0% found this document useful (0 votes)
122 views35 pages

ICTNWK542 - Assessments

This document provides information about assessing the unit ICTNWK542 - Install Operate and Troubleshoot medium enterprise routers. It outlines the unit description, performance criteria, evidence requirements, training and assessment strategies, and indicative content. Assessment will involve both practical and written activities to demonstrate configuration, installation, management and troubleshooting of routers.

Uploaded by

Amrit Sapkota
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
122 views35 pages

ICTNWK542 - Assessments

This document provides information about assessing the unit ICTNWK542 - Install Operate and Troubleshoot medium enterprise routers. It outlines the unit description, performance criteria, evidence requirements, training and assessment strategies, and indicative content. Assessment will involve both practical and written activities to demonstrate configuration, installation, management and troubleshooting of routers.

Uploaded by

Amrit Sapkota
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 35

ICTNWK542 – Install Operate and Troubleshoot

medium enterprise routers


Assessment
ICTNWK542– Install Operate and Troubleshoot medium enterprise routers.

Contents
1. Unit information............................................................................................................................
2. training and assessment................................................................................................................
3. TyPES of evidence..........................................................................................................................
4. Contextualising assessment..........................................................................................................
5. assessment guide........................................................................................................................
6. Assessment cover sheet............................................................................................................
7. written activity............................................................................................................................
8. Written Activity MARKING GUIDE...............................................................................................
9. Practical Activity..........................................................................................................................
10. Practical Activity..........................................................................................................................
11. Scenario....................................................................................................................................
12. Practical Activity MARKING GUIDE..............................................................................................
13. Unit Assessment Pack (UAP) – Cover Sheet.................................................................................

2
ICTNWK542– Install Operate and Troubleshoot medium enterprise routers.

UNIT INFORMATION
This Assessor Guide provides information to assess the unit ICTNWK542 – Design and implement a
security system. This unit forms part of an accredited training course. Accreditation means that it
must meet the required standards, and this includes ensuring all units of competency are assessed
fairly, flexible and provide enough, authentic evidence to make a judgment and decision on
competence.

The training and assessment activities for this unit and the other units included in the qualification
are designed to reflect workplace requirements and to equip a student to be an effective worker.

After successful completion of your course, educational outcomes and pathways may include an
entry into further training and/or higher education.

DESCRIPTION AND APPLICATION OF THE UNIT

This unit describes the skills and knowledge required to use the appropriate tools, equipment,

software and protocols to install, operate and troubleshoot, medium enterprise routers.

It applies to individuals working as network technicians, network administrator and network

support.

No licensing, legislative or certification requirements apply to this unit at the time of publication.

PERFORMANCE CRITERIA
1. Prepare to install router
1.1 Identify and analyse existing router performance against organisational
requirements
1.2 Review existing network design documentation and determine alignment to
organisational requirements
1.3 Determine network element additions and upgrades according to organisational
requirements
1.4 Develop and document installation plan and submit document to required
personnel
1.5 Obtain installation plan sign off from required personnel
2. Configure basic router operation
2.1 Determine basic routing requirements and operating parameters according to
installation plan specifications
2.2 Select required media, cables, ports, connectors and connect routers to network
devices and hosts according to installation plan specifications

3
ICTNWK542– Install Operate and Troubleshoot medium enterprise routers.

2.3 Set basic parameters and router firmware according to installation plan
specifications
2.4 Save and back up router configuration files according to installation plan
specifications
2.5 Implement required router security and configure static and default routes
according to installation plan specifications
3. Configure dynamic classless routing protocols
3.1 Calculate and apply required classless IP addressing scheme using variable length
subnet mapping (VLSM) to a local area network (LAN) and a wide area network
(WAN) environment according to router specifications
3.2 Configure and verify required classless routing protocols according to router
specifications
4. Apply troubleshooting processes
4.1 Troubleshoot device configuration and network connectivity according to
network specifications
4.2 Identify and correct problems with IP addressing and host configurations
according to network specifications
4.3 Seek and respond to feedback from required personnel

PERFORMANCE EVIDENCE

The candidate must demonstrate the ability to complete the tasks outlined in the elements,
performance criteria and foundation skills of this unit, including evidence of the ability to:

 configure, install, manage and troubleshoot on medium enterprise routers on at


least two occasions.

In the course of the above, the candidate must:

 apply network topologies, routing and security protocols.

Note: If a specific volume or frequency is not stated, then evidence must be provided at
least once.

4
ICTNWK542– Install Operate and Troubleshoot medium enterprise routers.

KNOWLEDGE EVIDENCE

The candidate must be able to demonstrate knowledge to complete the tasks outlined in
the elements, performance criteria and foundation skills of this unit, including knowledge
of:

 industry standard routing concepts for medium enterprise network switches and
routers
 classless routing protocols, including:
 open shortest path first (OSPF)
 routing information protocol (RIPv2)
 debug commands
 internet protocol version 4 (IPv4)
 purpose and basic operation of protocols in the open system interconnection (OSI)
and transmission control protocol and internet protocol (TCP/IP) models
 router command line interface (CLI) configuration.

