UNIT INTRODUCTION
This resource covers the unit ICTSUS601 - Integrate sustainability in ICT planning and design projects.
This unit describes the skills and knowledge required to integrate sustainability concepts and policies into information and communications technology (ICT) planning and design projects. These projects typically involve upgrades of equipment hardware and software or new installations of next generation networks (NGN) using emerging technologies.
It applies to individuals who have high level specialist technical skills and knowledge in optical communications and IT networks using internet protocol (IP) systems.
No licensing, legislative or certification requirements apply to this unit at the time of publication.
About This Resource
This resource brings together information to develop your knowledge about this unit. The information is designed to reflect the requirements of the unit and uses headings to makes it easier to follow.
You should read through this resource to develop your knowledge in preparation for your assessment. At the back of the resource are a list of references you may find useful to review.
As a student it is important to extend your learning and to search out textbooks, internet sites, talk to people at work and read newspaper articles and journals which can provide additional learning material.
Your trainer may include additional information and provide activities, PowerPoint slide presentations, and assessments in class to support your learning.
About Assessment
Throughout your training we are committed to your learning by providing a training and assessment framework that ensures the knowledge gained through training is translated into practical on the job improvements.
You are going to be assessed for:
You will receive an overall result of Competent or Not Yet Competent for the assessment of this unit. The assessment is a competency based assessment, which has no pass or fail. You are either competent or not yet competent. Not Yet Competent means that you still are in the process of understanding and acquiring the skills and knowledge required to be marked competent.
The assessment process is made up of a number of assessment methods. You are required to achieve a satisfactory result in each of these to be deemed competent overall.
All of your assessment and training is provided as a positive learning tool. Your trainer/assessor will guide your learning and provide feedback on your responses to the assessment. For valid and reliable assessment of this unit, a range of assessment methods will be used to assess practical skills and knowledge.
Your assessment may be conducted through a combination of the following methods:
The assessment tool for this unit should be completed within the specified time period following the delivery of the unit. If you feel you are not yet ready for assessment, discuss this with your trainer/assessor.
To be successful in this unit, you will need to relate your learning to your workplace. You may be required to demonstrate your skills and be observed by your assessor in your workplace environment. Some units provide for a simulated work environment, and your trainer and assessor will outline the requirements in these instances.
ELEMENTS AND PERFORMANCE CRITERIA
1. Prepare to produce ICT architecture design |
1.1 Obtain the client’s business specifications and business requirements from appropriate person 1.2 Review specifications and requirements to identify the type of ICT network and network specifications required 1.3 Consult with key stakeholders to identify their requirements 1.4 Assess business problems, opportunities and objectives, and confirm details with appropriate person |
2. Produce preliminary ICT network architecture design |
2.1 Ascertain technical requirements, including hardware, software and network elements according to specifications 2.2 Select software solutions to suit business platform 2.3 Develop preliminary physical network diagrams as a preface to architecture blueprint 2.4 Produce a document on the possible impact of the network design on the business requirements |
3. Evaluate preliminary |
3.1 Predict forecast traffic demands, and impact on |
design and likely performance network design, from current and future demand using forecast demands requirements |
design, addressing business specifications and recommendations
proposed
PERFORMANCE AND KNOWLEDGE EVIDENCE
This describes the essential knowledge and skills and their level required for this unit.
Performance Evidence
Evidence of ability to:
Note: If a specific volume or frequency is not stated, then evidence must be provided at least once.
Knowledge Evidence
To complete the unit requirements safely and effectively, the individual must:
ASSESSMENT CONDITIONS
Gather evidence to demonstrate consistent performance in conditions that are safe and replicate the workplace. Noise levels, production flow, interruptions and time variances should be typical of those experienced in the telecommunications networks engineering field of work and include access to:
Assessors of this unit must satisfy the requirements for assessors in applicable vocational education and training legislation, frameworks and/or standards.
PRE-REQUISITES
This unit must be assessed after the following pre-requisite unit:
There are no pre-requisites for this unit.
Topic 1 – Prepare to produce ICT architecture design
Welcome to the unit ICTTEN611- Produce An ICT Network Architecture Design
This unit describes the skills and knowledge required to compile and evaluate business specifications from a client, and produce a set of architecture design solutions to cater for present and future forecast demands.
It applies to individuals working in the field who carry out design and implementation of technical solutions of information communications technology (ICT) networks, employed by telecommunications and information technology networking provisioning companies specialising in integrating converging and emerging technologies of ICT networks.
No licensing, legislative or certification requirements apply to this unit at the time of publication.
In this unit you will learn how to:
Let’s begin!
Obtain the client’s business specifications and business requirements from appropriate person
When preparing to produce a suitable ICT architecture design for a complex business client it will be necessary to ensure that a range of information is obtained from the client in order to ensure that all designs will meet the client’s business specifications and requirements.
