<<

Install and commission a local area 114072

This unit standard is intended: To provide fundamental knowledge of the areas covered. For those working in, or entering the workplace in the area of & Networking. As additional knowledge for those wanting to understand the areas covered.

People credited with this unit standard are able to: Install local area network devices. Install local area network system software and application software. Test the installation of local area computer networks.

The performance of all elements is to a standard that allows for further learning in this area.

LEARNING ASSUMED TO BE IN PLACE AND RECOGNITION OF PRIOR LEARNING The credit value of this unit is based on a person having prior knowledge and skills to: Demonstrate competence to resolve technical computer problems Demonstrate an understanding of wide-area networks (WAN`s), comparing them with local area networks (LAN`s).

Module 5 – Network Support Skills Author: LEARNER MANUAL Rel Date: 27/01/2018 Rev Date: 01/06/2023 Doc Ref: 48573 LM Mod 1 v-1 PAGE 166

INDEX Competence Requirements Page Unit Standard 114072 alignment index Here you will find the different outcomes explained which you need to be 168 proved competent in, in order to complete the Unit Standard 114072. Unit Standard 114072 170 Install local area network devices 174 The installation ensures that LAN system software and application software are 186 installed according to manufacturer’s guidelines Test the installation of local area computer networks 192 Self-assessment Once you have completed all the questions after being facilitated, you need to check the progress you have made. If you feel that you are competent in the areas mentioned, you may tick the blocks, if however you feel that you 197 require additional knowledge, you need to indicate so in the block below. Show this to your facilitator and make the necessary arrangements to assist you to become competent.

Module 5 – Network Support Skills Author: LEARNER MANUAL Rel Date: 27/01/2018 Rev Date: 01/06/2023 Doc Ref: 48573 LM Mod 1 v-1 PAGE 167

Unit Standard 114072 – Alignment Index SPECIFIC OUTCOMES AND RELATED ASSESSMENT CRITERIA SO 1 Install local area network devices The installation ensures that LAN devices complete the manufacturer’s diagnostic tests free AC 1 of errors The installation ensures that the LAN devices are located and interconnected according to AC 2 manufacturer’s specifications and installation specifications The installation ensures that the LAN devices are configured and customised according to AC 3 manufacturer’s specifications and installation specifications The installation ensures that LAN system software and application software are SO 2 installed according to manufacturer’s guidelines The installation ensures that the LAN system software and application software operates AC 1 according to manufacturer’s and installation specification The installation ensures that the LAN system software and application software is AC 2 configured and customised according to installation specification The installation ensures that the LAN system software and application software performs AC 3 according to manufacturer’s and installation specification SO 3 Test the installation of local area computer networks The testing ensures that the LAN operates according to manufacturer’s and installation AC 1 specification AC 2 The testing procedure meets the manufacturer’s guidelines and installation specification AC 3 The testing ensures that results are recorded according to installation specification

Module 5 – Network Support Skills Author: LEARNER MANUAL Rel Date: 27/01/2018 Rev Date: 01/06/2023 Doc Ref: 48573 LM Mod 1 v-1 PAGE 168

CRITICAL CROSS FIELD OUTCOMES UNIT STANDARD CCFO WORKING Work effectively with others as a member of an organisation.

UNIT STANDARD CCFO ORGANISING Organise and manage him/her self and his/her activities responsibly and effectively.

UNIT STANDARD CCFO COLLECTING Collect, analyse, organise, and critically evaluate information.

UNIT STANDARD CCFO SCIENCE Use science and technology effectively and critically, showing responsibility towards the environment and health of others.

UNIT STANDARD CCFO DEMONSTRATING Demonstrate an understanding of the world as a set of related systems by recognising that problem solving contexts do not exists in isolation.

UNIT STANDARD CCFO CONTRIBUTING Contribute to his/her full personal development and the social and economic development of the society at large by being aware of the importance of: reflecting on and exploring a variety of strategies to learn more effectively, exploring education and career opportunities and developing entrepreneurial opportunities ESSENTIAL EMBEDDED KNOWLEDGE 1. Performance of all elements is to be carried out in accordance with organisation standards and procedures, unless otherwise stated. Organisation standards and procedures may cover: quality assurance, documentation, security, communication, health and safety, and personal behaviour. An example of the standards expected is the standards found in ISO 9000 Certified Organisations.

2. Performance of all elements complies with the laws of South Africa, especially with regard to copyright, privacy, health and safety, and consumer rights.

3. All activities must comply with any policies, procedures and requirements of the organisations involved, the ethical codes of relevant professional bodies and any relevant legislative and/ or regulatory requirements.

4. Performance of all elements is to be completed within the normal range of time and cost that would be expected in a professional environment (eg. In a commercial or government organisation).

Module 5 – Network Support Skills Author: LEARNER MANUAL Rel Date: 27/01/2018 Rev Date: 01/06/2023 Doc Ref: 48573 LM Mod 1 v-1 PAGE 169

All qualifications and part qualifications registered on the National Qualifications Framework are public property. Thus the only payment that can be made for them is for service and reproduction. It is illegal to sell this material for profit. If the material is reproduced or quoted, the South African Qualifications Authority (SAQA) should be acknowledged as the source.

SOUTH AFRICAN QUALIFICATIONS AUTHORITY REGISTERED UNIT STANDARD:

Install and commission a local area computer network SAQA US UNIT STANDARD TITLE ID 114072 Install and commission a local area computer network ORIGINATOR SGB Information Systems and Technology PRIMARY OR DELEGATED QUALITY ASSURANCE FUNCTIONARY - FIELD SUBFIELD Field 10 - Physical, Mathematical, Computer and Life Sciences Information Technology and Computer Sciences ABET UNIT STANDARD PRE-2009 NQF LEVEL NQF LEVEL CREDITS BAND TYPE Undefined Regular Level 5 Level TBA: Pre-2009 was 9 L5 REGISTRATION STATUS REGISTRATION START REGISTRATION END SAQA DECISION DATE DATE NUMBER Reregistered 2018-07-01 2023-06-30 SAQA 06120/18 LAST DATE FOR ENROLMENT LAST DATE FOR ACHIEVEMENT 2024-06-30 2027-06-30

In all of the tables in this document, both the pre-2009 NQF Level and the NQF Level is shown. In the text (purpose statements, qualification rules, etc), any references to NQF Levels are to the pre-2009 levels unless specifically stated otherwise.

