0% found this document useful (0 votes)
92 views75 pages

M04 - Providing Network Systems Administration

This document provides an instruction guide for a module on providing network system administration at level IV. The module contains 4 units that cover topics such as client access and security, disseminating disaster recovery plans, monitoring network performance, and migrating to new technologies. Upon completing the module, learners will be able to understand key network administration concepts, determine access privileges, maintain system integrity and security, understand disaster recovery plans and backups, monitor network performance indicators, and upgrade technology skills. The guide was prepared by the Ministry of Labor and Skills of Ethiopia for hardware and networking service occupations.

Uploaded by

fikadu walka
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
92 views75 pages

M04 - Providing Network Systems Administration

This document provides an instruction guide for a module on providing network system administration at level IV. The module contains 4 units that cover topics such as client access and security, disseminating disaster recovery plans, monitoring network performance, and migrating to new technologies. Upon completing the module, learners will be able to understand key network administration concepts, determine access privileges, maintain system integrity and security, understand disaster recovery plans and backups, monitor network performance indicators, and upgrade technology skills. The guide was prepared by the Ministry of Labor and Skills of Ethiopia for hardware and networking service occupations.

Uploaded by

fikadu walka
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 75

GOFA INDUSTRIAL COLLEGE

HARDWARE AND NETWORKING SERVICE


LEVEL- IV
Based on November, 2023Version-II

MODULE TITLE: - Provide Network System


Administration
MODULE CODE: EIS HNS4 M04 1123
NOMINAL DURATION: 45 Hours

Prepared by: - Ministry of Labor and Skill

November 2023
Addis Ababa, Ethiopia
Table of Contents
Acknowledgment............................................................................................................................iii
Acronym.........................................................................................................................................iv
Introduction to module....................................................................................................................v
Module Instruction.........................................................................................................................vi
Unit One: Client access and security...........................................................................................7
1.1. Basic concept of network system administration..............................................................8
1.2. Accounts and files privilege............................................................................................12
1.3. Determine access privileges............................................................................................13
1.4. Maintain System integrity and security..........................................................................15
Self-check - 1.................................................................................................................................18
Operation sheet 1.1........................................................................................................................20
LAP Test........................................................................................................................................24
Unit Two: Disseminate disaster recovery plan.........................................................................25
2.1. Basic concepts of disaster recovery plan............................................................................26
2.2. Backup and restore.............................................................................................................27
Self-check - 2.................................................................................................................................32
Operation sheet 2.1........................................................................................................................34
Operation sheet 2.2........................................................................................................................37
LAP Test.......................................................................................................................................41
Unit Three : Monitor network performance............................................................................42
3.1. Basic concept of monitor network performance.............................................................43
3.2. Performing diagnostic test..............................................................................................43
3.3. Analyze and respond information...................................................................................45
3.4. Monitor software and files..............................................................................................46
3.5. Monitor performance indicators......................................................................................47
3.6. Improve network and systems.........................................................................................48
Self-check - 3................................................................................................................................51
Operation sheet 3.1........................................................................................................................52
Operation sheet 3.2........................................................................................................................54
LAP Test........................................................................................................................................61

Page i of lxxvi Ministry of Labor and Providing network systems Version -1


Skills
administration level - IV December , 2023
Author/Copyright
Unit Four : Migrate to New Technology...................................................................................62
4.1. Basic concept of Migrating to new technology..............................................................63
4.2. Develop new skills..........................................................................................................63
4.3. Upgraded technology skills.............................................................................................64
4.4. Identify upgraded equipment..........................................................................................64
4.5. Understand Sources of information for new or upgraded equipment.............................67
4.6. Use new or upgraded equipment.....................................................................................68
Self-check - 4................................................................................................................................70
Reference.......................................................................................................................................71
Developer profile...........................................................................................................................72

Page ii of lxxvi Ministry of Labor and Providing network systems Version -1


Skills
administration level - IV December , 2023
Author/Copyright
Acknowledgment
Ministry of Labor and Skills wish to extend thanks and appreciation to the many
representatives of TVET instructors and respective industry experts who donated
their time and expertise to the development of this Teaching, Training and
Learning Materials (TTLM).

Page iii of lxxvi Ministry of Labor and Providing network systems Version -1
Skills
administration level - IV December , 2023
Author/Copyright
Acronym
5G:- Fifth-Generation
ACLs:- Access Control Lists
ATP:- Advanced Threat Protection
DPI:- Deep Packet Inspection
DRP:- Disaster Recovery Plan
IEEE:- Institute Of Electrical And Electronics Engineers
PoE :- Power Over Ethernet
QoS:- Quality Of Service
SLA:- Service Level Agreement
SNMP:- Simple Network Management Protocol
SQL:- Standard Query Language
SSDs:- Solid-State Drives
VLANs: Virtual Local Area Networks
-
Wi-Fi:- Wireless Fidelity
WSUS:- Windows Server Update Services

Page iv of lxxvi Ministry of Labor and Providing network systems Version -1


Skills
administration level - IV December , 2023
Author/Copyright
Introduction to module
This module defines the competence required to design and implement an infrastructure for
internet services. Network systems administration refers to the management and maintenance of
computer networks within an organization. It involves the configuration, monitoring, and
troubleshooting of network infrastructure to ensure its optimal performance, security, and
availability.
Disaster recovery for a network involves implementing strategies and procedures to restore
network functionality and data in the event of a major disruption or catastrophic event.
This module is designed to meet the industry requirement under the Hardware and Networking
Service occupational standard, particularly for the unit of competency: Providing Network
System Administration This module covers the units:
 Client access and security
 Disseminate disaster recovery plan
 Monitor network performance
 Migrate to New Technology
This guide will also assist you to attain the learning outcome stated in the cover page.
Specifically, upon completion of this learning guide, you will be able to:
 Understand network system administration
 Explain accounts and files privilege
 Determine access privileges
 Maintain System integrity and security
 Understand concepts of disaster recovery plan
 Understand Backup and restore
 Analyze and respond information
 Monitor software and files
 Monitoring performance indicators
 Upgrade technology skills
 Identify upgraded equipment.

Page v of lxxvi Ministry of Labor and Providing network systems Version -1


Skills
administration level - IV December , 2023
Author/Copyright
 Use new or upgrade equipment

Module Instruction
For effective use this modules trainees are expected to follow the following module instruction:

1. Read the specific objectives of this Learning Guide.

2. Read the information that this module contain.

3. Complete the Self-check.

4. Submit your accomplished Self-check.

5. Do the Operations which in the module.

6. Do the LAP test

Page vi of lxxvi Ministry of Labor and Providing network systems Version -1


Skills
administration level - IV December , 2023
Author/Copyright
Unit One: Client access and security
This unit is developed to provide you the necessary information regarding the following content
coverage and topics:
 Overview of Network System Administration
 Accounts and files privilege
 Determining access privileges
 Maintaining System integrity and security
This unit will also assist you to attain the learning outcomes stated in the cover page. Specifically,
upon completion of this learning guide, you will be able to:
 Understand Network System Administration
 Explain Accounts and files privilege
 Determine access privileges
 Maintain System integrity and security

Page vii of lxxvi Ministry of Labor and Providing network systems Version -1
Skills
administration level - IV December , 2023
Author/Copyright
1.1. Basic concept of network system administration

Network system administration involves managing and maintaining the operation, security, and
performance of a network infrastructure. It encompasses various tasks and responsibilities to
ensure the network functions reliably and efficiently. Network administration aims to manage,
monitor, maintain, secure, and service an organization’s network. However, the specific tasks
and procedures may vary depending on the size and type of an organization.
Network administration primarily consists of, but is not limited to, network monitoring, network
management, and maintaining network quality and security.
Network monitoring is essential to monitor unusual traffic patterns, the health of the network
infrastructure, and devices connected to the network. It helps detect abnormal activity, network
issues, or excessive bandwidth consumption early on and take preventative and remedial actions
to uphold the network quality and security. Network management encompasses multiple
administrative functions, including network planning, implementation, and configuration. It
involves:
 Re-planning the network based on changing organizational requirements
 Implementing the network for maximum efficiency
 Configuring various networking and security protocols
 Applying security patches and updating the firmware of the networking infrastructure,
such as routers, hubs, switches, and firewalls
 Assessing the network for weaknesses
 Evaluating quality and capacity to increase or decrease network capacity and manage
resource wastage
Network security employs various techniques to ensure a network is secure. For example, it uses
multiple tools such as firewalls, intrusion detection or prevention systems, and anti-malware
software to prevent or detect malicious activity in the network.
 Network administration goals
Network administration aims to ensure a reliable, secure network conducive to business
operations. Generally, network administration goals include:
 Maintain a resilient, high-quality network

Page viii of lxxvi Ministry of Labor and Providing network systems Version -1
Skills
administration level - IV December , 2023
Author/Copyright
 Plan and improve network capacity to enable seamless network access and operations
 Leverage networking tools for network systems administration and better network
administration control
 Track and document relevant changes
 Evaluate possible risks and orchestrate effective mitigations
 Prevent activities compromising or using the network as an attack vector
 Identify and mitigate intrusions to avoid security breaches
1.1.1 Network administration key areas
Networks administration consists of five key areas:
1. Fault management: - Monitors the network infrastructure to identify and address issues
potentially affecting the network. It uses standard protocols such as Simple Network
Management Protocol (SNMP) to monitor network infrastructure.
2. Configuration management: - Tracks configuration and related changes of network
components, including switches, firewalls, hubs, and routers. As unplanned changes can affect
the network drastically and potentially cause downtime, it is essential to streamline, track, and
manage configuration changes.