An ICT network is a complete Information and Communications Technology system, network and framework for an organisation and will cover all communications systems technology, software and hardware across the organisation. It is essential that the ICT system for a particular organisation is matched specifically to a client’s needs and their related business requirements.
ICT architecture design is the design of the full framework of hardware, software and networking components to ensure that all business tasks and operations are able to be successfully catered for.
Client may include:
Business specifications may include:
Business requirements may include:
Model of business framework to be considered in network design:
i
When preparing to conduct designing and planning operations for an organisation it will be necessary that a range of research is conducted in order to allow for the identification of appropriate personnel that business information may be obtained from. It will be necessary to create a list of all of the information that is required and then make contact with the appropriate person in order to commence the systematic collection of this information.
Review specifications and requirements to identify the type of ICT network and network
specifications required
Once the range of business information, specifications and requirements have been collected it will be necessary to ensure that they are carefully reviewed in order to identify the type of ICT network and network specifications that are likely to be required in order to meet these needs.
ICT network may include:
It will be necessary to conduct a systematic and methodological review of all of the collected business specifications and requirements and break them down one by one in order to enable efficient and effective planning of the ICT network architecture.
In determining and proposing the needs for the network you will need to collect and analyse a range of information from the organisation to determine the gap between the current situation and the desired situation.
Information will need to be collected on:
Once this gap has been ascertained then you can begin to develop options for how to close this gap. With all business options there will be costs, benefits and risks involved. To support effective change proposals, it is important to demonstrate that all of these factors have been considered information explaining them should be provided so that appropriate decisions can be made.
A well-written change proposal will contain the following sections:
Consult with key stakeholders to identify their requirements
When developing an, ICT network architecture, it is important that a range of individuals from all stakeholder groups from the organisation are involved. It is important to ensure that a range of key stakeholders and groups are involved in the consultation process when ICT network designs are being developed that may be relevant to them or impact on them in some way.
This will enable a broad and varied view of how the company can most successfully reach its goals in relation to the management of technology and communication and will ensure that the network design meets the needs of the stakeholders and it tailored correctly to the company.
To create something that aims to meet the needs of a specific group without asking them what their key concerns and needs are would be putting the company at great risk of creating strategies or a network that may not meet these needs at all.
Stakeholders may include:
It is essential that we understand each of the groups of people that the network architecture is designed to aid and assist. It will be necessary to consult in order to gain a range of different insights from different areas of the organisation.
Raw data related to matters of the ICT network should be analysed in consultation with key groups and other stakeholders to identify the companies’ current position on a range of different factors relating to the information and communications technology management within the organisation.
Target areas for the company will need to be decided upon and then objectives and goals will need to be determined. Only then can the actual network design begin to be developed. It is important to ensure that you also have a strategy for evaluating the success of each portion of the network design so that it may be implemented and then monitored successfully.
Consultation can take place in many different forms and should be varied to ensure that you are collecting the full breadth of the information. Your organisation should have a strategy in place for the consultation of stakeholders during ICT network design development and review. It is important that you are aware of these policies and procedures and that you follow them carefully at all times.
Methods for consulting key stakeholders may vary depending on the size of the organisation, the complexity of the network being developed and also the needs and characteristics of each of the key stakeholder groups.
For example, if you wanted to collect information on policy development from a worker group consisting of one thousand people then perhaps one on one consultation may not be a reasonable solution. But surveys could be disseminated and collected and advise on the issues at hand quite effectively.
On the other hand, if you have diversity specialists or human resources personnel within your stakeholder groups then a survey may not be sufficient in the collection of information from these groups as they will have a great deal of experience and knowledge related to the effective management of information and communications technology and should be included in a panel conducting detailed and extensive research and planning in relation to the network design.
When deciding on the methods that you will employ to consult the various groups available to within the organisation, it is advisable to conduct an audit of all of the different key stakeholder groups and write down their attributes and potential knowledge in the areas of ICT networks and plan a method of consultation that will be most beneficial in collecting the information that you need.
Data could be organised in a table similar to this:
Stakeholder Group |
Key attributes |
Type of knowledge in relation to ICT network needs |
Number of stakeholders in this group? |
Number of personnel we wish to consult from group |
Method of consultation? |
A strategy for achieving for consultation can then be planned and timelines and members that will be involved in the consultation can be advised. A clear plan will need to be devised to ensure that consultation is conducted in a timely and thorough manner meeting all legislation and regulatory requirements.
Both formal and informal consultation methods can be employed to ensure a varied manner in the collection on information.
Formal consultation in the form of the sharing of extensive reports and statistics should be shared and information regarding these should be collected from each source.
