ICTNWK542 - Assessments
ICTNWK542 - Assessments
Contents
1. Unit information............................................................................................................................
2. training and assessment................................................................................................................
3. TyPES of evidence..........................................................................................................................
4. Contextualising assessment..........................................................................................................
5. assessment guide........................................................................................................................
6. Assessment cover sheet............................................................................................................
7. written activity............................................................................................................................
8. Written Activity MARKING GUIDE...............................................................................................
9. Practical Activity..........................................................................................................................
10. Practical Activity..........................................................................................................................
11. Scenario....................................................................................................................................
12. Practical Activity MARKING GUIDE..............................................................................................
13. Unit Assessment Pack (UAP) – Cover Sheet.................................................................................
2
ICTNWK542– Install Operate and Troubleshoot medium enterprise routers.
UNIT INFORMATION
This Assessor Guide provides information to assess the unit ICTNWK542 – Design and implement a
security system. This unit forms part of an accredited training course. Accreditation means that it
must meet the required standards, and this includes ensuring all units of competency are assessed
fairly, flexible and provide enough, authentic evidence to make a judgment and decision on
competence.
The training and assessment activities for this unit and the other units included in the qualification
are designed to reflect workplace requirements and to equip a student to be an effective worker.
After successful completion of your course, educational outcomes and pathways may include an
entry into further training and/or higher education.
This unit describes the skills and knowledge required to use the appropriate tools, equipment,
software and protocols to install, operate and troubleshoot, medium enterprise routers.
support.
No licensing, legislative or certification requirements apply to this unit at the time of publication.
PERFORMANCE CRITERIA
1. Prepare to install router
1.1 Identify and analyse existing router performance against organisational
requirements
1.2 Review existing network design documentation and determine alignment to
organisational requirements
1.3 Determine network element additions and upgrades according to organisational
requirements
1.4 Develop and document installation plan and submit document to required
personnel
1.5 Obtain installation plan sign off from required personnel
2. Configure basic router operation
2.1 Determine basic routing requirements and operating parameters according to
installation plan specifications
2.2 Select required media, cables, ports, connectors and connect routers to network
devices and hosts according to installation plan specifications
3
ICTNWK542– Install Operate and Troubleshoot medium enterprise routers.
2.3 Set basic parameters and router firmware according to installation plan
specifications
2.4 Save and back up router configuration files according to installation plan
specifications
2.5 Implement required router security and configure static and default routes
according to installation plan specifications
3. Configure dynamic classless routing protocols
3.1 Calculate and apply required classless IP addressing scheme using variable length
subnet mapping (VLSM) to a local area network (LAN) and a wide area network
(WAN) environment according to router specifications
3.2 Configure and verify required classless routing protocols according to router
specifications
4. Apply troubleshooting processes
4.1 Troubleshoot device configuration and network connectivity according to
network specifications
4.2 Identify and correct problems with IP addressing and host configurations
according to network specifications
4.3 Seek and respond to feedback from required personnel
PERFORMANCE EVIDENCE
The candidate must demonstrate the ability to complete the tasks outlined in the elements,
performance criteria and foundation skills of this unit, including evidence of the ability to:
Note: If a specific volume or frequency is not stated, then evidence must be provided at
least once.
4
ICTNWK542– Install Operate and Troubleshoot medium enterprise routers.
KNOWLEDGE EVIDENCE
The candidate must be able to demonstrate knowledge to complete the tasks outlined in
the elements, performance criteria and foundation skills of this unit, including knowledge
of:
industry standard routing concepts for medium enterprise network switches and
routers
classless routing protocols, including:
open shortest path first (OSPF)
routing information protocol (RIPv2)
debug commands
internet protocol version 4 (IPv4)
purpose and basic operation of protocols in the open system interconnection (OSI)
and transmission control protocol and internet protocol (TCP/IP) models
router command line interface (CLI) configuration.
5
ICTNWK542– Install Operate and Troubleshoot medium enterprise routers.
Training will be delivered at the skill level required for each unit. The abilities and needs of the
student cohort will be assessed via a language, literacy and numeracy assessment on enrolment and
student support will be provided if required.
