M04 - Providing Network Systems Administration
M04 - Providing Network Systems Administration
November 2023
Addis Ababa, Ethiopia
Table of Contents
Acknowledgment............................................................................................................................iii
Acronym.........................................................................................................................................iv
Introduction to module....................................................................................................................v
Module Instruction.........................................................................................................................vi
Unit One: Client access and security...........................................................................................7
1.1. Basic concept of network system administration..............................................................8
1.2. Accounts and files privilege............................................................................................12
1.3. Determine access privileges............................................................................................13
1.4. Maintain System integrity and security..........................................................................15
Self-check - 1.................................................................................................................................18
Operation sheet 1.1........................................................................................................................20
LAP Test........................................................................................................................................24
Unit Two: Disseminate disaster recovery plan.........................................................................25
2.1. Basic concepts of disaster recovery plan............................................................................26
2.2. Backup and restore.............................................................................................................27
Self-check - 2.................................................................................................................................32
Operation sheet 2.1........................................................................................................................34
Operation sheet 2.2........................................................................................................................37
LAP Test.......................................................................................................................................41
Unit Three : Monitor network performance............................................................................42
3.1. Basic concept of monitor network performance.............................................................43
3.2. Performing diagnostic test..............................................................................................43
3.3. Analyze and respond information...................................................................................45
3.4. Monitor software and files..............................................................................................46
3.5. Monitor performance indicators......................................................................................47
3.6. Improve network and systems.........................................................................................48
Self-check - 3................................................................................................................................51
Operation sheet 3.1........................................................................................................................52
Operation sheet 3.2........................................................................................................................54
LAP Test........................................................................................................................................61
Page iii of lxxvi Ministry of Labor and Providing network systems Version -1
Skills
administration level - IV December , 2023
Author/Copyright
Acronym
5G:- Fifth-Generation
ACLs:- Access Control Lists
ATP:- Advanced Threat Protection
DPI:- Deep Packet Inspection
DRP:- Disaster Recovery Plan
IEEE:- Institute Of Electrical And Electronics Engineers
PoE :- Power Over Ethernet
QoS:- Quality Of Service
SLA:- Service Level Agreement
SNMP:- Simple Network Management Protocol
SQL:- Standard Query Language
SSDs:- Solid-State Drives
VLANs: Virtual Local Area Networks
-
Wi-Fi:- Wireless Fidelity
WSUS:- Windows Server Update Services
Module Instruction
For effective use this modules trainees are expected to follow the following module instruction:
Page vii of lxxvi Ministry of Labor and Providing network systems Version -1
Skills
administration level - IV December , 2023
Author/Copyright
1.1. Basic concept of network system administration
Network system administration involves managing and maintaining the operation, security, and
performance of a network infrastructure. It encompasses various tasks and responsibilities to
ensure the network functions reliably and efficiently. Network administration aims to manage,
monitor, maintain, secure, and service an organization’s network. However, the specific tasks
and procedures may vary depending on the size and type of an organization.
Network administration primarily consists of, but is not limited to, network monitoring, network
management, and maintaining network quality and security.
Network monitoring is essential to monitor unusual traffic patterns, the health of the network
infrastructure, and devices connected to the network. It helps detect abnormal activity, network
issues, or excessive bandwidth consumption early on and take preventative and remedial actions
to uphold the network quality and security. Network management encompasses multiple
administrative functions, including network planning, implementation, and configuration. It
involves:
Re-planning the network based on changing organizational requirements
Implementing the network for maximum efficiency
Configuring various networking and security protocols
Applying security patches and updating the firmware of the networking infrastructure,
such as routers, hubs, switches, and firewalls
Assessing the network for weaknesses
Evaluating quality and capacity to increase or decrease network capacity and manage
resource wastage
Network security employs various techniques to ensure a network is secure. For example, it uses
multiple tools such as firewalls, intrusion detection or prevention systems, and anti-malware
software to prevent or detect malicious activity in the network.
Network administration goals
Network administration aims to ensure a reliable, secure network conducive to business
operations. Generally, network administration goals include:
Maintain a resilient, high-quality network
Page viii of lxxvi Ministry of Labor and Providing network systems Version -1
Skills
administration level - IV December , 2023
Author/Copyright
Plan and improve network capacity to enable seamless network access and operations
Leverage networking tools for network systems administration and better network
administration control
Track and document relevant changes
Evaluate possible risks and orchestrate effective mitigations
Prevent activities compromising or using the network as an attack vector
Identify and mitigate intrusions to avoid security breaches
1.1.1 Network administration key areas
Networks administration consists of five key areas:
1. Fault management: - Monitors the network infrastructure to identify and address issues
potentially affecting the network. It uses standard protocols such as Simple Network
Management Protocol (SNMP) to monitor network infrastructure.
2. Configuration management: - Tracks configuration and related changes of network
components, including switches, firewalls, hubs, and routers. As unplanned changes can affect
the network drastically and potentially cause downtime, it is essential to streamline, track, and
manage configuration changes.
3. Account management: - Tracks network utilization to bill and estimate the usage of various
departments of an organization. In smaller organizations, billing may be irrelevant. However,
monitoring utilization helps spot specific trends and inefficiencies.
4. Performance management: - Focuses on maintaining service levels needed for efficient
operations. It collects various metrics and analytical data to continually assess network
performance, including response times, packet loss, and link utilization.
Applying account and file privileges involves configuring access controls to ensure that only
authorized users can access specific accounts and files. Here are some steps to apply account and
file privileges effectively:
1. User Account Creation: Create user accounts for individuals who require access to the
system or files. Each user should have a unique username and password combination.
2. User Groups: Group users based on their roles and responsibilities. This simplifies privilege
management by assigning privileges to groups rather than individual users.
3. Principle of Least Privilege: Follow the principle of least privilege, which means granting
users the minimum level of privileges required to perform their job functions. Avoid giving
excessive permissions that could potentially lead to security vulnerabilities.
4. Access Control Lists (ACLs): Utilize access control lists to define access permissions for
files and directories.
5. File Ownership: Assign appropriate file ownership to ensure accountability and control.
Only authorized users or groups should own sensitive files or directories.
6. Regular Access Reviews: Perform regular access reviews to identify and remove
unnecessary or outdated privileges. This helps maintain a clean and secure access control
environment.