This unit standard does not replace any other unit standard and is not replaced by any other unit standard.

PURPOSE OF THE UNIT STANDARD This unit standard is intended:

 To provide fundamental knowledge of the areas covered.  For those working in, or entering the workplace in the area of Data Communication & Networking.  As additional knowledge for those wanting to understand the areas covered.

People credited with this unit standard are able to:

 Install local area network devices.  Install local area network system software and application software.  Test the installation of local area computer networks.

The performance of all elements is to a standard that allows for further learning in this area.

Module 5 – Network Support Skills Author: LEARNER MANUAL Rel Date: 27/01/2018 Rev Date: 01/06/2023 Doc Ref: 48573 LM Mod 1 v-1 PAGE 170

LEARNING ASSUMED TO BE IN PLACE AND RECOGNITION OF PRIOR LEARNING The credit value of this unit is based on a person having prior knowledge and skills to:

 Demonstrate competence to resolve technical computer problems  Demonstrate an understanding of wide-area networks (WAN`s), comparing them with local area networks (LAN`s).

UNIT STANDARD RANGE N/A

Specific Outcomes and Assessment Criteria:

SPECIFIC OUTCOME 1 Install local area network devices.

ASSESSMENT CRITERIA

ASSESSMENT CRITERION 1 1. The installation ensures that the LAN devices complete the manufacturer`s diagnostic tests free of errors.

ASSESSMENT CRITERION 2 2. The installation ensures that the LAN devices are located and interconnected according to manufacturer`s specifications and installation specifications.

ASSESSMENT CRITERION 3 3. The installation ensures that the LAN devices are configured and customised according to manufacturer`s specifications and installation specifications.

SPECIFIC OUTCOME 2 The installation ensures that the LAN system software and application software performs accordingly. OUTCOME RANGE The installation ensures that LAN system software and application software are installed according to manufacturer`s guidelines.

ASSESSMENT CRITERIA

ASSESSMENT CRITERION 1 1. The installation ensures that the LAN system software and application software operates according to manufacturer`s and installation specification.

ASSESSMENT CRITERION 2 2. The installation ensures that the LAN system software and application software is configured and customised according to installation specification.

ASSESSMENT CRITERION 3 3. The installation ensures that the LAN system software and application software performs according to manufacturer`s and installation specification.

SPECIFIC OUTCOME 3 Test the installation of local area computer networks.

Module 5 – Network Support Skills Author: LEARNER MANUAL Rel Date: 27/01/2018 Rev Date: 01/06/2023 Doc Ref: 48573 LM Mod 1 v-1 PAGE 171

ASSESSMENT CRITERIA

ASSESSMENT CRITERION 1 1. The testing ensures that the LAN operates according to manufacturer`s and installation specification.

ASSESSMENT CRITERION 2 2. The testing procedure meets the manufacturer`s guidelines and installation specification.

ASSESSMENT CRITERION 3 3. The testing ensures that results are recorded according to installation specification.

UNIT STANDARD ACCREDITATION AND MODERATION OPTIONS The relevant Education and Training Quality Authority (ETQA) must accredit providers before they can offer programs of education and training assessed against unit standards.

Moderation of assessment will be overseen by the relevant ETQA according to the moderation guidelines in the relevant qualification and the agreed ETQA procedures.

UNIT STANDARD ESSENTIAL EMBEDDED KNOWLEDGE 1. Performance of all elements is to be carried out in accordance with organisation standards and procedures, unless otherwise stated. Organisation standards and procedures may cover: quality assurance, documentation, security, communication, health and safety, and personal behaviour. An example of the standards expected is the standards found in ISO 9000 Certified Organisations.

2. Performance of all elements complies with the laws of South Africa, especially with regard to copyright, privacy, health and safety, and consumer rights.

3. All activities must comply with any policies, procedures and requirements of the organisations involved, the ethical codes of relevant professional bodies and any relevant legislative and/ or regulatory requirements.

4. Performance of all elements is to be completed within the normal range of time and cost that would be expected in a professional environment (eg. In a commercial or government organisation).

UNIT STANDARD DEVELOPMENTAL OUTCOME N/A

UNIT STANDARD LINKAGES N/A

Critical Cross-field Outcomes (CCFO):

UNIT STANDARD CCFO WORKING Work effectively with others as a member of an organisation.

UNIT STANDARD CCFO ORGANISING Organise and manage him/her self and his/her activities responsibly and effectively.

UNIT STANDARD CCFO COLLECTING Collect, analyse, organise, and critically evaluate information.

UNIT STANDARD CCFO SCIENCE

Module 5 – Network Support Skills Author: LEARNER MANUAL Rel Date: 27/01/2018 Rev Date: 01/06/2023 Doc Ref: 48573 LM Mod 1 v-1 PAGE 172

Use science and technology effectively and critically, showing responsibility towards the environment and health of others.

UNIT STANDARD CCFO DEMONSTRATING Demonstrate an understanding of the world as a set of related systems by recognising that problem solving contexts do not exists in isolation.

UNIT STANDARD CCFO CONTRIBUTING Contribute to his/her full personal development and the social and economic development of the society at large by being aware of the importance of: reflecting on and exploring a variety of strategies to learn more effectively, exploring education and career opportunities and developing entrepreneurial opportunities.

UNIT STANDARD ASSESSOR CRITERIA N/A

REREGISTRATION HISTORY As per the SAQA Board decision/s at that time, this unit standard was Reregistered in 2012; 2015.

UNIT STANDARD NOTES Supplementary information:

1. "LAN" refers to a single network of personal computers within the same area,such as an office or building.

2. "Industry Recommended Procedure" refers to a procedure used and recommendedby an organisation involved in the computer industry.

