0% found this document useful (0 votes)
12 views27 pages

Building Internet Infrastructure

This document serves as a learning guide for building internet infrastructure, outlining the competencies required to plan, design, install, configure, and manage internet services. It details the essential components of internet infrastructure, including data centers, networks, computer equipment, and storage services, while also emphasizing the importance of security and user account management. Various learning activities and requirements for successful completion of the module are also provided.

Uploaded by

estifanos haile
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
12 views27 pages

Building Internet Infrastructure

This document serves as a learning guide for building internet infrastructure, outlining the competencies required to plan, design, install, configure, and manage internet services. It details the essential components of internet infrastructure, including data centers, networks, computer equipment, and storage services, while also emphasizing the importance of security and user account management. Various learning activities and requirements for successful completion of the module are also provided.

Uploaded by

estifanos haile
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 27

HARDWARE AND NETWORK SERVICING

Level - IV

Unit of Competence: Build Internet Infrastructure

Module Title: Build Internet Infrastructure

LG Code: ICT HNS4 03 0811


LM Code: ICT HNS4 03 0811
Learning outcomes:
LO 1: Plan and design internet infrastructure
LO 2. Install and configure internet and services
LO 3. Test security and internet access
LO4. Ensure user accounts and verified for security
LO5. Manage and support internet

Introduction Learning Guide # 3

Page 1 of 27
LEVEL IV: Building Internet Infrastructure
This learning guide is developed to provide you the necessary information regarding the following
content coverage and topics –
 Internet infrastructure is selected inline with business and end-user requirements.
 Cables is installed and tested where appropriate according to the standard
 Mail servers is built and tested when needed
 Security access levels is tested and verified based on security policy.

This guide will also assist you to attain the learning outcome stated in the cover page. Specifically,
upon completion of this Learning Guide, you will be able to –
 Internet infrastructure is selected inline with business and end-user requirements.
 Cables is installed and tested where appropriate according to the standard
 Mail servers is built and tested when needed
 Security access levels is tested and verified based on security policy.
Learning Activities
1. Read the specific objectives of this Learning Guide.#3

2. Read the information written in the “Information Sheets #1”.

3. Accomplish the “Self-check” in page ____.


4. If you earned a satisfactory evaluation proceed to “Information Sheet #1” However, if your rating is
unsatisfactory, see your teacher for further instructions or go back to Learning Activity #1.
5. Submit your accomplished Self-check. This will form part of your training portfolio.

6. Perform “Operation Sheet #1.

7. Submit your accomplished Operation Sheet. This will form part of your training portfolio.

8. Read the information written in the “Information Sheets #2”.

9. Accomplish the “Operation Sheet” #2.

10. Submit your accomplished Operation Sheet #2. This will form part of your training portfolio.

11. If you earned a satisfactory evaluation see your teacher for further instructions However, if your rating is
unsatisfactory, or go back to Learning Activity #2.
12. Your teacher will evaluate your output either satisfactory or unsatisfactory. If unsatisfactory, your teacher
shall advice you on additional work. But if satisfactory you can proceed to Learning Guide.

Information Sheet # 1 Plan and design internet

Page 2 of 27
LEVEL IV: Building Internet Infrastructure
infrastructure

What is Internet Infrastructure?

All the hardware and services required to make a web page appear in your browser.
Internet infrastructure is a collective term for all hardware and software systems that
constitute essential components in the operation of the Internet. Physical transmission
lines of all types, such as wired, fiber optic and microwave links, along with routing
equipment, the accompanying critical software services like the Domain Name System
(DNS), Email, website hosting, authentication and authorization, storage systems, and
database servers are considered critical Internet components

Internet Infrastructure consisting of:

Data Centre

A Data Centre is basically a specialist building that has the ability to power (and cool)
massive amounts of computer equipment. Typically a Data Centre would also have a
very large amount of network bandwidth to accommodate data transfer in and out of
it.

A data center is a centralized repository computer facility used to house computer


systems and associated components, such as telecommunications and storage
systems. It generally includes redundant or backup power supplies, redundant data
communications connections, environmental controls (e.g., air conditioning, fire
extinguisher) and security devices

Network

Most important foundation block of Internet Infrastructure is the Network. Without a


network connection no data can pass between Data Centers, over the Internet, and
ultimately onto your Desktop or Laptop.