7. Password Policies: Enforce strong password policies to protect user accounts. Require users
to create passwords that meet complexity requirements (e.g., minimum length, a combination
of letters, numbers, and special characters) and encourage regular password updates.
8. Regular Auditing and Monitoring: Implement logging and monitoring mechanisms to
track user activities, access attempts, and changes to account and file privileges. Regularly
review logs and audit trails to identify suspicious behavior and potential security breaches.
9. Training and Awareness: Provide training and awareness programs to educate users about
the importance of account and file privilege management. Users should understand their
responsibilities in safeguarding sensitive data and be aware of best practices for access
control.
Page xii of lxxvi Ministry of Labor and Providing network systems Version -1
Skills
administration level - IV December , 2023
Author/Copyright
1.3. Determine access privileges
When a user tries to perform a privileged operation, the system checks the user's access token to
determine whether the user holds the necessary privileges1. If the user holds the necessary
privileges, the system checks whether the privileges are enabled.
Access privileges can be viewed and modified in the Operations Server console. The following
primary roles can be subdivided into additional categories if necessary to match your
organization:
System Administrator: Responsible for configuring and maintaining the Operations Center
environment, including:
Defining adapter connections to key components such as databases and remote
management systems
Defining service model hierarchies, automations, and operations,
Defining custom classes, behavior models, and property pages
Defining calendars, schedules, and jobs
Creating custom SQL Views
Creating Layout views
Determining which users should have access to specific element hierarchies
Security Manager: Responsible for enforcing company security policies regarding user
access to the system, user identification and authorization, password rules, access privileges,
and so on. Also responsible for managing users and groups and enforcing password policies
and rules.
End Users: Responsible for analyzing and reporting information collected in Operations
Center from various sources. You should organize users who have similar authorization to
access data into groups, such as by job function or security clearance level.
Table 1. 1 Access Control Privileges
Access Description
Privilege
View The user can view elements, as well as their alarms and properties, and
relationships to other elements that the user can view.
Note for T/EC adapters: Any user with the View permission can suppress a
T/EC alarm; however, this user cannot acknowledge or close the alarm.
Page xiii of lxxvi Ministry of Labor and Providing network systems Version -1
Skills
administration level - IV December , 2023
Author/Copyright
Manage The user can perform nonintrusive actions (such as Ping or TraceRoute) as
well as update element information (such as custom properties).
Note for T/EC adapters: Any user with the Manage permission can
acknowledge or close a T/EC alarm.
Access The user can access remote managed elements by using “connect to”
operations with adapters that support cut-through telnet such as the Event
Manager, OpenView, and Netcool*. An example operation is using the Console
capability in the Elements hierarchy.
Define The user can perform administrative tasks such as adding scripts, sites, and
service model elements, as well as creating, deleting, and changing the
definition of adapters, service models and SLAs in Operations Center.
Undefined Not defining access privileges avoids conflicts. For example, the two groups in
the following figure have the following permissions at the top (root) Access
Control level:
The admins group has Define privileges explicitly defined. The users group
has undefined Define privileges. Therefore, a member of both groups has
Define privileges.
Page xiv of lxxvi Ministry of Labor and Providing network systems Version -1
Skills
administration level - IV December , 2023
Author/Copyright
Figure 1. 5 Determining access privileges
Page xvi of lxxvi Ministry of Labor and Providing network systems Version -1
Skills
administration level - IV December , 2023
Author/Copyright
A system is said to be secure if its resources are used and accessed as intended under all the
circumstances, but no system can guarantee absolute security from several of various malicious
threats and unauthorized access.
The security of a system can be threatened via two violations:
Threat: A program that has the potential to cause serious damage to the system.
Attack: An attempt to break security and make unauthorized use of an asset.
Security violations affecting the system can be categorized as malicious and accidental threats.
Malicious threats, as the name suggests are a kind of harmful computer code or web script
designed to create system vulnerabilities leading to back doors and security breaches. Accidental
Threats, on the other hand, are comparatively easier to be protected against.
Example: Denial of Service DDoS attack.
Page xvii of lxxvi Ministry of Labor and Providing network systems Version -1
Skills
administration level - IV December , 2023
Author/Copyright
Self-check - 1
Part I:- Say True if the given statement is correct else say False
_______1. When determining access privileges in a network system, factors such as user's physical
location and job title should be considered.
_______2. Granting all users the highest level of access possible is a recommended approach for
determining access privileges.
_______3. Storing sensitive data in plain text files is a secure practice for maintaining system
integrity and security.
Part II: - Select the appropriate answer from the given alternative
_______1. When referring to accounts and files privilege in network system administration, what
does the term "privilege escalation" mean?
A. Granting additional permissions to a user
B. Revoking all access privileges from a user
C. Assigning a new username to a user
D. Changing the file ownership to a different user
_______2. In the context of determining access privileges, what is the principle of "least privilege"?
A. Granting users the highest level of access possible
B. Assigning access privileges based on job titles
C. Limiting user access to only the resources necessary for their tasks
D. Providing all users with equal access privileges
_______3. Which of the following is an example of a multifactor authentication method for
determining access privileges?
A. Using a username and password combination
B. Requiring a fingerprint scan and a password
C. Granting access based solely on IP address
D. Sharing a single password among multiple users
_______4. What is the purpose of implementing intrusion detection systems (IDS) in network
system administration?
A. To prevent unauthorized access to the system
Page xviii of lxxvi Ministry of Labor and Providing network systems Version -1
Skills
administration level - IV December , 2023
Author/Copyright
B. To monitor network traffic and detect potential security breaches
C. To encrypt sensitive data during transmission
D. To manage user accounts and access privileges
_______5. Which of the following is an example of a security measure for maintaining system
integrity and security?
A. Regularly updating antivirus software
B. Sharing passwords with coworkers for convenience
C. Allowing unrestricted remote access to the system
D. Storing sensitive data in plain text files
Part II: - Give short answer
1. What are the responsibilities of system administrator?
2. Demonstrate the difference between system security and system integrity with example?
3. List and explain Network administration key areas?
4.
Page xix of lxxvi Ministry of Labor and Providing network systems Version -1
Skills
administration level - IV December , 2023
Author/Copyright
Operation sheet 1.1
Operation title: - Accounts and files privilege
Purpose:- Protect and give privilege for user account and computer files
Instruction: Use the figure below, given equipment and task. You have given 45 Minute for the
task and you are expected to complete tasks.