Brainstorming sessions and meetings are a good way of troubleshooting and creating strategies.
Invite stakeholder groups to attend information sessions regarding the key needs of each of the target groups will assist in appropriate data collection to aid in the development of relevant strategies.
A series of one on one and group consultation meetings and surveys related to the topics are also appropriate means of consultation for ICT network design.
Assess business problems, opportunities and objectives, and confirm details with appropriate
person
It will be necessary to ensure that a range of business problems, opportunities and objectives are assessed and then confirmed with appropriate persons so that these details can be used for the planning of the ICT network architecture design.
Appropriate person may include:
A range of business problems within the organisation may be able to be used to determine a range of further business needs and specifications that the ICT network may need to meet.
Business problems are those that need to be:
Fixed
Improved
Minimises
Business opportunities are a range of circumstances or situations from within the organisation which may be able to be utilised in order to promote:
A SWOT analysis of the current situation and current strategic plans is an effective tool to be used during ICT network planning and business analysis.
A SWOT analysis will assess and determine the main STRENGTHS, WEAKNESSES, OPPORTUNITIES and THREATS that an organisation is currently facing and that the current ICT plan presents.
In order to correctly carry out a SWOT analysis it is important to define the problem you are trying to resolve of the situation that you are attempting to assess.
Typical opportunities and objectives and related plans will be related to items such as:
When performing a SWOT analysis, you will need to determine the parameters of exactly what it is you are measuring and what sections of the organisation are involved in each review.
Analysing the entire organisation as once is extremely difficult and will provide answers that are too broad to be helpful it is important to conduct a SWOT for each of the problems, strategies and related sections within the organisation.
You will then need to gather all of the information that will be used to determine each of the categories of the SWOT analysis. This information will need to be gathered in many different forms and from many different departments within the organisation.
A range of different market research and internal research techniques can be used to obtain quantitative and qualitative information from within the organisation and also external information regarding the market and competitors and their performance and these include:
Analysis of public information kept on companies
Stock market analysis
Internal documentation
Once you have gathered all of this information it is important to divide it into the four SWOT sections STRENGTHS, WEAKNESSES, OPPORTUNITIES and STRENGTHS.
Opportunities may include:
Threats may include:
Weaknesses may include:
Strengths may include:
Certain resources you may have that others do not
Your company image
Your market share.
All of this information can then be used to determine methods for utilising opportunities and strengths and managing threats and weaknesses.
This type of strategic analysis should be conducted on all strategic plans and will determine a list of potential developmental needs that your organisation has. These can be used to make new strategic plans and developmental plans to assist the organisation in achieving its overall goals and objectives.
Information from the SWOT analysis should be used to inform on the ICT needs of the organisation.
TOPIC 2 – PRODUCE PRELIMINARY ICT NETWORK ARCHITECTURE DESIGN
Ascertain technical requirements, including hardware, software and network elements
according to specifications
It will be necessary to ensure that all of the technical requirements of the ICT network architecture design are able to be ascertained from design plans and documentations in order to ensure that the network will operate as planned.
It will be necessary to ensure that an in-depth range of information is collected and assessed in order to enable the appropriate and effective planning of the ICT network architecture design.
Information may be collected from:
Technical requirements of the ICT network architecture are the range of technical specifications and capacities that the network must provide in order to be sufficient.
Technical requirements may refer to:
Bandwidth
The hardware component is the network that the ICT network will be connected to and may include a range of existing external networks that enter the premises and need to be connected to.
Hardware may include:
The IT network elements are the range of elements that must make up the IT portion of the network this will include the use of the internet and all digital communications.
IT network elements may include:
Gateway
Software is the range of applications that the organisation will require in order to meet all business requirements and specifications for the ICT plan.
Software may include:
Vendor propriety
Network elements are the range of network accessories and components that are needed in order to enable the effective construction and use of the ICT network.
Network elements may include:
Transmitter
Each of these sections of components, infrastructure and equipment will need to be carefully assessed and built as the ICT architecture is slowly built and tailored to meet the specific needs of the organisation.
Select software solutions to suit business platform
There are many different types of software that is available either as free source or by purchase or subscription. It is essential that the correct type of software that best suits the intended type of communication and information technology management and is selected for the ICT network architecture that you are seeking to apply.
Choosing the appropriate software for an organisation will come down to a range of factors including:
There are a range of different software types that the ICT network may need to utilise and these include:
Network management suites are independent edition and collections of software applications that can be used to configure, monitor, manage and control the hardware items that exist within the network.
There are a range of applications which will operate at the desktop and server layers of the ICT network and will include a range of database and archive management software’s as well as software that can be used to store, share, record and manage the range of information that is held within the organisation.