Assessment for this unit will be based on the elements and the performance criteria, the
performance and knowledge evidence and the assessment conditions. Assessment conditions -
Gather evidence to demonstrate consistent performance in conditions that are safe and replicate
the workplace. Noise levels, production flow, interruptions and time variances must be typical of
those experienced in the general ICT industry, and include access to:
The details of how each unit and qualification will be delivered and assessed is outlined in the
Training and Assessment Strategy (TAS). The TAS is the framework for training and assessment,
developed by the AIBT.
INDICATIVE CONTENT
This section will include the lists of topics to be covered.
For Example:
6
ICTNWK542– Install Operate and Troubleshoot medium enterprise routers.
Lectures and class discussions in class will mainly be for the theory topics. The trainer will introduce
the topics and initiate interactivity as the discussion progresses through a particular session in the
class. Lectures are used to cover concepts and techniques of Routing and routing protocols such as
RIP, EIGRP and OSPF.
Research activities will be incorporated in practical assessment. These activities will entail
information gathering from various sources, including the Internet, and writing a report on a given
topic. Trainers are required to guide students and help them in research online and from the
resources provided.
Demonstrations will mainly be during practical sessions. The trainer will show how to carry out a
particular information technology (IT) task, e.g. how to configure EIGRP The students can do this
with the tutor as the demonstration progresses.
Hands-on practical exercises are intended for students to practice the IT tasks demonstrated by the
tutor. There are four weekly laboratory sessions, starting from Week 1.
Practical sessions will involve using tools to configure router, switches and server.
The trainer is required to explain the software resources that are used in this unit.
1) Packet Tracer
7
ICTNWK542– Install Operate and Troubleshoot medium enterprise routers.
8
ICTNWK542– Install Operate and Troubleshoot medium enterprise routers.
TYPES OF EVIDENCE
AIBT ensures that assessment is carried out in accordance with the requirements of the unit and the
standards and will implement an assessment process which identifies the evidence required for each
unit of competency. They will identify the type of evidence and the assessment methods used.
Direct Evidence – things that the assessor, observes first-hand, e.g., observation or work
samples
Indirect Evidence – things that someone else has observed and reported to us, e.g., third
party reports
Supplementary Evidence – other things that can indicate performance, such as training
records, questions, written work, portfolios
Written Activity
Observation/Demonstration
Practical Activity
Questions
The assessment must comply with the assessment methods of the training package and be
conducted in accordance with the Principles of Assessment and assessment conditions. This means
the assessment must be fair, flexible, reliable and valid.
CONTEXTUALISING ASSESSMENT
Some units of competency are designed to be used across a number of qualifications and a range of
industry sectors. Delivery and assessment may need to be contextualized to meet the individual
requirements of the industry, the workplace and the cohort of students. Contextualizing assessment
can be difficult. To aid you in doing so and deciding on the outcome of your learners, this assessor
guide contains the benchmark answers and a mapping guide.
The assessments contain the performance criteria and knowledge and performance evidence that
the student should be displaying. If you are unsure whether they are displaying the relevant
information, you should refer to the benchmark answers and mapping guide.
9
ICTNWK542– Install Operate and Troubleshoot medium enterprise routers.
A result of competent or not yet competent is determined for the unit as a whole. Individual parts of
the assessment can be assessed as satisfactory or not satisfactory. Competency should only be
determined once all assessment activities are deemed satisfactory.
Giving a learner a not yet competent for a unit code must be justifiable and requires you to do
ensure that the performance criteria haven’t been met in a satisfactory way.
ASSESSMENT GUIDE
The following table shows you how to achieve a satisfactory result against the criteria for each type
of assessment task. The following is a list of general assessment methods that can be used in
assessing a unit of competency. Check your assessment tasks to identify the ones used in this unit of
competency.
The student will receive an overall result of Competent or Not Yet Competent for the unit. The assessment
process is made up of a number of assessment methods. The student is required to achieve a satisfactory result
in each of these to be deemed competent overall. An assessment may include the following assessment types.