Figure 1. 1 Configuration management steps

3. Account management: - Tracks network utilization to bill and estimate the usage of various
departments of an organization. In smaller organizations, billing may be irrelevant. However,
monitoring utilization helps spot specific trends and inefficiencies.
4. Performance management: - Focuses on maintaining service levels needed for efficient
operations. It collects various metrics and analytical data to continually assess network
performance, including response times, packet loss, and link utilization.

Page ix of lxxvi Ministry of Labor and Providing network systems Version -1


Skills
administration level - IV December , 2023
Author/Copyright
5. Security management:- Aims to ensure only authorized activity and authenticated devices
and users can access the network. It employs several disciplines such as threat management,
intrusion detection, and firewall management. It also collects and analyzes relevant network
information to detect and block malicious or suspicious activity.

Figure 1. 2 Network security management

1.1.2. Network administrator tools and software


Network administrators use various networking software and tools to optimally perform network
operations, including compliance, automation, configuration, real-time monitoring and alerting,
network inventory management, performance management, and vulnerability assessment.
Due to the increasing number of networking components in an organization’s network, it
becomes difficult to manage the network manually, which is also error-prone. By implementing
basic and advanced tools, network administrators can automate several tasks and focus on more
value-adding tasks needing their attention.

Page x of lxxvi Ministry of Labor and Providing network systems Version -1


Skills
administration level - IV December , 2023
Author/Copyright
Figure 1. 3 Network administrator tools

1.1.3. Responsibilities of network administrator


A network administrator focuses on the day-to-day aspects of managing and maintaining a
network. The roles and responsibilities of network administrators are outlined below.
 Is responsible for managing and maintaining the network in real time
 Ensures the network is secure by blocking suspicious activity and mitigating the risk of
security breaches
 Implements security programs based on
hardware and software
 Manages on-site networking servers
responsible for business operations
 Ensures network integrity and resilience to
maintain service levels
 Tests the network to uncover weaknesses
and mitigate them
 Monitors and tracks utilization
 Applies utilization, authentication, and
authorization policies to maintain the
quality and security of the network

Figure 1. 4 Responsibilities of network administrator

Page xi of lxxvi Ministry of Labor and Providing network systems Version -1


Skills
administration level - IV December , 2023
Author/Copyright
1.2. Accounts and files privilege

Applying account and file privileges involves configuring access controls to ensure that only
authorized users can access specific accounts and files. Here are some steps to apply account and
file privileges effectively:
1. User Account Creation: Create user accounts for individuals who require access to the
system or files. Each user should have a unique username and password combination.
2. User Groups: Group users based on their roles and responsibilities. This simplifies privilege
management by assigning privileges to groups rather than individual users.
3. Principle of Least Privilege: Follow the principle of least privilege, which means granting
users the minimum level of privileges required to perform their job functions. Avoid giving
excessive permissions that could potentially lead to security vulnerabilities.
4. Access Control Lists (ACLs): Utilize access control lists to define access permissions for
files and directories.
5. File Ownership: Assign appropriate file ownership to ensure accountability and control.
Only authorized users or groups should own sensitive files or directories.
6. Regular Access Reviews: Perform regular access reviews to identify and remove
unnecessary or outdated privileges. This helps maintain a clean and secure access control
environment.
7. Password Policies: Enforce strong password policies to protect user accounts. Require users
to create passwords that meet complexity requirements (e.g., minimum length, a combination
of letters, numbers, and special characters) and encourage regular password updates.
8. Regular Auditing and Monitoring: Implement logging and monitoring mechanisms to
track user activities, access attempts, and changes to account and file privileges. Regularly
review logs and audit trails to identify suspicious behavior and potential security breaches.
9. Training and Awareness: Provide training and awareness programs to educate users about
the importance of account and file privilege management. Users should understand their
responsibilities in safeguarding sensitive data and be aware of best practices for access
control.

Page xii of lxxvi Ministry of Labor and Providing network systems Version -1
Skills
administration level - IV December , 2023
Author/Copyright
1.3. Determine access privileges
When a user tries to perform a privileged operation, the system checks the user's access token to
determine whether the user holds the necessary privileges1. If the user holds the necessary
privileges, the system checks whether the privileges are enabled.
Access privileges can be viewed and modified in the Operations Server console. The following
primary roles can be subdivided into additional categories if necessary to match your
organization:
 System Administrator: Responsible for configuring and maintaining the Operations Center
environment, including:
 Defining adapter connections to key components such as databases and remote
management systems
 Defining service model hierarchies, automations, and operations,
 Defining custom classes, behavior models, and property pages
 Defining calendars, schedules, and jobs
 Creating custom SQL Views
 Creating Layout views
 Determining which users should have access to specific element hierarchies
 Security Manager: Responsible for enforcing company security policies regarding user
access to the system, user identification and authorization, password rules, access privileges,
and so on. Also responsible for managing users and groups and enforcing password policies
and rules.
 End Users: Responsible for analyzing and reporting information collected in Operations
Center from various sources. You should organize users who have similar authorization to
access data into groups, such as by job function or security clearance level.
Table 1. 1 Access Control Privileges

Access Description
Privilege
View The user can view elements, as well as their alarms and properties, and
relationships to other elements that the user can view.
Note for T/EC adapters: Any user with the View permission can suppress a
T/EC alarm; however, this user cannot acknowledge or close the alarm.

Page xiii of lxxvi Ministry of Labor and Providing network systems Version -1
Skills
administration level - IV December , 2023
Author/Copyright
Manage The user can perform nonintrusive actions (such as Ping or TraceRoute) as
well as update element information (such as custom properties).
Note for T/EC adapters: Any user with the Manage permission can
acknowledge or close a T/EC alarm.
Access The user can access remote managed elements by using “connect to”
operations with adapters that support cut-through telnet such as the Event
Manager, OpenView, and Netcool*. An example operation is using the Console
capability in the Elements hierarchy.
Define The user can perform administrative tasks such as adding scripts, sites, and
service model elements, as well as creating, deleting, and changing the
definition of adapters, service models and SLAs in Operations Center.
Undefined Not defining access privileges avoids conflicts. For example, the two groups in
the following figure have the following permissions at the top (root) Access
Control level:

The admins group has Define privileges explicitly defined. The users group
has undefined Define privileges. Therefore, a member of both groups has
Define privileges.

Page xiv of lxxvi Ministry of Labor and Providing network systems Version -1
Skills
administration level - IV December , 2023
Author/Copyright
Figure 1. 5 Determining access privileges

1.4. Maintain System integrity and security

1.4.1. System integrity


System integrity refers to the state of a computer system or network being complete, accurate,
and secure. It involves ensuring that the system operates as intended, without unauthorized
modifications, corruption, or compromise. System integrity encompasses various aspects,
including data integrity, configuration integrity, and overall security.
Data Integrity: Data integrity refers to the accuracy, consistency, and reliability of data stored
within a system. It ensures that data remains unchanged and uncorrupted throughout its lifecycle.
Measures such as data validation, checksums, and error detection techniques are used to maintain
data integrity.
Configuration Integrity: Configuration integrity involves verifying and maintaining the
integrity of system configurations, settings, and parameters.

Page xv of lxxvi Ministry of Labor and Providing network systems Version -1


Skills
administration level - IV December , 2023
Author/Copyright
It ensures that the system is properly configured according to established standards and best
practices. Unauthorized changes to system configurations can introduce vulnerabilities or disrupt
system functionality.
Software Integrity: Software integrity focuses on ensuring that software applications and
programs are free from defects, vulnerabilities, or unauthorized modifications. It involves
implementing secure coding practices, performing regular software updates and patching, and
conducting code reviews and software testing to identify and fix vulnerabilities.
Hardware Integrity: Hardware integrity refers to the assurance that computer hardware
components are functioning correctly and have not been tampered with or compromised. It
involves validating the authenticity and integrity of hardware components, monitoring for
hardware failures, and protecting against unauthorized modifications or hardware-based attacks.
System Security: System security is a critical aspect of system integrity. It involves protecting
the system against unauthorized access, data breaches, malware, and other security threats. This
includes implementing access controls, strong authentication mechanisms, encryption, intrusion
detection and prevention systems, and ongoing monitoring
and auditing of system activities.
Maintaining system integrity is essential to ensure the
reliability, availability, and confidentiality of information,
as well as the proper functioning of computer systems and
networks. It requires a combination of technical controls,
security measures, and proactive monitoring to prevent
unauthorized changes, detect potential vulnerabilities, and
respond promptly to security incidents.

