Professional Documents
Culture Documents
Ictnwk504 V1.1
Ictnwk504 V1.1
Hazards are a situation or thing that can cause a potential risk of injury, illness or death
Once hazards have been identified using a series of workplace checking and safety audits then their
associated risks will be identified and then measured using a risk matrix which works out the correlation
between the type of injury that may occur and the probability of that type of incident actually
happening
Contact with electricity
Spills
Heavy lifting
Working with flammable liquids
Excessive noise
RISK assessment
Once hazards and their associated risks have been identified they will need to
be recorded and ranked on appropriate risk assessment documentation
Risk assessment documentation includes:
Hazards and risks registers
Risk matrix (Injury Vs Probability)
Risk Rating Documentation
The rating that has been applied to the risk will determine how quickly the
risk will need to be rectified
Controlling hazards
There are a range of other work permits that may be required for the specific
location or organisation that the work is being performed for and these may
include:
Access permits
Organisational permits
Permits from the client organisation
Advise client of deployment and potential
down times
All computing devices will require an operating system that can be used to
control the device, this is the same for networks. Networks will require an
operating system that will control the use and efficiency of the devices that
are on the particular network
For a simple computer network one of the devices on the network may be used to
run the network operating system
For more complex and larger networks that may require a range of different users
the network operating system will need to be placed on a server that makes up a
part of the network
Research redundancy and replication
requirements for selected authentication model
It will be necessary to produce the integrated server design for the client
including the processes that will be used for authentication, file sharing and
security
An integrated server is a server solution that contains the following components:
Server design
The full server design will need to be described in the server design
documentation and it will be necessary to ensure that a range of information
is included such as:
Authentication requirements and protocols
File sharing options and rules
Security types and processes that will be used
Describe current server applications,
compatibility issues and resolution procedures
The current server applications are the range of applications that may be run from the server
and this will depend on:
Server type
Server uses
Authentication protocols
Network operating system
There are a range of compatibility issues that may arise and these may be due to:
Hardware
Software version
Authentication protocols
Coding
Language
TOPIC 3 – INSTALL AND CONFIGURE THE
INTEGRATED SERVER SOLUTION
Implement integrated authentication solution
When setting out to implement the integrated authentication solutions it will be
necessary to conduct a range of actions including:
Verify authentication requirements are met
Set up authentication requirements
Create a database for user information
Configure the server to accept the authentication
Test user authentication
Document the authentication process
Implement integrated file sharing solution
It will be necessary to implement the integrated file sharing solution that has
been selected once the authentication protocols have been determined,
planned and implemented
Summarise network file systems and shares
A network file system or NFS is a server to client application that allows a
computer or device that is on the network to store and update files on a remote
computer in a manner that appears as if those files are on the computer itself
This can allow for all or part of the server’s files to be accessed and shared with a
range of permissions that have been programmed per user
File sharing
It will be necessary to ensure that all workstations are configured for the
integrated environment and to do this the following considerations should be
made:
Selecting components that are required
When configuring workstations for integrated environments it will be necessary to:
Select all components that are required within the environment
Determine their compatibility requirements
Install the server
It will be necessary to ensure that the server is installed and set up remotely or locally depending on
the type of server and using the server setup tools as required
It will be necessary to ensure that:
Server access points are determined and implemented
Server connection and authentication methods are set up
Server security requirements are installed
Set up databases and directories
It will be necessary to ensure that all databases and directories are able to be set up in a manner that
allows for them to be accessed from the workstation
Workstation configuration
There are a range of actions that will need to be made to ensure that the workstation is configured to the integrated
server environment and these actions may include:
Set authenticating method
Set up user information
Set up directories
Ensure compatibility and redundancy
Set up server actions
Configuring additional workstations
When setting out to configure additional workstations it will be necessary to:
Create a configuration file
Save the file
Upload it to other workstations
Change the settings
Implement security for the integrated
server environment
When setting out to implement security for the integrated environment it will
be necessary to:
Determine all security requirements
Assess a range of ways to achieve security
Set a range of permissions
Enable security on as many factors of the integrated environment as possible
Record all security measures
TOPIC 4 – TEST AND RECONFIGURE
NETWORK SERVERS
Test server for benchmarking against client specification and
requirements according to test plan, and record outcomes
Once the server and all security requirements have been implemented it will be
necessary to ensure that the server is tested for benchmarking against client
specifications and requirements according to the test plan and record the
outcomes that are received so that these may be able to inform on further server
configurations
Client specifications for integrated server
Client specifications are the range of parameters and requirements that were
set by the client during the consultation and design phases of the integrated
server solution development
Client specifications for integrated server may include:
Speed
Integrity
Compatibility
Security requirements
Access requirements
Benchmarks
Benchmarks are predetermined and pre-set quality standards that have been
set for the integrated server solution
It is essential to ensure that a range of testing is conducted to ensure that all
benchmarks are able to be met and maintained
Test plan
