic network. Dealing with traffic congestion and recovering network • Complete visibility • Improved quality of service • Proactive discovery of security threats • Predicting and preventing bandwidth bottlenecks • Network traffic flow |
Activity 4: Discussion about network strategies and contingency plan
This activity is continuing from the previous activity.
In this activity, you need to conduct a meeting with your manager to discuss the strategies developed in the previous activity and changes that need to be made in the strategies.
You will act as a network developer, and one of your classmates will act as your manager.
In the meeting you need to discuss the following points:
Discuss information collected in activity 2
Highlight issues related to the strategies
Discuss the budgeting of the project
Discuss contingency plan that can be developed to overcome the issues
Your manager will highlight and will provide suggestions for the strategies and contingency plan.
You need to complete the meeting in 7-10 minutes. Your trainer will observe your performance and complete the following performance checklist. You also need to complete the following meeting minutes template and write the information related to the meeting discussion.
You need to submit the completed meeting minutes document to your assessor.
Meeting minute template
Minutes of Meeting The minute of the meeting includes the contingency plan with the overcoming of the issues with Career Training is acknowledged for the industry training leader with the recognition on the specialized courses. It is for the RTO that is for the delivery that comes with the recognized courses and the accredited Australian Qualification Framework with the VET qualifications. It is applicable for the Australian state and the territory funding for the vocational education and training. The career training is for the network system with the RTO that’s for the use of internet services. Meeting Objective: Discuss information collected in activity 2
The evolution of the network traffic problems and capacity with the IT contingency plan with the development for the policy statement. It tends to for providing on the authority and then guiding the necessary development for the effective plans for contingency. It is for the conduct on the business impact analysis with the prioritizing on information systems and components with the critical for the support on the mission and the business functions. The development of the information system includes the contingency plan with the detailed guidance for the restoring of the factors with the contingency plan with the detailed guidance and procedures. Highlight issues related to the strategies The issues are about the network traffic analysis with the solution with the key features with the broad visibility or the entity tracking. It is for the comprehensive baseline with the every-changing modernized IT environment. The consequential promise is for the network traffic analysis with the emergence for the NTA products which comes with security professionals with no longer focusing on the multiple sources of data with the DHCP and DNS logs, and the management of configuration on the databases. Discuss the budgeting of the project
The budgeting is based on the monitoring the traffic with the use of the router with the going to find the IP address with the running of ipconfig. The key network traffic is for the analysis features with the broader visibility that comes with the traditional TCP/Ip which comes for the style packets with the virtual network traffic and then handling the encrypted traffic analysis. It is for the entity tracking with offering the tracking and the profile for the entities for the network. This comes with devices, users, applications and the destination with the machine learning or the analytics with attribution for behaviour and relationship. Discuss contingency plan that can be developed to overcome the issues The choice is for the potential threats with the critical operations that comes with the harm on the critical operations. The loss of the key staff with the technical failure with the change on the government policies. The identification is for the risks is for the natural disasters with the product issues, supplier, and the PR issues with the legal issues as well. The prioritizing factors is for the events with the occurrence on the consistency for the impact of the organization. Attendees: Career Training is for the RTO based on Geraldton, Western Australia with satellite office in Broome, Derby and Perth. Venue: office in Broome, Derby and Perth. Date: 09/05/2021 |
|||
No |
Points Discussed |
Actions Suggested |
Target Date |
1 |
Slow speed of internet |
Handling access control |
09/05/2020 |
2 |
Handling congestion traffic |
Working on the anti-malware systems |
10/05/2020 |
3 |
Network Availability |
Focusing on the larger devices which is connected. |
11/05/2020 |
Performance criteria checklist for unit assessment task:
Trainer/ Assessor to complete |
|||
Does the candidate meet the following criteria |
Yes |
No |
Trainer/Assessor Comments |
Conduct a meeting: Discussed information collected in activity 2 Highlighted issues related to the strategies Discussed the budgeting of the project Discussed contingency plan that can be developed to overcome the issues Completed the given meeting minutes template Completed the meeting in the given timeframe Use active listening to understand the manager’s point of view Allow other people to discuss the issues |
Activity 5: Contingency plan
This activity is continuing from the previous activity. You need to develop a contingency plan for dealing with the network problem, which will occur during the changes that will be made in the network.
For completing this activity successfully, you need to prepare a contingency plan, which needs to include ways to deal with the network problems. Your trainer will provide you with the template for the contingency plan.
You need to research the internet and understand the criteria and gather information from previous activities to complete the task. Once the template is complete, you need to submit it to the trainer for assessment.