Questions All questions answered correctly Incorrect answers for one or more
questions
Answers address the question in full; Answers do not address the
referring to appropriate sources question in full. Does not refer to
from your workbook and/or appropriate or correct sources.
workplace
Third Party Report Supervisor or manager observes Could not demonstrate consistency.
work performance and confirms that Could not demonstrate the ability to
you consistently meet the standards achieve the required standard
expected from an experienced
operator
Written Activity The assessor will mark the activity Does not follow
against the detailed guidelines/instructions
guidelines/instructions
Attachments if requested are Requested supplementary items are
attached not attached
All requirements of the written The response does not address the
activity are addressed/covered. requirements in full; is missing a
response for one or more areas.
The student will receive an overall result of Competent or Not Yet Competent for the unit. The assessment
process is made up of a number of assessment methods. The student is required to achieve a satisfactory result
in each of these to be deemed competent overall. An assessment may include the following assessment types.
an application of knowledge of the knowledge (remove) required to
topic case study. complete the case study questions
correctly. One or more questions
are answered incorrectly.
Answers address the question in full; Answers do not address the
referring to appropriate sources question in full; do not refer to
from your workbook and/or appropriate sources.
workplace
Practical Activity All tasks in the practical activity must Tasks have not been completed
be competed and evidence of effectively and evidence of
completion must be provided to your completion has not been provided.
trainer/assessor.
All tasks have been completed
accurately and evidence provided for
each stated task.
Attachments if requested are Requested supplementary items are
attached not attached
11
ICTNWK542– Install Operate and Troubleshoot medium enterprise routers.
Date
Assessors Name:
Submitted:
Have the Student’s rights and the appeal system been fully explained? Yes No
The student will complete the written activity provided to them by S NYS
the assessor. The Written Activity Checklist will be completed by the
assessor.
The student will complete the practical activity provided to them by S NYS
the assessor. The Practical Activity Checklist will be completed by the
assessor.
Student Declaration
I agree to undertake assessment in the knowledge that information gathered will only be used for
professional development purposes and can only be accessed by AIBT
I declare that:
I have kept a copy of all relevant notes and reference material that I used in the production of my
work;
I have given references for all sources of information that are not my own, including the words, ideas
12
ICTNWK542– Install Operate and Troubleshoot medium enterprise routers.
Feedback to Student
WRITTEN ACTIVITY
ICTNWK542 Q&A
1. Briefly define the following classless routing protocols (For each you are to describe what does
the acronym mean, what algorithm it uses, what IPV4 multicast IP addresses each protocol use, what
are the limitations of each protocol).
OSPF
RIPV2
Abbreviations:
algorithm:
OSPF uses Dijkstra's algorithm to calculate the shortest path in the network.
13
ICTNWK542– Install Operate and Troubleshoot medium enterprise routers.
Multicast IP address:
OSPF uses the multicast IP address 224.0.0.5 for all OSPF routers and 224.0.0.6 for all
designated OSPF routers.
limit:
Acronyms:
algorithm:
RIPV2 uses the Bellman-Ford algorithm, specifically the distance vector algorithm, for
routing decisions.
Multicast IP address:
boundary:
1. Convergence time can be slow in large networks due to its periodic routing updates.
14
ICTNWK542– Install Operate and Troubleshoot medium enterprise routers.
2. Briefly Explain OSI model (name and explain each layer of OSI model in brief)
=> The Open System Interconnection (OSI) model is a conceptual framework that helps
understand how protocols and network systems communicate with each other.
It consists of seven classes, each with its specific functions and responsibilities.
1. Physical layer:
The physical layer is responsible for transmitting and receiving raw bit streams over physical
media, such as cable or wireless signals. It deals with the physical characteristics of the network,
such as voltage levels, connectors, and data rates. Examples of devices:- Ethernet cable, hub,
repeater.
The data link layer provides reliable point-to-point data transmission between two nodes
connected on the same physical network segment. It handles error detection, and flow
control, and manages access to physical media. Device example:- Ethernet switch, bridge.
3. Network layer:
The network layer controls the behavior of subnets and determines the paths that data
packets take through multiple networks from source to destination. It deals with logical
addressing, routing, and fragmentation of data packets. Device example:- Router, IP
(Internet Protocol).