5
ICTNWK542– Install Operate and Troubleshoot medium enterprise routers.

TRAINING AND ASSESSMENT


Training for this unit of competency will be based on the elements and the performance criteria and
the performance and knowledge evidence identified in the unit of competency outline from
training.gov.au. It will be tailored or contextualized to meet workplace requirements and will be
aligned to the language and literacy level assessed for each unit.

Training will be delivered at the skill level required for each unit. The abilities and needs of the
student cohort will be assessed via a language, literacy and numeracy assessment on enrolment and
student support will be provided if required.

Assessment for this unit will be based on the elements and the performance criteria, the
performance and knowledge evidence and the assessment conditions. Assessment conditions -
Gather evidence to demonstrate consistent performance in conditions that are safe and replicate
the workplace. Noise levels, production flow, interruptions and time variances must be typical of
those experienced in the general ICT industry, and include access to:

 relevant computer software packages (Packet tracer)


 suitable hardware (desktop computers, Routers, Server, Switches)
 codes, standards and legislation relevant to the jurisdiction and the project
 project documentation (included in the practical activity assessment)
 research resources, including product information and data, theoretical texts and other
information (leaner’s guide, power point presentations, practical activity assessment,
Discovery online library)

Assessors must satisfy NVR/AQTF assessor requirements.

The details of how each unit and qualification will be delivered and assessed is outlined in the
Training and Assessment Strategy (TAS). The TAS is the framework for training and assessment,
developed by the AIBT.

INDICATIVE CONTENT
This section will include the lists of topics to be covered.

For Example:

 WHS legislations, codes, regulations and standards


 Network design
 Selection of Network elements
 Communication with vendors and suppliers
 Configuration of static and default routes
 Basic router security
 Firmware upgrade
 Subnetting and VLSM
 Configuration of classless routing protocols
 Troubleshooting of device and connectivity

6
ICTNWK542– Install Operate and Troubleshoot medium enterprise routers.

Please refer to the Session Plan for more details.

TEACHING STRATEGIES FOR THIS UNIT


Lectures, class discussions, research activities, demonstrations, hands-on practical exercises.

Lectures and class discussions in class will mainly be for the theory topics. The trainer will introduce
the topics and initiate interactivity as the discussion progresses through a particular session in the
class. Lectures are used to cover concepts and techniques of Routing and routing protocols such as
RIP, EIGRP and OSPF.

Research activities will be incorporated in practical assessment. These activities will entail
information gathering from various sources, including the Internet, and writing a report on a given
topic. Trainers are required to guide students and help them in research online and from the
resources provided.

Demonstrations will mainly be during practical sessions. The trainer will show how to carry out a
particular information technology (IT) task, e.g. how to configure EIGRP The students can do this
with the tutor as the demonstration progresses.

Hands-on practical exercises are intended for students to practice the IT tasks demonstrated by the
tutor. There are four weekly laboratory sessions, starting from Week 1.

Practical sessions will involve using tools to configure router, switches and server.

The trainer is required to explain the software resources that are used in this unit.

1) Packet Tracer

This software is required to be installed on a desktop or laptop. A demonstration would be


required as how packet tracer works and how we can connect routers, switches and PC.

7
ICTNWK542– Install Operate and Troubleshoot medium enterprise routers.

Link to download: https://www.netacad.com/courses/packet-tracer

Step 1: Create account

Step 2: Login and chose your operating type

Step 3: Download and run installation

8
ICTNWK542– Install Operate and Troubleshoot medium enterprise routers.

TYPES OF EVIDENCE
AIBT ensures that assessment is carried out in accordance with the requirements of the unit and the
standards and will implement an assessment process which identifies the evidence required for each
unit of competency. They will identify the type of evidence and the assessment methods used.

Types of evidence include:

 Direct Evidence – things that the assessor, observes first-hand, e.g., observation or work
samples

 Indirect Evidence – things that someone else has observed and reported to us, e.g., third
party reports

 Supplementary Evidence – other things that can indicate performance, such as training
records, questions, written work, portfolios

Assessment methods include:

 Written Activity

 Observation/Demonstration

 Practical Activity

 Questions

The assessment must comply with the assessment methods of the training package and be
conducted in accordance with the Principles of Assessment and assessment conditions. This means
the assessment must be fair, flexible, reliable and valid.

CONTEXTUALISING ASSESSMENT
Some units of competency are designed to be used across a number of qualifications and a range of
industry sectors. Delivery and assessment may need to be contextualized to meet the individual
requirements of the industry, the workplace and the cohort of students. Contextualizing assessment
can be difficult. To aid you in doing so and deciding on the outcome of your learners, this assessor
guide contains the benchmark answers and a mapping guide.

The assessments contain the performance criteria and knowledge and performance evidence that
the student should be displaying. If you are unsure whether they are displaying the relevant
information, you should refer to the benchmark answers and mapping guide.