Figure 1. 6 System integrity management

1.4.2. System security


The security of a computer system is a crucial task. It is a process of ensuring the confidentiality
and integrity of the OS. Security is one of most important as well as the major task in order to
keep all the threats or other malicious tasks or attacks or program away from the computer’s
software system.

Page xvi of lxxvi Ministry of Labor and Providing network systems Version -1
Skills
administration level - IV December , 2023
Author/Copyright
A system is said to be secure if its resources are used and accessed as intended under all the
circumstances, but no system can guarantee absolute security from several of various malicious
threats and unauthorized access.
The security of a system can be threatened via two violations:
Threat: A program that has the potential to cause serious damage to the system.
Attack: An attempt to break security and make unauthorized use of an asset.
Security violations affecting the system can be categorized as malicious and accidental threats.
Malicious threats, as the name suggests are a kind of harmful computer code or web script
designed to create system vulnerabilities leading to back doors and security breaches. Accidental
Threats, on the other hand, are comparatively easier to be protected against.
Example: Denial of Service DDoS attack.

Figure 1. 7 Network security

Page xvii of lxxvi Ministry of Labor and Providing network systems Version -1
Skills
administration level - IV December , 2023
Author/Copyright
Self-check - 1

Part I:- Say True if the given statement is correct else say False
_______1. When determining access privileges in a network system, factors such as user's physical
location and job title should be considered.
_______2. Granting all users the highest level of access possible is a recommended approach for
determining access privileges.
_______3. Storing sensitive data in plain text files is a secure practice for maintaining system
integrity and security.
Part II: - Select the appropriate answer from the given alternative
_______1. When referring to accounts and files privilege in network system administration, what
does the term "privilege escalation" mean?
A. Granting additional permissions to a user
B. Revoking all access privileges from a user
C. Assigning a new username to a user
D. Changing the file ownership to a different user
_______2. In the context of determining access privileges, what is the principle of "least privilege"?
A. Granting users the highest level of access possible
B. Assigning access privileges based on job titles
C. Limiting user access to only the resources necessary for their tasks
D. Providing all users with equal access privileges
_______3. Which of the following is an example of a multifactor authentication method for
determining access privileges?
A. Using a username and password combination
B. Requiring a fingerprint scan and a password
C. Granting access based solely on IP address
D. Sharing a single password among multiple users
_______4. What is the purpose of implementing intrusion detection systems (IDS) in network
system administration?
A. To prevent unauthorized access to the system

Page xviii of lxxvi Ministry of Labor and Providing network systems Version -1
Skills
administration level - IV December , 2023
Author/Copyright
B. To monitor network traffic and detect potential security breaches
C. To encrypt sensitive data during transmission
D. To manage user accounts and access privileges
_______5. Which of the following is an example of a security measure for maintaining system
integrity and security?
A. Regularly updating antivirus software
B. Sharing passwords with coworkers for convenience
C. Allowing unrestricted remote access to the system
D. Storing sensitive data in plain text files
Part II: - Give short answer
1. What are the responsibilities of system administrator?
2. Demonstrate the difference between system security and system integrity with example?
3. List and explain Network administration key areas?
4.

Page xix of lxxvi Ministry of Labor and Providing network systems Version -1
Skills
administration level - IV December , 2023
Author/Copyright
Operation sheet 1.1
Operation title: - Accounts and files privilege
Purpose:- Protect and give privilege for user account and computer files
Instruction: Use the figure below, given equipment and task. You have given 45 Minute for the
task and you are expected to complete tasks.
 Tools and requirement:,- Computes
Task 1:- Give full access privilege for user
Step 1:- Open File Explorer.
Step 2:- Browse and find the file or folder you
want to have full access.
Step3:- Right-click it, and select Properties.
Step 4:- Click the Security tab to access the
NTFS permissions.
Step 5:- Click the Advanced button.

Step 6:- On the "Advanced Security Settings" page, you need to click the Change link, in the
Owner's field.

Page xx of lxxvi Ministry of Labor and Providing network systems Version -1


Skills
administration level - IV December , 2023
Author/Copyright
Step 7:- Click the Advanced button.
Step 8:- On the "Select User or Group" page,
click the Find Now button.
Step 9:- From the search result, select your
user account, and click OK.

Step 10:- On the "Select User or Group" page, click OK.


Step 11:-Click Apply.
Step 12:- Click OK.

Page xxi of lxxvi Ministry of Labor and Providing network systems Version -1
Skills
administration level - IV December , 2023
Author/Copyright
Step 13:- Click OK again.
Step 14:- Click OK one more time to complete this task.

Task 2:- Replace ownership on sub containers and object


Step 1:- Right-click the file or folder and select Properties.
Step 2:- Click the Security tab to access the NTFS permissions.
Step 3:- Click the Advanced button.
Step 4:- Under the Permissions tab, click Add.

Page xxii of lxxvi Ministry of Labor and Providing network systems Version -1
Skills
administration level - IV December , 2023
Author/Copyright
Step 5:- Click Select a principal to add your user account.
Step 6:- On the "Select User or Group" page, click the Find
Now button.
Step 7:- From the search result, select your user account,
and click OK.
Step 8:- On the "Select User or Group" page, click OK.

Step 10:-On "Permission Entry", check the Full control option.


Step 11:-Click OK

Page xxiii of lxxvi Ministry of Labor and Providing network systems Version -1
Skills
administration level - IV December , 2023
Author/Copyright
Step 12:- Click OK.
Step 13:- Click Apply.
Step 14:- Click OK.
Step 15:- Click OK to close the file or folder properties to complete the task.

LAP Test
Task 1. Create one administrator account and standard account in one computer
Task 2. On the above administrator account on local desk C:/ create one folder called user
privilege
Task 3. Give full access privilege for the above created standard account

Page xxiv of lxxvi Ministry of Labor and Providing network systems Version -1
Skills
administration level - IV December , 2023
Author/Copyright
Unit Two: Disseminate disaster recovery plan
This unit is developed to provide you the necessary information regarding the following content
coverage and topics:

 Basic concepts of disaster recovery plan


 Backup and restore
This unit will also assist you to attain the learning outcomes stated in the cover page. Specifically,
upon completion of this learning guide, you will be able to:

 Basic concepts of disaster recovery plan


 Backup and restore

Page xxv of lxxvi Ministry of Labor and Providing network systems Version -1
Skills
administration level - IV December , 2023
Author/Copyright
2.1. Basic concepts of disaster recovery plan

A Disaster Recovery Plan (DRP) is a structured approach to responding to and recovering from
events that can cause data loss, system downtime, and other disruptions to normal business
operations. Modern organizations have to operate on a 24/7 basis in order to stay competitive in
the market. It is important to create a disaster recovery (DR) plan so as to ensure that your
business can continue to operate even during a DR event. However, when designing a DR plan,
many businesses overlook the importance of network disaster recovery. In this blog post, we will
discuss what network disaster recovery planning entails and how to securely protect your
organization against network failures.
A network disaster recovery plan includes a set of procedures required to effectively respond to a
disaster that affects a network and causes its disruption. Network disaster recovery planning
generally entails:
 Listing the steps which should be undertaken in order to restore network connectivity

Page xxvi of lxxvi Ministry of Labor and Providing network systems Version -1
Skills
administration level - IV December , 2023
Author/Copyright
 Identifying people responsible for conducting network disaster recovery
 Assessing possible consequences of a network failure
 Determining the best strategies to mitigate them
The main purpose of network disaster recovery is to ensure that business services can be
delivered to customers despite a disruption in network connectivity. However, disasters come in
different forms and sizes, which makes it hard to predict what their impact would be, which
network components would be affected, and how many resources would be required to restore

network connectivity.