4. Shipping class:
he transport layer provides transparent and reliable data transmission between end
systems. It provides mechanisms for segmentation, reassembly, error control, and flow
control. Examples of protocols:- TCP (Transmission Control Protocol), and UDP (User
Datagram Protocol).
5. Session class:
The session layer establishes, manages, and terminates communication sessions between
applications running on different devices. It provides services such as session establishment,
15
ICTNWK542– Install Operate and Troubleshoot medium enterprise routers.
6. Presentation class:
The presentation layer is responsible for representing, encoding, and compressing data. It ensures
that data exchanged between applications is properly formatted and presented. Function example:-
Encode, compress and convert ASCII to EBCDIC.
7. Application class:
The application layer provides a direct interface to end-user applications and services. It enables
communication between applications and combinations of protocols for tasks such as file transfer,
email, and remote access. Examples of protocols:- HTTP (Hypertext Transfer Protocol), FTP (File
Transfer Protocol), and SMTP (Simple Mail Transfer Protocol).
3. Briefly Explain the TCP/IP Model (Name and explain each layer of TCP/IP model in brief)
=> The TCP/IP model is a conceptual framework used to understand and describe how data is
transmitted over the Internet. It consists of four layers, each serving a specific purpose in the
communication process. Let's briefly explain each class:
1. Application layer :
The application layer is the layer closest to the end user and provides services directly to users or
applications. It includes protocols like HTTP (Hypertext Transfer Protocol), SMTP (Simple Mail
Transfer Protocol), FTP (File Transfer Protocol), and DNS (Domain Name System). This class handles
tasks like file transfer, email exchange, web browsing, etc.
2. Transportation layer:
16
ICTNWK542– Install Operate and Troubleshoot medium enterprise routers.
The transport layer ensures reliable and orderly data transmission between devices. It uses TCP
(Transmission Control Protocol) and UDP (User Datagram Protocol). TCP provides reliable,
connection-oriented communication with features such as error recovery, flow control, and
retransmission of lost data. UDP, on the other hand, provides connectionless, unreliable
communication, making it suitable for applications where real-time delivery is more important than
error handling.
2. Internet layer:
The Internet layer is responsible for addressing and routing packets across different networks. It uses
Internet Protocol (IP) to encapsulate data in packets and add source and destination IP addresses.
The internet layer allows devices to locate each other on the network using IP addresses and ensure
that data packets are sent to the correct destination.
4. Link layer:
The link layer, also known as the network interface layer, is responsible for the physical transmission
of data over a particular network medium. It deals with the protocols and technologies that control
the interaction between network equipment and the physical network, such as Ethernet, Wi-Fi, or
DSL. This layer defines how data is formatted, addressed, transmitted, and received over the physical
network.
In summary, the TCP/IP model consists of Application Layer, Transport Layer, Internet Layer, and
Connection Layer. Each layer performs a specific function that facilitates the movement of data
across the Internet, from providing services to end users (application layer) to transferring data over
physical networks (link layer). Understanding the TCP/IP model helps you understand how
communication takes place over computer networks.
4. Explain routing and switching. How business use routing and switching
=> Routing and switching are fundamental components of computer networks, and enterprises rely
on them to ensure efficient and effective communication within their network infrastructure.
Routing:
17
ICTNWK542– Install Operate and Troubleshoot medium enterprise routers.
Routing is the process of determining the best path for a data packet to travel from source to
destination over interconnected networks. Routers are network devices responsible for forwarding
data packets based on certain criteria, such as IP addresses. It analyzes the destination address in
the packet header and uses routing tables to determine how to forward the packet.Routing enables
enterprises to establish efficient communications between different networks or subnets. For
example, if a company has multiple office locations connected by a wide area network (WAN),
routers play an important role in routing data packets between those locations. It looks at the
destination IP address and chooses the best path. In doing so, it considers factors such as network
congestion, connection reliability, and other metrics to ensure that packets reach their intended
destination.
switching:
Switching, on the other hand, is the process of forwarding data packets within a local area network
(LAN). A switch is a network device that connects devices such as computers, servers, printers, and
other network devices in a LAN. It operates at the data link layer (Layer 2) of the TCP/IP model and
uses MAC addresses to make forwarding decisions.When the switch receives a data packet, it looks
at her MAC address in the packet header and consults its MAC address table. This table maps MAC
addresses to the appropriate ports on the switch. Based on this information, the switch decides
which outbound port to forward the packet to, enabling communication between devices within the
same network segment.