9
ICTNWK542– Install Operate and Troubleshoot medium enterprise routers.

A result of competent or not yet competent is determined for the unit as a whole. Individual parts of
the assessment can be assessed as satisfactory or not satisfactory. Competency should only be
determined once all assessment activities are deemed satisfactory.

Giving a learner a not yet competent for a unit code must be justifiable and requires you to do
ensure that the performance criteria haven’t been met in a satisfactory way.

ASSESSMENT GUIDE
The following table shows you how to achieve a satisfactory result against the criteria for each type
of assessment task. The following is a list of general assessment methods that can be used in
assessing a unit of competency. Check your assessment tasks to identify the ones used in this unit of
competency.

Assessment Method Satisfactory Result Non-Satisfactory Result

The student will receive an overall result of Competent or Not Yet Competent for the unit. The assessment
process is made up of a number of assessment methods. The student is required to achieve a satisfactory result
in each of these to be deemed competent overall. An assessment may include the following assessment types.
Questions All questions answered correctly Incorrect answers for one or more
questions
Answers address the question in full; Answers do not address the
referring to appropriate sources question in full. Does not refer to
from your workbook and/or appropriate or correct sources.
workplace
Third Party Report Supervisor or manager observes Could not demonstrate consistency.
work performance and confirms that Could not demonstrate the ability to
you consistently meet the standards achieve the required standard
expected from an experienced
operator
Written Activity The assessor will mark the activity Does not follow
against the detailed guidelines/instructions
guidelines/instructions
Attachments if requested are Requested supplementary items are
attached not attached
All requirements of the written The response does not address the
activity are addressed/covered. requirements in full; is missing a
response for one or more areas.

Responses must refer to appropriate One or more of the requirements


sources from your workbook and/or are answered incorrectly.
workplace Does not refer to or utilize
appropriate or correct sources of
information
Observation/Demonstration All elements, criteria, knowledge and Could not demonstrate elements,
performance evidence and critical criteria, knowledge and performance
aspects of evidence, are evidence and/or critical aspects of
demonstrated at the appropriate evidence, at the appropriate AQF
AQF level level
Case Study All comprehension questions Lack of demonstrated
answered correctly; demonstrating comprehension of the underpinning
10
ICTNWK542– Install Operate and Troubleshoot medium enterprise routers.

Assessment Method Satisfactory Result Non-Satisfactory Result

The student will receive an overall result of Competent or Not Yet Competent for the unit. The assessment
process is made up of a number of assessment methods. The student is required to achieve a satisfactory result
in each of these to be deemed competent overall. An assessment may include the following assessment types.
an application of knowledge of the knowledge (remove) required to
topic case study. complete the case study questions
correctly. One or more questions
are answered incorrectly.
Answers address the question in full; Answers do not address the
referring to appropriate sources question in full; do not refer to
from your workbook and/or appropriate sources.
workplace
Practical Activity All tasks in the practical activity must Tasks have not been completed
be competed and evidence of effectively and evidence of
completion must be provided to your completion has not been provided.
trainer/assessor.
All tasks have been completed
accurately and evidence provided for
each stated task.
Attachments if requested are Requested supplementary items are
attached not attached

11
ICTNWK542– Install Operate and Troubleshoot medium enterprise routers.

ASSESSMENT COVER SHEET


Assessment Cover Sheet

Student’s name: USI

Date
Assessors Name:
Submitted:

The following questions are to be completed by the assessor:

Is the Student ready for assessment? Yes No

Has the assessment process been explained? Yes No

Does the Student understand which evidence is to be collected and


Yes No
how?

Have the Student’s rights and the appeal system been fully explained? Yes No

Have you discussed any special needs to be considered during


Yes No
assessment?

The following documents must be completed and attached:

 Written Activity and Checklist

The student will complete the written activity provided to them by S NYS
the assessor. The Written Activity Checklist will be completed by the
assessor.

 Practical Activity and Checklist

The student will complete the practical activity provided to them by S NYS
the assessor. The Practical Activity Checklist will be completed by the
assessor.

Student Declaration

I agree to undertake assessment in the knowledge that information gathered will only be used for
professional development purposes and can only be accessed by AIBT

I declare that:

 The material I have submitted is my own work;

 I have kept a copy of all relevant notes and reference material that I used in the production of my
work;

 I have given references for all sources of information that are not my own, including the words, ideas

12
ICTNWK542– Install Operate and Troubleshoot medium enterprise routers.

and images of others.

Student Signature: Date:

Result and Feedback

Feedback to Student

Overall Outcome Competent Not yet Competent


Assessor
Date:
Signature:

WRITTEN ACTIVITY

ICTNWK542 Q&A

1. Briefly define the following classless routing protocols (For each you are to describe what does
the acronym mean, what algorithm it uses, what IPV4 multicast IP addresses each protocol use, what
are the limitations of each protocol).
 OSPF
 RIPV2

=> The solution to this question is given below:-

A. OSPF (open shortest path first):

Abbreviations:

OSPF stands for Open Shortest Path First.

algorithm:

OSPF uses Dijkstra's algorithm to calculate the shortest path in the network.