Tools and requirement:,- Computes
Task 1:- Give full access privilege for user
Step 1:- Open File Explorer.
Step 2:- Browse and find the file or folder you
want to have full access.
Step3:- Right-click it, and select Properties.
Step 4:- Click the Security tab to access the
NTFS permissions.
Step 5:- Click the Advanced button.
Step 6:- On the "Advanced Security Settings" page, you need to click the Change link, in the
Owner's field.
Page xxi of lxxvi Ministry of Labor and Providing network systems Version -1
Skills
administration level - IV December , 2023
Author/Copyright
Step 13:- Click OK again.
Step 14:- Click OK one more time to complete this task.
Page xxii of lxxvi Ministry of Labor and Providing network systems Version -1
Skills
administration level - IV December , 2023
Author/Copyright
Step 5:- Click Select a principal to add your user account.
Step 6:- On the "Select User or Group" page, click the Find
Now button.
Step 7:- From the search result, select your user account,
and click OK.
Step 8:- On the "Select User or Group" page, click OK.
Page xxiii of lxxvi Ministry of Labor and Providing network systems Version -1
Skills
administration level - IV December , 2023
Author/Copyright
Step 12:- Click OK.
Step 13:- Click Apply.
Step 14:- Click OK.
Step 15:- Click OK to close the file or folder properties to complete the task.
LAP Test
Task 1. Create one administrator account and standard account in one computer
Task 2. On the above administrator account on local desk C:/ create one folder called user
privilege
Task 3. Give full access privilege for the above created standard account
Page xxiv of lxxvi Ministry of Labor and Providing network systems Version -1
Skills
administration level - IV December , 2023
Author/Copyright
Unit Two: Disseminate disaster recovery plan
This unit is developed to provide you the necessary information regarding the following content
coverage and topics:
Page xxv of lxxvi Ministry of Labor and Providing network systems Version -1
Skills
administration level - IV December , 2023
Author/Copyright
2.1. Basic concepts of disaster recovery plan
A Disaster Recovery Plan (DRP) is a structured approach to responding to and recovering from
events that can cause data loss, system downtime, and other disruptions to normal business
operations. Modern organizations have to operate on a 24/7 basis in order to stay competitive in
the market. It is important to create a disaster recovery (DR) plan so as to ensure that your
business can continue to operate even during a DR event. However, when designing a DR plan,
many businesses overlook the importance of network disaster recovery. In this blog post, we will
discuss what network disaster recovery planning entails and how to securely protect your
organization against network failures.
A network disaster recovery plan includes a set of procedures required to effectively respond to a
disaster that affects a network and causes its disruption. Network disaster recovery planning
generally entails:
Listing the steps which should be undertaken in order to restore network connectivity
Page xxvi of lxxvi Ministry of Labor and Providing network systems Version -1
Skills
administration level - IV December , 2023
Author/Copyright
Identifying people responsible for conducting network disaster recovery
Assessing possible consequences of a network failure
Determining the best strategies to mitigate them
The main purpose of network disaster recovery is to ensure that business services can be
delivered to customers despite a disruption in network connectivity. However, disasters come in
different forms and sizes, which makes it hard to predict what their impact would be, which
network components would be affected, and how many resources would be required to restore
network connectivity.
Page xxvii of lxxvi Ministry of Labor and Providing network systems Version -1
Skills
administration level - IV December , 2023
Author/Copyright
Figure 2. 1 Tips for Disaster Recovery Planning
Page xxviii of lxxvi Ministry of Labor and Providing network systems Version -1
Skills
administration level - IV December , 2023
Author/Copyright
Figure 2. 2 Full Backup
2. Incremental Backup: Incremental backups only capture and store changes made since
the last backup, whether it was a full or incremental backup. This approach is more
efficient in terms of time and storage space, as it only backs up the modified or new data.
However, recovery from incremental backups may require multiple backup sets to be
restored.
3. Differential Backup: Differential backups capture all changes made since the last full
backup. Unlike incremental backups, which only include changes since the last backup
(whether full or incremental), differential backups include changes since the last full
backup. This results in faster recovery compared to incremental backups, as only the last
full backup and the differential backup need to be restored.
Page xxix of lxxvi Ministry of Labor and Providing network systems Version -1
Skills
administration level - IV December , 2023
Author/Copyright
Figure 2. 4 Differential Backup
4. Mirror Backup: A mirror backup creates an exact replica of the source data or system. It
involves copying all files and directories to a separate storage device or
location. Mirror backups provide a straightforward recovery process,
as the backup is a direct copy of the original data. However, they can
consume significant storage space and may not offer versioning or
point-in-time recovery capabilities.
5. Snapshot Backup: Snapshot backups capture the state of a system or data at a specific
point in time. Instead of copying all data, snapshot backups store the
differences or changes made since the previous snapshot. This allows
for fast and efficient backups and provides the ability to restore data
to specific points in time.
6. Cloud Backup: Cloud backup involves storing data backups in off-site cloud storage. It
offers the advantage of scalability, accessibility from anywhere
with an internet connection, and built-in redundancy provided
by the cloud service provider. Cloud backups can be performed
using various backup methods, such as full, incremental, or
snapshot backups.
The choice of backup type depends on factors such as the data volume, frequency of changes,
recovery requirements, available storage resources, and budgetary considerations. A combination
of backup types can be employed to create a comprehensive backup strategy that meets specific
needs for data protection and recovery.
2.2.2. Restore for disaster recovery
In the context of disaster recovery, the term "restore" refers to the process of recovering and
returning critical data, applications, and systems to their operational state following a disruptive
event or data loss. The restore phase is a key component of the overall disaster recovery plan and
involves the following:
Page xxx of lxxvi Ministry of Labor and Providing network systems Version -1
Skills
administration level - IV December , 2023
Author/Copyright
1. Assess the situation: Before initiating the restore process, assess the extent of the damage
caused by the disaster and determine the scope of the restoration effort. Identify the affected
systems, applications, and data that need to be restored.
2. Activate the disaster recovery plan: Refer to the documented disaster recovery plan,
which should outline the procedures and guidelines for restoring various components of the
IT infrastructure. Follow the plan's instructions to ensure a structured and organized
approach to the restore process.
3. Retrieve backups: Retrieve the backup copies of the affected data, applications, or systems
from the designated backup storage location. This may involve accessing backup tapes,
disk-based backups, or cloud-based backups depending on the backup strategy and
technology in place.