Module 5 – Network Support Skills Author: LEARNER MANUAL Rel Date: 27/01/2018 Rev Date: 01/06/2023 Doc Ref: 48573 LM Mod 1 v-1 PAGE 173

Install local area network devices Time: 90 minutes Activity: Self and Group

AC 1 he installation ensures that the LAN devices complete the manufacturer`s diagnostic tests free of errors. T Fast and inexpensive LAN technology has achieved widespread adoption in the computer world and is now shaping the future of test system development and operation. LAN-based systems provide several advantages for test-and-measurement applications: lower-cost hardware and cabling; pervasive availability throughout most enterprises; remote or shared system control; fast data transfers; file, drive and sharing; and browser-based interaction with individual instruments

The advantages of LAN technology make it a good choice for meeting the I/O needs of test systems. With LAN adapters built into most current-generation PCs, the portion of the system requires minimal physical configuration to support test system deployment. This situation is driving the addition of LAN connectors and adapters to current- and next- generation test equipment

Once all the items have been placed at their desired places and they have been checked for appropriateness with their users, it is a good idea to test these machines one by one. Making use of the manufacturers instructions and guides, you will have the network manufacturer’s diagnostic tools with which to check for any signs of error.

All equipment must also be placed in such an area as described by the manufacturer to ensure that they are not in any way damaged by the elements or any physical damage. Once the hardware is in place and the cards have been place din their areas, the network must be configured according to the manufacturer’s installation specifications.

AC 2

Module 5 – Network Support Skills Author: LEARNER MANUAL Rel Date: 27/01/2018 Rev Date: 01/06/2023 Doc Ref: 48573 LM Mod 1 v-1 PAGE 174

he installation ensures that the LAN devices are located and interconnected according to manufacturer`s specifications and T installation specifications. What is a LAN? The typical definition of Local Area Network (LAN) is "two or more connected stations (PCs, servers, computer…) in the same limited area, sharing data and peripheral devices, and operating at the speed of 1 Mbps (Million bits per second) to about 1 Gbps (Billion bits per second)." The most popular LANs include 10 Mbps & 100 Mbps , 4 Mbps & 16 Mbps .

What are the hardware components of a LAN? The hardware components of a LAN consist of: PCs/ and servers Network Interface Card (NIC) Cabling and connectors, for example, and BNC connector, Unshielded (UTP) and RJ-45 connector Hub, concentrator, and more complicated network devices such as Bridge, LAN Switch and

What are the software components of a LAN? The software components of a LAN can be grouped into two categories: 1. Inside PCs/workstations and servers NIC Drivers for servers, for example, ® Netware 4.1 or Windows® NT Network Operating System for clients (PCs/workstations), for example, Novell® Netware 4.1 client or Microsoft Windows® 95 Networking protocol software, for example, TCP/IP, Novell® IPX Application software, for example, emails, Web Browser 2. Inside network devices (Hub/Bridge/LAN Switch/Router) Network Management Software, for example, Simple Network Management Protocol (SNMP), Remote Network Monitoring (RMC) Forwarding/ & control software, for examples, transparent bridging, spanning tree and IP routing software

Module 5 – Network Support Skills Author: LEARNER MANUAL Rel Date: 27/01/2018 Rev Date: 01/06/2023 Doc Ref: 48573 LM Mod 1 v-1 PAGE 175

What is a Network Interface Card (NIC)? A Network Interface Card, or NIC, is a circuit board inserted into each network station (PC/ or ) to allow communication with other stations. Depending on the stations, the bus of a NIC could be ISA, PCI, EISA, MCA, S-bus…and so on.

What is a Hub? A Hub is a central device used on topology that repeats or amplifies signals, allowing the network to be lengthened or expanded with additional stations. For example, an Ethernet hub normally has 8 or 12 or 16 RJ-45 ports, each port can be connected to a PC or workstation or server. Also, the hub’s BNC port can be connected to a coaxial cable to lengthen the network.

What is a Bridge? A Bridge is a device used to connect two or more LANs. It operates at the Media Access Control Layer (layer 2), checking and forwarding data packets between different LANs.

What is a LAN Switch? A LAN Switch is a device using switching hardware to speed-up the checking and forwarding of data packets between LANs. LAN Switch is functionally like a bridge, but its speed and performance is faster and better than a bridge.

What is a Router? A Router is a device that operates at the network layer (layer 3), routing data between similar or dissimilar networks. A router is more powerful than a bridge or LAN Switch because the router checks the network protocols and addresses (for example, IP or IPX).

What is a Network Management? Network Management are functions that manage and control networks. It consists of five major functions: Fault Management Accounting Management Configuration Management Performance Management Security Management

Module 5 – Network Support Skills Author: LEARNER MANUAL Rel Date: 27/01/2018 Rev Date: 01/06/2023 Doc Ref: 48573 LM Mod 1 v-1 PAGE 176

What is SNMP? SNMP, or Simple Network Management Protocol, is a standard protocol adopted for the network management of Internet and TCP/IP based networks.

What is RMON? RMON are the functions that monitor the network performance, errors and other summary information. RMON functions can be implemented in a network device (HUB, LAN switch) or a station (PC, Server).

What is JAVA? JAVA is a network programming language designed to solve problems in the area of client- server programming. It is ideal for programming on the Internet. JAVA capability is included in most new generation Internet Web Browser, e.g. Netscape Navigator 2.0 and higher and Microsoft® Explorer 3.0 and above.

Define a JAVA-based Network Management System. A JAVA-based Network Management System is an integration of JAVA language and network management functions. The network management software is written in JAVA language and stored in a network device (HUB, LAN switch). The user can manage the network by an Internet Web Browser. The operation of network management is as simple as browsing WWW server.

What is a RMON software probe? A RMON software probe is a RMON-like software that runs on PCS. The software can do the function of monitoring the network traffics, errors and other statistics. It can also store the records for later analysis.

Setting up a network In order to create an Ethernet network, certain components are necessary for the computers within the network to communicate with each other. The required components to create an Ethernet network are: 10Base-T Ethernet Network Interface Card (NIC) Ethernet hub BNC T-connectors (usually provided) 50-Ohm terminators (usually provided) Thin Ethernet (Thinnest) coaxial cable (usually provided)

Module 5 – Network Support Skills Author: LEARNER MANUAL Rel Date: 27/01/2018 Rev Date: 01/06/2023 Doc Ref: 48573 LM Mod 1 v-1 PAGE 177

Network Interface Card A Network Interface Card (NIC) is an add-on adapter card that is installed to the PCI or ISA slot on the PC’s motherboard. The NIC sorts data on the computer into bundles and transmits them to another computer while allowing the user to access the data within the bundle simultaneously. The most common NIC used today is the 10Base-T Ethernet card that is connected to an Ethernet hub.