13
ICTNWK542– Install Operate and Troubleshoot medium enterprise routers.

Multicast IP address:

OSPF uses the multicast IP address 224.0.0.5 for all OSPF routers and 224.0.0.6 for all
designated OSPF routers.

limit:

OSPF limitations are as follows:

1. Large networks have high computing and storage requirements.

2. The complexity of configuration and troubleshooting.

3. Reliance on reliable network connectivity with link-state database synchronization.

B.RIPV2 (Routing Information Protocol version 2):

Acronyms:

RIPV2 stands for Routing Information Protocol version 2.

algorithm:

RIPV2 uses the Bellman-Ford algorithm, specifically the distance vector algorithm, for
routing decisions.

Multicast IP address:

RIPV2 does not use multicast IP addresses for normal operations.

However, it uses 224.0.0.9 to update the RIPv2 route in some implementations.

boundary:

Some limitations of RIPV2 include:

1. Convergence time can be slow in large networks due to its periodic routing updates.

2. Limited scalability in complex networks.


3. Inefficient use of network bandwidth due to frequent routing updates.

14
ICTNWK542– Install Operate and Troubleshoot medium enterprise routers.

2. Briefly Explain OSI model (name and explain each layer of OSI model in brief)

=> The Open System Interconnection (OSI) model is a conceptual framework that helps
understand how protocols and network systems communicate with each other.

It consists of seven classes, each with its specific functions and responsibilities.

Here is a brief explanation of each class:

1. Physical layer:

The physical layer is responsible for transmitting and receiving raw bit streams over physical
media, such as cable or wireless signals. It deals with the physical characteristics of the network,
such as voltage levels, connectors, and data rates. Examples of devices:- Ethernet cable, hub,
repeater.

2. Data transmission level:

The data link layer provides reliable point-to-point data transmission between two nodes
connected on the same physical network segment. It handles error detection, and flow
control, and manages access to physical media. Device example:- Ethernet switch, bridge.

3. Network layer:

The network layer controls the behavior of subnets and determines the paths that data
packets take through multiple networks from source to destination. It deals with logical
addressing, routing, and fragmentation of data packets. Device example:- Router, IP
(Internet Protocol).

4. Shipping class:

he transport layer provides transparent and reliable data transmission between end
systems. It provides mechanisms for segmentation, reassembly, error control, and flow
control. Examples of protocols:- TCP (Transmission Control Protocol), and UDP (User
Datagram Protocol).

5. Session class:

The session layer establishes, manages, and terminates communication sessions between
applications running on different devices. It provides services such as session establishment,

15
ICTNWK542– Install Operate and Troubleshoot medium enterprise routers.

synchronization, and checkpoints. Function example:- API (application programming


interface).

6. Presentation class:

The presentation layer is responsible for representing, encoding, and compressing data. It ensures
that data exchanged between applications is properly formatted and presented. Function example:-
Encode, compress and convert ASCII to EBCDIC.

7. Application class:

The application layer provides a direct interface to end-user applications and services. It enables
communication between applications and combinations of protocols for tasks such as file transfer,
email, and remote access. Examples of protocols:- HTTP (Hypertext Transfer Protocol), FTP (File
Transfer Protocol), and SMTP (Simple Mail Transfer Protocol).

3. Briefly Explain the TCP/IP Model (Name and explain each layer of TCP/IP model in brief)

=> The TCP/IP model is a conceptual framework used to understand and describe how data is
transmitted over the Internet. It consists of four layers, each serving a specific purpose in the
communication process. Let's briefly explain each class:

1. Application layer :

The application layer is the layer closest to the end user and provides services directly to users or
applications. It includes protocols like HTTP (Hypertext Transfer Protocol), SMTP (Simple Mail
Transfer Protocol), FTP (File Transfer Protocol), and DNS (Domain Name System). This class handles
tasks like file transfer, email exchange, web browsing, etc.

2. Transportation layer:

16
ICTNWK542– Install Operate and Troubleshoot medium enterprise routers.

The transport layer ensures reliable and orderly data transmission between devices. It uses TCP
(Transmission Control Protocol) and UDP (User Datagram Protocol). TCP provides reliable,
connection-oriented communication with features such as error recovery, flow control, and
retransmission of lost data. UDP, on the other hand, provides connectionless, unreliable
communication, making it suitable for applications where real-time delivery is more important than
error handling.

2. Internet layer:

The Internet layer is responsible for addressing and routing packets across different networks. It uses
Internet Protocol (IP) to encapsulate data in packets and add source and destination IP addresses.
The internet layer allows devices to locate each other on the network using IP addresses and ensure
that data packets are sent to the correct destination.

4. Link layer:

The link layer, also known as the network interface layer, is responsible for the physical transmission
of data over a particular network medium. It deals with the protocols and technologies that control
the interaction between network equipment and the physical network, such as Ethernet, Wi-Fi, or
DSL. This layer defines how data is formatted, addressed, transmitted, and received over the physical
network.