Template: Contingency plan template
What will be the issue |
Probability |
Contingency plan |
Malware attack on the system |
Browsing experience for the night than the during the day. |
The repeated problems are for the subnet network performance with the hostile activity. |
Unauthorised people are accessing the network due to which network traffic is increasing |
The results are medium. |
The approach is for the uncovering of the individual for the risks with not controlling and the fatalities of probability. |
The bandwidth of the signal is low, which results in traffic |
High with the network congestion is poor design or device misconfiguration. |
The bandwidth is for the ensured planning maintenance with the system enhancement and organizational changes. |
Activity 6: Implementation of the strategies and contingency plan
This activity is in continuation with the previous activity.
After completing the previous activities, you came up with the strategies with the help of which network traffic can be controlled. In this activity, you need to implement those strategies and contingency plan on the network to deal with traffic congestion problems.
For completing this activity, you need to implement the following things in the network:
Implement software changes
The adoption is for the communication and the tools of collaboration where the methodology is for the placing on the managing of change. It is for the software implementation with the methodology that provides the steps with the necessary factors to ensure about the sustained adoption for the user with the implemented systems. The ADKAR change model is for the personalizing n the messaging and communication for the teams. The goals are for the communication with the teams adopting to the new software with the large organization.
Implement strategies to control traffic congestion
The continuous improvement is for the running on the new software with the full speed that tends to continue the better working on the software each day. It is for the long-term implementation with the start by the prioritizing on the capabilities with handling the mastering needs. It will help on influencing the training and providing benchmarks with the benchmarks with the regular check ins. The training is for the continuous improvement with the right kind of training that is found to be better than the poor training.
Develop solutions for temporary problems
The best practices with the installation of continuous improvement with the actual adoption with the temporary solution. The workshop style is for the informal setup with the conducive to collaborative learning with the brainstorming sessions with the user share success stories and then working on the solving of issues. It is for encouraging of the users to work on the reference guides with the offering by the vendors.
Allow reversal action if the implementation doesn’t work
The communicating and notification are for the implementation with the primary location of business which is affected through the fire and flood. It is for the shift of the operations with the good communication plan with the arise of the new locations and the good communication plan. It is for the previously agreed mode for the telephone and the email and SMS. The contact details with the contingency planning on the execution of project.
Implement contingency plan
The implementation contingency plan is for the performance for the different tasks. The project follows the good knowledge for the sharing practices, with the good documentation. It will tend to facilitate the induction with the new support staff for the assistance. The important is for the communication to the client for the regular person with not affecting the delivery schedule of project. The implementation on the contingency with the need to handle the client communication. It is for the mitigation on the risks that is under control.
Your trainer will observe you while you are performing the activity. At the end of the activity, the trainer needs to complete a performance checklist.
Performance criteria checklist for unit assessment task:
Trainer/ Assessor to complete |
|||
Does the candidate meet the following criteria |
Yes |
No |
Trainer/Assessor Comments |
Implementation of strategies and contingency plan: Performed activity effectively Covered all the requirements Implemented software changes Implemented strategies to control traffic congestion Developed solutions for temporary problems Allowed reversal action if the implementation doesn’t work Implemented contingency plan |
Activity 7: Analysis of network traffic
This activity is in continuation with the previous activity.
In this activity, you need to analyse and test the network again after the implementation of strategies and a contingency plan.
Again, you need to perform this activity in the computer lab. Your trainer will provide all the equipment required for performing this activity.
In this activity, you need to test the network after the implementation of strategies to monitor the traffic and identify problems associated with the network. Your trainer will observe you while performing this activity.
You need to perform the following tasks to complete the activity:
Monitor changes made in the network
Measure the outcome of changes
Test security of the network
Analyse flow of traffic
Check for traffic congestion
Make recommendations
Control traffic flow to prevent processor overload
Once you have performed the tasks, you need to prepare a report in which you just need to put the tools, software and website which you used to test the network and get the information about the network traffic.
Your trainer will provide you with the template of the report, and the trainer will also complete a performance checklist at the end of the activity. You need to submit the completed template to the trainer.
Template: Network traffic problems and Network capacity evaluation
Tools used to check the security of the network NPM PING which is for the measuring of the loss of packet and the packet delays and the traceroutes Alert times. |
Ways to check network availability Checking of planned and unplanned network outages Unplanned network is for the unforeseen failure for the elements of network Failure includes the faults which are found to be internal for the components of hardware and software like the control plane software crash Planned network for network element with router that is taken out of service for upgrade of software. |
Tools to monitor network traffic
SolarWinds BAP Datadog Network Performance Monitoring ManageEngine OpManager |
Network problems Poor network design Over-utilization of the devices Fault devices Security attack |
Customer complaints Handling the stronger markets than the others. Consolidating the others with the feedback results Problem with the internet speed. |
Performance criteria checklist for unit assessment task:
Trainer/ Assessor to complete |
|||
Does the candidate meet the following criteria |
Yes |
No |
Trainer/Assessor Comments |
Network evaluation: Monitored changes Measured the outcome of changes Performed the task effectively Used tools inappropriate manner Tested security of the network Analysed flow of traffic Checked for traffic congestion Made recommendations Used congestion control strategies to control congestion |
Activity 8: Contingency plan
This activity is continuing from the previous activity. You need to develop a contingency plan for controlling the flow of traffic.