Computer Equipment
Computer equipment refers to any or all of the many different parts of a computer, as
well as peripheral devices such as printers, external hard drives and servers. Basically,
anything relating to a computer is considered computer equipment.

Storage Services

Page 3 of 27
LEVEL IV: Building Internet Infrastructure
Data Storage is a huge part of Internet Infrastructure. All those emails accessible
online, all the web pages on your favorite web site, all those photos on Facebook …
are all stored on a hard drive in a DC somewhere. The basic level of storage is on-
server storage, which means the hard drives in the computer server.

Server Applications

The final piece of underlying Internet Infrastructure is the server applications


themselves. In order for an web application to be delivered from a server, that server
requires an Operation System (typically Windows or Linux), a Web Server application
(like Apache or Microsoft IIS), and a Database (such as MySQL, MS-SQL or Oracle).
There any many more variations here, but the basic web server has these 3 things.
From here you can install blog software, an ecommerce site, your new web 2.0
application, or any Internet capable piece of software (more include – Instant
Messaging Server, File Storage Server, Message Board)

Functional requirements specification

The functional specification describes what the system will do, as opposed to how it
will be done. This distinction is important, because:
the client may not be interested in the details of how a function is implemented, and
the technical details may simply cause confusion for the client
the implementation details may need to change during the design and development of
the project
you don’t want to have to negotiate changes to the functional specification just to
change details of implementation
the technical specification for large projects will be detailed in a separate document,
and you should not entangle one with the other.
The language of the functional specification should be clear, concise and (as far as
possible) non-technical. It is very important to attend to details in the functional
specification. One misplaced word may commit a vendor company to develop extra
functionality that was never intended, and damage the profitability of the project.

Fixed requirements

Some requirements are fixed, and not derived from the ideal functionality that the
product or system should possess. These are often in the form of constraints set by
the client. For example:

 A client may require a particular look-and-feel to their website.


 The client may require your system to interface to their existing systems in a
particular way.

Page 4 of 27
LEVEL IV: Building Internet Infrastructure
Use cases

A use case is a very useful tool to help you start to determine the required
functionality of a system. Use cases have quickly become a standard tool for capturing
functional requirements.

A use case is a diagram showing how the proposed system will be used in one
particular scenario, by a particular user. Use cases allow the designer to focus on
details, but keep the design grounded in the basics of how the system will be used. A
large system will have many use cases.

Functional requirements
Functional requirements describe the way in which the different components and
functions in the solution will interact. They will clarify how the solution is going to work
and how users can use it.
Next are some examples of the questions you might ask in order to determine the
functional requirements of an IT system.

User requirements
 How many users are expected to use the system?
 How many people will be utilising the solution at one time?
 Where the users will be located (eg overseas, interstate or at home)?
 What navigation model will it use?
 What is the range of the content?
 How much content will it include?
 How will the content be structured?

Technical requirements
 What types of computers/operating systems will the users operate?
 Are their desktops all the same?
 What bandwidth restrictions occur presently?
 What security (login) will they need?
 What backup policies need to be in place?
 Who will have administration rights?
 What will the business do if the system fails at any stage?

Page 5 of 27
LEVEL IV: Building Internet Infrastructure
 Who is the project sponsor?
 What does management expect the system will do and won’t do?

Hardware
 Compatibility: will the solution work with existing systems?
 Support for multimedia formats: will the existing systems and architecture
support all types of media?
 Will the new system be supported by existing resources within the company?
 Is there funding available for new hardware? (eg new servers)
 What is the backup strategy? Has this been costed?
 Does the system need to be mirrored?
 Will there be time delays to purchase and install hardware?
 Will you be relying on another group to set up the hardware? If they don’t
consider your project a priority, is that time delay factored into the delivery
strategy?
 Are there other projects that you may be able to share hardware costs with?
 If the system needs to cater for multimedia, does there need to be extra
attention paid to being able to store and transmit large graphic, sound and video
files?
 If you are a consultant or part time employee, will you be given permissions and
rights to install and support the system fully? (As some computer centres are
secure).

Software
 What is the true cost of the software?
 Are there licensing issues? (As the system is in development, should you pay for
all the licensing now, or when the system is in live mode?)
 Can the software be licensed for use by multiple users who use it on different
machines? (Concurrent licensing)
 How long has the software been on the market for?
 What happens if the software company becomes insolvent? Who supports it?
 Who owns the source code?
 What happens if the source code is modified; who supports the product then?
 Does the solution work with all other company software systems?
 If web-based, does the solution function on all common browsers?
 If security is a concern, can the software be delivered in a ‘locked down’ format?

