About this document
This assignment comprises all of the assessment for Level 2 Networking Principles (7540-002).
Health and safety
You are asked to consider the importance of safe working practices at all times. You are responsible for maintaining the safety of others as well as your own. Anyone behaving in an unsafe fashion will be stopped and a suitable warning given. You will not be allowed to continue with an assignment if you compromise any of the Health and Safety requirements. This may seem rather strict but, apart from the potentially unpleasant consequences, you must acquire the habits required for the workplace.
Time allowance
The recommended time allowance for this assignment is 4 hours.
2
Assignment A Level 2 Networking Principles (7540-002)
Level 2 Networking Principles (7540-002) Candidate Instructions
Time allowance: 4 hours Assignment set up:
This assignment is made up of two tasks: • Task A – Set up, configure and test a peer-to-peer network consisting of two computers • Task B – Manage user accounts on a network
Scenario
A company, Signom Networks, provide installation and technical support services for clients networks. They receive requests from clients for network installation and maintenance and support services. Technicians are then sent out to a client’s site to provide the service required. Two jobs have been assigned to you. A Proot Printing, a small print service company using two stand-alone computers, require a network to be set up to allow them to back-up their daily work quickly and easily at the end of the day. Your manager has decided that a peer-to-peer network would satisfy this requirement and has asked you to visit the company to set up the network. A new LAN has just been installed for Aximo Marketing, a small market research company. The user accounts must now be set up. Your manager has asked you to visit the company and set up the user accounts.
B
Task A – Set up, configure and test a peer-to-peer network consisting of two computers
In this task you are required to connect two computers in a peer-to-peer network and undertake some file and print operations on the network. You are permitted to use manufacturer’s manuals and tutor notes. 1 Produce the following planning document for the hardware and software requirements of the network:
• • • • • •
the name of the operating system and the software publisher cable types and connectors required Network Interface Card (NIC) type and speed type of switch/hub and speed software required (eg drivers, client, sharing, protocol) specify anti-virus and firewall software.
Label this document planning.
Assignment A Level 2 Networking Principles (7540-002)
3
2
Use appropriate tools and safety/ESD protection equipment to:
• • • • •
disconnect the computers from the power supply remove their covers conduct pre-installation checks on hardware components install the network cards into the computers make any required connections.
3
Ask the assessor to check the safety of your installation. After approval:
• refit the covers • connect the computers to the power supply, switch them on and boot up • if the NIC uses software for set-up, use the supplier’s software or the operating system
utility to configure the NIC.
4
Install and configure the appropriate components to allow the computers to be connected in a peer-to-peer network including manually setting up the protocols. Take a screen print of the outcome. Set up suitable computer and workgroup names for all computers and take a screen print. Configure guest computer access using a password. Configure the computers to access resources to:
• allow full access to all users to the hard drive on all computers • share the printer and give it a share name to include the printer’s make or unique
5
6
identifier.
Demonstrate to your Assessor the operation of the network components (eg to show hard drive and printer access over the network). 7 Test the functionality of the network file system. Log on to a computer that does not have the printer attached. Create a directory/folder on the other computer. Create a text file with your name in the first line of the text. Save the text file with the filename yourname.txt in the directory/folder that you created on the other computer. • Test access to the printer by printing the text file created above. Label this printout printout1. • Write down, on printout1, the path of the directory/folder and file that you created. • Log off the computers.
• • • •
Task B – Manage user accounts on a network
In this task, you are required to plan for and set up user accounts for the network for Aximo Marketing. The company employs 20 permanent members of staff and has a total workforce of 40. They all
4 Assignment A Level 2 Networking Principles (7540-002)
work on a 9am-5pm basis. Some employees are temporary and may only work for the company for very short periods of up to a maximum of 4 months. This temporary status must be reflected in the usernames. Each employee requires a secure home folder and a user account. You should use the word password whenever you need to set up user passwords during this task. Please note that this is not generally good security practice but the method should be used in this assignment. 1 Develop and state a naming convention that will accommodate all employees, taking into account the possibility of duplicate names and the requirements for temporary staff on the Answer Sheet provided. Use the Usernames table to produce a list of ten example names and their respective usernames including two examples for temporary staff. On the Usernames table, write the location (paths) of the home folders. On the computer network, log on as administrator. Create six new user accounts, using names from your list, confirming that home folders have been created for the new accounts. These should be for permanent members of staff. Create two new user accounts for temporary staff, using details from your list. Delete one user account created in Task B5. Configure the temporary user accounts to expire after three months. Apply restrictions to all the home folders created only to allow access to the owner. On the Answer sheet provide, describe three of the file management facilities used on a network such as: • group access • back-up • copy, rename, delete, move • search tools • file listing • directory/folder structure • access rights to directory/folder structure. 9 10 Attempt to access a folder from another login and take a screen print of the result. Log off the network. (Answer the following on the Answer sheet provided)
2
3 4 5
6
7 8
Assignment A Level 2 Networking Principles (7540-002)
5
11
Describe two of the main features (speed, access method, topology and media) of the following network technologies: • • Ethernet token ring
• wireless • FDDI/CDDI. 12 Describe three of the main functions of a Network Operating System from the points below: • • • • • 13 administration share level security user level security hardware support storage support.
Describe using examples simplex, duplex and half duplex communication methods.
6
Assignment A Level 2 Networking Principles (7540-002)
14
Describe the differences between peer-to-peer and server based networks including at least three of the points below: • • • • • • • • servers clients peers shared resources operating systems administration security central support systems.
15
Describe, giving an example for each, binary and hexadecimal numbering systems.
16
Describe the purpose and benefit of using anti-virus software.
17
Identify the basic characteristics of the following Internet access technologies: • • • • DSL broadband (ADSL) satellite wireless.