Possible Causes of Network Failures


Network services are required for ensuring an uninterrupted flow of communications and data
transfer within your IT infrastructure. Various factors can lead to network failure. These include:
 Hardware failure. Network equipment such as routers, switches, modems, gateways, or
any other device can fail and, as a result, affect the performance of all other devices
connected to them.
 Cascading failure. A single network consists of multiple routers, nodes, or switches.
One of those network components might become overloaded and stop working, which
can trigger a cascade of failures within a single network.
 Issues with the internet connection. Failure to set up an internet connection can cause
problems with network connectivity and interrupt data transfer.
 Human errors. Sometimes, network connectivity problems might be the result of
mistakes made by employees when working with network equipment or manually
configuring network components.
 Network attacks. Network services can get disrupted after a cyber-attack, whose aim is
to prevent the organization from delivering its services, forcing it to shut down.
 Natural or man-made disaster. Disasters of any type can significantly damage or even
destroy your production center and virtual infrastructure, thus causing significant
business losses.

Page xxvii of lxxvi Ministry of Labor and Providing network systems Version -1
Skills
administration level - IV December , 2023
Author/Copyright
Figure 2. 1 Tips for Disaster Recovery Planning

2.2. Backup and restore

2.2.1. Backup for disaster recovery


Backup is a crucial element of disaster recovery, providing a means to safeguard critical data,
applications, and systems in case of unforeseen events. It involves creating duplicate copies of
essential information and storing them on separate devices or off-site locations. These backups
are performed regularly to capture the most up-to-date data and ensure its availability for
recovery purposes.
In the event of a disaster or data loss, such as hardware failures, natural disasters, cyberattacks,
or accidental deletions, the backups serve as a reliable source for restoring the affected systems.
By having comprehensive backups, organizations can minimize downtime and mitigate the
potential loss of data, enabling them to recover quickly and resume normal operations. Backup
strategies often include different levels of redundancy, encryption, and verification processes to
ensure the integrity and security of the stored information.
There are several types of backups that can be employed, each offering different levels of data
protection and recovery options. Some common types of backups include:
1. Full Backup: A full backup involves creating a complete copy of all data and files in a
system or storage device. It captures all data, regardless of whether it has changed since
the last backup. Full backups are comprehensive but can be time-consuming and require
significant storage space.

Page xxviii of lxxvi Ministry of Labor and Providing network systems Version -1
Skills
administration level - IV December , 2023
Author/Copyright
Figure 2. 2 Full Backup

2. Incremental Backup: Incremental backups only capture and store changes made since
the last backup, whether it was a full or incremental backup. This approach is more
efficient in terms of time and storage space, as it only backs up the modified or new data.
However, recovery from incremental backups may require multiple backup sets to be
restored.

Figure 2. 3 Incremental Backup

3. Differential Backup: Differential backups capture all changes made since the last full
backup. Unlike incremental backups, which only include changes since the last backup
(whether full or incremental), differential backups include changes since the last full
backup. This results in faster recovery compared to incremental backups, as only the last
full backup and the differential backup need to be restored.

Page xxix of lxxvi Ministry of Labor and Providing network systems Version -1
Skills
administration level - IV December , 2023
Author/Copyright
Figure 2. 4 Differential Backup

4. Mirror Backup: A mirror backup creates an exact replica of the source data or system. It
involves copying all files and directories to a separate storage device or
location. Mirror backups provide a straightforward recovery process,
as the backup is a direct copy of the original data. However, they can
consume significant storage space and may not offer versioning or
point-in-time recovery capabilities.
5. Snapshot Backup: Snapshot backups capture the state of a system or data at a specific
point in time. Instead of copying all data, snapshot backups store the
differences or changes made since the previous snapshot. This allows
for fast and efficient backups and provides the ability to restore data
to specific points in time.
6. Cloud Backup: Cloud backup involves storing data backups in off-site cloud storage. It
offers the advantage of scalability, accessibility from anywhere
with an internet connection, and built-in redundancy provided
by the cloud service provider. Cloud backups can be performed
using various backup methods, such as full, incremental, or
snapshot backups.
The choice of backup type depends on factors such as the data volume, frequency of changes,
recovery requirements, available storage resources, and budgetary considerations. A combination
of backup types can be employed to create a comprehensive backup strategy that meets specific
needs for data protection and recovery.
2.2.2. Restore for disaster recovery
In the context of disaster recovery, the term "restore" refers to the process of recovering and
returning critical data, applications, and systems to their operational state following a disruptive
event or data loss. The restore phase is a key component of the overall disaster recovery plan and
involves the following:

Page xxx of lxxvi Ministry of Labor and Providing network systems Version -1
Skills
administration level - IV December , 2023
Author/Copyright
1. Assess the situation: Before initiating the restore process, assess the extent of the damage
caused by the disaster and determine the scope of the restoration effort. Identify the affected
systems, applications, and data that need to be restored.
2. Activate the disaster recovery plan: Refer to the documented disaster recovery plan,
which should outline the procedures and guidelines for restoring various components of the
IT infrastructure. Follow the plan's instructions to ensure a structured and organized
approach to the restore process.
3. Retrieve backups: Retrieve the backup copies of the affected data, applications, or systems
from the designated backup storage location. This may involve accessing backup tapes,
disk-based backups, or cloud-based backups depending on the backup strategy and
technology in place.
4. Validate backup integrity: Verify the integrity and consistency of the backup data before
proceeding with the restore process. This step ensures that the backups are viable and can be
relied upon for successful recovery.
5. Restore data and applications: Start the restoration of data and applications based on the
recovery priorities defined in the disaster recovery plan. Begin with the most critical
systems and work your way down to less critical ones. Follow the appropriate procedures
for each type of backup (e.g., full backups, incremental backups) to restore the data and
applications to their original or alternative locations.
6. Test and verify: After the restore process, conduct thorough testing to validate the restored
data, applications, and systems. Perform functional tests, check for data integrity, and ensure
that the restored components are working correctly.
7. Update configurations and connections: Adjust configurations and re-establish
connections as necessary to integrate the restored systems back into the production
environment.
8. Document the restore process: Maintain detailed documentation of the restore process,
including the steps performed, any issues encountered, and the actions taken to resolve
them.

Page xxxi of lxxvi Ministry of Labor and Providing network systems Version -1
Skills
administration level - IV December , 2023
Author/Copyright
Self-check - 2
Part I:- Say True if the given statement is correct else say False
_______1. A disaster recovery plan (DRP) only focuses on recovering data and does not address
other aspects of business operations.
_______2. Backup and restore processes are only necessary for natural disasters and do not apply to
other types of disruptions.
_______3. Having a backup solution in place guarantees instant recovery of data and systems in the
event of a disaster.
_______4. Data backup and replication are interchangeable terms, representing the same process.
Part II: - Select the appropriate answer from the given alternative

_______1. What is the primary goal of a disaster recovery plan (DRP)?


A. Preventing disasters from occurring
B. Minimizing the impact of disasters on business operations

C. Recovering data and systems instantly after a disaster


D. Eliminating the need for regular backups
_______2. What is the purpose of conducting a business impact analysis (BIA) in the context of a
disaster recovery plan?

Page xxxii of lxxvi Ministry of Labor and Providing network systems Version -1
Skills
administration level - IV December , 2023
Author/Copyright
A. Identifying critical business functions and their dependencies
B. Assessing the likelihood of specific disaster events occurring
C. Implementing cybersecurity measures to prevent data breaches
D. Evaluating the effectiveness of backup and restore processes
_______3. Which of the following is an example of an off-site backup location?
A. An external hard drive connected to the same server
B. A cloud storage service hosted by a third-party provider
C. shared network folder on the same local network
D. An additional internal hard drive within the same computer
_______4. What does the term "recovery point objective" (RPO) refer to in backup and restore?
A. The maximum tolerable downtime after a disaster
B. The amount of data that can be recovered within a specific timeframe
C. The point in time to which data can be restored after a disaster
D. The frequency at which backups are performed
_______5. Which of the following is a common backup strategy for ensuring redundancy and data
availability?
A. Full backup performed daily
B. Incremental backup performed weekly
C. Differential backup performed monthly
D. Snapshot backup performed hourly
Part II: - Give short answer
1. List and explain types of backups?
2. Demonstrate the main purpose of network disaster recovery in large and small
organization?
3. Demonstrate disaster restore phase?

Page xxxiii of lxxvi Ministry of Labor and Providing network systems Version -1
Skills
administration level - IV December , 2023
Author/Copyright
Operation sheet 2.1
Operation title: - Create a full backup of Windows 10 with the system image tool
Purpose: - Protect and save personal information from disaster.
Instruction: Use the figure below, given equipment and task. You have given 45 Minute for the
task and you are expected to complete tasks.
 Tools and requirement:-Compute
Procedures:-
Step 1:- Open Settings.
Step 2:- Click on Update & Security.
Step 3:- Click on Backup.

Page xxxiv of lxxvi Ministry of Labor and Providing network systems Version -1
Skills
administration level - IV December , 2023
Author/Copyright
Step 4:- Under the "Looking for an older backup?"

Step 5:- Click the "Create a system image" option from the left pane.