Hub All Ethernet 10Base-T networks are connected with an Ethernet hub. The hub manages the traffic that passes between computers on a network and is connected to all computers that are part of the network.

Other networking components Other networking components are used to connect a PC or even a to an Ethernet network. AUI-BNC transceivers can be used to connect a PC or a laptop to a different network interface. Some NIC can support a combination of interface, such as an AUI and a BNC as well as a RJ45. Sometimes a combo transceiver may be used to connect to a NIC on a PC or a laptop on one end and to another network system on the other over the supported interface.

Most network interface cards today have PnP (Plug and Play) capability. The following procedures assume that your NIC is PnP-compatible and that your PC’s operating system is Windows® 95. Once the NIC is installed and you have powered on your computer, Windows® 95 will automatically detect the new and assist you with its configuration. If this is not the case, refer to the documentation that came with your NIC for proper configuration procedures such as setting IRQ settings.

Module 5 – Network Support Skills Author: LEARNER MANUAL Rel Date: 27/01/2018 Rev Date: 01/06/2023 Doc Ref: 48573 LM Mod 1 v-1 PAGE 178

AC 3 he installation ensures that the LAN devices are configured and customised according to manufacturer`s specifications and installation T specifications. A step-by-step guide to setting up a The introduction of a new piece of hardware is the perfect time to set up or reorganise your home network. For many people, this is the most painful part of the tech experience. Let's face it, networking a new piece of tech you got for the holidays is the latter-day "some assembly required."

No matter what networking hardware makers tell you, setting up your home network involves more than just purchasing and plugging in a router. But that doesn't mean that it has to be a nightmare, either. You can set up a managed and centrally controlled network in a few (relatively) easy steps – you just have to know what you're doing, and do it the right way.

And it's worth doing it right. It's worth learning how to configure proper IP addressing, lock down the network from intruders, create accounts for everyone who gets access, and set up sharing for files and folders. If you can do those things (and you can) you'll have a centrally controlled, robust network with better security. Plus, having a good handle on your network allows for more efficient control over remote access to devices and data on the network. For parents, the ability to see what children are accessing and control what they access is possible, if you've got a structured home network.

Of course, the router is the central point of a home network. Although hardware vendors are making router setup easier than ever with, you can still burrow deeper into the router's configuration pages to establish security, access controls, and granular management. At any rate, you can set up a tightly managed, secure home network. All you have to do is follow these five steps.

1. Connect your router The router is the gateway between the Internet and your home network. It is also the means by which all the devices on your network communicate with one another. You will also want to ensure that any device that will connect to the router also has an appropriate network adapter. These devices are your network "clients." New will have 802.11n adapters (some will support 802.11ac, even). For older laptops or desktops you can purchase

Module 5 – Network Support Skills Author: LEARNER MANUAL Rel Date: 27/01/2018 Rev Date: 01/06/2023 Doc Ref: 48573 LM Mod 1 v-1 PAGE 179

compatible adapters. Once you've got the right router, you have to set it up, and the first step is to physically connect your router to a modem provided by your ISP with an Ethernet cable. First, unplug or turn off the cable or DSL modem. Power up your and connect the network cable that most likely comes with it into the port on the router that is labelled "Internet" or "WAN." Connect the other end to the cable or DSL modem and power up the modem. Don't attempt to connect any devices such as laptops or tablets until you have a good strong signal indicating a WAN connection on both the router and modem.

2. Access the router's interface and lock it down The next step involves getting into the router's interface (some companies call this the management console). This is done by connecting a laptop to the router and then accessing the interface via a browser. How do you go about this? Routers ship with a default IP address, administrator account and password.

For example, most Cisco/Linksys routers have the default IP address of 192.168.1.1, and the default administrator account is "admin," and the password is also "admin." What you want to do is change your laptop's IP settings to match those of the router's to connect to it for configuration. This allows the laptop to communicate with the router, so you can access your router's software for setup via the laptop.

Connect an Ethernet cable to one of the LAN ports on the router and the other end to the Ethernet port of your laptop. On a Windows 7 machine that's connected to the router by Ethernet, for example, you would go into the and click to open "Network and Internet" and then "Network and Sharing Centre." From the left-hand window, click "Change adapter settings." Right click on "Local Area Connection" (not the Connection) and select "Properties." Highlight “Internet Protocol Version 4 (TCP/IP v4)” and once again, click "Properties." Set the first button to "Use the following IP address:" and enter the information as shown in the image above. Once you've applied the changes, open up a browser and go the web address of (in our example) the Cisco/Linksys interface by typing http://192.168.1.1 and using the account name "admin" and password "admin." Then you are all set to configure security and other settings.

Module 5 – Network Support Skills Author: LEARNER MANUAL Rel Date: 27/01/2018 Rev Date: 01/06/2023 Doc Ref: 48573 LM Mod 1 v-1 PAGE 180

Most router companies use the same default IP address, admin account, and passwords on all their routers. Your router's documentation will tell you the specific IP address and account login information.

3. Configure security and IP addressing After you've accessed the router, the next order of business is getting the security, SSID and IP addressing settings right. Getting security right is a must, unless you want a neighbour stealing your and possibly your data. IP addressing is important because these addresses are used for devices on your network to communicate with the router. You make all of these changes within the router's management interface.

These settings are typically under the "Basic" settings of the interface. They may also be under "Security" or "Wireless Settings." Router interfaces vary, so if you can't find the settings to configure within the router’s interface pages when following the below steps, check with the router manufacturer. Okay, on with the steps:

Change the default administrator password. Some networking equipment forces you to do so once you've accessed the web-based interface, but many consumer routers don't. The settings for the admin password are usually under the "System" tab or page of the interface. You can just enter in a new password in the new password field.

Change the router's default SSID. The SSID is the broadcasted name of your wireless network. That's the name that shows up as the network's name when you scan for available networks. Use a unique name that your neighbours aren't using for their routers to avoid confusion.

Assign security. Newer routers may be set by default to automatically configure security by using WPS (Wi-Fi Protected Setup). Since the goal here is to have full control of your network, switch from "WPS" to "Manual." Once in manual mode, go into the router's page.