When you have finished working: • • Sign each document above your name and label all removable storage media with your name. Hand all paperwork and removable storage media to your assessor.
If the assignment is taken over more than one period, all paperwork and removable media must be returned to the test supervisor at the end of each sitting.
End of assignment
Assignment A Level 2 Networking Principles (7540-002)
7
You May Also Find These Documents Helpful
-
Intended users: The users of the network will be 1 administrator, 2 full time employees and a receptionist.…
- 768 Words
- 4 Pages
Powerful Essays -
For this assignment, imagine that you work for U.S. Industries, Inc. as a network administrator. Your…
- 348 Words
- 2 Pages
Satisfactory Essays -
Travel Agency, Inc. is a large travel firm that was founded in 1999. They pride themselves on personal relationships along with fast and accurate customer service. Travel Agency, Inc. currently has five locations in Los Angeles, New York, Atlanta, Dallas and Chicago. Travel Agency, Inc. is looking to cut down on operating costs and focus on expanding their business. Part of this growth process is to switch to a telecommuting business model. The original business model consisted of workers in dedicated call centers. This is costly due to other travel agencies having lower overhead through utilization of self-service websites. By eliminating the overhead cost of a building rental, Travel Agency, Inc. will create flexibility, better customer service, and increased productivity. This also creates a home-based virtual office environment. This will help…
- 9550 Words
- 35 Pages
Good Essays -
| With PC’s entering into the home and workplace, a network was created as a way of linking various PC’s together and to a server.…
- 381 Words
- 2 Pages
Satisfactory Essays -
Encapsulation is an attribute of object design. It means that all of the object's data is contained and hidden in the object and access to it restricted to members of that class. A procedure is a type of encapsulation because it combines a series of computer instructions. Likewise, a complex data type, such as a record or class, relies on encapsulation.…
- 2452 Words
- 10 Pages
Powerful Essays -
The scientific workplace I have chosen is Huntingdon Life Sciences, which is a research company, located in the outskirts of Huntingdon, Cambridgeshire. There are laws and regulations in place to monitor all types of scientific work in factories, in the field and laboratories. In every scientific workplace it is critical that each person follows the Health and Safety at Work Act, this covers all aspects and areas of the workplace, this act is mainly displayed in work places through a poster. The purpose of this act is to prevent any death, injury and ill health to those at work and those who are affected by work activities. As this workplace has more than five employees it is essential for them to produce a ‘Health and Safety Policy’ document, which is overseen by the ‘Health and Safety Executive’. The Health and Safety Executive sets out the general approach of this policy and oversees the policy. It is the Health and Safety Executive in Huntingdon Life Science to oversee the writing of the policy, accessing of risks, consulting workers and making sure that Health and Safety at work posters are displayed.…
- 837 Words
- 24 Pages
Good Essays -
Ensure that before I begin any work activities I check and use any risk assessments examine the areas in which I work and any equipment I have to use to ensure that they are safe, hazard free and conform to legal and the settings requirements for health and safety, remove, where possible, hazards that might pose a health and safety risk to myself and others.…
- 356 Words
- 2 Pages
Good Essays -
Now it is time for you to put your networking knowledge to work. Read through the Network Design:…
- 1276 Words
- 9 Pages
Powerful Essays -
In our school we follow the Health and Safety at Work Act 1974 and through this our Health and Safety policy is produced. It is the employer’s duty to put policies and procedures into place to ensure that the setting is meeting the standards of the Health and Safety at Work Act, and the employer’s duty to make sure these are followed. The way in which our school follows this Act is by making sure that the building and environment is well…
- 3060 Words
- 13 Pages
Good Essays -
1. You are the network administrator for a new company that has 10 users and plans to add five more users within a year. The files need to be accessed by all 10 users and each user must have different security rights. What kind of network would you install and how would the pieces and components of this network relate to each other? Define each component.…
- 350 Words
- 2 Pages
Satisfactory Essays -
1. Bill’s business is already expanding. He thinks that in a few weeks, he will need to hire one or two employees to help him. He knows that new employees will need their own computer. He is also making the necessary changes so that the new employees will be working in a spare room in Bill’s house. Explain to Bill what networking options he has. Go through each type or configuration of network possible for him, making sure that you explain the pros and cons of each configuration. Finish with your suggestion for the network that he should set up and explain what new hardware will be required to do this.…
- 1278 Words
- 5 Pages
Better Essays -
Over four months, a very short period of time, a small accounting firm grew from five employees to fifty. The existing network architecture could no longer support the exponential growth. Peer-to-Peer networks work very well in a small office environment. Once the ratio of employees exceeds around five employees resources, file storage and a plethora of other network disasters begin. The obvious solution was to recommend a change. As explained in the proposal the proposed upgrade from a peer-to-peer network architecture to client/server was an imminent necessity.…
- 6041 Words
- 25 Pages
Powerful Essays -
Describe the requirements for a health and safe workplace in terms of the physical environment and the equipment at a selected work organisation.…
- 1969 Words
- 8 Pages
Good Essays -
1.2 Explain how health and safety is monitered and maintained and how people in the work setting are made aware of the risks and hazards…
- 521 Words
- 3 Pages
Satisfactory Essays -
This document contains the solutions to review questions and problems for the 4th edition of Computer Networking: A Top-Down Approach Featuring the Internet by Jim Kurose and Keith Ross. These solutions are being made available to instructors ONLY. Please do NOT copy or distribute this document to others (even other instructors). Please do not post any solutions on a publicly-available Web site. We’ll be happy to provide a copy (up-to-date) of this solution manual ourselves to anyone who asks.…
- 27814 Words
- 112 Pages
Powerful Essays