5. Explain briefly IPV4. (how many bits, how many octets, list the IP address for all classes,
Explain private and public Ip address .What are private IP address ranges for IPV4)
18
ICTNWK542– Install Operate and Troubleshoot medium enterprise routers.
IPv4 is the fourth version of the Internet Protocol and is the most widely used protocol for
identifying and addressing devices on networks.It uses a 32-bit address space divided into four dot-
separated octets (groups of 8 bits), giving a total of 4.3 billion unique IP addresses.
IP address class:
A, B, C, D, and E. The class is determined by the range of values in the first octet. The IP address
ranges for each class are:
class a:
example:
Class B:
The first octet starts with a value between 128 and 191.
Class C:
The first octet starts with a value between 192 and 223.
Class D:
Class E:
IPv4 uses private and public IP addresses to distinguish between internal and external networks.
1. Private IP address:
Private IP addresses are used within private networks such as local area networks (LANs) and are not
directly accessible from the Internet.
19
ICTNWK542– Install Operate and Troubleshoot medium enterprise routers.
Private IP addresses allow devices on the same network to communicate with each other.
The three private IP address ranges set by the Internet Assigned Numbers Authority (IANA) for IPv4
are:
Class A:
10.0.0.0 to 10.255.255.255
Class B:
172.16.0.0 to 172.31.255.255
Class C:
192.168.0.0 to 192.168.255.255
2. Public IP address:
Devices that are directly connected to the Internet are assigned public IP addresses. Uniquely
identifies your device on the public Internet. Public IP addresses are obtained from your Internet
Service Provider (ISP) and are used for communication between different networks on the Internet.
NOTES: Private IP addresses are not routable on the internet. However, when accessing the internet,
it can be translated to a public IP address through a process called network address translation
(NAT).
In summary, IPv4 is a widely used protocol that uses a 32-bit address space divided into 4 octets. IP
addresses are divided into classes, with the first octet of each class having a specific range of values.
Private IP addresses are used on private networks and are not directly accessible from the Internet.
Public IP addresses, on the other hand, are assigned to devices that connect directly to the Internet
and allow communication between different networks.
6.
I. Convert 192.168.10.30 and 255.255.255.0 to binary
20
ICTNWK542– Install Operate and Troubleshoot medium enterprise routers.
=> To convert an IP address or subnet mask to its binary representation, each octet (group of 8
bits) must be converted to its binary representation.
IP address 192.168.10.30:
Octet 1:
Octet 2:
Octet 3:
10 => 00001010
Octet 4:
30 => 00011110
11000000.10101000.00001010.00011110
Octet 1:
Octet 2:
Octet 3:
Octet 4:
0 => 00000000
11111111.11111111.11111111.00000000
21
ICTNWK542– Install Operate and Troubleshoot medium enterprise routers.
By converting IP addresses and subnet masks to binary values, individual bits can be analyzed
and various network calculations and configurations can be performed as needed.
7. List at least three debug commands you can use for EIGRP
=> There are three debug commands available for debugging Enhanced Interior Gateway Routing
Protocol (EIGRP). Debug commands are useful for troubleshooting network problems and gaining
insight into routing processes. Here are three debug commands commonly used with EIGRP:
This command allows you to debug EIGRP packets and provide detailed information about EIGRP
packets exchanged between routers. Displays EIGRP packet content, including source and
destination IP addresses, EIGRP message type, and other relevant information. This command is
typically used in conjunction with a specific EIGRP process ID or Autonomous System Number (ASN)
to filter the output.
This command enables EIGRP neighbor relationship debugging. Provides information about
establishing, maintaining, and terminating EIGRP neighbor relationships. When run, it displays
details such as neighbor IP addresses, interface information, EIGRP adjacency events, and error
messages related to neighbor formation. Similarly, this command is often used with a specific EIGRP
process ID or ASN for targeted debugging.