There is no excuse, except in very limited circumstances when dealing with legacy technology, to not use WPA/WPA2. WPA security requires clients connecting to it to use a key or passphrase, which you create within the router's interface on the same page you set up security.

Module 5 – Network Support Skills Author: LEARNER MANUAL Rel Date: 27/01/2018 Rev Date: 01/06/2023 Doc Ref: 48573 LM Mod 1 v-1 PAGE 181

Some routers allow you to enter a string of 64 hexadecimal digits which provides strong security, but most have you create an 8 to 63 letter passphrase. If you are creating a passphrase (or password) be sure to create a strong password that would be hard to guess.

Set up IP addressing. For most networks, the router can be kept at its default DHCP setting. This means the router will dole out IP addresses to clients that connect to the network, leaving you without any IP addressing management to do. For extra security, it's not a bad idea to change the router's default IP, making it more resistant to snooping.

Remember, hackers know what the default IP addresses of the most common routers are (even though it's really tough for them to get to, due to the fact that your IP addresses on your network are private). For instance, I would change my Cisco/Linksys router's network from 192.168.1.1 to something like 192.168.1.3.

Disconnect the laptop and reboot it. When the laptop comes back from reboot you should see the SSID name of your wireless network and be able to connect to it with the passphrase you created. Congratulations – you're connected wirelessly. But you're not done with your setup yet!

Advanced steps: DHCP reservation For those who anticipate connecting servers, NAS device or any device that you may access from outside your network, best practice is to configure DHCP Reservation. That may be a scary sounding term for newbies, but all it means is that you are telling the router that a specific device always uses a specific IP address, which is set aside or "reserved" for it. For example, my router IP is 192.168.1.1.

I can give my email server an IP address of 192.168.1.2. I can give a third device, say my NAS server for instance, an IP address of 192.168.1.3, and so on. You don't want to change the first three sets of numbers though, for most basic home networks. IP addressing has specific rules about formatting, so you want to retain the first three sets of numbers, called "octets."

You’ll also want to put in the device's MAC address that you are reserving. The MAC address is usually printed on a sticker affixed to a device. Again, reserving the IP addresses means those addresses will never be distributed to clients via DHCP and are "held" for the devices you specify.

Module 5 – Network Support Skills Author: LEARNER MANUAL Rel Date: 27/01/2018 Rev Date: 01/06/2023 Doc Ref: 48573 LM Mod 1 v-1 PAGE 182

Reserving IP addresses is good practice for devices you want to access remotely, because otherwise when the IP address leases expire you won't be able to perform remote access.

Don't forget to assign the reserved IPs as static addresses on the devices for which you made reservations. There are various ways to do this – on Windows servers and machines you can assign an IP address though the Network settings Control Panel. Other devices, such as NASes, have areas in their management console where you can assign an IP address. It really depends on what device you want to set a static address for, so check with the vendor if you aren't sure.

If you are using the router as an access point, bridge or to extend the signal of an existing router on a network, you will want to turn off DHCP completely. Having two routers performing DHCP on the same network can result in a myriad of connection issues. However, for most home networks, having the router set to use DHCP will suffice.

4. Set up sharing and control Now that you have a network set up, you can set up a way for everyone to access data on the network. With Windows 7 clients, this is achieved by creating a HomeGroup, a user-friendly way to create a workgroup. A HomeGroup is a group of computers on a home network that can share files and printers. Using a HomeGroup makes sharing easier. You can share pictures, music, videos, documents, and printers with other people in your HomeGroup.

Other people can't change the files that you share unless you give them permission. You can help protect your HomeGroup with a password, which you can change at any time. Computers must be running Windows 7 or Windows 8 (more about the latter in a moment) to participate in a HomeGroup. HomeGroup is available in all editions of Windows 7. In Windows 7 Starter and Windows 7 Home Basic, you can join a HomeGroup, but you can't create one.

When a Windows 7 laptop first connects to the network, the user will be prompted to set the current network location. Ensure that the location is set to "Home network" (you can check it in Network and Sharing Centre) because HomeGroup only works on networks set to the Home location.

Module 5 – Network Support Skills Author: LEARNER MANUAL Rel Date: 27/01/2018 Rev Date: 01/06/2023 Doc Ref: 48573 LM Mod 1 v-1 PAGE 183

Open up "HomeGroup" in the Control Panel, and then click "Create a HomeGroup." For every Windows 7 client that you want to give access to the HomeGroup, open HomeGroup in the Control Panel of those machines and then click "Join now" (those machines have to physically or wirelessly connected to the network).

During the process of setting up or joining a HomeGroup, you can choose the libraries, printers, or files and folders you want to share (see the next step for details).

For Windows 8, you create a HomeGroup by moving the mouse to the top right corner of the screen, then click Settings, then Change PC Settings. Click on HomeGroup, then you can click on Create. As above, you can then select the libraries and devices you want to share with the HomeGroup.

If you have a network with an older version of Windows running, then you are going to create a standard Workgroup. Click Start, right click My Computer, and then click Properties. In System Properties, click the Computer Name tab. Click "Change," select "Workgroup," and enter a workgroup name. Click OK to apply the change. Do the same thing for all computers that you want sharing data on the network.

5. Set up user accounts In most business networks, users access the network by logging in with their user account and password. Corporate IT networks set up user accounts to keep tabs on who is accessing the network and when they are accessing it. User accounts provide a way to establish user access control. Perhaps there's some data on the network some users should have access to and some shouldn't. Maybe some users should only be able to read certain files, while others should be able to change files.

You can establish this same kind of access in your home network, should you wish, especially once you have a HomeGroup or Workgroup defined. It's not something most home network users will really need to do, but we’ll cover it briefly, as it is quite easy to set up user accounts in Windows:  In Windows 7's Control Panel, select the User Accounts icon. User accounts will let you configure your account and its settings.  To add and configure other users, from User Accounts, click on "Manage User Accounts," and then click on the "Advanced" tab.  Under "Advanced User Management" click "Advanced" to open up Local Users and Groups.