4. Validate backup integrity: Verify the integrity and consistency of the backup data before
proceeding with the restore process. This step ensures that the backups are viable and can be
relied upon for successful recovery.
5. Restore data and applications: Start the restoration of data and applications based on the
recovery priorities defined in the disaster recovery plan. Begin with the most critical
systems and work your way down to less critical ones. Follow the appropriate procedures
for each type of backup (e.g., full backups, incremental backups) to restore the data and
applications to their original or alternative locations.
6. Test and verify: After the restore process, conduct thorough testing to validate the restored
data, applications, and systems. Perform functional tests, check for data integrity, and ensure
that the restored components are working correctly.
7. Update configurations and connections: Adjust configurations and re-establish
connections as necessary to integrate the restored systems back into the production
environment.
8. Document the restore process: Maintain detailed documentation of the restore process,
including the steps performed, any issues encountered, and the actions taken to resolve
them.
Page xxxi of lxxvi Ministry of Labor and Providing network systems Version -1
Skills
administration level - IV December , 2023
Author/Copyright
Self-check - 2
Part I:- Say True if the given statement is correct else say False
_______1. A disaster recovery plan (DRP) only focuses on recovering data and does not address
other aspects of business operations.
_______2. Backup and restore processes are only necessary for natural disasters and do not apply to
other types of disruptions.
_______3. Having a backup solution in place guarantees instant recovery of data and systems in the
event of a disaster.
_______4. Data backup and replication are interchangeable terms, representing the same process.
Part II: - Select the appropriate answer from the given alternative
Page xxxii of lxxvi Ministry of Labor and Providing network systems Version -1
Skills
administration level - IV December , 2023
Author/Copyright
A. Identifying critical business functions and their dependencies
B. Assessing the likelihood of specific disaster events occurring
C. Implementing cybersecurity measures to prevent data breaches
D. Evaluating the effectiveness of backup and restore processes
_______3. Which of the following is an example of an off-site backup location?
A. An external hard drive connected to the same server
B. A cloud storage service hosted by a third-party provider
C. shared network folder on the same local network
D. An additional internal hard drive within the same computer
_______4. What does the term "recovery point objective" (RPO) refer to in backup and restore?
A. The maximum tolerable downtime after a disaster
B. The amount of data that can be recovered within a specific timeframe
C. The point in time to which data can be restored after a disaster
D. The frequency at which backups are performed
_______5. Which of the following is a common backup strategy for ensuring redundancy and data
availability?
A. Full backup performed daily
B. Incremental backup performed weekly
C. Differential backup performed monthly
D. Snapshot backup performed hourly
Part II: - Give short answer
1. List and explain types of backups?
2. Demonstrate the main purpose of network disaster recovery in large and small
organization?
3. Demonstrate disaster restore phase?
Page xxxiii of lxxvi Ministry of Labor and Providing network systems Version -1
Skills
administration level - IV December , 2023
Author/Copyright
Operation sheet 2.1
Operation title: - Create a full backup of Windows 10 with the system image tool
Purpose: - Protect and save personal information from disaster.
Instruction: Use the figure below, given equipment and task. You have given 45 Minute for the
task and you are expected to complete tasks.
Tools and requirement:-Compute
Procedures:-
Step 1:- Open Settings.
Step 2:- Click on Update & Security.
Step 3:- Click on Backup.
Page xxxiv of lxxvi Ministry of Labor and Providing network systems Version -1
Skills
administration level - IV December , 2023
Author/Copyright
Step 4:- Under the "Looking for an older backup?"
Step 5:- Click the "Create a system image" option from the left pane.
Page xxxv of lxxvi Ministry of Labor and Providing network systems Version -1
Skills
administration level - IV December , 2023
Author/Copyright
Step 6:- Select the "On a hard disk" option.
Step 7: -Use the "On a hard disk" drop-down menu and select the location to export the
Windows 10 full backup.
Page xxxvi of lxxvi Ministry of Labor and Providing network systems Version -1
Skills
administration level - IV December , 2023
Author/Copyright
Step 9:- (Optional) Select any additional hard drives to include them in the backup.
Step 10:- Click the Next button.
Step 11:- Click the Start backup button.
Page xxxvii of lxxvi Ministry of Labor and Providing network systems Version -1
Skills
administration level - IV December , 2023
Author/Copyright
Operation sheet 2.2
Operation title: - Restore a backup with system image tool on Windows 10
Purpose: - To recover distorted or damage information.
Instruction: Use the figure below, given equipment and task. You have given 45 Minute for the
task and you are expected to complete tasks.
Tools and requirement:-Compute Windows 10 USB bootable drive
Procedures:-
Step 1:- Connect the drive with the full back up to the device.
Step 2:- Connect the Windows 10 USB bootable drive to the computer.
Step 3:- Start the computer.
Step 4:- On the USB bootable drive startup prompt, press any key to continue.
Quick tip: If the device does not start in the Windows Setup wizard, you will need to access
the Basic Input/Output System (BIOS) or Unified Extensible Firmware Interface (UEFI) to
change the boot order settings. You can use this guide to access the BIOS/UEFI, but the steps are
usually different per manufacturer and device model. It is recommended to check your
manufacturer support website for more specific details.
Step 5:- On the "Windows Setup" page, click the Next button.
Page xxxviii of lxxvi Ministry of Labor and Providing network systems Version -1
Skills
administration level - IV December , 2023
Author/Copyright
Step 6:- Click the "Repair your computer" option from the bottom-left corner of the screen.
Page xxxix of lxxvi Ministry of Labor and Providing network systems Version -1
Skills
administration level - IV December , 2023
Author/Copyright
Step 9:- Select the Windows 10 option as the target operating system.
Step 10:- On the "Re-image your computer" page, select the "Use the latest available system
image" option.
Quick tip: You can use the "Select a system image" option if you have multiple backups and
you are trying to restore an older version of the system and files.
Quick tip: If you choose this option, use the Exclude disks option to prevent formatting
secondary drives that may contain data.
Step 13:- (Optional) Check the "Only restore system drivers" option (if the backup contains a
copy of multiple drives and you only want to restore the operating system).
Step 14:- Click the Next button.
Step 15:- Click the Finish button.
Page xli of lxxvi Ministry of Labor and Providing network systems Version -1
Skills
administration level - IV December , 2023
Author/Copyright
Step 16:- Click the Yes button.