There is a range of client relationship management software applications that may need to be utilised as a part of the ICT network design and is used to collect, record, store, share and manage a range of information that is used to manage client needs and relations.
The operating systems for the workstations and system servers and other devices will need to be assessed and selected based on:
There is a range of software that may be used to aid in the communications between staff and other stakeholders and these may include:
When assessing the network for the required range of software applications it will be necessary to consider:
When selecting appropriate software, it will be necessary to assess and consider the following factors:
Develop preliminary physical network diagrams as a preface to architecture blueprint
It will be necessary to ensure that a range of preliminary physical network diagrams are created so that they are able to be used to create future architecture blueprints.
A range of ICT symbols and icons will need to be used as a part of the creation of preliminary physical network diagrams and these may include:
ii
ICT preliminary network diagrams are diagrams using a range of symbols and lines in order to demonstrate the connections and information flows that will be represented throughout the system. These are designed to provide an overview and plan of the system and not to provide a working document that can be used for the installation.
ICT network architecture diagram:
iii
Carrier network architecture may include:
Network architecture configuration:
Database software may include:
Operating systems may include:
A network architecture blueprint is a reproduction of a technical drawing which is used to document an architecture or engineering design. Blueprints will be developed on light sensitive sheets and allow for the rapid and accurate reproduction of documents as required.
Blueprints will contain a range of information including:
Produce a document on the possible impact of the network design on the business
requirements
As a part of the ICT network architecture design it will be necessary to ensure that a range of impacts, benefit and challenges that the ICT network architecture may result in is assessed, documented and reported to allow for effective planning and decisionmaking processes in relation to the ICT plan.
The impact of the ICT network architecture is the range of changes and circumstances that are likely to be caused by its implementation. Impact may refer to:
Effective management of information and communications networks can provide competitive advantages for all organisations. The benefits from implementing, carefully planned network architecture can impact on the entire organisation.
By using the range of data and assessment collected on the current system and organisational requirements and specifications in relation to the ICT network architecture design it will be possible to assess and categorise the potential impacts that are likely to result.
Potential impacts of ICT network architecture may include:
It is important that when you are presenting information to demonstrate the impacts of the ICT network architecture design data is shown that demonstrates trends in success in relation to good practice and highlight the negative impact that occurs when best practice in relation to matters of information technology and communication are not achieved.
Correct analysis of qualitative and quantitative data collected regarding ICT design policies and strategies within the business can be mapped against these benefits to demonstrate the success of the current ICT networks.
Information from competitors that may be managing their ICT networks in a more effective manner than the organisation in question can also be used to demonstrate impacts.
Case studies showing how business performance and overall bottom line have been improved due to the implementation of a well-structured and thought-out ICT network architecture have been effective in other businesses can be used to demonstrate how effective management of ICT networks has a direct link to organisational goals and objectives.
Business objectives may include:
It is important that all ICT impacts are identified and mapped directly to the business objectives so that stakeholders can realise the importance of ICT network architecture implementation within the organisation.
TOPIC 3 – EVALUATE PRELIMINARY DESIGN AND LIKELY PERFORMANCE USING FORECAST DEMANDS
Predict forecast traffic demands, and impact on network design, from current and future
demand requirements
It will be necessary to conduct a range of evaluations on the preliminary ICT network architecture design and to in order to predict forecast traffic demand and the impact of these forecasts on the ICT network design. These predictions and forecasts should be based on a range of current and future demand requirements on the network.
Forecasting techniques may include:
All of these different methods for forecasting a extremely useful for determining different aspects of the ICT system requirements. In most instances the organisation will use a combination of these methods in order to make up its entire forecasting portfolio.
It will be necessary to ensure that a
These may include factors such as:
Benchmark design using expected performance parameters
It will be necessary to ensure that a range of benchmarks are created and applied to the ICT network architecture design according to the expected performance parameters that have been applied throughout consultation and planning for the ICT network architecture.
Expected performance parameters are the range of specifics and statistics that the ICT network is expected to be able to maintain. It is essential that these performance parameters are assessed and used to create a range of specific benchmarks that the ICT network must meet in order to be measured and deemed to be successful.
Performance parameters may include:
Benchmarks are pre-set and measurable quality standards that are set in order for the ICT network architecture to achieve. In order to be successful benchmarks should be written using the SMART acronym.
Benchmarks written using the SMART acronym will be:
It is essential that the benchmarks that are created for the ICT network architecture design meet the performance parameter requirements that have been set for the specific plan.
There are three typical forms of measures that would be suitable for evaluating the suitability of the benchmarks that have been set and these include:
Review design’s likely performance profile
It will be necessary to ensure that a range of reviews are conducted on the ICT network architectures likely design performance profile in order to determine whether the proposed design is likely to be sufficient according to expected performance parameters and benchmarks that the design is required to meet in order to be considered successful.