22
ICTNWK542– Install Operate and Troubleshoot medium enterprise routers.
This command allows you to debug EIGRP events and capture important events related to EIGRP
operation. Gain insight into events such as topology changes, route updates, metric changes, route
flaps, and all major EIGRP-related events. This command will help you understand the behavior and
dynamics of t EIGRP in your network.
Be aware that debug commands can generate a large amount of output that can affect router
performance. It is important to use these judiciously and sele and enable debugging only for as long
as necessary to avoid unnecessary network disruption.
NOTES:
The exact syntax and availability of debug commands may vary depending on the router operating
system and software version. We recommend that you refer to your router platform-specific
documentation or command reference for exact command usage.
8. What is router CLI? Explain the following command modes (user EXEC, Privileged EXEC,
Global Configuration, Interface Configuration) and list the appropriate commands that you
would use to enter those modes.
=> The Command Line Interface (CLI) provides a uniform control interface for the router and
can be used to get/set configuration parameters, apply updates, restart services, or perform
other system tasks.
The router CLI provides a text-based interface for manipulating and configuring router
settings.
Command mode:
23
ICTNWK542– Install Operate and Troubleshoot medium enterprise routers.
User EXEC "Executive" This mode is the initial mode when accessing the router CLI. Provides
basic access to view router status and perform limited monitoring functions. Prompts usually
end with a ">" symbol. To enter user EXEC mode, simply connect to the router through a
console or Telnet session.
Privileged EXEC mode is also called activation mode or privileged mode. This gives you
access to all router commands and allows you to change settings. Privileged EXEC mode
allows more control and requires a password for security. Prompts usually end with a "#"
sign. Enter the enable command followed by the activation password to enter privileged
EXEC mode.
Global configuration mode allows you to configure various global router settings. B.
Hostnames, interface parameters, routing protocols, security features. In this mode, you can
make changes that affect the entire router. The prompt usually ends with "(config)#". To
enter global configuration mode, use the configure terminal or conf t command from
privileged EXEC mode.
Interface configuration mode is used to configure individual router interfaces. You can
configure interface-specific settings such as IP address, subnet mask, speed, duplex, and
other parameters. The command prompt usually shows the interface name. To enter
interface configuration mode, specify the interface name after the "interface" command. B.
"Interface GigabitEthernet0/1".
Enter and use the activation password after the Enable command.
From privileged EXEC mode, use the configure terminal or conf t command.
Here's an example of how the prompt changes when moving between command modes:
24
ICTNWK542– Install Operate and Troubleshoot medium enterprise routers.
Router>
password:*****
Router #
Router#configure terminal
Router (config)#
Router(config-if)#
By navigating through these command modes, you can access and configure various aspects
of router configuration, from global settings to specific interface settings, so you can
customize the router to meet your network needs.
Q&A Assessment –
STUDENT’S
STUDENT NO:
NAME:
ASSESSOR’S DATE:
NAME:
25
ICTNWK542– Install Operate and Troubleshoot medium enterprise routers.
Feedback to Student:
Student
26
ICTNWK542– Install Operate and Troubleshoot medium enterprise routers.
27
ICTNWK542– Install Operate and Troubleshoot medium enterprise routers.
PRACTICAL ACTIVITY
ASSESSOR NOTE
These instructions must be followed when assessing the student in this unit. The checklist on the
following page is to be completed for each student. Please refer to separate mapping document
for specific details relating to the alignment of this task to the unit requirements.
This competency is to be assessed using standard and authorized work practices, safety
requirements and environmental constraints. Assessment of essential underpinning knowledge will
usually be conducted in an off-site context. Assessment is to comply with relevant regulatory or
Australian standards' requirements.
Reasonable adjustments for people with disabilities must be made to assessment processes where
required. This could include access to modified equipment and other physical resources, and the
provision of appropriate assessment support.
This project should be completed with reference to a simulated ICT/Business environment. For the
practice environment, noise levels, production flow, interruptions and time variances must be typical
of those experienced in the ICT project management field of work and include access to:
28
ICTNWK542– Install Operate and Troubleshoot medium enterprise routers.