The contingency plan needs to address the ways to deal with the traffic flow problems, and your trainer will provide you with the template.
You need to research the internet and understand the criteria and gather information from previous activities to complete the task. Once the template is complete, you need to submit it to the trainer for assessment.
Template: Contingency plan template
What will be the issue |
Probability |
Contingency plan |
Unauthorised people are still accessing the network due to which network traffic is increasing |
High |
If a key team member is rendered out of action, there should be another team member capable of stepping in to perform important tasks. If the project follows good knowledge sharing practices and has good documentation, |
Traffic congestion at peak time |
Low |
it will facilitate induction of new support staff (developers / testers) for assistance. It is important to communicate to the client that the absence of the regular person will not affect the project delivery schedule. |
Activity 9: Future traffic problems
This activity is in continuation with the previous activity.
After completing the contingency plan, you need to prepare a report in which you need to outline the traffic problems that can occur in future.
In the report, you need to provide the following information:
Introduction
Future traffic problems
Recommendation
Conclusion
You need to complete this report by researching over the internet and performing the activity, and understanding the behaviour of network traffic.
Your trainer will provide you with the template of the report, and you need to complete that template by doing the research. Once the template is completed, you need to submit it to the trainer for assessment.
Template: Report on future traffic problems
Introduction The service monitors the network with the installation of the agent programs with the monitoring of network. Hence, there are single site LANs and the multi-site WANs which is for the cloud resources. Most of the network monitors are the Datadof services with the reliability on the SNMP servers for the live statistics. It tends to enable the monitoring to seek for the devices and then get into the services.
|
Future traffic problems The percentage change is for the traffic that is detected over the time. Greater capacity of the planning tool with the handling of the inefficient cabling and the overloading of the links and calibrated load balancers Problem with the production of the overloaded servers. The remapping on the Vs with the ensuring of the constant capacity availability with spotting the changes as needed and then moved or removed from network. |
Recommendations The tracking is for the system logs with the network and interpreting the records for analysis The approach is for the exploring of methods with the accommodation them with the managing on the network utilization. There is a need to work on the monitoring of the site LANs with the multi-site WANs. |
Conclusion it will facilitate induction of new support staff (developers / testers) for assistance. It is important to communicate to the client that the absence of the regular person will not affect the project delivery schedule.
|
Activity 10: Discussion of traffic problems and recommendations
This activity is in continuation with the previous activity.
In this activity, you need to conduct a meeting with your manager about potential traffic problems, which can arise in future.
You will act as a network developer, and one of your classmates will act as your manager.
In the meeting you need to discuss the following points:
Discuss traffic problems that can occur in future
Highlight the potential traffic problems
Discuss ways to deal with these problems
Provide recommendations
List the recommendations
Your manager will identify future traffic problems and will also help to provide recommendations.
You need to complete the meeting in 7-10 minutes. Your trainer will observe your performance and complete the following performance checklist. You also need to complete the following meeting minutes template and write the information related to the meeting discussion.
You need to submit the completed meeting minutes document to your assessor.