Page xxxv of lxxvi Ministry of Labor and Providing network systems Version -1
Skills
administration level - IV December , 2023
Author/Copyright
Step 6:- Select the "On a hard disk" option.

Step 7: -Use the "On a hard disk" drop-down menu and select the location to export the
Windows 10 full backup.

Step 8: -Click the Next button.

Page xxxvi of lxxvi Ministry of Labor and Providing network systems Version -1
Skills
administration level - IV December , 2023
Author/Copyright
Step 9:- (Optional) Select any additional hard drives to include them in the backup.
Step 10:- Click the Next button.
Step 11:- Click the Start backup button.

Step 12:- Click the No button.


Step 13:- Click the Close button.

Page xxxvii of lxxvi Ministry of Labor and Providing network systems Version -1
Skills
administration level - IV December , 2023
Author/Copyright
Operation sheet 2.2
Operation title: - Restore a backup with system image tool on Windows 10
Purpose: - To recover distorted or damage information.
Instruction: Use the figure below, given equipment and task. You have given 45 Minute for the
task and you are expected to complete tasks.
Tools and requirement:-Compute Windows 10 USB bootable drive
Procedures:-
Step 1:- Connect the drive with the full back up to the device.
Step 2:- Connect the Windows 10 USB bootable drive to the computer.
Step 3:- Start the computer.
Step 4:- On the USB bootable drive startup prompt, press any key to continue.

Quick tip: If the device does not start in the Windows Setup wizard, you will need to access
the Basic Input/Output System (BIOS) or Unified Extensible Firmware Interface (UEFI) to
change the boot order settings. You can use this guide to access the BIOS/UEFI, but the steps are
usually different per manufacturer and device model. It is recommended to check your
manufacturer support website for more specific details.

Step 5:- On the "Windows Setup" page, click the Next button.

Page xxxviii of lxxvi Ministry of Labor and Providing network systems Version -1
Skills
administration level - IV December , 2023
Author/Copyright
Step 6:- Click the "Repair your computer" option from the bottom-left corner of the screen.

Step 7:- Click the Troubleshoot option.

Step 8:- Click the "System Image Recovery" option

Page xxxix of lxxvi Ministry of Labor and Providing network systems Version -1
Skills
administration level - IV December , 2023
Author/Copyright
Step 9:- Select the Windows 10 option as the target operating system.

Step 10:- On the "Re-image your computer" page, select the "Use the latest available system
image" option.

Quick tip: You can use the "Select a system image" option if you have multiple backups and
you are trying to restore an older version of the system and files.

Page xl of lxxvi Ministry of Labor and Providing network systems Version -1


Skills
administration level - IV December , 2023
Author/Copyright
Step 11:- Click the Next button.
Step 12:-(Optional) Carefully select the "Format and repartition disks" option before
restoring the backup (if you are restoring the backup on a new drive).

Quick tip: If you choose this option, use the Exclude disks option to prevent formatting
secondary drives that may contain data.
Step 13:- (Optional) Check the "Only restore system drivers" option (if the backup contains a
copy of multiple drives and you only want to restore the operating system).
Step 14:- Click the Next button.
Step 15:- Click the Finish button.

Page xli of lxxvi Ministry of Labor and Providing network systems Version -1
Skills
administration level - IV December , 2023
Author/Copyright
Step 16:- Click the Yes button.

Quick tip:- After you complete the steps, the recovery process will start on the computer. The
time to finish the restoration will depend on the amount of data and hardware configuration.
If you are about to restore a device, do not interrupt the process, as it can cause the backup to
fail, making it unbootable. It is always recommended to have the laptop connected to a power
source and a desktop computer to an uninterruptible power supply (UPS) to avoid problems.
Once the backup has been restored, open Settings  Update & Security Windows Update,
and click the Check for Updates button to quickly install any missing security updates.

LAP Test
Task 1:- Create a full backup of Windows 10 with the system image tool
Task 2:- Restore damage computer by using bootable Windows 10 operating system.

Page xlii of lxxvi Ministry of Labor and Providing network systems Version -1
Skills
administration level - IV December , 2023
Author/Copyright
Unit Three : Monitor network performance
This unit is developed to provide you the necessary information regarding the following content
coverage and topics:

 Performing diagnostic test


 Analyzing and responding information
 Monitoring software and files
 Monitoring performance indicators
 Improving network and systems
This unit will also assist you to attain the learning outcomes stated in the cover page. Specifically,
upon completion of this learning guide, you will be able to:

 Perform diagnostic test


 Analyze and responding information

Page xliii of lxxvi Ministry of Labor and Providing network systems Version -1
Skills
administration level - IV December , 2023
Author/Copyright
 Monitor software and files
 Monitor performance indicators
 Improve network and systems

3.1. Basic concept of monitor network performance

Monitoring network performance involves the systematic observation and analysis of a computer
network to ensure it operates efficiently, reliably, and securely. This process encompasses
various aspects such as bandwidth utilization, latency, packet loss, and device health. By
continually assessing these factors, network administrators can identify and address potential
issues before they impact the user experience. Bandwidth monitoring helps optimize data
transmission capacity, latency monitoring ensures timely data delivery, and packet loss
monitoring aids in maintaining a stable and responsive network. Additionally, network
performance monitoring includes traffic analysis, security surveillance, and quality of service
assessments to ensure that resources are allocated effectively, potential security threats are
detected, and the overall quality of communication meets the desired standards. Utilizing
specialized tools and reporting mechanisms, organizations can maintain a proactive approach to

Page xliv of lxxvi Ministry of Labor and Providing network systems Version -1
Skills
administration level - IV December , 2023
Author/Copyright
network management, enhancing the overall reliability and performance of their network
infrastructure.

3.2. Performing diagnostic test

Performing network diagnostic tests involves a systematic process to assess and analyze the
health, performance, and functionality of a computer network. Here are the general steps you can
follow to conduct network diagnostic tests:
 Identify the Issue:
 Begin by identifying the specific issue or symptoms that require diagnostic testing. This
could include slow network performance, connectivity problems, or unexpected outages.
 Define Testing Objectives:
 Clearly define the objectives of your diagnostic tests. Determine what aspects of the
network you need to evaluate, such as bandwidth, latency, packet loss, or device health.
 Select Appropriate Tools:
 Choose the appropriate network diagnostic tools for the specific tests you want to perform.
There are various tools available for different aspects of network analysis, including:
 Ping and Traceroute: For assessing connectivity and latency.
 Network Performance Monitoring Tools: Such as Wireshark, Nagios, or PRTG
for detailed analysis of network traffic.
 Bandwidth Testing Tools: Like Speedtest.net or iPerf for measuring available
bandwidth.
 Device Monitoring Software: To assess the health and performance of network
devices.
 Execute Diagnostic Tests:
 Perform the selected diagnostic tests. For example:
 Use ping to check connectivity and measure round-trip times.
 Conduct traceroute to identify the path and latency between your computer and a
destination.
 Run bandwidth tests to evaluate the network's capacity.

Page xlv of lxxvi Ministry of Labor and Providing network systems Version -1
Skills
administration level - IV December , 2023
Author/Copyright
 Utilize network monitoring tools to analyze traffic patterns and identify potential
issues.
 Interpret Results:
 Analyze the results of the diagnostic tests. Look for anomalies, deviations from expected
values, or patterns that may indicate network issues. Pay attention to any packet loss,
latency spikes, or irregularities in traffic.
 Diagnose Network Issues:
 Based on the results, diagnose the root causes of identified network issues. This may
involve troubleshooting hardware, configuration settings, or addressing issues related to
network congestion.
 Implement Solutions:
 Once the issues are identified, implement appropriate solutions. This could include
adjusting network configurations, upgrading hardware, optimizing settings, or addressing
specific issues with network devices.
 Document and Report:
 Document the results of your diagnostic tests and the actions taken to address any issues.
This documentation is valuable for future reference and can help in maintaining a
proactive approach to network management.
 Continuous Monitoring:
 Establish a routine for continuous monitoring of the network. Regularly perform
diagnostic tests to identify and address potential issues before they impact network
performance.