Page 6 of 27
LEVEL IV: Building Internet Infrastructure
 Does the software support all file formats? (This is especially important when
working on multimedia tasks.)
 Is the software easy to use or are there major training issues/costs?

Support materials

You will need to consider the content and design requirements of all support materials.
Support materials could include:

 system specifications
 user guides
 knowledge banks
 intranet/Internet help sites/CD-ROMs
 training manuals
 General user documentation and print-based help.

You will also need to consider workshops, seminars or briefings you may need to run in
order to support the software/hardware/system.

During the development of the scope document you will have determined the kinds of
support materials that you will need. You will probably also establish who will be
responsible for the production of those materials.

Note: Satisfactory rating – 12 points above / unsatisfactory 6 points


You can ask you teacher for the copy of the correct answers

Page 7 of 27
LEVEL IV: Building Internet Infrastructure
Score = ___________
Answer Sheet
Rating: ____________

Name: _________________________ Date: _______________

Answer
1. ____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
__________________________________________________________________
2. ____________________________________________________________________
____________________________________________________________________
__________________________________________________________________
3. ____________________________________________________________________
____________________________________________________________________
__________________________________________________________________
4. ____________________________________________________________________
____________________________________________________________________
__________________________________________________________________
5. ____________________________________________________________________
____________________________________________________________________
__________________________________________________________________

TVET Program: ___________________________________


Learning Guide for _____
Page 8 of 7
Version: __ Revision: 0
Author: __________________________________________
Information Sheet INSTALL AND CONFIGURE
#2 INTERNET INFRASTRUCTURE

Network hardware
A great variety of networking devices exist—many more than can possibly be covered here.
Local requirements dictate the types of networks be formed using these devices. This reading
will focus on the most common range of network devices and the main standard that supports
them, Ethernet.

Ethernet
Most network devices commonly-used are based upon the Ethernet protocol. Ethernet speeds
have been slowly increasing over the last decade, from 10 megabits per second (10 Mbps, 10
million bps) up to discussions of 10 gigabits per second (10 Gbps, 10 x 1000 Mbps) and
beyond. Currently, most computer networks work very well with the 100 Mbps range of
products, but as data transfers within a local rea network increase, the higher bandwidth and
capacity of faster networks may be needed. Often the limiting factor is not the network speed
but other bottlenecks (limits) in the overall system, such as processing speed and hard drive
access times.
Ethernet uses the concept of CSMA/CD (carrier sense multiple access with collision
detection). Carrier sense means that devices on the network listen first for no network activity
on the network. No activity indicates that no other device is sending information, since they
all use a common medium to transfer data (multiple access). But since just as in a
momentarily quiet room two or more people may start to speak at the same time, the collision
detection mechanism is a method of dealing with this.
Wireless Ethernet devices (based on the IEEE 802.11 standards) have recently become more
available. These include connection devices such as wireless access points (AP) and
individual peripherals, such as printers. Wireless networking devices connect the network by
radio waves. Similar concepts to the wired Ethernet are used to ensure that transmissions
don’t conflict (collisions) and are regulated in some way.

Open systems interconnect–reference model (OSI-RM)


The open systems interconnect—reference model forms the basis of networking
communications and is maintained by the International Standards Organization (ISO). It is a
model to aid in the development of communications standards, not a standard itself. The
different layers define functions that should be considered and implemented at each level.
When a device operates at a particular layer it means that the device components make
informed decisions based on information from that layer of the model. For example, a switch
makes decisions at layer 2, data link layer, based on the media access control (MAC) address
of the destination network card. The MAC is a sub-layer of the data link layer. (Of course, all
devices need access to the layers below so that they can physically connect together.)

TVET Program: ___________________________________


Learning Guide for _____
Page 9 of 7
Version: __ Revision: 0
Author: __________________________________________
Table 1: OSI reference model layers and basic functions

Layer Basic functions

7 – Application Interface to user Programs


6 – Presentation Data compression, encryption
5 – Session Authentication
4 – Transport Logical connection of data stream
3 – Network Moving of data packets through connected networks
2 – Data Link Co-ordination of access to the medium
1 – Physical Physical signalling on the medium

Network devices
Some of the more general types of network devices available are listed in Table 1 on the next
page.