Quick tip:- After you complete the steps, the recovery process will start on the computer. The
time to finish the restoration will depend on the amount of data and hardware configuration.
If you are about to restore a device, do not interrupt the process, as it can cause the backup to
fail, making it unbootable. It is always recommended to have the laptop connected to a power
source and a desktop computer to an uninterruptible power supply (UPS) to avoid problems.
Once the backup has been restored, open Settings Update & Security Windows Update,
and click the Check for Updates button to quickly install any missing security updates.
LAP Test
Task 1:- Create a full backup of Windows 10 with the system image tool
Task 2:- Restore damage computer by using bootable Windows 10 operating system.
Page xlii of lxxvi Ministry of Labor and Providing network systems Version -1
Skills
administration level - IV December , 2023
Author/Copyright
Unit Three : Monitor network performance
This unit is developed to provide you the necessary information regarding the following content
coverage and topics:
Page xliii of lxxvi Ministry of Labor and Providing network systems Version -1
Skills
administration level - IV December , 2023
Author/Copyright
Monitor software and files
Monitor performance indicators
Improve network and systems
Monitoring network performance involves the systematic observation and analysis of a computer
network to ensure it operates efficiently, reliably, and securely. This process encompasses
various aspects such as bandwidth utilization, latency, packet loss, and device health. By
continually assessing these factors, network administrators can identify and address potential
issues before they impact the user experience. Bandwidth monitoring helps optimize data
transmission capacity, latency monitoring ensures timely data delivery, and packet loss
monitoring aids in maintaining a stable and responsive network. Additionally, network
performance monitoring includes traffic analysis, security surveillance, and quality of service
assessments to ensure that resources are allocated effectively, potential security threats are
detected, and the overall quality of communication meets the desired standards. Utilizing
specialized tools and reporting mechanisms, organizations can maintain a proactive approach to
Page xliv of lxxvi Ministry of Labor and Providing network systems Version -1
Skills
administration level - IV December , 2023
Author/Copyright
network management, enhancing the overall reliability and performance of their network
infrastructure.
Performing network diagnostic tests involves a systematic process to assess and analyze the
health, performance, and functionality of a computer network. Here are the general steps you can
follow to conduct network diagnostic tests:
Identify the Issue:
Begin by identifying the specific issue or symptoms that require diagnostic testing. This
could include slow network performance, connectivity problems, or unexpected outages.
Define Testing Objectives:
Clearly define the objectives of your diagnostic tests. Determine what aspects of the
network you need to evaluate, such as bandwidth, latency, packet loss, or device health.
Select Appropriate Tools:
Choose the appropriate network diagnostic tools for the specific tests you want to perform.
There are various tools available for different aspects of network analysis, including:
Ping and Traceroute: For assessing connectivity and latency.
Network Performance Monitoring Tools: Such as Wireshark, Nagios, or PRTG
for detailed analysis of network traffic.
Bandwidth Testing Tools: Like Speedtest.net or iPerf for measuring available
bandwidth.
Device Monitoring Software: To assess the health and performance of network
devices.
Execute Diagnostic Tests:
Perform the selected diagnostic tests. For example:
Use ping to check connectivity and measure round-trip times.
Conduct traceroute to identify the path and latency between your computer and a
destination.
Run bandwidth tests to evaluate the network's capacity.
Page xlv of lxxvi Ministry of Labor and Providing network systems Version -1
Skills
administration level - IV December , 2023
Author/Copyright
Utilize network monitoring tools to analyze traffic patterns and identify potential
issues.
Interpret Results:
Analyze the results of the diagnostic tests. Look for anomalies, deviations from expected
values, or patterns that may indicate network issues. Pay attention to any packet loss,
latency spikes, or irregularities in traffic.
Diagnose Network Issues:
Based on the results, diagnose the root causes of identified network issues. This may
involve troubleshooting hardware, configuration settings, or addressing issues related to
network congestion.
Implement Solutions:
Once the issues are identified, implement appropriate solutions. This could include
adjusting network configurations, upgrading hardware, optimizing settings, or addressing
specific issues with network devices.
Document and Report:
Document the results of your diagnostic tests and the actions taken to address any issues.
This documentation is valuable for future reference and can help in maintaining a
proactive approach to network management.
Continuous Monitoring:
Establish a routine for continuous monitoring of the network. Regularly perform
diagnostic tests to identify and address potential issues before they impact network
performance.
Page xlvi of lxxvi Ministry of Labor and Providing network systems Version -1
Skills
administration level - IV December , 2023
Author/Copyright
network activity, including bandwidth utilization, packet loss, latency, and security events.
2. Establish baseline and thresholds: Establish a baseline of normal network behavior by
monitoring network traffic patterns over time. Set thresholds or alerts for abnormal network
behavior, such as unusually high traffic volume, network congestion, or security breaches.
3. Monitor network traffic: Continuously monitor network traffic to identify any anomalies
or deviations from the baseline. Observe patterns, trends, and irregularities that may
indicate network performance issues or security incidents.
4. Analyze network logs: Analyze log files generated by network devices, servers, and
security systems. Logs can provide valuable information about network events, errors, and
security incidents. Look for any suspicious or unusual activities that may require
investigation or response.
5. Identify security threats: Use intrusion detection and prevention systems (IDS/IPS) or
security information and event management (SIEM) solutions to detect and respond to
security threats. Analyze network traffic for signs of malware infections, unauthorized
access attempts, or other malicious activities.
6. Investigate network issues: When an issue or anomaly is detected, investigate the root
cause by analyzing relevant network logs, traffic patterns, and system configurations.
Identify the source of the problem, whether it's a misconfiguration, hardware failure,
software bug, or security incident.
7. Respond to network incidents: Take appropriate actions to address network incidents or
issues. This may involve implementing security measures, such as blocking malicious IP
addresses or isolating compromised devices. Troubleshoot network performance problems
and apply necessary fixes or optimizations.
8. Document and report: Keep detailed records of network incidents, actions taken, and their
outcomes. Document any changes made to network configurations or security settings.
Prepare reports summarizing network performance, security incidents, and actions taken
for management and future reference.
9. Continuous improvement: Regularly review and update network monitoring and response
strategies based on lessons learned from past incidents. Stay updated with emerging threats,
new technologies, and best practices in network monitoring and security.