3.3. Analyze and respond information

Analyzing and responding to information in a network involves monitoring network traffic,


identifying potential issues or anomalies, and taking appropriate actions to ensure network
security, performance, and reliability. Here are some ways of analyze and respond to information
in a network:

1. Implement network-monitoring tools: Use network monitoring software or tools to


capture and analyze network traffic. These tools can provide real-time visibility into

Page xlvi of lxxvi Ministry of Labor and Providing network systems Version -1
Skills
administration level - IV December , 2023
Author/Copyright
network activity, including bandwidth utilization, packet loss, latency, and security events.
2. Establish baseline and thresholds: Establish a baseline of normal network behavior by
monitoring network traffic patterns over time. Set thresholds or alerts for abnormal network
behavior, such as unusually high traffic volume, network congestion, or security breaches.
3. Monitor network traffic: Continuously monitor network traffic to identify any anomalies
or deviations from the baseline. Observe patterns, trends, and irregularities that may
indicate network performance issues or security incidents.
4. Analyze network logs: Analyze log files generated by network devices, servers, and
security systems. Logs can provide valuable information about network events, errors, and
security incidents. Look for any suspicious or unusual activities that may require
investigation or response.
5. Identify security threats: Use intrusion detection and prevention systems (IDS/IPS) or
security information and event management (SIEM) solutions to detect and respond to
security threats. Analyze network traffic for signs of malware infections, unauthorized
access attempts, or other malicious activities.
6. Investigate network issues: When an issue or anomaly is detected, investigate the root
cause by analyzing relevant network logs, traffic patterns, and system configurations.
Identify the source of the problem, whether it's a misconfiguration, hardware failure,
software bug, or security incident.
7. Respond to network incidents: Take appropriate actions to address network incidents or
issues. This may involve implementing security measures, such as blocking malicious IP
addresses or isolating compromised devices. Troubleshoot network performance problems
and apply necessary fixes or optimizations.
8. Document and report: Keep detailed records of network incidents, actions taken, and their
outcomes. Document any changes made to network configurations or security settings.
Prepare reports summarizing network performance, security incidents, and actions taken
for management and future reference.
9. Continuous improvement: Regularly review and update network monitoring and response
strategies based on lessons learned from past incidents. Stay updated with emerging threats,
new technologies, and best practices in network monitoring and security.

Page xlvii of lxxvi Ministry of Labor and Providing network systems Version -1
Skills
administration level - IV December , 2023
Author/Copyright
Analyzing and responding to information in a network requires a proactive and vigilant
approach. It is crucial to have skilled network administrators or security professionals who can
effectively interpret network data, identify potential risks or issues, and take prompt actions to
maintain the network's integrity and performance.
3.4. Monitor software and files
To monitor software and files using a network, you can employ various network monitoring
techniques and tools. Here are some steps to monitor software and files using a network:
1. Choose network-monitoring tools: Select network monitoring software or tools that offer
features for monitoring software and file activities. Look for tools that provide real-time
monitoring, alerting, and reporting capabilities specific to software and file monitoring.
2. Install monitoring agents or software: Install monitoring agents or software on the
systems or servers where the software and files are located. These agents will collect data
and send it to the central monitoring system for analysis.
3. Set up file integrity monitoring: Implement file integrity monitoring (FIM) to detect
unauthorized changes to files. FIM tools can monitor file attributes, checksums, or digital
signatures to ensure the integrity and security of critical files. Any unauthorized
modifications can trigger an alert.
4. Monitor network traffic: Utilize network-monitoring tools to capture and analyze
network traffic that is related to software and file activities. This can help identify any
unusual or unauthorized network connections, file transfers, or software downloads.
5. Enable logging and auditing: Enable logging and auditing features on servers and
systems hosting the software and files. Configure the logging settings to capture relevant
information about software installations, file accesses, modifications, and user activities.
Regularly review the logs for any suspicious or unauthorized activities.
6. Configure alerts and notifications: Set up alerts and notifications within the network
monitoring tools to inform you of any abnormal software or file-related activities.
Configure the alerts to be sent via email, SMS, or other communication channels, ensuring
that the right individuals or teams are notified promptly.
7. Perform regular analysis and reporting: Regularly analyze the collected data, generate
reports on software, and file activities. Look for patterns, trends, or anomalies that may

Page xlviii of lxxvi Ministry of Labor and Providing network systems Version -1
Skills
administration level - IV December , 2023
Author/Copyright
indicate security risks, compliance violations, or performance issues. Share these reports
with relevant stakeholders for visibility and informed decision-making.
8. Maintain patch management and vulnerability scanning: Regularly apply software
patches and updates to address known vulnerabilities. Conduct vulnerability scans to
identify any weaknesses in software or files that could be exploited by attackers. Monitor
the results of patching and vulnerability scanning activities to ensure compliance and
mitigate risks.
9. Continuously review and refine monitoring strategies: Review your monitoring
strategies and tools periodically to ensure they remain effective and aligned with your
organization's evolving needs. Stay informed about emerging threats, new monitoring
technologies, and best practices in software and file monitoring to enhance your monitoring
capabilities.
3.5. Monitor performance indicators
Monitoring the performance indicators of a network is essential to ensure its optimal
functionality. To monitor network performance, start by identifying relevant performance
indicators such as bandwidth utilization, latency, packet loss, network throughput, and response
times. Next, select network monitoring tools that can collect and analyze data on these
indicators. Deploy monitoring agents or sensors on critical network devices and configure real-
time monitoring to continuously track performance metrics. Set up performance thresholds and
alerts to receive notifications when indicators exceed or fall below acceptable levels. Analyze
historical data to identify trends and patterns, and periodically conduct performance assessments.
Utilize network traffic analysis tools to examine traffic patterns and generate performance
reports to gain insights into the network's health. Continuously review and optimize your
monitoring strategy to align with evolving network requirements and industry best practices.
Monitoring network performance involves selecting relevant performance indicators, deploying
monitoring tools and agents, configuring real-time monitoring, setting up thresholds and alerts,
analyzing historical data, conducting periodic assessments, utilizing network traffic analysis, and
generating performance reports. By following these steps, you can proactively identify and
address performance issues, optimize network resources, and ensure a reliable and efficient
network infrastructure. Regularly reviewing and optimizing your monitoring strategy is crucial to
stay aligned with changing network requirements and technological advancements.

Page xlix of lxxvi Ministry of Labor and Providing network systems Version -1
Skills
administration level - IV December , 2023
Author/Copyright
3.6. Improve network and systems
Improving network and systems involves implementing strategies to enhance performance,
A step to enhance your network performance can enhance your overall productivity and business
continuity.
1. Reconfigure Your Network
Your network configuration can affect
performance. For instance, if you install an
update and it doesn't configure your devices,
this can have a large impact on your
performance. A good example is the
personal area network devices that should
not be more than 10 meters apart.
Devices with short-range connectivity
should be close to each other to prevent
network delays between the hardware components.
Reconfiguring your hardware components will help the devices communicate with each other
effectively.
2. Check for System Defects And Viruses
Viruses and system defects can break down a network infrastructure and degrade the network
performance. Some malwares can also control programs and applications in your network. A
flaw in the components or system can cause a network to behave unexpectedly.
Cable defects such as core rapture are a good example of issues that can cause failure in the
conduction of electricity, interfering with communication in a network. Checking for malware
and fixing system defects can address the situation and restore optimal performance.
3. Upgrade and Update Firmware and Software
Often, businesses cannot keep up with the pace of technology and balance with the software they
run. You may end up having software running on outdated technology in your network. You can
also have old machines with new programs.
Usually, there is no guarantee that programs and the existing technology are fully compatible,
which can negatively impact the network performance. Outdated software and programs also
have bugs that can break down your infrastructure.

Page l of lxxvi Ministry of Labor and Providing network systems Version -1


Skills
administration level - IV December , 2023
Author/Copyright
4. Use Virtual Local Area Networks (VLANs)
VLANs reduce broadcast traffic, ease administration and
confine broadcast domains. You can use the technology
to segment your network resources such that critical areas
are given the highest priority. With VLANs, you can
separate or partition the network without rewiring the
entire office.
VLANs also play a vital role in enhancing security.
Splitting network components and prioritizing tasks in
the network can create room for performance optimization.
5. Provide a Guest Network
Having multiple users on a network increases traffic, which affects network performance. An
enterprise network accommodating hundreds of guest users is bound to experience slowdowns.
Guests can demand bandwidth that your business would otherwise be using on other important
tasks.
6. User Education
Educating your team on user behavior can enhance network performance. Often, employees use
their free time on their computers. They could choose to stream a show or play video games,
unaware of the impact of the activities on the network resources.
In this case, employees should be educated on how the downtime activities of their computers
affect network performance. They are likely to settle for other activities that don't strain the
resources with this knowledge.
Educating your employees on best practices for spending time on their computers, running
processes, and utilizing network resources can help improve performance.
7. Network Monitoring:- Monitoring your network for traffic jams and bottlenecks can help
you diagnose problems, solve them in good time, and
prevent advancing network issues. For instance, if the
network admin identifies backups as the reason behind

Page li of lxxvi Ministry of Labor and Providing network systems Version -1


Skills
administration level - IV December , 2023
Author/Copyright
substandard network performance, they can schedule them for a time when the personnel are not
utilizing most of the network resources.
Regular network monitoring can help you spot the bottlenecks, address them, and enhance
network performance.