Table 2: Examples of network devices available

Device Description

Network Often referred to as network interface cards (NICs), they may be installed in
cards a computer or peripheral device and interact with the network medium,
including both wired and wireless networks.
Switches Often switches are used interchangeably with hubs, but they have slightly
different characteristics. The differences will not usually show up as a
performance increase until used in a larger network with multiple servers. A
switch is a better performing device and is only slightly more expensive
than a hub.
Switches operate at layer 2 (data link layer) of the open systems
interconnect—reference model and can make a decision on the destination
of a data packet that they receive. In this way, a switch may send data out to
a port based on the destination media access control (MAC) address that is
included in every frame. In fact, simultaneous data transfer between
computers is possible, which increases overall network capacity.
Hubs A hub creates the basic framework for most local area networks used in
business and home environments. They connect the servers, workstations
and other network devices together.
Hubs are also called multi-port repeaters. Hubs work at the OSI open
systems interconnect—reference model Physical (layer 1).

TVET Program: ___________________________________


Learning Guide for _____
Page 10 of 7
Version: __ Revision: 0
Author: __________________________________________
Device Description

Routers Routers are used to interconnect two or more LANs. The LANs may
communicate through the router or the router may act as a gateway to
connect to the Internet.
Routers operate at Layer 3 (Network layer) of the open systems interconnect
—reference model and make decisions based on the network addresses
which are included in the data packet. In most networks, the network
address will be based on IP addresses but may also include IPX address
information to work with Novell Netware networks.
Access These devices act as a hub in a wireless network and as a connection
points between the wired and wireless network segments in a combined network.
In some configurations, the access point will act as a switch and/or router
and prevent unnecessary data packets from travelling between the wired and
wireless sections of the network. In other configurations, two or more
access points may only act as a repeater (or relay) and connect segments of
a wired LAN, perhaps between buildings or across roads where wired
access would be difficult or expensive to connect.
Broadband These devices connect between a LAN (or single computer) and a
modem/ permanent broadband Internet connection such as ADSL or Cable. Modem
routers versions tend to have USB connections that must connect directly to a
computer. Router versions have an RJ-45 LAN connection and/or a wireless
antenna that may connect to a computer or hub to share Internet access
between many computers.
Printers Many printers are available to connect directly to an Ethernet network.
These include printer with an inbuilt NIC. Examples are of network-ready
printers are: Brother HL-5170DN, Canon IP4000R and Hewlett Packard
DJ6840.
Scanners Some scanners are network-ready and provide access from the network.
Many of these are included in Multi-Function Centres with printer, copying
and fax capabilities as well. Examples are: Brother MFC-620CN, Canon
NSA-01 and Hewlett Packard Photosmart 2710.
Storage These devices offer additional file storage capabilities to a network. They
act as a file server and the storage can be controlled over the network.
Examples of Network Attached Storage devices are: D-Link DSM-624H,
Iomega NAS 100d/160G and Linksys EFG250

TVET Program: ___________________________________


Learning Guide for _____
Page 11 of 7
Version: __ Revision: 0
Author: __________________________________________
Installation procedures
Internal hardware
Many main system boards come with a network adapter built-in; opening the system unit of a
computer workstation in order to add networking hardware is rarely necessary. You may
otherwise need to add a network card to a system when:
 none is built-in to the main system board
 replacing or overriding a failed built-in network card
 an additional network card is needed for routing purposes
 upgrading the network card for one with faster processing

Identify location to install card (possibly removing an old card)


PCI is the peripheral component interconnect standard (the abbreviation is
always used), which specifies a computer bus for attaching peripheral
devices to a computer motherboard. These devices can take the form of
integrated circuits fitted onto the motherboard itself (called planar devices
in the PCI specification); or expansion cards that fit in sockets.
New network cards will insert into a spare PCI slot of the main system
board. The PCI slots can be identified as white connectors approximately 8
cm long by 1 cm wide towards the back of the system board. You should
also identify possible obstructions to the installation of the network
interface card (NIC) and a clear path for the easy connection of the
network patch cable with all the other cables connected. This may include
removing a screwed-in cover plate or a fixed panel that has been pre-
perforated. The pre-perforated panel needs to be removed by repeated
small movements back and forth until eventually it snaps off. Beware of
the sharp edges of the case while doing this, particularly when the piece
comes away.