Page xlvii of lxxvi Ministry of Labor and Providing network systems Version -1
Skills
administration level - IV December , 2023
Author/Copyright
Analyzing and responding to information in a network requires a proactive and vigilant
approach. It is crucial to have skilled network administrators or security professionals who can
effectively interpret network data, identify potential risks or issues, and take prompt actions to
maintain the network's integrity and performance.
3.4. Monitor software and files
To monitor software and files using a network, you can employ various network monitoring
techniques and tools. Here are some steps to monitor software and files using a network:
1. Choose network-monitoring tools: Select network monitoring software or tools that offer
features for monitoring software and file activities. Look for tools that provide real-time
monitoring, alerting, and reporting capabilities specific to software and file monitoring.
2. Install monitoring agents or software: Install monitoring agents or software on the
systems or servers where the software and files are located. These agents will collect data
and send it to the central monitoring system for analysis.
3. Set up file integrity monitoring: Implement file integrity monitoring (FIM) to detect
unauthorized changes to files. FIM tools can monitor file attributes, checksums, or digital
signatures to ensure the integrity and security of critical files. Any unauthorized
modifications can trigger an alert.
4. Monitor network traffic: Utilize network-monitoring tools to capture and analyze
network traffic that is related to software and file activities. This can help identify any
unusual or unauthorized network connections, file transfers, or software downloads.
5. Enable logging and auditing: Enable logging and auditing features on servers and
systems hosting the software and files. Configure the logging settings to capture relevant
information about software installations, file accesses, modifications, and user activities.
Regularly review the logs for any suspicious or unauthorized activities.
6. Configure alerts and notifications: Set up alerts and notifications within the network
monitoring tools to inform you of any abnormal software or file-related activities.
Configure the alerts to be sent via email, SMS, or other communication channels, ensuring
that the right individuals or teams are notified promptly.
7. Perform regular analysis and reporting: Regularly analyze the collected data, generate
reports on software, and file activities. Look for patterns, trends, or anomalies that may
Page xlviii of lxxvi Ministry of Labor and Providing network systems Version -1
Skills
administration level - IV December , 2023
Author/Copyright
indicate security risks, compliance violations, or performance issues. Share these reports
with relevant stakeholders for visibility and informed decision-making.
8. Maintain patch management and vulnerability scanning: Regularly apply software
patches and updates to address known vulnerabilities. Conduct vulnerability scans to
identify any weaknesses in software or files that could be exploited by attackers. Monitor
the results of patching and vulnerability scanning activities to ensure compliance and
mitigate risks.
9. Continuously review and refine monitoring strategies: Review your monitoring
strategies and tools periodically to ensure they remain effective and aligned with your
organization's evolving needs. Stay informed about emerging threats, new monitoring
technologies, and best practices in software and file monitoring to enhance your monitoring
capabilities.
3.5. Monitor performance indicators
Monitoring the performance indicators of a network is essential to ensure its optimal
functionality. To monitor network performance, start by identifying relevant performance
indicators such as bandwidth utilization, latency, packet loss, network throughput, and response
times. Next, select network monitoring tools that can collect and analyze data on these
indicators. Deploy monitoring agents or sensors on critical network devices and configure real-
time monitoring to continuously track performance metrics. Set up performance thresholds and
alerts to receive notifications when indicators exceed or fall below acceptable levels. Analyze
historical data to identify trends and patterns, and periodically conduct performance assessments.
Utilize network traffic analysis tools to examine traffic patterns and generate performance
reports to gain insights into the network's health. Continuously review and optimize your
monitoring strategy to align with evolving network requirements and industry best practices.
Monitoring network performance involves selecting relevant performance indicators, deploying
monitoring tools and agents, configuring real-time monitoring, setting up thresholds and alerts,
analyzing historical data, conducting periodic assessments, utilizing network traffic analysis, and
generating performance reports. By following these steps, you can proactively identify and
address performance issues, optimize network resources, and ensure a reliable and efficient
network infrastructure. Regularly reviewing and optimizing your monitoring strategy is crucial to
stay aligned with changing network requirements and technological advancements.
Page xlix of lxxvi Ministry of Labor and Providing network systems Version -1
Skills
administration level - IV December , 2023
Author/Copyright
3.6. Improve network and systems
Improving network and systems involves implementing strategies to enhance performance,
A step to enhance your network performance can enhance your overall productivity and business
continuity.
1. Reconfigure Your Network
Your network configuration can affect
performance. For instance, if you install an
update and it doesn't configure your devices,
this can have a large impact on your
performance. A good example is the
personal area network devices that should
not be more than 10 meters apart.
Devices with short-range connectivity
should be close to each other to prevent
network delays between the hardware components.
Reconfiguring your hardware components will help the devices communicate with each other
effectively.
2. Check for System Defects And Viruses
Viruses and system defects can break down a network infrastructure and degrade the network
performance. Some malwares can also control programs and applications in your network. A
flaw in the components or system can cause a network to behave unexpectedly.
Cable defects such as core rapture are a good example of issues that can cause failure in the
conduction of electricity, interfering with communication in a network. Checking for malware
and fixing system defects can address the situation and restore optimal performance.
3. Upgrade and Update Firmware and Software
Often, businesses cannot keep up with the pace of technology and balance with the software they
run. You may end up having software running on outdated technology in your network. You can
also have old machines with new programs.
Usually, there is no guarantee that programs and the existing technology are fully compatible,
which can negatively impact the network performance. Outdated software and programs also
have bugs that can break down your infrastructure.
Self-check - 3
Part I:- Say True if the given statement is correct else say False
_______1. Performing diagnostic tests involves analyzing and responding to information.
_______2. Monitoring software and files is not a part of the diagnostic testing process.
_______3. Diagnostic testing does not involve monitoring performance indicators.
Part II: - Select the appropriate answer from the given alternative
_______1. What is the purpose of analyzing and responding to information in network
administration?
Page lii of lxxvi Ministry of Labor and Providing network systems Version -1
Skills
administration level - IV December , 2023
Author/Copyright
A. Improving network aesthetics C. Identifying performance bottlenecks
B. Monitoring software license usage D. Ensuring physical security measures
_______2. which of the following is a common performance indicator monitored in
network administration.
A. Keyboard typing speed C. File compression ratio
B. Server room temperature D. Network bandwidth utilization
_______3. How does improving network and systems contribute to network
administration?
A. Increasing software licensing costs
B. Enhancing data backup and recovery
C. Monitoring physical server dimensions
D. Optimizing network configurations
_______4. How does improving network and systems contribute to network
administration?