Figure 1. 8 Network Monitoring

Self-check - 3
Part I:- Say True if the given statement is correct else say False
_______1. Performing diagnostic tests involves analyzing and responding to information.
_______2. Monitoring software and files is not a part of the diagnostic testing process.
_______3. Diagnostic testing does not involve monitoring performance indicators.

Part II: - Select the appropriate answer from the given alternative
_______1. What is the purpose of analyzing and responding to information in network
administration?

Page lii of lxxvi Ministry of Labor and Providing network systems Version -1
Skills
administration level - IV December , 2023
Author/Copyright
A. Improving network aesthetics C. Identifying performance bottlenecks
B. Monitoring software license usage D. Ensuring physical security measures
_______2. which of the following is a common performance indicator monitored in
network administration.
A. Keyboard typing speed C. File compression ratio
B. Server room temperature D. Network bandwidth utilization
_______3. How does improving network and systems contribute to network
administration?
A. Increasing software licensing costs
B. Enhancing data backup and recovery
C. Monitoring physical server dimensions
D. Optimizing network configurations
_______4. How does improving network and systems contribute to network
administration?
A. Monitoring office supply inventory
B. Increasing software licensing compliance
C. Enhancing network security measures
D. Optimizing printer paper tray configurations
Part III: - Give short answer
1. List and explain ways of analyze and respond to information in a network?
2. Demonstrate the way of improve network and systems?
3. Demonstrate the technic of monitor software and files using a network?

Operation sheet 3.1.


Operation title: - Diagnostic network performance
Purpose: - To recover network problem and test performance.
Instruction: Use the figure below, given equipment and task. You have given 45 Minute for the
task and you are expected to complete tasks.
Tools and requirement:-Compute
Procedures:-
Step 1:- Press Windows + I to open Settings

Page liii of lxxvi Ministry of Labor and Providing network systems Version -1
Skills
administration level - IV December , 2023
Author/Copyright
Step 2:- Click on Network and Internet

Step 3:- Under the left-hand panel, option Status navigate to Network Troubleshooter and click
it

Page liv of lxxvi Ministry of Labor and Providing network systems Version -1
Skills
administration level - IV December , 2023
Author/Copyright
Step 4:- Then the tool will start to run a network check to find what can be possibly wrong with
the connectivity
I will show you how it will work. Let’s say I am not connected to my preferred network. Then
upon running a network check using the Network Troubleshooter, I will get the following result.

Page lv of lxxvi Ministry of Labor and Providing network systems Version -1


Skills
administration level - IV December , 2023
Author/Copyright
Operation sheet 3.2.
Operation title: - Speed up Internet connection on Windows 10
Purpose: - To increase download and upload speed of internet connection.
Instruction: Use the figure below, given equipment and task. You have given 45 Minute for the
task and you are expected to complete tasks.
Tools and requirement:-Compute, Internet, Internet cable, NW driver
Procedures:-
To speed up Windows 10 internet, you can make some small changes on Windows 10 to
quickly resolve these culprits for slow internet speed and enjoy faster internet in five ways.
Way 1. Change Bandwidth Limit to Speed up Internet on Windows 10
Step 1. Open the Settings on your Windows 10.
Step 2. Click Update & Security Advanced options in turn.

Page lvi of lxxvi Ministry of Labor and Providing network systems Version -1
Skills
administration level - IV December , 2023
Author/Copyright
Step 3. In the Advanced options window, scroll down to find Delivery Optimization and click it.
Step 4. Choose advanced options again at the bottom.
Step 5. After that, you will see an adjuster for both Download settings and Upload settings. Here,
you can reset the amount of bandwidth that Windows can use for your core tasks.

Page lvii of lxxvi Ministry of Labor and Providing network systems Version -1
Skills
administration level - IV December , 2023
Author/Copyright
Way 2. Get the Best VPN to Speed up Internet on Windows 10
Step 1. Download this free VPN on your Windows and launch it.

Step 2. Click All Servers in the left navigator. You will see a long list of all available servers in
multiple countries, like USA, Mexico, Canada, United Kingdom, etc.

Step 3. To speed up internet on Windows 10, select a server (USA, for instance) and click
Connect. Then you can enjoy faster speeds with the USA server in no time.

Page lviii of lxxvi Ministry of Labor and Providing network systems Version -1
Skills
administration level - IV December , 2023
Author/Copyright
Way 3. Reset DNS Settings to Speed up Internet on Windows 10

Step 1. Search view network connections in search box of Windows 10 and enter it.
Step 2. Then right click on your network adapter and select Properties at the bottom.
Step 3. Now, select Internet Protocol Version 4 from the list under Networking and click on the
Properties tab.

Page lix of lxxvi Ministry of Labor and Providing network systems Version -1
Skills
administration level - IV December , 2023
Author/Copyright
Step 4. Now, select Use the following DNS server addresses and type to enter Google DNS as
follows: 8.8.8.8
8.8.4.4

Step 5. Lastly, click on Apply and select OK.


Way 4. Change Adapter Settings to Speed up Internet on Windows 10
Step 1. Press Windows + I key together to open Settings on Windows 10.
Step 2. Now, select Update & Security and click Windows Update from the left menu.
Step 3. Then click on Advanced options from the right side.
Step 4. Turn off Download updates over metered connections (extra charges may apply).

Page lx of lxxvi Ministry of Labor and Providing network systems Version -1


Skills
administration level - IV December , 2023
Author/Copyright
Way 5. Turn off Background Apps to Speed up Internet on Windows 10
Step 1. Open Settings panel as mentioned in the foregoing part.
Step 2. Then click on Privacy.

Step 3. Now, choose background apps from the left menu.


Step 4. Lastly, switch the button under Background apps to off.

Page lxi of lxxvi Ministry of Labor and Providing network systems Version -1
Skills
administration level - IV December , 2023
Author/Copyright
Way 6. Clear Temp and Cached Files to Speed up Internet on Windows 10
Step 1. Search Disk Cleanup in your Windows 10
search box.
Step 2. Next, click on Disk Cleanup.
Step 3. Select C Drive in the pop-up box.
Step 4. Then, select all files from the files list and
click OK to delete all useless files on your PC at
present.

Step 5. Continue to click on Clean up system files.


Step 6. Also, do remember to clear your recycle
bin.

Page lxii of lxxvi Ministry of Labor and Providing network systems Version -1
Skills
administration level - IV December , 2023
Author/Copyright
LAP Test
Task 1:- Diagnostic and test network performance
Task 2:- Test download and upload speed of your computer Internet

Page lxiii of lxxvi Ministry of Labor and Providing network systems Version -1
Skills
administration level - IV December , 2023
Author/Copyright
Unit Four : Migrate to New Technology
This unit is developed to provide you the necessary information regarding the following content
coverage and topics:
 Developing new skills.
 Upgraded technology skills
 Identifying upgraded equipment.
 Sources of information for new or upgraded equipment
 Using new or upgraded equipment
This unit will also assist you to attain the learning outcomes stated in the cover page. Specifically,
upon completion of this learning guide, you will be able to:
 Develop new skills.
 Upgraded technology skills
 Identify upgraded equipment.
 Understand Sources of information for new or upgraded equipment
 Use new or upgraded equipment

Page lxiv of lxxvi Ministry of Labor and Providing network systems Version -1
Skills
administration level - IV December , 2023
Author/Copyright
4.1. Basic concept of Migrating to new technology
Migrating to new technology involves the strategic transition from existing technological
systems to advanced solutions. This process entails a comprehensive assessment of current
infrastructure, careful planning, and seamless execution to optimize efficiency and stay
competitive. Successful migration requires evaluating compatibility, scalability, and security
aspects, along with effective change management to mitigate disruptions. Post-migration,
ongoing support and monitoring are essential to ensure the smooth integration of new
technology, enhancing operational capabilities and positioning the organization for sustained
growth in a dynamic technological landscape.
4.2. Develop new skills.
Developing new skills in new technology requires a systematic approach and a commitment to
continuous learning. Here are steps to help you develop new skills in emerging technologies:
1. Identify the technology: Start by identifying the specific technology or field you want to
develop skills in. Research and understand its fundamentals, applications, and potential
impact in your industry or area of interest.
2. Set clear goals: Define your learning goals and objectives. Determine what specific skills,
knowledge, or certifications you want to acquire in the new technology.
3. Assess existing skills: Evaluate your existing skills and knowledge related to the
technology. Identify any foundational knowledge or transferable skills that can serve as a
starting point for your learning journey.
4. Select learning resources: Identify high-quality learning resources that suit your preferred
learning style. These resources may include online courses, tutorials, books, video lectures,
forums, or workshops.
5. Create a learning plan: Develop a learning plan that outlines the topics, concepts, and
skills you need to cover. Break down the learning process into manageable chunks and set
a schedule or timeline for your learning activities.
6. Embrace continuous learning: Technology evolves rapidly, so commit to continuous
learning. Stay curious, explore new developments, and keep up with industry news and
updates. Dedicate time regularly to learn and stay updated on advancements in the
technology you're focusing on.