In summary, the TCP/IP model consists of Application Layer, Transport Layer, Internet Layer, and
Connection Layer. Each layer performs a specific function that facilitates the movement of data
across the Internet, from providing services to end users (application layer) to transferring data over
physical networks (link layer). Understanding the TCP/IP model helps you understand how
communication takes place over computer networks.

4. Explain routing and switching. How business use routing and switching

=> Routing and switching are fundamental components of computer networks, and enterprises rely
on them to ensure efficient and effective communication within their network infrastructure.
Routing:

17
ICTNWK542– Install Operate and Troubleshoot medium enterprise routers.

Routing is the process of determining the best path for a data packet to travel from source to
destination over interconnected networks. Routers are network devices responsible for forwarding
data packets based on certain criteria, such as IP addresses. It analyzes the destination address in
the packet header and uses routing tables to determine how to forward the packet.Routing enables
enterprises to establish efficient communications between different networks or subnets. For
example, if a company has multiple office locations connected by a wide area network (WAN),
routers play an important role in routing data packets between those locations. It looks at the
destination IP address and chooses the best path. In doing so, it considers factors such as network
congestion, connection reliability, and other metrics to ensure that packets reach their intended
destination.

switching:

Switching, on the other hand, is the process of forwarding data packets within a local area network
(LAN). A switch is a network device that connects devices such as computers, servers, printers, and
other network devices in a LAN. It operates at the data link layer (Layer 2) of the TCP/IP model and
uses MAC addresses to make forwarding decisions.When the switch receives a data packet, it looks
at her MAC address in the packet header and consults its MAC address table. This table maps MAC
addresses to the appropriate ports on the switch. Based on this information, the switch decides
which outbound port to forward the packet to, enabling communication between devices within the
same network segment.

5. Explain briefly IPV4. (how many bits, how many octets, list the IP address for all classes,
Explain private and public Ip address .What are private IP address ranges for IPV4)

=> IPv4 (Internet Protocol version 4):

18
ICTNWK542– Install Operate and Troubleshoot medium enterprise routers.

IPv4 is the fourth version of the Internet Protocol and is the most widely used protocol for
identifying and addressing devices on networks.It uses a 32-bit address space divided into four dot-
separated octets (groups of 8 bits), giving a total of 4.3 billion unique IP addresses.

IP address class:

IPv4 defines five classes of IP addresses:

A, B, C, D, and E. The class is determined by the range of values in the first octet. The IP address
ranges for each class are:

class a:

The first octet starts with a value between 1 and 126.

example:

10.0.0.0 to 10.255.255.255 or 172.16.0.0 to 172.31.255.255

Class B:

The first octet starts with a value between 128 and 191.

Example: 172.16.0.0 to 172.31.255.255

Class C:

The first octet starts with a value between 192 and 223.

Example: 192.168.0.0 to 192.168.255.255

Class D:

Reserved for multicast addresses.

Example: 224.0.0.0 to 239.255.255.255

Class E:

Reserved for experimental purposes.

Example: 240.0.0.0 to 255.255.255.255

Private and public IP addresses:

IPv4 uses private and public IP addresses to distinguish between internal and external networks.

1. Private IP address:

Private IP addresses are used within private networks such as local area networks (LANs) and are not
directly accessible from the Internet.
19
ICTNWK542– Install Operate and Troubleshoot medium enterprise routers.

Private IP addresses allow devices on the same network to communicate with each other.

The three private IP address ranges set by the Internet Assigned Numbers Authority (IANA) for IPv4
are:

Class A:

10.0.0.0 to 10.255.255.255

Class B:

172.16.0.0 to 172.31.255.255

Class C:

192.168.0.0 to 192.168.255.255

2. Public IP address:

Devices that are directly connected to the Internet are assigned public IP addresses. Uniquely
identifies your device on the public Internet. Public IP addresses are obtained from your Internet
Service Provider (ISP) and are used for communication between different networks on the Internet.

NOTES: Private IP addresses are not routable on the internet. However, when accessing the internet,
it can be translated to a public IP address through a process called network address translation
(NAT).
In summary, IPv4 is a widely used protocol that uses a 32-bit address space divided into 4 octets. IP
addresses are divided into classes, with the first octet of each class having a specific range of values.
Private IP addresses are used on private networks and are not directly accessible from the Internet.
Public IP addresses, on the other hand, are assigned to devices that connect directly to the Internet
and allow communication between different networks.

6.
I. Convert 192.168.10.30 and 255.255.255.0 to binary

20
ICTNWK542– Install Operate and Troubleshoot medium enterprise routers.

=> To convert an IP address or subnet mask to its binary representation, each octet (group of 8
bits) must be converted to its binary representation.

IP address 192.168.10.30:

Octet 1:

192 => 11000000

Octet 2:

168 => 10101000

Octet 3:

10 => 00001010

Octet 4:

30 => 00011110

In binary, the IP address is 192.168.10.30.

11000000.10101000.00001010.00011110

Subnet mask 255.255.255.0:

Octet 1:

255 => 11111111

Octet 2:

255 => 11111111

Octet 3:

255 => 11111111

Octet 4:

0 => 00000000

In binary, the subnet mask is 255.255.255.0.