A server test plan is a series of tests that have been designed to ensure that
the server is running as required
It will be necessary to ensure that a full test plan that incorporated the
specific benchmarks for the server is created and followed throughout the
testing procedure
The server test plan should contain the following information:
Date and time of test
Conditions
Name of tester
All tests undertaken
Analyse error report and make changes as
required
It will be necessary to carefully assess the range of information that was collected as a part of
the event and error logging procedures to determine:
The need for potential changes
The possible impacts of potential changes
Changes may include factors such as:
Authentication requirements
Password protection
Encryption issues
Access requirements
Use troubleshooting tools and techniques to
diagnose and correct integration problems
It will be necessary to ensure that all of the integration activities are working
correctly on the server solution
Integration problems may include:
Continuity
IP address configurations
Communication methods
Packets
Security protocols
Test required changes or additions
There are a range of changes or additions that may need to be made to the
integrated server environment and these may include:
Authentication configuration
Passwords
Encryptions
Locations of hardware
Software installations
Permissions
Access requirements
Test required changes or additions
Once any changes or additions have been tested and are confirmed as being
operational and accurate it will be necessary to ensure that the changes or
additions are then validated against the specifications that have been
provided for the particular server solution
The validation of any changes or additions to the integrated server environment is
a quality review process that is used to determine and assess if all of the changes
and additions that have been made to the server are compliant with the
parameters of the specifications that were determined
It will be necessary to obtain the specifications and systematically assess each of
the changes or additions against these specifications
Specifications documentation
As a part of the design plan for the integrated server solution there will be a
range of specifications that will be laid out in purpose created specifications
documentation and this may include a range of sections and information
including:
Project overview
All components
Mapping
Authentication requirements
Hardware
Virtual requirements
TOPIC 5 – COMPLETE AND DOCUMENT
NETWORK DESIGN AND INSTALLATION
Make and document server configuration and operational changes
It will be necessary to ensure that a range of server configurations and operational
changes are made and that full server documentation is created
It will be necessary to ensure that a range of adjustments and configurations are
made to servers to ensure that they:
Communicate in an appropriate manner
Have appropriate security and access requirements
Are compatible and functioning with other network
components
Are finely tuned
List documentation required for networks
Upon completion of all work tasks it will be necessary to ensure that the work
site is effectively rehabilitated, cleaned up and made safe in accordance with
the specific procedures of the organisation
It is essential that all material waste is removed from the site and disposed of
according to environmental and organisational requirements
It is essential to ensure that approving authorities and clients are satisfied with the
restoration that is conducted on the work site and all aspects of the site are up to
standard
Restoring the worksite
The restoring process to the worksite is the process of returning the site back
to the state that it was in prior to the commencement of work, this includes
all safety tags, locks and signs and cleaning and tidying of the worksite back
to the exact manner in which the site should be left for optimum safety
Waste disposal
When work is complete the site will need to be cleared and cleaned according
to the job specifications for the specific task
Codes of practice and regulatory guidelines will be a set of policies and
procedures that are written and followed within the business to ensure that
all workers are maintaining their job tasks in a consistent and compliant
manner
Codes of practice guidelines or policies and procedures will have been written with
the required legislation, regulations and safety requirements in mind
Clearing the worksite according to
established procedures
It is essential that all tools and materials are removed from the work site and that the work site
is left in a safe and organised manner on completion of works
Clearing tasks may include:
Removing all waste
Removing all tools and equipment
Removing all barriers and signage
Ensuring all doors and gates are locked
Checking all safety components
Ensuring all personnel are aware that works are completed
Final checking to ensure all job tasks are fully completed and safe
Secure sign-off from appropriate person
On completion of all server design and implementation tasks it will be necessary to ensure that
all personnel are notified of job completion and that appropriate sign off has been obtained
Notifying supervisor of completion of work
There are a range of methods that can be used when notifying supervisors of completion of work tasks
and these can include:
Verbal notification
Written notification
Phone call
Job completion submission in jobs system
Job completion reports
Job completion reports
Job completion reports may be required upon completion of some tasks and
the information that may be required for these reports includes:
Task outline
Actions conducted
Further actions required
Improvement options
Safety measures taken
Quality control measures taken
Reporting on issues or errors
Other requirements dependent on organisation
Obtaining job sign off
It will be necessary to ensure that all of the required sign-offs are obtained
for the specific job tasks
It will be necessary to approach the supervisor and ask for sign off, a job
inspection may be required to sign off being granted
Sign off may be required on:
Workplace reports
Workplace documentation
Permits for access
Re-energisation or connection approvals
Job completion
TOPIC 6 – REQUIRED KNOWLEDGE
A file system is a system that is used to store, access and maintain all of the
files and data that is stored within the system
File system security is maintained through:
Access control
Permissions
File naming conventions
Metadata
Directory access and permissions
Outline network service configuration and
security
Now that you have completed this unit, you should have the skills and
knowledge to design and implement a network authentication model that
allows users to log in using the same user credentials between multiple
operating system platforms to provide a secure method of sharing files on the
same network