Please refer to the assessment document for the specifications. Note that this is an individual task.
Throughout the assessment task, ensure that you refer to and apply the Australian Computer Society
Code of Ethics.
Develop Specifications and Terms of Reference for the project that includes:
Within your practice environment, complete each of the following parts (Note: Parts of this
assessment task, such as project execution, will be simulated in your practice environment):
PRACTICAL ACTIVITY
CASE STUDY
Scenario
You are working as IT Specialist for AIBT Corporation, Sydney. Currently they
Have a flat where they have their HR and the Finance department. As the number has grown
significantly, They have acquired the new building and have placed the Sales and marketing
department in the new building.
Currently AIBT is using the peer-to-peer network consists of eight IBM compatible PCs (Intel Pentium
Duo Core 1.6MHz) running Windows XP and two Canon iR C3080 printers. You have noted that
much of co-axial cabling runs across the floor and are serious OH & S issues.
AIBT has fifteen IBM compatibles PCs (Intel Pentium Duo Core 1.6 MHz), one Hewlett Packard
HP800N Laser and one Hewlett Packard HP4500DN color printer. The IBM PCs are running Windows
7 connected to peer-to-peer using coaxial cables.
You are recommended to connect the two sites so that IT will be easier for them to work. You have
been asked to maintain the basic router security on both the routers. You are also recommended to
install separate file server in the network was approved to allow effective sharing of information
resources and increase security and overall productivity. It is expected that there will be heavy
sharing of data between two offices.
Background
In this activity, you are given a 192.168.72.0 /24 network address to use to design a VLSM addressing
scheme. Based on a set of requirements, you will assign subnets and addressing, configure devices and
verify connectivity.
29
ICTNWK542– Install Operate and Troubleshoot medium enterprise routers.
Task
5. Select and Contact vendors make documentation for the specifications such as the switches
you will be using, the routers, the cables and complete the cost analysis
6. Develop the plan with task priority and contingency arrangement for the installation of
components with minimum disruptions to the client
7. Get the client sign off for the preliminary concept including security and timings.
8. Determine the basic routing requirements and its operating parameters according to
installation plan specifications by using questioning skills on clients
9. Select required media, cables, ports, connectors and connect routers to network devices and
hosts according to installation plan specifications
10. Access and use the router to set basic parameters and Upgrade the firmware on the router
11. Configure the basic router security according to installation plan specifications
12. Configure the static and default routes according to installation plan specifications
13. Configure and Verify the classless routing protocols such as EIGRP using variable length
subnet mapping (VLSM) according to router specifications
14. Assign IP Addresses to Devices in LAN and WAN and Verify Connectivity
15. Save and backup the router configuration files according to installation plan specifications
16. Troubleshoot the device configuration and network connectivity using basic program utilities
17. Document the common problems with the IP addressing
18. Provide the brief report and seek and respond to feedback from required personnel
30
ICTNWK542– Install Operate and Troubleshoot medium enterprise routers.
Practical Assessment –
STUDENT’S NAME: STUDENT NO:
ASSESSOR’S DATE:
NAME:
UNIT NAME: ICTNWK542 – Install, operate and troubleshoot medium enterprise routers
31
ICTNWK542– Install Operate and Troubleshoot medium enterprise routers.
Feedback to Student:
Result
Student
signature and
declaration. Student’s Signature Date:
The result of my performance in this assessment has been discussed and explained
to me
33
ICTNWK542– Install Operate and Troubleshoot medium enterprise routers.
Student ID
Student name
Contact number
Email address
Trainer/Assessor name
Course code
Course name
Unit code
Unit name
Student Declaration
I certify that the work submitted for this assessment pack is my own. I have clearly
referenced any sources used in my submission. I understand that a false declaration is a
form of malpractice;
I have kept a copy of this assessment pack and all relevant notes, attachments, and
reference material that I used in the production of the assessment pack;
For the purposes of assessment, I give the trainer/assessor of this assessment the
permission to:
34
ICTNWK542– Install Operate and Troubleshoot medium enterprise routers.
Reproduce this assessment and provide a copy to another member of staff; and
Date: ____/_____/______________
35