11111111.11111111.11111111.00000000

21
ICTNWK542– Install Operate and Troubleshoot medium enterprise routers.

By converting IP addresses and subnet masks to binary values, individual bits can be analyzed
and various network calculations and configurations can be performed as needed.

7. List at least three debug commands you can use for EIGRP

=> There are three debug commands available for debugging Enhanced Interior Gateway Routing
Protocol (EIGRP). Debug commands are useful for troubleshooting network problems and gaining
insight into routing processes. Here are three debug commands commonly used with EIGRP:

1. Debugging the Eigrp package:

This command allows you to debug EIGRP packets and provide detailed information about EIGRP
packets exchanged between routers. Displays EIGRP packet content, including source and
destination IP addresses, EIGRP message type, and other relevant information. This command is
typically used in conjunction with a specific EIGRP process ID or Autonomous System Number (ASN)
to filter the output.

2. Debug Eigrp neighbor:

This command enables EIGRP neighbor relationship debugging. Provides information about
establishing, maintaining, and terminating EIGRP neighbor relationships. When run, it displays
details such as neighbor IP addresses, interface information, EIGRP adjacency events, and error
messages related to neighbor formation. Similarly, this command is often used with a specific EIGRP
process ID or ASN for targeted debugging.

3. Debug eigrp events:

22
ICTNWK542– Install Operate and Troubleshoot medium enterprise routers.

This command allows you to debug EIGRP events and capture important events related to EIGRP
operation. Gain insight into events such as topology changes, route updates, metric changes, route
flaps, and all major EIGRP-related events. This command will help you understand the behavior and
dynamics of t EIGRP in your network.

Be aware that debug commands can generate a large amount of output that can affect router
performance. It is important to use these judiciously and sele and enable debugging only for as long
as necessary to avoid unnecessary network disruption.

NOTES:
The exact syntax and availability of debug commands may vary depending on the router operating
system and software version. We recommend that you refer to your router platform-specific
documentation or command reference for exact command usage.

8. What is router CLI? Explain the following command modes (user EXEC, Privileged EXEC,
Global Configuration, Interface Configuration) and list the appropriate commands that you
would use to enter those modes.

=> The Command Line Interface (CLI) provides a uniform control interface for the router and
can be used to get/set configuration parameters, apply updates, restart services, or perform
other system tasks.

The router CLI provides a text-based interface for manipulating and configuring router
settings.

Command mode:

23
ICTNWK542– Install Operate and Troubleshoot medium enterprise routers.

1. User EXEC mode:

User EXEC "Executive" This mode is the initial mode when accessing the router CLI. Provides
basic access to view router status and perform limited monitoring functions. Prompts usually
end with a ">" symbol. To enter user EXEC mode, simply connect to the router through a
console or Telnet session.

2. Privileged EXEC mode:

Privileged EXEC mode is also called activation mode or privileged mode. This gives you
access to all router commands and allows you to change settings. Privileged EXEC mode
allows more control and requires a password for security. Prompts usually end with a "#"
sign. Enter the enable command followed by the activation password to enter privileged
EXEC mode.

3. Global setting mode:

Global configuration mode allows you to configure various global router settings. B.
Hostnames, interface parameters, routing protocols, security features. In this mode, you can
make changes that affect the entire router. The prompt usually ends with "(config)#". To
enter global configuration mode, use the configure terminal or conf t command from
privileged EXEC mode.

4. Interface configuration mode:

Interface configuration mode is used to configure individual router interfaces. You can
configure interface-specific settings such as IP address, subnet mask, speed, duplex, and
other parameters. The command prompt usually shows the interface name. To enter
interface configuration mode, specify the interface name after the "interface" command. B.
"Interface GigabitEthernet0/1".

Command to enter the mode:

i.User EXEC mode:

Connect to your router using a console or telnet.

ii. Privileged EXEC mode:

Enter and use the activation password after the Enable command.

iii. Global setting mode:

From privileged EXEC mode, use the configure terminal or conf t command.

iv. Interface configuration mode:

Use the "interface" command followed by the interface name. B. "Interface


GigabitEthernet0/1".

Here's an example of how the prompt changes when moving between command modes:
24
ICTNWK542– Install Operate and Troubleshoot medium enterprise routers.

Router>

Router > enable

password:*****

Router #

Router#configure terminal

Router (config)#

router(config)# interface GigabitEthernet 0/1

Router(config-if)#
By navigating through these command modes, you can access and configure various aspects
of router configuration, from global settings to specific interface settings, so you can
customize the router to meet your network needs.

WRITTEN ACTIVITY MARKING


GUIDE

Q&A Assessment –
STUDENT’S
STUDENT NO:
NAME:

ASSESSOR’S DATE:
NAME:

UNIT ICTNWK542 – Install, operate and troubleshoot medium enterprise routers


NAME:

In this assessment the student: Satisfactory Not yet Satisfactory Comments

Met the requirements of the assessment


criterion as specified

Q1. Described the routing protocols  


with respect to
 Acronym
 Algorithm used
 IPV4 multicast address used

25
ICTNWK542– Install Operate and Troubleshoot medium enterprise routers.

 Limitation of the protocol

Q.2 Explained OSI layers:  


Briefly listed and explained 7 layers
of OSI model

Q.3 Explained Each layer of TCP/IP  


sufficiently

Q.4 Explained routing and switching  


and how business use them

Q.5 Explained IPV4 briefly.  