TVET Program: ___________________________________


Learning Guide for _____
Page 12 of 7
Version: __ Revision: 0
Author: __________________________________________
Figure 2: PCI slot on main system board

Follow manufacturer’s directions


Manufacturer’s directions usually include instructions for the correct insertion of the NIC.
Some manufacturers specify which PCI slot to use, which may require the rearrangement of
other cards.

Installing software drivers


The Microsoft Windows operating system should automatically detect the hardware during
start-up and a wizard will begin to install drivers necessary for the network card. This may
require a re-boot in order to activate the network card successfully

External hardware
Many devices already come with a network interface installed, such as hubs, printers and
storage devices. You may also choose to install a network interface adapter to an external
port, such as USB (Version 2.0) or FireWire (also known as i.Link or IEEE 1394). The
choice of device will have already been made by this time, so the physical installation is
relatively straightforward. Similarly, the location of the external device and provision of
power and suitable network connections should have been arranged.

Patch and crossover cables


Most networking hardware will interconnect using standard patch cables. Stranded
unshielded twisted pair (UTP) cable is used for flexibility, with an RJ-45 modular connector
plug on each end. The four pairs of conductors are arranged identically in each plug, as
shown in Figure 4 on the next page.
When you need to directly connect a pair of like (similar) devices, a crossover cable must be
used. These cables are also made from stranded UTP cable for flexibility with an RJ-45
modular connector plug on each end, while the four pairs of conductors are arranged to swap
(cross over) the ‘transmit’ and ‘receive’ pairs in just one of the plugs, as shown in Figure 5 on
the next page.
Table 3 on the next page shows the types of direct connections possible and the types of
cables used.

TVET Program: ___________________________________


Learning Guide for _____
Page 13 of 7
Version: __ Revision: 0
Author: __________________________________________
Figure 3: Patch cable showing both ends Figure 4: Crossover cable with swapped
identical pairs (green swaps with orange)

Table 4: Patch cable colours

Conductor pairs Colour

1/2 White with orange stripe/solid orange


3/6 White with green stripe/solid green
4/5 White with blue stripe/solid blue
7/8 White with brown stripe/solid brown

The connections you produce would resemble those on pages following, shown for:
 normal connections with infrastructure (fixed wiring)
 normal connections without infrastructure (no fixed wiring)
 connecting two devices directly
 Connecting multiple hubs directly.

TVET Program: ___________________________________


Learning Guide for _____
Page 14 of 7
Version: __ Revision: 0
Author: __________________________________________
Figure 11: Diagram of the network connections used when fixed wiring infrastructure and a wiring
cabinet is available

Figure 12: Diagram of the network connections used when there is no fixed wiring infrastructure
available

TVET Program: ___________________________________


Learning Guide for _____
Page 15 of 7
Version: __ Revision: 0
Author: __________________________________________
Figure 13: Diagram of the network connections used when connecting two like devices directly

Configuration
Once new hardware is connected, the equipment is then integrated into the existing network
or a new network begins. Integration includes the naming and addressing schemes for the
protocols used on the network, which may be specified by the organisation.
Many new network devices such as routers or switches include a small web-server that allows
you to log in to the device and change settings using a web browser. In this way devices can
be configured using any operating system with a web browser.

Table 5: Configurations for added hardware

Added network Basic configuration required


hardware

Workstation or Name; IP Address; Join domain or active directory; Add extra


NIC protocols such as Internetwork Packet Exchange (IPX) if needed
Hub Usually no configuration needed
Switch Usually no configuration needed. Switches learn about their part of
the network as they are used.
Router Name; Configuration needs to be made to have correct routes and
interface addresses assigned. IP Addresses (Note two or more for a
router). Some routers will discover the adjacent route from adjacent
routers if these protocols are active.
Printer Configuration program needs to be installed on a workstation to
allow configuration to be carried out. Drivers installed on the server
if present and possibly on each workstation. Name; Share name; IP
address; Add to domain or active directory

TVET Program: ___________________________________


Learning Guide for _____
Page 16 of 7
Version: __ Revision: 0
Author: __________________________________________
Added network Basic configuration required
hardware

Network storage Configuration program needs to be installed on a workstation to


allow configuration to be carried out. Share often controlled by the
server transparently to the users. Mapping drive letters by modifying
login scripts. Name; Share name; IP Address.