A networks performance profile is made up of a range of expected statistics and performance figures that are based on the design and its potential capacity. It will be necessary to consider a range of factors such as the range of performance parameters that have been pre-decided.
It will be necessary to conduct a range of reviews on the designs expected performance based on:
It will be necessary to use a range of review and analysis tools when reviewing the likely performance profile that the network design is able to provide:
It will be necessary to ensure that the results of the performance review on the network in order to provide expected network performance profile recorded and presented in order to provide clear projected information on the expected performance of the planned ICT network and all of its components.
Determine costs involved with a range of supplier products
It will be necessary to ensure that all expected and projected costs that are to be involved with a range of supplier products are able to be determined in order to contribute to the evaluation report that will predict the overall costs of the network.
The costs that are involved with a range of supplier products that have been included as a part of the network architecture will need to be determined through the process of:
Purchasing data and information is a range of information and data held within the organisation in relation to purchasing plans and projections including:
Units are components that resources will be calculated in the type of unit may vary depending on the resource for example:
It will be necessary to select a unit type for each of the different resource types that will be used throughout the network installation so that costs can be calculated for each unit, this will allow calculation and identification of total costs for each resource type for the network.
When calculating the unit and total cost for each supplier product within the network it will be necessary to undertake the following steps:
Calculate the total unit cost for each product type
Produce an evaluation report on predicted performance and costs of the network architecture design, addressing business specifications and recommendations
It will be necessary to take the range of data and information that has been compiled and assessed throughout the production of the ICT network architecture plan and analyse it so that an evaluation report is able to be provided on the predicted performance and costs of the complete network architecture design. It is essential that this evaluation report will address the business specifications and recommendations for the network design and explain how these needs have been successfully met in the design plan.
It is essential that all information and data that is collected from within the organisation is carefully analysed so that a full understanding of the projected ICT network is able to be effectively identified.
Analysing information is the systematic process of examining the data collected in a way that illustrates the correlations, interrelationships and in patterns in data. It is important that analysis is conducted so that trends and developments that are shown in the information that you have collected about a subject can be reported on. These trends and developments can then be used to advise on issues and support strategic decision making. Understanding the intended use of the information is important when analysing and presenting raw data so that it can be formatted and delivered in a way that best suits the needs of the area that the information is intended to advise on.
Careful analysis of information can provide:
Supporting information for an existing theory
Evaluation reports should include a range of sections including:
Reports may be required in order to:
When conducting effective report writing procedures it will be necessary to ensure that the following considerations are made:
User audience: It will be necessary to ensure that audience that will be reading the report is considered in order to ensure that the following factors are appropriate: o Language o Format o Inclusions o Confidentiality requirements
o Readable o Informative o Clear o Appropriate for the information presented
It will be necessary to ensure that all of the information that is included within the report is:
Current: the information must still be current meaning that it is not outdated due to changes in the environment or more recent information becoming available.
TOPIC 4 – FINALISE NETWORK DESIGN AND OBTAIN APPROVAL
Review benchmarks, requirements and final design proposed
It will be necessary to ensure that a range of reviews on the benchmarks, requirements and final designs in order to ensure that all agreed parameters are met by the plan.
The final proposed design of an ICT network may include:
When the ICT network design parameters were developed and implemented there will have been a range of benchmarks set in order to successfully measure the success of the proposed design.
These will have been specific to the different sections within the plan. It will be necessary to ensure that a range of tools are developed that can be used to effectively measure the final design proposed against the pre-set benchmarks for the business ICT network and related information.
Tools that can be used to measure benchmarks may include:
There are a range of factors that should be focused on during the reviews process and these may include:
Reviews should also include general management items such as:
Determine support and training requirements needed
When any new system, policy or framework is implemented into an organisation there may be a range of training and support that personnel may require in order to enable:
Change management strategies should be based around the uptake and planning for the changes to ensure that the recovery processes and positive direction changes within organisations can be successfully managed.
Change management strategies may include:
In order to successfully implement new ICT networks into the organisation it is essential to ensure that all personnel involved in the implementation have access to all of the information that they will require in order to do so.
Information required may include:
Provide support through training
It will be necessary to ensure that all relevant personnel receive the training and support that they require in order to effectively implement the ICT network design into the organisation in a compliant and efficient manner.
Required training may include:
Provide support through resources
It is essential to show support to all relevant personnel throughout the ICT network architecture design implementation by ensuring that personnel have access to the resources that they require to ensure that all tasks can be completed as required, to the level of quality required and within required timeframes.
Resources required may include:
Provide support through specialist advice
It may be necessary to ensure that personnel have access to specialist advice as required throughout the ICT network architecture design implementation process within the organisation.