Listed the classes of IPV4

Q.6 Debug commands for EIGRP  

Q.7 Explained the router CLI and the  


commands

Feedback to Student:

Assessment  Satisfactory  Not Yet Satisfactory  Re-assessment required


Result

Student

26
ICTNWK542– Install Operate and Troubleshoot medium enterprise routers.

signature Student’s Signature Date:


and
declaration. The result of my performance in this assessment has been discussed and explained to me
I would like to appeal the result of this assessment
Assessor’s Assessor’s Declaration:
signature
I hereby certify that the above student has been assessed by me and the assessment was
and
carried out as per AIBT Policies and Procedures.
declaration.

Assessor’s Signature: Date

27
ICTNWK542– Install Operate and Troubleshoot medium enterprise routers.

PRACTICAL ACTIVITY
ASSESSOR NOTE

These instructions must be followed when assessing the student in this unit. The checklist on the
following page is to be completed for each student. Please refer to separate mapping document
for specific details relating to the alignment of this task to the unit requirements.

This competency is to be assessed using standard and authorized work practices, safety
requirements and environmental constraints. Assessment of essential underpinning knowledge will
usually be conducted in an off-site context. Assessment is to comply with relevant regulatory or
Australian standards' requirements.

Resource implications for assessment include:

 an induction procedure and requirement


 realistic tasks or simulated tasks covering the mandatory task requirements
 relevant specifications and work instructions
 tools and equipment appropriate for applying safe work practices
 support materials appropriate to the activity
 workplace instructions relating to safe work practices and addressing hazards and
emergencies
 material safety data sheets
 research resources, including industry-related systems information.

Reasonable adjustments for people with disabilities must be made to assessment processes where
required. This could include access to modified equipment and other physical resources, and the
provision of appropriate assessment support.

This assessment task requires the student to:

 Create a network diagram


 Implement a VLSM
 Configure security in the routers
 Configure Classless routing protocols
 Troubleshooting of the device
 Implement authentication, authorisation and accounting

This project should be completed with reference to a simulated ICT/Business environment. For the
practice environment, noise levels, production flow, interruptions and time variances must be typical
of those experienced in the ICT project management field of work and include access to:

 relevant computer software packages


 suitable hardware
 codes, standards and legislation relevant to the jurisdiction and the project
 project documentation
 research resources, including product information and data, theoretical texts and other
information.

28
ICTNWK542– Install Operate and Troubleshoot medium enterprise routers.

Please refer to the assessment document for the specifications. Note that this is an individual task.

Throughout the assessment task, ensure that you refer to and apply the Australian Computer Society
Code of Ethics.

Develop Specifications and Terms of Reference for the project that includes:

Within your practice environment, complete each of the following parts (Note: Parts of this
assessment task, such as project execution, will be simulated in your practice environment):

PRACTICAL ACTIVITY
CASE STUDY

Scenario

You are working as IT Specialist for AIBT Corporation, Sydney. Currently they

Have a flat where they have their HR and the Finance department. As the number has grown
significantly, They have acquired the new building and have placed the Sales and marketing
department in the new building.

Currently AIBT is using the peer-to-peer network consists of eight IBM compatible PCs (Intel Pentium
Duo Core 1.6MHz) running Windows XP and two Canon iR C3080 printers. You have noted that
much of co-axial cabling runs across the floor and are serious OH & S issues.

AIBT has fifteen IBM compatibles PCs (Intel Pentium Duo Core 1.6 MHz), one Hewlett Packard
HP800N Laser and one Hewlett Packard HP4500DN color printer. The IBM PCs are running Windows
7 connected to peer-to-peer using coaxial cables.

You are recommended to connect the two sites so that IT will be easier for them to work. You have
been asked to maintain the basic router security on both the routers. You are also recommended to
install separate file server in the network was approved to allow effective sharing of information
resources and increase security and overall productivity. It is expected that there will be heavy
sharing of data between two offices.

Background
In this activity, you are given a 192.168.72.0 /24 network address to use to design a VLSM addressing
scheme. Based on a set of requirements, you will assign subnets and addressing, configure devices and
verify connectivity.

29
ICTNWK542– Install Operate and Troubleshoot medium enterprise routers.

Task

 Step 1: Determine the number of subnets needed.