A. Monitoring office supply inventory
B. Increasing software licensing compliance
C. Enhancing network security measures
D. Optimizing printer paper tray configurations
Part III: - Give short answer
1. List and explain ways of analyze and respond to information in a network?
2. Demonstrate the way of improve network and systems?
3. Demonstrate the technic of monitor software and files using a network?
Page liii of lxxvi Ministry of Labor and Providing network systems Version -1
Skills
administration level - IV December , 2023
Author/Copyright
Step 2:- Click on Network and Internet
Step 3:- Under the left-hand panel, option Status navigate to Network Troubleshooter and click
it
Page liv of lxxvi Ministry of Labor and Providing network systems Version -1
Skills
administration level - IV December , 2023
Author/Copyright
Step 4:- Then the tool will start to run a network check to find what can be possibly wrong with
the connectivity
I will show you how it will work. Let’s say I am not connected to my preferred network. Then
upon running a network check using the Network Troubleshooter, I will get the following result.
Page lvi of lxxvi Ministry of Labor and Providing network systems Version -1
Skills
administration level - IV December , 2023
Author/Copyright
Step 3. In the Advanced options window, scroll down to find Delivery Optimization and click it.
Step 4. Choose advanced options again at the bottom.
Step 5. After that, you will see an adjuster for both Download settings and Upload settings. Here,
you can reset the amount of bandwidth that Windows can use for your core tasks.
Page lvii of lxxvi Ministry of Labor and Providing network systems Version -1
Skills
administration level - IV December , 2023
Author/Copyright
Way 2. Get the Best VPN to Speed up Internet on Windows 10
Step 1. Download this free VPN on your Windows and launch it.
Step 2. Click All Servers in the left navigator. You will see a long list of all available servers in
multiple countries, like USA, Mexico, Canada, United Kingdom, etc.
Step 3. To speed up internet on Windows 10, select a server (USA, for instance) and click
Connect. Then you can enjoy faster speeds with the USA server in no time.
Page lviii of lxxvi Ministry of Labor and Providing network systems Version -1
Skills
administration level - IV December , 2023
Author/Copyright
Way 3. Reset DNS Settings to Speed up Internet on Windows 10
Step 1. Search view network connections in search box of Windows 10 and enter it.
Step 2. Then right click on your network adapter and select Properties at the bottom.
Step 3. Now, select Internet Protocol Version 4 from the list under Networking and click on the
Properties tab.
Page lix of lxxvi Ministry of Labor and Providing network systems Version -1
Skills
administration level - IV December , 2023
Author/Copyright
Step 4. Now, select Use the following DNS server addresses and type to enter Google DNS as
follows: 8.8.8.8
8.8.4.4
Page lxi of lxxvi Ministry of Labor and Providing network systems Version -1
Skills
administration level - IV December , 2023
Author/Copyright
Way 6. Clear Temp and Cached Files to Speed up Internet on Windows 10
Step 1. Search Disk Cleanup in your Windows 10
search box.
Step 2. Next, click on Disk Cleanup.
Step 3. Select C Drive in the pop-up box.
Step 4. Then, select all files from the files list and
click OK to delete all useless files on your PC at
present.
Page lxii of lxxvi Ministry of Labor and Providing network systems Version -1
Skills
administration level - IV December , 2023
Author/Copyright
LAP Test
Task 1:- Diagnostic and test network performance
Task 2:- Test download and upload speed of your computer Internet
Page lxiii of lxxvi Ministry of Labor and Providing network systems Version -1
Skills
administration level - IV December , 2023
Author/Copyright
Unit Four : Migrate to New Technology
This unit is developed to provide you the necessary information regarding the following content
coverage and topics:
Developing new skills.
Upgraded technology skills
Identifying upgraded equipment.
Sources of information for new or upgraded equipment
Using new or upgraded equipment
This unit will also assist you to attain the learning outcomes stated in the cover page. Specifically,
upon completion of this learning guide, you will be able to:
Develop new skills.
Upgraded technology skills
Identify upgraded equipment.
Understand Sources of information for new or upgraded equipment
Use new or upgraded equipment
Page lxiv of lxxvi Ministry of Labor and Providing network systems Version -1
Skills
administration level - IV December , 2023
Author/Copyright
4.1. Basic concept of Migrating to new technology
Migrating to new technology involves the strategic transition from existing technological
systems to advanced solutions. This process entails a comprehensive assessment of current
infrastructure, careful planning, and seamless execution to optimize efficiency and stay
competitive. Successful migration requires evaluating compatibility, scalability, and security
aspects, along with effective change management to mitigate disruptions. Post-migration,
ongoing support and monitoring are essential to ensure the smooth integration of new
technology, enhancing operational capabilities and positioning the organization for sustained
growth in a dynamic technological landscape.
4.2. Develop new skills.
Developing new skills in new technology requires a systematic approach and a commitment to
continuous learning. Here are steps to help you develop new skills in emerging technologies:
1. Identify the technology: Start by identifying the specific technology or field you want to
develop skills in. Research and understand its fundamentals, applications, and potential
impact in your industry or area of interest.
2. Set clear goals: Define your learning goals and objectives. Determine what specific skills,
knowledge, or certifications you want to acquire in the new technology.
3. Assess existing skills: Evaluate your existing skills and knowledge related to the
technology. Identify any foundational knowledge or transferable skills that can serve as a
starting point for your learning journey.
4. Select learning resources: Identify high-quality learning resources that suit your preferred
learning style. These resources may include online courses, tutorials, books, video lectures,
forums, or workshops.
5. Create a learning plan: Develop a learning plan that outlines the topics, concepts, and
skills you need to cover. Break down the learning process into manageable chunks and set
a schedule or timeline for your learning activities.
6. Embrace continuous learning: Technology evolves rapidly, so commit to continuous
learning. Stay curious, explore new developments, and keep up with industry news and
updates. Dedicate time regularly to learn and stay updated on advancements in the
technology you're focusing on.
Page lxv of lxxvi Ministry of Labor and Providing network systems Version -1
Skills
administration level - IV December , 2023
Author/Copyright
4.3. Upgraded technology skills
Upgrading technology skills is an ongoing process that requires dedication, perseverance, and a
commitment to lifelong learning. Embrace new challenges, be proactive in seeking opportunities,
and apply your upgraded skills in practical settings to maximize their impact.