Specialist advice may be in relation to:
Provide support through regular opportunities for collaboration
It may be necessary to further support personnel in implementing ICT network architecture design by allowing them structured time to collaborate with each other and upper management. Collaboration is an essential business action that drives motivation, innovation and a supportive environment for personnel and strategies to flourish within.
Opportunities for collaboration may include:
Provide support through allocation of time
It is essential that all tasks are allocated to be completed within reasonable and appropriate timeframes; implementation should be efficient but not rushed.
Methods for ensuring that relevant personnel have the time that they require to complete implementation tasks may include:
Ensure support provided is sufficient
When supporting relevant personnel to successfully complete ICT network architecture design implementation tasks into the organisation it will be necessary to ensure that regular communication is conducted so that the personnel will have the opportunity to make requests for further support that they may require. It will be necessary to ensure that support provided is reviewed and updated as the needs of personnel and stakeholders change throughout the different stages of the implementation process.
Obtain latest technical specifications and pricing by contacting possible vendors
It will be necessary to ensure that the latest technical specifications and pricing for the range of equipment and software requirements that the specific ICT network architecture design may have and these can be obtained through the contacting of possible vendors.
Contact possible vendors
It will be necessary to conduct a range of research into the approved vendors by the organisation and the range of other vendors that may meet a range of quality standards for items and ensure that they contacted in order to confirm pricing and latest available technical specifications.
Pricing
The pricing of items may be based on a range of factors including:
Technical specifications
Technical specifications are a range of technical information and parameters that pertain to the items that is to be used within an installation.
Technical specifications may include:
Technical capabilities and limitations and specifications may include:
A typical technical specification will include the following sections:
Verify technical specifications for equipment items
It is essential that all of the technical specifications for the equipment items that are to be included in the installation are verified against:
It will be necessary to determine the range of materials that will be required in order to complete the job tasks. All workplaces will then have a range of techniques and established procedures for accessing these materials, it is essential to ensure that all established workplace procedures are followed at all times.
Identify components and equipment required
It will then be necessary to assess all of the plans and work specifications in order to analyse the components and equipment items that will be required to carry out the job tasks successfully and appropriately.
It will be necessary to check all safety standards in relation to the selection of the appropriate sized component types and other materials in order to ensure electrical safety. All materials used on the work site must be of the Australian Quality standards.
Calculating amounts
It will be necessary to calculate the required amounts of each of the components and equipment that have been identified from planning documentation. Each of the components and equipment will then need to be priced and ordered from a variety of different suppliers. All workplaces will have a set of policies and procedures related to the assessing of material requirements.
Checking against job requirements
Checking against job requirements may include checking:
Document network design and present documentation to appropriate person for approval
It will be necessary to ensure that a range of documentation and network designs are created and presented to an appropriate person for approval.
Document network design
When documenting network design it will be necessary to ensure that the following information is documented:
Documentation
Documentation may include:
Submit the final copy of the design and supporting documents to relevant personnel for approval
When submitting the final copy of the design and supporting documents to relevant personnel for approval it will be necessary to ensure that:
Obtain sign off on final business solution
It is essential on completion of the creation and development of an ICT network architecture design that formal sign off is able to be obtained in order to allow for the planning and preparation stages for the actual completion of the job tasks.
Final business solution
The final business solution that is put forward is the completed ICT network design and all related documentation that has met and passed all other requirements throughout the process.
Sign-off
Sign off is the formal acceptance by authorised personnel of a particular design or proposal that is required prior to allowing for the commencement of the next stages of work. There are a range of actions that should be conducted when attempting to obtain approvals and these may include:
Notifying supervisor of completion of work
There are a range of methods that can be used when notifying supervisors of completion of work tasks and these can include:
Job completion reports
Job completion reports may be required upon completion of some tasks and the information that may be required for these reports includes:
Obtaining job sign off
It will be necessary to ensure that all of the required sign-offs are obtained for the specific job tasks. It will be necessary to approach the supervisor and ask for sign off, a job inspection may be required to sign off being granted. Sign off may be required on:
Obtaining sign-off on ICT network architecture design
When setting out to obtain sign-off on ICT network architecture design it will be necessary to ensure that a range of information and documentation is compiled and submitted for formal approval and these may include completed:
Methods for obtaining final sign off
There are a range of actions that will need to be taken in order to ensure that final sign off is able to be obtained and these may include:
TOPIC 5 – REQUIRED KNOWLEDGE
Produce an ICT network architecture design
Summarise principles of the following technologies:
Access networks
An access network is a network which connects users of a telecommunications company to the service provider and thus to the services that are provided.
Core networks
Customers of a service provider gain access to a provider’s core network via the provider access network. A core network is the portion of a telecommunications network that provides various services to its’ customers. The normal function of a core network is to route telephone calls across Public-Switched Telephone Network (PSTN).