 You will subnet the network address 192.168.72.0/24. The network has the following requirements:
  SW-1 will be configured for the HR department which will require 7 host IP addresses
  SW-2 should be configured as the Finance department which will require 15 host IP addresses
  SW-3 should be configured for the marketing department will require 29 host IP addresses
  SW-4 should be configured as the sales department which will require 58 host IP addresses

1. Identify and analyse existing router performance against organisational requirements


2. Review the existing design documentation and determine alignment to organisational
requirements

3. You are to design the network topology.


4. Design the VLSM Addressing Scheme

5. Select and Contact vendors make documentation for the specifications such as the switches
you will be using, the routers, the cables and complete the cost analysis
6. Develop the plan with task priority and contingency arrangement for the installation of
components with minimum disruptions to the client
7. Get the client sign off for the preliminary concept including security and timings.
8. Determine the basic routing requirements and its operating parameters according to
installation plan specifications by using questioning skills on clients
9. Select required media, cables, ports, connectors and connect routers to network devices and
hosts according to installation plan specifications
10. Access and use the router to set basic parameters and Upgrade the firmware on the router
11. Configure the basic router security according to installation plan specifications
12. Configure the static and default routes according to installation plan specifications
13. Configure and Verify the classless routing protocols such as EIGRP using variable length
subnet mapping (VLSM) according to router specifications
14. Assign IP Addresses to Devices in LAN and WAN and Verify Connectivity
15. Save and backup the router configuration files according to installation plan specifications
16. Troubleshoot the device configuration and network connectivity using basic program utilities
17. Document the common problems with the IP addressing
18. Provide the brief report and seek and respond to feedback from required personnel

30
ICTNWK542– Install Operate and Troubleshoot medium enterprise routers.

PRACTICAL ACTIVITY MARKING


GUIDE
*Multiple copies of the checklist will need to be printed if the task is to be completed more than once.

Practical Assessment –
STUDENT’S NAME: STUDENT NO:

ASSESSOR’S DATE:
NAME:

UNIT NAME: ICTNWK542 – Install, operate and troubleshoot medium enterprise routers

In this assessment the student: Satisfactory Not yet Comments


Satisfactory

Met the requirements of the assessment


criterion as specified

1 Identify and analyse existing router ☐ ☐


performance against organisational
requirements

2. Review of the existing topology ☐ ☐


provided

3. Designed the network topology ☐ ☐

4. IP addressing table Created ☐ ☐

5. Selected and contacted the vendors ☐ ☐


for equipment specification

6. Developed the plan with task ☐ ☐


priority and contingency
7. Client signoff for preliminary ☐ ☐
concept
8. Determined the basic routing ☐ ☐
requirements and the operating
parameters
9. Select required media, cables, ports, ☐ ☐
connectors and connect routers to
network devices and hosts according
to installation plan specifications

31
ICTNWK542– Install Operate and Troubleshoot medium enterprise routers.

10.Set basic parameters and router ☐ ☐


firmware according to installation plan
specifications
11. Configured the basic router ☐ ☐
security

12. Configure the static and default ☐ ☐


routes according to installation plan
specifications

13. Configured and verified the ☐ ☐


classless routing protocol.

14. Assign IP Addresses to Devices in ☐ ☐


LAN and WAN and Verify Connectivity

15. Saved and backed up the router ☐ ☐


configuration

16. Troubleshoot the device ☐ ☐


configuration and network connectivity
using basic program utilities

17. Document the common problems ☐ ☐


with the IP addressing

18. Provide the brief report and seek ☐ ☐


and respond to feedback from required
personnel

Feedback to Student:

Assessment  Satisfactory  Not Yet Satisfactory  Re-assessment required


32
ICTNWK542– Install Operate and Troubleshoot medium enterprise routers.

Result

Student
signature and
declaration. Student’s Signature Date:

The result of my performance in this assessment has been discussed and explained
to me

I would like to appeal the result of this assessment


Assessor’s Assessor’s Declaration:
signature and
I hereby certify that the above student has been assessed by me and the assessment
declaration.
was carried out as per AIBT Policies and Procedures.

Assessor’s Signature: Date

33
ICTNWK542– Install Operate and Troubleshoot medium enterprise routers.

UNIT ASSESSMENT PACK (UAP) –


COVER SHEET
Student and Trainer/Assessor Details

Student ID

Student name

Contact number

Email address

Trainer/Assessor name

Course and Unit Details

Course code

Course name

Unit code

Unit name

Assessment Submission Method

By hand to trainer/assessor By email to Online submission via Learning


trainer/assessor Management System (LMS)

By Australia Post to RTO Any other method


_________________________________________________

(Please mention here)

Student Declaration

 I certify that the work submitted for this assessment pack is my own. I have clearly
referenced any sources used in my submission. I understand that a false declaration is a
form of malpractice;

 I have kept a copy of this assessment pack and all relevant notes, attachments, and
reference material that I used in the production of the assessment pack;

 For the purposes of assessment, I give the trainer/assessor of this assessment the
permission to:

34
ICTNWK542– Install Operate and Troubleshoot medium enterprise routers.

 Reproduce this assessment and provide a copy to another member of staff; and

 Take steps to authenticate the assessment, including communicating a copy of this


assessment to a checking service (which may retain a copy of the assessment on its
database for future plagiarism checking).

Student signature: ________________________________

Date: ____/_____/______________

35

You might also like