Setting the IP address


Each workstation, server or other network peripheral device on a network needs its own
unique identification number in the form of an Internet protocol (IP) address. In IP version 4
(used here), known as dotted decimal notation, has a 4-byte binary string that is normally
written as four decimal numbers each separated by a period or dot, for example:
203.14.151.67.
The two choices for setting IP addresses are called static and dynamic. Static IP addresses are
changed manually so the address remains the same for a computer until specifically changed.
A dynamic host control protocol (DHCP) server allocates dynamic IP addresses, and while
they tend to remain the same, they may change without notice.
Static IP addresses are manually configured and tend to be used in small networks where
changes will not happen very often and a DHCP server is not present on the network. Static
IP addresses are also used for routers, gateways, servers and other network resources on any
network.
Dynamic IP addresses must be used in conjunction with a DHCP server and tend to be used
on larger networks for IP address allocation to workstations.
The DHCP server allocates an IP address automatically to a client device when the
client requests one

TVET Program: ___________________________________


Learning Guide for _____
Page 17 of 7
Version: __ Revision: 0
Author: __________________________________________
To set the IP address as either static
or dynamic as per organisational policy and
standards you must:
 Login with an administrator level
account.
 Select Start then select the My
Network Places option.
 In Network Tasks on the left select
View network connections if they
are not currently shown.
 In the right panel under the LAN or
High-Speed Internet section right-
click the Local Area Connection
and select Properties from the pop-
up menu to display the following
dialog.
 You may need to scroll down the
Protocols and Clients list to view Figure 15: Local Area Connection Properties
the Internet Protocol (TCP/IP) item.
Select this and click on the
Properties button.
 For dynamic IP addressing select
both the Obtain an IP address
automatically and Obtain DNS
server address automatically, as in
Figure 16.

TVET Program: ___________________________________


Learning Guide for _____
Page 18 of 7
Version: __ Revision: 0
Author: __________________________________________
Figure 17: Setting for static IP addressing
(substitute values for your own network and
Internet service provider)

Figure 16: Setting for dynamic IP addressing.

 For Static IP addresses you need to


set all of the information except an
Alternate DNS server in order to
access the Internet, as in Figure 17.

Setting the computer name


You need to set the computer name of all the computers in your network. This allows you to
organise how the network interacts with various devices and also allows shares to be re-
shared from a central source such as a server.

TVET Program: ___________________________________


Learning Guide for _____
Page 19 of 7
Version: __ Revision: 0
Author: __________________________________________
To change the computer’s name to
conform to organisational policy and
standards you must:
 Login with an administrator level
account.
 Select Start then right-click on
the My Computer option.
 From the pop-up menu select
Properties.
 Click on the Computer Name tab
of the dialog. You should have a
dialog like that in Figure 18.
 Click on the Change button to Figure 18: System Properties showing Computer
Name tab details (Note: Windows XP Professional
show the Computer Name
will also mention joining a domain near the
Changes dialog in Figure 19. Change button)

When the name is displayed as required you


press the OK button.
If you are using Windows XP Professional
and you are joining a domain here then you
will be prompted for the username and
password of a domain administrator level
account to join the domain.
This will be followed by a short delay as
authentication and entry to the Active
Directory is made. When successful, a
welcome message is displayed.

Figure 19: Changing the computer’s name


(Note: Windows XP Professional will have a
section to join a Domain under the
Workgroup entry fields)

Testing the hardware and configuration


Now that everything is in place as planned, you must undertake a systematic (if not complete)
test of the network system.
You must confirm that the network functions as designed.
 Can users login?
Note that the questions
 Can users reach the server to store and start with ‘Can users…’
retrieve files? You might be able to do
 Can users run applications that need these things while

TVET Program: ___________________________________


Learning Guide for _____
Page 20 of 7
Version: __ Revision: 0
Author: __________________________________________
access to the server?
logged on as an
 Can users print to all of the printers they administrator, but the
should have access to? test is ‘regular users’,
 Can users reach the Internet? probably with more
restrictive accounts.

You should have a checklist available with the functions you will test and the expected
outcomes of the test. Leave room for comments, which allows you to log the actual results,
problems and solutions.
It is impractical to test every login account and every function on every workstation. You
need to access all combinations of user groups and functionality with at least one network
function from each workstation. This ensures that all devices are physically connected to the
network and that group based policies and scripts are working. This only leaves doubt about a
few possible non-standard (often undocumented) modifications that exist in an existing
network system. These will be highlighted by help desk calls and allow them to be integrated
into the standard system or documented properly as exceptions if they are really necessary.
Table 6 on the next page has a sample checklist. Note the testing is planned to cover all the
workstations and both the sales and admin groups. Access to the H: drive, Internet and both
printers is confirmed from each group.