Module 5 – Network Support Skills Author: LEARNER MANUAL Rel Date: 27/01/2018 Rev Date: 01/06/2023 Doc Ref: 48573 LM Mod 1 v-1 PAGE 184

 Right click on either "Users" or "Groups" to add either to your network.  If you have a number of people accessing your network and you want to control access to the data on it, you may also want to set up permissions for files and folders. Create a user account for every family member and then right click on the folder, click "Properties" and then the "Sharing" tab. You can add the family members that you want to give access to any particular folder, and exclude the ones you don't. You can also right click on each Library to select the specific users you want to share with. Right click on a printer to pull up the "Sharing" tab to set up shared access.  Unless you have a lot of users connecting to your network, as we mentioned previously you most likely won't need to create user groups, but it's a good idea if you do anticipate a number of users connecting (as is the case for a small business) and you want to give certain groups access to certain files and folders.  If you've gotten this far and performed all the steps that apply to you, you should have a functional, secure, and robust network set up. Congratulations!

Module 5 – Network Support Skills Author: LEARNER MANUAL Rel Date: 27/01/2018 Rev Date: 01/06/2023 Doc Ref: 48573 LM Mod 1 v-1 PAGE 185

Ensure LAN system software and application software are installed according to Guidelines Time: 90 minutes Activity: Self and Group

AC 1 he installation ensures that the LAN system software and application software operates according to manufacturer`s and installation T specification. Each organisation must have a written backup plan including a backup schedule, backup process and a list of mission critical applications. Organisation should consider their current electronic archiving process (the storing of files for future retrieval, not the process of sending documents to the Archives) while developing their backup plan.

Organisations cannot use the backup process as an electronic archiving method; a separate electronic archiving process and plan must be developed. The backup plan must be reviewed annually and periodically tested by the agency network administrator. Each agency must maintain a notification list of designated staff to be contacted in an emergency. A copy of this list must be kept in a secure location, such as with off-site backups, and be readily accessible in case of an emergency.

Definitions  Full Backup – Complete, full backup of all files. Complete backup of all servers is done once a week. Offsite storage of backup media allows for full disaster recovery.  Differential Backup –This backup includes any changes or additions to data since the previous full backup.  Workstation Backup – Each user is assigned a network storage area. The H:\ drive assigned to each user is located on a server. This area is included in the daily and weekly backup plan. Applications set up according to BIT standards are designed to save information to the users assigned H:\ drive directory by default. If you accidentally erase one of your files, notify the BIT Help Desk immediately.  User Responsibility - Any information stored locally (C:\) on the users workstation must be backed up by the user. Information stored locally (C:\) by the user should be placed in a common work area. C:\Work\ as an example. This will help insure that the data is not lost in the event of any system changes.

Module 5 – Network Support Skills Author: LEARNER MANUAL Rel Date: 27/01/2018 Rev Date: 01/06/2023 Doc Ref: 48573 LM Mod 1 v-1 PAGE 186

LAN testing must occur on a regular basis and should happen at all nodes at least once a month. The ability to move files internally as well as the speed that is achieved with each of the nodes must be recorded and documented. All cables must be checked as well as their ports which they connect with, on a monthly basis. This will help ensure that they are properly maintained.

When a problem occurs in communication carried out by a user, information concerning the problem is notified to the user. A network management system transfers a problem notification program to a network device adjacent to a place experiencing the problem. The problem notification program notifies "communication impossible" to a terminal of a transmission source of data output from an output port of the network device.

AC 2 he installation ensures that the LAN system software and application software is configured and customised according to installation T specification. A network system having a plurality of terminal devices and a plurality of network devices for relaying data among said terminal devices, said terminal devices being used by users of said network system, wherein each network devices includes: first means for detecting a problem in said network device; second means for detecting a terminal device which is a transmission source of data output to an output port of said network device in which said problem has occurred; and means for notifying problem information representing occurrence of said problem in said network device to said terminal device which is the transmission source of data output to said output port detected by said second means for detecting, thereby informing the user of said terminal device of said problem.

Circuit - A type of communications in which a dedicated channel (or circuit) is established for the duration of a transmission. The most ubiquitous circuit-switching network is the system, which links together wire segments to create a single unbroken line for each . The other common communications method is , which divides messages into packets and sends each packet individually.

Module 5 – Network Support Skills Author: LEARNER MANUAL Rel Date: 27/01/2018 Rev Date: 01/06/2023 Doc Ref: 48573 LM Mod 1 v-1 PAGE 187

The Internet is based on a packet-switching protocol, TCP/IP. Circuit-switching systems are ideal for communications that require data to be transmitted in real-time. Packet-switching networks are more efficient if some amount of delay is acceptable. Circuit-switching networks are sometimes called connection-oriented networks. Note, however, that although packet switching is essentially connectionless, a packet switching network can be made connection-oriented by using a higher-level protocol. TCP, for example, makes IP networks connection-oriented.

Packet - Refers to protocols in which messages are divided into packets before they are sent. Each packet is then transmitted individually and can even follow different routes to its destination.

Once all the packets forming a message arrive at the destination, they are recompiled into the original message. Most modern (WAN) protocols, including TCP/IP, X.25, and , are based on packet-switching technologies. In contrast, normal telephone service is based on a circuit-switching technology, in which a dedicated line is allocated for transmission between two parties.

Circuit-switching is ideal when data must be transmitted quickly and must arrive in the same order in which it's sent. This is the case with most real-time data, such as live audio and video. Packet switching is more efficient and robust for data that can withstand some delays in transmission, such as e-mail messages and Web pages. A new technology, ATM, attempts to combine the best of both worlds -- the guaranteed delivery of circuit-switched networks and the robustness and efficiency of packet-switching networks.

Module 5 – Network Support Skills Author: LEARNER MANUAL Rel Date: 27/01/2018 Rev Date: 01/06/2023 Doc Ref: 48573 LM Mod 1 v-1 PAGE 188

Packet Switching refers to protocols in which messages are divided into packets before they are sent. Each packet is then transmitted individually and can even follow different routes to its destination. Once all the packets forming a message arrive at the destination, they are recompiled into the original message.

Most modern Wide Area Network (WAN) protocols, including TCP/IP, X.25, and Frame Relay, are based on packet-switching technologies. In contrast, normal telephone service is based on a circuit-switching technology, in which a dedicated line is allocated for transmission between two parties. Circuit-switching is ideal when data must be transmitted quickly and must arrive in the same order in which it's sent.