Information communications technologies (ICT) network topologies
Information communications technologies (ICT) network topologies are the arrangements of ICT networks. The arrangement is referred to in the forms of connecting lines and nodes, which are also known as network geometry.
There are two ways in which network geometry is defined:
Physical
Physical topology is the geometric layout of workstations (nodes) and connections.
Physical topology examples may include:
Logical
Logical topology refers to the signal path that is followed throughout the network. Physical and geometric are often the same shape, but it is important to realise that this is not always the case.
Mobile cellular networks
A mobile cellular network is a cellular network that is accessed using mobile devices such as mobile telephones.
Cellular network
A cellular network is a network of radios that are distributed in fixed locations across a landmass. The radio cells are referred to as base stations. The base stations are situated so that their effective areas overlap with nearby base stations to form large coverage areas with as few gaps as possible. Mobile devices are able to continuously remain connected to the network while passing between the coverage area of individual base stations. Subscribers are granted access to cellular networks by their service providers. The providers track the location of each mobile device on their network using Strong paging channels and transmit information to and from the devices using strong dedicated control channels.
Network protocols and operating systems
Network protocols
Network protocols are the rules and conventions that govern the communication of devices on a network. Network protocols may govern the following facilities on networks:
Network operating systems
An operating system is a central collection of applications and programs that work together as one software system that organises and manages all function that takes place within a network. Network operating systems use network protocols to manage all facilities and housekeeping aspects of a network.
The facilities that a network operating system manages may include:
Optical networks and principles
Optical networks are data communication networks that are built using optical fibre technology.
Principles of optical networks
The principles of optical networks are essentially the use of light to transmit data. Data is created or translated at a node then converted into electrical energy. The electrical signal is sent to an optical transmitter device where it is translated into pulses of light. That light is transmitted long distances along fibre optical cables until it reaches either a repeater device that replaces weak signals with more powerful ones or it reaches its destination on the network. When it reaches its destination, another optical transmitter transfers the light back into electrical signals, which are then converted into date. The method of data transfer is much faster than using traditional means, such as copper cables. Light travels faster and there are few external factors that can impede the movement of information through fibre optic cables.
Radio frequency (RF) technologies and principles
Radio frequency technologies are based on particular frequencies of radio waves that can be used for a range of different technologies dependent on the allocated spectrum limits for use.
Within each country there will be a range of spectrum limits and allocations which will ensure that all frequencies will be used for a specific purpose ensuring the safety and organisation of the use of all of the available frequencies on the spectrum.
See the example spectrum allocation and limits guide below:
iv
Radio frequency identification (RFID) hardware and software
RFID or radio frequency identification is a technology that uses electromagnetic or electrostatic coupling in the RF frequency range in order to identify objects, animals or people. RFID may be used as a part of authentication and tracking of processes and items within the ICT network architecture. The RIDF system consists of three main components and these are:
Explain what is meant in the ICT sector by business processes
Business processes within the information and communications or ICT industry are the actions that will be taken by the organisation in order to conduct work tasks. These may be within or outside of the ICT network architecture.
Explain compatibility issues and resolution procedures
Compatibility issues may arise between both hardware and software components of the servers and the computers and their applications that are seeking to access and use them. It is important to understand that a range of different aspects may cause compatibility issues and then consider a range of methods that can be used to resolve these issues.
There is a process that can be used to test and assess compatibility issues and resolution procedures and this is:
Example mitigation process:
Domain name server (DNS) resolution
All hosts and the web servers that they connect to will have a unique IP or Internet protocol address. (Internet protocol is the format of all of the data that is shared across the internet.) These IP addresses will be in text form and the DNS resolution process will be the translation of this address into numbers that can be recognised as an IP address such as 207.142.131.248.
During the process of a DNS resolution a web crawler will contact a particular DNS Server and then use a range of other servers in order to complete the process.
Summarise configuration of internet protocol (IP) networks
Configuration of internet protocol or IP networks can be achieved through the completion of the following actions:
Node configuration
Nodes are the range of devices, switches, bridges or hubs a part of the communication network. These nodes are able to communicate with each other as a part of the network, gateways will provide an access point between one part of the network and another. When connecting to the internet it will be common for a computer to be connected to the internet via a gateway and a modem, in this instance the gateway would be assigned to the modem.
This type of gateway is called a default gateway this is the type of gateway that will be able to forward and send packets of data onto other networks when they have not been specifically assigned to another gateway type.
In a network, such as a TCP/IP network, nodes such as computers, workstations and servers will have a default gateway path, in this instance the gateway is essentially a router.