To upgrade your technology skills, you can follow these one:
Identify Areas for Improvement:
Set Clear Goals
Create a Learning Plan:
Engage in Practical Projects:
Stay Updated and Practice Continuously
Seek Feedback and Networking
4.4. Identify upgraded equipment.
Upgraded equipment refers to the improved or advanced versions of technological devices or
tools used in various domains. It involves the enhancement of hardware components, software
capabilities, performance, features, or functionalities of a specific piece of equipment. Upgrades
can include improvements in processing power, memory capacity, storage capacity, connectivity
options, display quality, battery life, security features, or any other aspect that enhances the
overall performance or user experience of the equipment. Upgraded equipment often
incorporates the latest technological advancements and innovations to deliver superior
performance, increased efficiency, and enhanced capabilities compared to previous versions or
older models.
1. Computers:
High-performance desktop computers
with advanced processors, increased
RAM, and faster storage options like
solid-state drives (SSDs).
Laptops with improved battery life, higher
screen resolutions, and enhanced graphics
capabilities.
Workstations designed for intensive tasks
such as video editing, 3D rendering, or
figure 1. 9 upgraded computer
Page lxvi of lxxvi Ministry of Labor and Providing network systems Version -1
Skills
administration level - IV December , 2023
Author/Copyright
scientific simulations, featuring powerful processors, ample RAM, and dedicated
graphics cards.
2. Smartphones:
Flagship smartphones with faster processors, larger RAM capacity, and improved
camera technologies.
Devices with 5G connectivity for faster internet speeds and lower latency.
Smartphones equipped with advanced biometric authentication methods like facial
recognition or under-display fingerprint sensors.
3. Networking:
Upgraded routers with the latest Wi-Fi standards (such as Wi-Fi 6 or Wi-Fi 6E)
offering faster speeds and better network performance.
Network switches with higher port densities, increased bandwidth, and support for
advanced features like Power over Ethernet (PoE) or Quality of Service (QoS).
Firewall appliances with enhanced security capabilities, such as intrusion prevention
systems (IPS), deep packet inspection (DPI), or advanced threat protection (ATP).
Page lxvii of lxxvi Ministry of Labor and Providing network systems Version -1
Skills
administration level - IV December , 2023
Author/Copyright
Figure 4. 2 History of network
Page lxviii of lxxvi Ministry of Labor and Providing network systems Version -1
Skills
administration level - IV December , 2023
Author/Copyright
Controllers and haptic devices that provide more precise and immersive interactions
within virtual environments.
Page lxix of lxxvi Ministry of Labor and Providing network systems Version -1
Skills
administration level - IV December , 2023
Author/Copyright
tap into their expertise and firsthand experiences with the equipment you are interested
in.
4.6. Use new or upgraded equipment
When organizations want to make a significant change to their business systems, new technology
or new equipment is generally part of the change. Using new or upgraded equipment typically
involves several steps to ensure a smooth and efficient transition. Here is a general guide:
1. Read the Manual:- Start by thoroughly reading the user manual or any accompanying
documentation that comes with the equipment. This will provide you with a detailed
understanding of its features, functionalities, and proper usage.
Page lxx of lxxvi Ministry of Labor and Providing network systems Version -1
Skills
administration level - IV December , 2023
Author/Copyright
2. Familiarize Yourself: Take some time to get familiar with the equipment. Explore its
buttons, controls, and settings. Understand how to power it on/off, adjust settings, and
navigate through different menus or options.
3. Practice Hands-On: Engage in hands-on practice with the equipment. Start with simple
tasks or basic functions to gain confidence and gradually progress to more complex
operations. Experiment with different settings and features to understand their impact and
functionality.
4. Seek Training or Tutorials: If available, attend training sessions or workshops related to the
equipment. Alternatively, search for online tutorials, video guides, or forums where you can
learn from others' experiences and expertise.
5. Troubleshooting and Maintenance: Familiarize yourself with common troubleshooting
techniques specific to the equipment. Learn how to identify and resolve common issues that
may arise during usage.
Page lxxi of lxxvi Ministry of Labor and Providing network systems Version -1
Skills
administration level - IV December , 2023
Author/Copyright
Self-check - 4
Part I: - Say True if the given statement is correct else say False
_______1. Upgrading technology skills involves identifying upgraded equipment.
_______2. Understanding sources of information for new or upgraded equipment is
necessary when upgrading technology skills.
_______3. Using new or upgraded equipment is not important in the process of upgrading
technology skills.
Part II: - Select the appropriate answer from the given alternative
1. Which of the following is a benefit of identifying upgraded equipment when upgrading
technology skills?
2. How does using new or upgraded equipment contribute to upgrading technology skills?
A. It improves social interaction skills
B. It enhances critical thinking abilities
C. It promotes physical well-being
D. It develops musical talent
3. Which of the following is an example of upgraded equipment in the context of upgrading
technology skills?
Page lxxii of lxxvi Ministry of Labor and Providing network systems Version -1
Skills
administration level - IV December , 2023
Author/Copyright
Part III: - Give short answer
1. List and explain Sources of information for new or upgraded equipment?
2. Demonstrate the way of develop new skills in emerging technologies?
3. List and explain upgraded equipment in ICT?
Page lxxiii of lxxvi Ministry of Labor and Providing network systems Version -1
Skills
administration level - IV December , 2023
Author/Copyright
Reference Books
1. The Practice of System and Network Administration
2. Network Security Essentials: Applications and Standards" by William Stallings
3. Network Programmability and Automation: Skills for the Next-Generation Network
Engineer" by Jason Edelman, Scott S. Lowe, and Matt Oswalt
4. Network Management: Principles and Practice" by Mani Subramanian:
5. Network Analysis, Architecture, and Design" by James D. McCabe
6.
7. List of website
8.
1. https://www.windowscentral.com/how-make-full-backup-windows-10#section-how-to-
restore-a-backup-with-system-image-tool-on-windows-10
2. https://www.comparitech.com/net-admin/network-troubleshooting-tools/
3. https://www.itechguides.com/how-to-get-administrator-privileges-on-windows-10/
4. Make an administrator account to a standard user on Windows 10/11 (softwareok.com)
5. https://www.devicemag.com/network-testing-tool/
6. https://www.itopvpn.com/blog/speed-up-internet-on-windows-10-3123
9.
10.
11.
12.
13.
14.
15.
16.
17.
18.
19.
20.