This is the case with most real-time data, such as live audio and video. Packet switching is more efficient and robust for data that can withstand some delays in transmission, such as e-mail messages and Web pages. A new technology, ATM, attempts to combine the best of both worlds, the guaranteed delivery of circuit-switched networks and the robustness and efficiency of packet-switching networks.

A comparison of latency and throughput in can address a common misunderstanding that having greater throughput means a "faster" connection. However, throughput, latency, the type of information transmitted, and the way that information is applied all affect the perceived speed of a connection.

AC 3 he installation ensures that the LAN system software and application software performs according to manufacturer`s and installation T specification. Terms Latency is the delay between the initiation of a network transmission by a and the initial receipt of that transmission by a receiver. It is typically commensurate with the distance the signal must travel, but is also affected by delays introduced in network routing, including queues, multiple routes, packet loss, etc. and also

Throughput is the rate at which the transmission occurs. It is typically commensurate with the channel capacity of the lowest-bandwidth portion of the transmission conduit.

Module 5 – Network Support Skills Author: LEARNER MANUAL Rel Date: 27/01/2018 Rev Date: 01/06/2023 Doc Ref: 48573 LM Mod 1 v-1 PAGE 189

Interplay of factors Latency and throughput together affect the perceived speed of a connection. However, the perceived speed of a connection can still vary widely, depending in part on the type of information transmitted and how it is used.

For example, to view a web page over a 56 kbit/s modem transmitted from a server 4,800 km away, latency over the Internet is fairly low – typically about a quarter of a second – and an average web page of 30–100 kilobytes will transfer in 10–30 seconds. However, to transfer the contents of a DVD over a modem could take a week or more at this rate. Simply packing the DVD into an envelope and mailing it could be faster.

Using a T1 line with similar latencies, one could download the same web page in under a second. To download a 5 GB DVD over this 1.5 Mbit/s connection would take about 7.4 hours. Latency can also directly affect throughput. In TCP connections, the large Bandwidth- delay product of high latency connections, combined with relatively small TCP window sizes on many devices, effectively causes the throughput of a high latency connection to drop sharply with latency.

This can be remedied with various techniques, such as increasing the TCP congestion window size, or more drastic solutions, such as packet coalescing, TCP acceleration, and forward error correction, all of which are commonly used for high latency satellite links.

Queuing Tagged Command Queuing (TCQ) is a technology built into certain ATA and SCSI hard drives. It allows the operating system to send multiple read and write requests to a hard drive. ATA TCQ is not identical in function to the more efficient Native Command Queuing (NCQ) used by SATA drives. SCSI TCQ does not suffer from the same limitations as ATA TCQ.

Before TCQ, an operating system was only able to send one request at a time. In order to boost performance, it had to decide the order of the requests based on its own, possibly incorrect, idea of what the hard drive was doing. With TCQ, the drive can make its own decisions about how to order the requests (and in turn relieve the operating system from having to do so). The result is that TCQ can improve the overall performance of a hard drive if it is implemented correctly.

Module 5 – Network Support Skills Author: LEARNER MANUAL Rel Date: 27/01/2018 Rev Date: 01/06/2023 Doc Ref: 48573 LM Mod 1 v-1 PAGE 190

With the increasing use of computers the usage and need of processing has increased. In order to use an analogue signal on a computer it must be digitized with an analogue to digital converter (ADC). Sampling is usually carried out in two stages, discretisation and quantisation. In the discretisation stage, the space of signals is partitioned into equivalence classes and discretisation is carried out by replacing the signal with representative signal of the corresponding equivalence class. In the quantisation stage the representative signal values are approximated by values from a finite set.

The faster the chip in your computer, the more processes it can handle at a time, the more work can be done simultaneously. Increasing the speed of your chip (this can only be done by buying a newer, faster chip) will enhance the speed that your computer processes the information.

The larger the hard rive, the larger the speed that it can read and write to its’ memory (cache), which means it can store data at a faster pace than a smaller (or lower cached) hard drive. This can increase the speed that data is saved at, increasing the speed of the user.

When you keep your computer updated with the latest media devices, it will be able to read these devices faster, enabling you to access the information at a faster speed, thus decreasing the time spent on processing information.

RAM (random access memory) is memory which is used by your computer to randomly allocate to programs and processes. The more RAM added to your computer, the more it can access information from other programs, and the faster you are able to toggle between the programs, accessing and saving information and data

Module 5 – Network Support Skills Author: LEARNER MANUAL Rel Date: 27/01/2018 Rev Date: 01/06/2023 Doc Ref: 48573 LM Mod 1 v-1 PAGE 191

Test the installation of local area computer networks Time: 120 minutes Activity: Self and Group

AC 1 he testing ensures that the LAN operates according to manufacturer`s and installation specification. T What is an Administrator? A person who manages a local area communications network (LAN) within an organization, Responsibilities include network security, installing new applications, distributing software upgrades, monitoring daily activity, enforcing licensing agreements, developing a storage management program and providing for routine backups. An individual responsible for maintaining a multi-user computer system, including a local-area network (LAN). Typical duties include: Adding and configuring new workstations Setting up user accounts Installing system-wide software Performing procedures to prevent the spread of viruses Allocating mass storage space The system administrator is sometimes called the sysadmin or the systems administrator. Small organizations may have just one system administrator, whereas larger enterprises usually have a whole team of system administrators.

Module 5 – Network Support Skills Author: LEARNER MANUAL Rel Date: 27/01/2018 Rev Date: 01/06/2023 Doc Ref: 48573 LM Mod 1 v-1 PAGE 192

AC 2 he testing procedure meets the manufacturer`s guidelines and installation specification. T LAN Troubleshooting In order to ascertain the usage and health of user LANs for planning and problem determination, it is necessary to be able to monitor the LAN. This can be accomplished either from a Network Management Station communicating with SNMP enabled devices on the LAN, or with a standalone network monitor such as the Network General Sniffer. Currently, administrators monitor Ethernet (primarily IP) traffic between the local LAN and the FDDI backbone.

This is accomplished using our Network Management System (NetView/6000) communicating via SNMP with the campus backbone routers. In most cases this type of monitoring is wholly inadequate as it does not include the majority of the traffic which is local to the LAN. To adequately monitor the LAN, LAN administrators and planners should consider the following management capabilities when purchasing/installing network components.