Meeting minute template
Minutes of Meeting The minute of meeting is for the network traffic problems and then making the recommendations for the network planners. It is for the network teams with the upgrading on the network capacity with the speed for the enterprise demands. The team is for the upgrade of the switches on the servers, routers with optimised hardware layout. Meeting Objective: Discuss traffic problems that can occur in future The potential network traffic with the outdated or the non-compatible hardware with upgrading on the network capacity and the speed with the matching on the demands. The approach is for the team on upgrading on the switches, servers, and the routers. There are too many devices with capacity for the putting on limits for the bandwidth and the traffic. Bandwidth hogs with the purpose, consuming on the data with the other devices. The difference with the average data usage with the hog’s usage with the minor or significant approach. Highlight the potential traffic problems
The potential traffic problems are for the fault with the network designing. The network layouts with the need for the optimization on the network connection. It is for the maximised performance and then handling the coverage areas. Discuss ways to deal with these problems The devices with the specific level of capacity with the limitations on the bandwidth with the handling on the performance. It is for the connection to the network for the network. The overloading is for the requests with the data. The NPM with the information on more device than the network with the dealing factors. List the recommendations
Ways to reduce network congestion • Monitor Your Network Traffic. • Network Segmentation. • Use a Content Delivery Network. • Reconfigure TCP/IP Settings. • Backpressure Routing. • Choke Packet. • Implicit Congestion Notification. • Explicit Congestion Notification. Attendees: Career Training is for the RTO based on Geraldton, Western Australia with satellite office in Broome, Derby and Perth. Venue: office in Broome, Derby and Perth. Date: 09/05/2021 |
|||
No |
Points Discussed |
Actions Suggested |
Target Date |
1 |
Slow speed of internet |
Handling access control |
09/05/2020 |
2 |
Handling congestion traffic |
Working on the anti-malware systems |
10/05/2020 |
3 |
Network Availability |
Focusing on the larger devices which is connected. |
11/05/2020 |
Performance criteria checklist for unit assessment task:
Trainer/ Assessor to complete |
|||
Does the candidate meet the following criteria |
Yes |
No |
Trainer/Assessor Comments |
Conduct a meeting: Discussed traffic problems that can occur in future Highlighted the potential traffic problems Discussed ways to deal with these problems Provided recommendations Listed recommendations Completed the given meeting minutes template Completed the meeting in the given timeframe Use active listening to understand the manager’s point of view Allow other people to discuss the issues |
Activity 11: Delivery of updated reports
This activity is in continuation with the previous activity.
After the completion of the activity 9, you need to update the reports according to the recommendations made in the meeting and write an email to the Manage (Trainer) to update him that the reports are being updated and has been attached in the email. In the email, you need to attach all the relevant documents required for managing network traffic.
A VPN, or Virtual Private Network, is a service that protects your data and provides you with more privacy when you’re online by routing your internet connection through a server. A VPN can protect you from hackers, or even online ads, and is a secure option, particularly if you’re often using public wi-fi.
Some internet service providers (ISP) use broadband traffic management to moderate upload bandwidth if this is the case for your ISP, you can use a VPN, which will prevent your ISP from recognising how large your files are, enabling you to send them.
Every so often, your network team will have to upgrade network capacity and speeds to match your enterprise’s demands. If your team does not upgrade its hardware along with it, you could be opening the door to bottlenecks. Whenever possible, your team should upgrade your switches, servers, routers, etc. to have the most optimal hardware layout. This also extends to wire and cable connections between devices. Ethernet cables, for example, have different categories that determine their maximum data speed. If your Ethernet cables are not able to handle the data speeds your network requires, they can slow down your network tremendously.
Activity 12: Regular network traffic management
Additional scenario
It has 6 months now that Career training has monitored the traffic on the network. The staff, students and services on internet services has increased. The speed of the internet is dropping, and the contingency plan is not working either. You need to repeat all the activities one till 11 and come measure the traffic on the network, and develop the contingency plan.
Task 2 – practical activity Checklist
Practical Activity Checklist |
|||
For this assessment, the learner must complete the practical activity. The practical activity is a stand-alone activity that will allow the learner to display the knowledge and performance evidence that is essential when deciding overall competency. |
|||
Learner Name: |
|||
Assessor Name: |
|||
Has the learner satisfactorily completed the practical activity? |
|||
Yes |
No |
||
Did the Learner provide evidence of their ability to: |
|||
Activity 1: Obtaining work details |
|
|
|
Activity 2: Evaluation of network traffic problems and capacity |
|
|
|
Activity 3: Strategies to overcome network traffic problems |
|
|
|
Activity 4: Discussion about network strategies and contingency plan |
|
|
|
Activity 5: Contingency plan |
|
|
|
Activity 6: Implementation of the strategies and contingency plan |
|
|
|
Activity 7: Analysis of network traffic |
|
|
|
Activity 8: Contingency plan |
|
|
|
Activity 9: Future traffic problems |
|
|
|
Activity 10: Discussion of traffic problems and recommendations |
|
|
|
Activity 11: Delivery of updated reports |
|
|
|
Activity 12: Regular network traffic management |
|
|
|
Feedback to Learner:
|
|||
Result Satisfactory Not Yet Satisfactory |
|||
Assessor’s Signature: |
Date: |
Tags: aleks, algebra, assignmentaustralia, assignmentcanada, assignmentdeadline, assignmentdone, assignmenthelpaustralia, assignmenthelpermalaysia, assignmentoman, assignmentshelp, assignmentsolutions, assignmentuniversity, assignmentwriter, assignmentwritinghelp, assignmentwritingservices, bhfyp, box, confidentialassignment, dissertationhelp, dissertationwriting, homeworkhelper, mathematics, nytassignment, onlinehelp, pearson, research, statistics, studentlife, thesiswriting