Assigning nodes to a specific gateway
All nodes on the network will have connectors and gateways assigned to them so that they are directed to use the correct path. The node will need to be configured to detect the ID of the specific gateway and how to interact with this gateway. The gateway and the node will both need to be configured in order to achieve this.
The computers and nodes within the network will need to be configured to a range of network parameters including:
Types of nodes that will need to be configured may include:
Commonly the workstations that are a part of the network will be assigned dynamic IP addresses while the other devices within the network will be assigned with static IP addresses and it is important to have a clear understanding of both.
Configure nodes to dynamic ip addresses
Network nodes that need to be assigned to dynamic IP addresses will need to have a DHCP or Dynamic Host Control Protocol server that is available and has been configured and made available for each IP subnet.
DHCP servers will required the configuration of the following parameters:
Once configured a dynamic IP address node within the network will send out a broadcast containing a request for the it’s IP configuration, this request will be sent out during the boot up process of the node and the assigned DHCP server which will be constantly monitoring the network for this type of request will then respond with the assigning of an IP address from its list of unused addresses and send the configuration details back to the requesting node.
The node can be configured from the network utilities system of both the node and the DHCP server.
Configure nodes to static ip addresses
There usually will be at least one network node that required configuration to a static ID on each network and this is often a gateway, wireless access point or print server. The gateway in this scenario will have been already configured and the other components within the network will need to have their configurations set manually.
It will be necessary to log onto the nodes that need to be configured to static IP addresses as an administrator with the ability to alter the network settings. The settings of the node will need to be configured in order to ensure that they can be set to the specific static IP address.
Outline desktop applications and operating systems
The desktop operating system is the operating application that is used to control and communicate with the computer or device that the system is installed on.
Examples of desktop operating system include:
Desktop applications are those that are installed onto the particular operating system that is installed on the desktop computer or device and this may include applications such as:
The desktop applications are the range of applications that will be used by the end user to complete work tasks and to access a range of items across the network. These are the software components of the system that are used by the end user to complete work tasks and business processes.
Summarise security protocols, standards and data encryption
Security must be across multiple platforms and may include the following security protocols, standards and data encryption requirements:
which contain the directory and file locations is protected through authentication, authorisation and access control. It will be necessary to set a range of permissions and user requirements for the directories.
SUMMARY
Now that you have completed this unit, you should have the skills and knowledge to compile and evaluate business specifications from a client, and produce a set of architecture design solutions to cater for present and future forecast demands.
If you have any questions about this resource, please ask your trainer. They will be only too happy to assist you when required.
REFERENCES
Radio frequency Retrieved: 23 Aug 2019 https://en.wikipedia.org/wiki/Radio_frequency
RFID (radio frequency identification) Retrieved: 23 Aug 2019
http://internetofthingsagenda.techtarget.com/definition/RFID-radio-frequencyidentification
Business process modeller Retrieved: 26 March 2017
https://www.qgcio.qld.gov.au/products/ict-workforce-capability/careers-andprograms/ict-career-streams/business-process-modeller
Information and Communications Technology Strategic Planning Process – Information Sheet
Retrieved: 23 Aug 2019 https://www.finance.nsw.gov.au/sites/default/files/policydocuments/ICT%20SP%20Process%20Information%20Sheet%202011.pdf
Configuring TCP/IP networking Retrieved: 23 Aug 2019 https://msdn.microsoft.com/en-us/library/dd163570.aspx
Security protocols Retrieved: 23 Aug 2019 https://www.techopedia.com/definition/29036/network-security-protocols
List of performance analysis tools Retrieved: 23 Aug 2019 https://en.wikipedia.org/wiki/List_of_performance_analysis_tools
Beginners Guide to Performance Profiling Retrieved: 23 Aug 2019 https://msdn.microsoft.com/en-us/library/ms182372.aspx
ihttps://upload.wikimedia.org/wikipedia/commons/d/d0/NIST_Enterprise_Architecture_Model.jpg ii http://kingofnetworking.weebly.com/uploads/7/8/7/4/7874226/215281.png?872 iii http://www.agileict.co.uk/wp-content/uploads/2013/12/networkdiagram.jpg
Our motto is deliver assignment on Time. Our Expert writers deliver quality assignments to the students.
Get reliable and unique assignments by using our 100% plagiarism-free.
Get connected 24*7 with our Live Chat support executives to receive instant solutions for your assignment.
Get Help with all the subjects like: Programming, Accounting, Finance, Engineering, Law and Marketing.
Get premium service at a pocket-friendly rate at AssignmentHippo
I was struggling so hard to complete my marketing assignment on brand development when I decided to finally reach to the experts of this portal. They certainly deliver perfect consistency and the desired format. The content prepared by the experts of this platform was simply amazing. I definitely owe my grades to them.
Get instant assignment help