Computer Login as Access Access Print Print Tested Test Test


H: Internet colour laser by date OK

WS001 Testsales Test Test


WS002 Testsales Test
WS003 Testsales Test
WS004 Testadmin Test Test
WS005 Testadmin Test
WS006 Testadmin Test

TVET Program: ___________________________________


Learning Guide for _____
Page 21 of 7
Version: __ Revision: 0
Author: __________________________________________
Table 6: Sample checklist

The ping command


The ‘ping’ command helps confirm the basic connectivity of a network device. Ping stands
for packet Internet grouper (or groper or gopher). An echo request packet is sent out to the IP
address; the receiving system identifies it and sends back an acknowledgement. This round
trip ensures that there is an active network path between the two devices.

The ping command is


easily run from the Run
menu (Start->Run…)
type in the command
ping –t 192.168.0.101
which causes the system
to continue (-t) trying to
send an echo packet to
the IP address used until
you stop it using the Figure 20: Running the ping command
Ctrl-C key combination.
(Note in UNIX/Linux Figure 21 shows the screen for a successful
systems the –t is response from a ping command. Note that many
unnecessary as this is the firewalls can be set to reject ping and other
default behaviour.) packets.

Figure 21: Successful response from the ping command; an unsuccessful response will show the
words ‘Request timed out’

TVET Program: ___________________________________


Learning Guide for _____
Page 22 of 7
Version: __ Revision: 0
Author: __________________________________________
Answer sheet 1
Score=_________________
Rating:___________________

Name____________________________________ Date_______________

I. Short Answer questions


1. _____________________________________________________________________
_____________________________________________________________________
_____________________________________________________________________
2. _____________________________________________________________________
_____________________________________________________________________
_____________________________________________________________________
3. _____________________________________________________________________
_____________________________________________________________________
_____________________________________________________________________
4. _____________________________________________________________________
_____________________________________________________________________
_____________________________________________________________________
_____________________________________________________________________
5. _____________________________________________________________________
_____________________________________________________________________
_____________________________________________________________________
_____________________________________________________________________
6. _____________________________________________________________________
_____________________________________________________________________
_____________________________________________________________________
_____________________________________________________________________

TVET Program: ___________________________________


Learning Guide for _____
Page 23 of 7
Version: __ Revision: 0
Author: __________________________________________
7. _____________________________________________________________________
_____________________________________________________________________
________________________________________________

Information Sheet # 3

TVET Program: ___________________________________


Learning Guide for _____
Page 24 of 7
Version: __ Revision: 0
Author: __________________________________________
Self-Check 1 Written Test

Name:____________________
Date:_________________

Instruction: Answer all the questions listed below, if you have some
clarifications- feel free to ask your teacher.

Note: Satisfactory rating – 6 points above / satisfactory 5 below 4


points
You can ask you teacher for the copy of the correct answers

TVET Program: ___________________________________


Learning Guide for _____
Page 25 of 7
Version: __ Revision: 0
Author: __________________________________________
Answer sheet 1 Score=_________________
Rating:___________________

Name____________________________________ Date_______________

Short Answer questions


1. __________________________________________________________________
__________________________________________________________________
__________________________________________________________________
2. __________________________________________________________________
__________________________________________________________________
__________________________________________________________________
3. __________________________________________________________________
__________________________________________________________________
__________________________________________________________________
4. __________________________________________________________________
__________________________________________________________________
__________________________________________________________________
5. __________________________________________________________________
__________________________________________________________________
__________________________________________________________________
6. __________________________________________________________________
__________________________________________________________________
_________________________________________________________________
7. __________________________________________________________________
__________________________________________________________________
______________________________________________________

Note: Satisfactory rating – 1 point above / unsatisfactory 0 below


1 points
You can ask you teacher for the copy of the correct answers

TVET Program: ___________________________________


Learning Guide for _____
Page 26 of 7
Version: __ Revision: 0
Author: __________________________________________
TVET Program: ___________________________________
Learning Guide for _____
Page 27 of 7
Version: __ Revision: 0
Author: __________________________________________

You might also like