LAN Monitoring from a Network Management System Local hub with SNMP (repeater MIB and/or bridge MIB): allows traffic and error statistics collection Local hub with SNMP (RMON MIB): allows monitoring of MAC layer traffic and errors Local hub with SNMP (RMON2 MIB): allows monitoring of all OSI layers (including MAC, Network, protocol and application) Network probe which can monitor local traffic and errors; if the probe has RMON2 support, it can monitor all OSI layers; the probe can be accessed remotely for data collection and error reporting

Local Standalone LAN Monitoring Attach a network monitor such as a Network General Sniffer to analyze network problems in real time. The network planner should also be aware of the consequence of installing switched hubs. These introduce a whole new set of problems associated with the very nature of switching.

Module 5 – Network Support Skills Author: LEARNER MANUAL Rel Date: 27/01/2018 Rev Date: 01/06/2023 Doc Ref: 48573 LM Mod 1 v-1 PAGE 193

In order to monitor the ports on the switch, it should have at least one of the following options: 1. RMON/RMON2 SNMP agent built into the switch. 2. Monitor (roving) port built into the switch.

This allows monitoring of one or more of the switch ports by an attached network probe or monitor as noted above. Network Administrators must be prepared to assist LAN administrators in monitoring their LANs using our Network Management System and/or by temporarily installing our Ethernet probe or Ethernet Network General Sniffer on the local network.

Very often a Mainframe computer will have to be set up to ensure that all the backing up file storage is safe and done in line with the organisational requirements. A mainframe computer is a very large and expensive computer capable of supporting hundreds, or even thousands, of users simultaneously. In the hierarchy that starts with a simple microprocessor (in watches, for example) at the bottom and moves to supercomputers at the top, mainframes are just below supercomputers.

In some ways, mainframes are more powerful than supercomputers because they support more simultaneous programs. But supercomputers can execute a single program faster than a mainframe. The distinction between small mainframes and is vague, depending really on how the manufacturer wants to market its machines.

The Administrator will have to administer the domain controller which is as defined by Microsoft, in server roles, computers that function as servers within a domain can have one of two roles: member server or domain controller. Abbreviated as DC, domain controller is a server on a Microsoft Windows or Windows NT network that is responsible for allowing host access to Windows domain resources.

The domain controllers in your network are the centrepiece of your Active Directory, directory service. It stores user account information, authenticates users and enforces security policy for a Windows domain. An active directory service stems from Microsoft that is a part of Windows 2000. It is an implementation of Internet standard directory and naming protocols that uses a database engine for transactional support, and also supports a variety of application programming interface standards.

Module 5 – Network Support Skills Author: LEARNER MANUAL Rel Date: 27/01/2018 Rev Date: 01/06/2023 Doc Ref: 48573 LM Mod 1 v-1 PAGE 194

Whereas, as defined by Microsoft, in Active Directory server roles, computers that function as servers within a domain can have one of two roles: member server or domain controller. A member server is a computer that runs an operating system in the Windows 2000 Server family or the Windows Server 2003 family, belongs to a domain, and is not a domain controller.

Member servers typically function as the following types of servers: File servers Application servers Database servers Web servers Certificate servers Firewalls Remote-access servers

AC 3 he testing ensures that results are recorded according to installation specification. T Once you find your solution, you'll need to create a procedure for how you will back up your data and how you will handle restoration in the case of data loss.

To make sure you have effective data backup and recovery systems in place, you'll need to plan in detail for disaster recovery, make sure that all your employees are fully aware of the effort to back up files, and test the system. Decide on a Backup Schedule whether you do it yourself or hire a service to do it, you'll need to decide on a schedule for backing up.

Your backup schedule will consist of the following: Full backups. This is a complete set of all of the data you want to back up. You'll want to keep a current backup of your entire system around, but you don't need to do these backups daily, as most of your files don't change every day, and full backups are time- consuming. Differential backups. This is the set of any files that have changed since the last full backup. These backups take less time and space than a full backup but more than an incremental backup. Incremental backups. This is the set of files that have changed since the previous backup (whether it is a differential, incremental, or full backup). These backups take the least time and space, but, in the event of data loss, you'll need to restore data from

Module 5 – Network Support Skills Author: LEARNER MANUAL Rel Date: 27/01/2018 Rev Date: 01/06/2023 Doc Ref: 48573 LM Mod 1 v-1 PAGE 195

several backups (the last full backup, last differential, and all the incremental backups since the last differential) and restore them in precisely the correct order.

First, decide how often to back up by considering how much data you can afford to lose. Then, if you are using a hardware drive (tape, CD, or DVD), you'll need to decide on a rotation schedule for your backups (how often you overwrite backed-up data). You'll also want to periodically schedule some permanent backups for media that aren't rotated and replaced with a more recent backup. This will allow you to go back further in time if you need to. For instance, some viruses don't cause noticeable damage for weeks.

You will want to keep the following backups updated at all times: Three daily incremental backups 1-week-old full backup 1-month-old full backup If you aren't using a remote backup service, you'll need to have someone take off-site each day/week.

Prepare for Effective Data Backup and Recovery to make sure you have an effective data backup and recovery system, you'll need to plan in detail for disaster recovery, make sure that all your employees are fully aware of the effort to back up files to prevent data loss as much as possible, and test to make sure that your data backup method is meeting your needs.

Module 5 – Network Support Skills Author: LEARNER MANUAL Rel Date: 27/01/2018 Rev Date: 01/06/2023 Doc Ref: 48573 LM Mod 1 v-1 PAGE 196

You are now ready to go through a check list. Be honest with yourself

Tick the box with either a √ or an X to indicate your response

□ I am able to install LAN devices

□ I am able to ensure the installation meets the required manufacturer’s guidelines

□ I am able to test the installation on LAN’s

You must think about any point you could not tick. Write this down as a goal. Decide on a plan of action to achieve these goals. Regularly review these goals.

My Goals and Planning: ______

Module 5 – Network Support Skills Author: LEARNER MANUAL Rel Date: 27/01/2018 Rev Date: 01/06/2023 Doc Ref: 48573 LM Mod 1 v-1 PAGE 197