Page lxv of lxxvi Ministry of Labor and Providing network systems Version -1
Skills
administration level - IV December , 2023
Author/Copyright
4.3. Upgraded technology skills
Upgrading technology skills is an ongoing process that requires dedication, perseverance, and a
commitment to lifelong learning. Embrace new challenges, be proactive in seeking opportunities,
and apply your upgraded skills in practical settings to maximize their impact.
To upgrade your technology skills, you can follow these one:
 Identify Areas for Improvement:
 Set Clear Goals
 Create a Learning Plan:
 Engage in Practical Projects:
 Stay Updated and Practice Continuously
 Seek Feedback and Networking
4.4. Identify upgraded equipment.
Upgraded equipment refers to the improved or advanced versions of technological devices or
tools used in various domains. It involves the enhancement of hardware components, software
capabilities, performance, features, or functionalities of a specific piece of equipment. Upgrades
can include improvements in processing power, memory capacity, storage capacity, connectivity
options, display quality, battery life, security features, or any other aspect that enhances the
overall performance or user experience of the equipment. Upgraded equipment often
incorporates the latest technological advancements and innovations to deliver superior
performance, increased efficiency, and enhanced capabilities compared to previous versions or
older models.
1. Computers:
 High-performance desktop computers
with advanced processors, increased
RAM, and faster storage options like
solid-state drives (SSDs).
 Laptops with improved battery life, higher
screen resolutions, and enhanced graphics
capabilities.
 Workstations designed for intensive tasks
such as video editing, 3D rendering, or
figure 1. 9 upgraded computer

Page lxvi of lxxvi Ministry of Labor and Providing network systems Version -1
Skills
administration level - IV December , 2023
Author/Copyright
scientific simulations, featuring powerful processors, ample RAM, and dedicated
graphics cards.

2. Smartphones:
 Flagship smartphones with faster processors, larger RAM capacity, and improved
camera technologies.
 Devices with 5G connectivity for faster internet speeds and lower latency.
 Smartphones equipped with advanced biometric authentication methods like facial
recognition or under-display fingerprint sensors.

Figure 4. 1 upgraded smartphone

3. Networking:
 Upgraded routers with the latest Wi-Fi standards (such as Wi-Fi 6 or Wi-Fi 6E)
offering faster speeds and better network performance.
 Network switches with higher port densities, increased bandwidth, and support for
advanced features like Power over Ethernet (PoE) or Quality of Service (QoS).
 Firewall appliances with enhanced security capabilities, such as intrusion prevention
systems (IPS), deep packet inspection (DPI), or advanced threat protection (ATP).

Page lxvii of lxxvi Ministry of Labor and Providing network systems Version -1
Skills
administration level - IV December , 2023
Author/Copyright
Figure 4. 2 History of network

4. Cameras and Photography:


 Digital cameras with higher megapixel counts, improved low-light performance, and
advanced autofocus systems.
 Mirrorless cameras with faster burst shooting rates, improved image stabilization, and
high-resolution electronic viewfinders.
 Drones equipped with high-resolution cameras, obstacle avoidance sensors, and
intelligent flight modes for aerial photography and videography.

Figure 4. 3 History of camera

5. Virtual Reality (VR) and Augmented Reality (AR):


 VR headsets with higher display resolutions, wider field of view, and improved
tracking accuracy.
 AR glasses with lightweight designs, better transparent display technology, and
enhanced gesture recognition.

Page lxviii of lxxvi Ministry of Labor and Providing network systems Version -1
Skills
administration level - IV December , 2023
Author/Copyright
 Controllers and haptic devices that provide more precise and immersive interactions
within virtual environments.

Figure 4. 4 Virtual Reality (VR) and Augmented Reality (AR)

4.5. Understand Sources of information for new or upgraded equipment


1. Manufacturer Websites: The official websites of equipment manufacturers provide
comprehensive and accurate information about their products. These websites often
include detailed specifications, features, pricing, and availability of the latest models or
upgrades.
2. Technology News Websites: Websites that specialize in technology news and reviews,
such as CNET, Engadget, The Verge, PCMag, and Gizmodo, offer up-to-date coverage
on new and upgraded equipment. They provide in-depth articles, reviews, comparisons,
and expert insights into the latest technology trends and advancements.
3. Industry-specific Publications: Industry publications and magazines dedicated to
specific fields or sectors often feature articles and reviews about new or upgraded
equipment. Examples include Wired, Popular Science, IEEE Spectrum, or Automotive
News, depending on your area of interest.
4. Online Forums and Communities: Online forums and communities focused on specific
equipment or technology domains are valuable sources of information. Platforms like
Reddit, specialized forums, or dedicated Facebook groups allow users to discuss, share
experiences, and ask questions about new or upgraded equipment.
5. Professional Networks and Colleagues: Networking with professionals in your industry
or field can provide valuable insights into new or upgraded equipment. Engaging with
colleagues, attending industry events, or joining professional organizations can help you

Page lxix of lxxvi Ministry of Labor and Providing network systems Version -1
Skills
administration level - IV December , 2023
Author/Copyright
tap into their expertise and firsthand experiences with the equipment you are interested
in.
4.6. Use new or upgraded equipment
When organizations want to make a significant change to their business systems, new technology
or new equipment is generally part of the change. Using new or upgraded equipment typically
involves several steps to ensure a smooth and efficient transition. Here is a general guide:
1. Read the Manual:- Start by thoroughly reading the user manual or any accompanying
documentation that comes with the equipment. This will provide you with a detailed
understanding of its features, functionalities, and proper usage.

Figure 4. 5 User manual of printer

Page lxx of lxxvi Ministry of Labor and Providing network systems Version -1
Skills
administration level - IV December , 2023
Author/Copyright
2. Familiarize Yourself: Take some time to get familiar with the equipment. Explore its
buttons, controls, and settings. Understand how to power it on/off, adjust settings, and
navigate through different menus or options.
3. Practice Hands-On: Engage in hands-on practice with the equipment. Start with simple
tasks or basic functions to gain confidence and gradually progress to more complex
operations. Experiment with different settings and features to understand their impact and
functionality.
4. Seek Training or Tutorials: If available, attend training sessions or workshops related to the
equipment. Alternatively, search for online tutorials, video guides, or forums where you can
learn from others' experiences and expertise.
5. Troubleshooting and Maintenance: Familiarize yourself with common troubleshooting
techniques specific to the equipment. Learn how to identify and resolve common issues that
may arise during usage.

Figure 4. 6 Troubleshooting and Maintenance

Page lxxi of lxxvi Ministry of Labor and Providing network systems Version -1
Skills
administration level - IV December , 2023
Author/Copyright
Self-check - 4
Part I: - Say True if the given statement is correct else say False
_______1. Upgrading technology skills involves identifying upgraded equipment.
_______2. Understanding sources of information for new or upgraded equipment is
necessary when upgrading technology skills.
_______3. Using new or upgraded equipment is not important in the process of upgrading
technology skills.
Part II: - Select the appropriate answer from the given alternative
1. Which of the following is a benefit of identifying upgraded equipment when upgrading
technology skills?

A. It improves physical fitness C. It boosts creativity in art and design


B. It enhances problem-solving abilities D. It promotes healthy eating habits

2. How does using new or upgraded equipment contribute to upgrading technology skills?
A. It improves social interaction skills
B. It enhances critical thinking abilities
C. It promotes physical well-being
D. It develops musical talent
3. Which of the following is an example of upgraded equipment in the context of upgrading
technology skills?

A. Pencil and paper C. Smartphone


B. Typewriter D. Abacus

4. Which of the following is a direct outcome of upgrading technology skills?

A. Building a sandcastle C. Writing poetry


B. Solving complex technological D. Playing sports
problems

Page lxxii of lxxvi Ministry of Labor and Providing network systems Version -1
Skills
administration level - IV December , 2023
Author/Copyright
Part III: - Give short answer
1. List and explain Sources of information for new or upgraded equipment?
2. Demonstrate the way of develop new skills in emerging technologies?
3. List and explain upgraded equipment in ICT?

Page lxxiii of lxxvi Ministry of Labor and Providing network systems Version -1
Skills
administration level - IV December , 2023
Author/Copyright
Reference Books
1. The Practice of System and Network Administration
2. Network Security Essentials: Applications and Standards" by William Stallings
3. Network Programmability and Automation: Skills for the Next-Generation Network
Engineer" by Jason Edelman, Scott S. Lowe, and Matt Oswalt
4. Network Management: Principles and Practice" by Mani Subramanian:
5. Network Analysis, Architecture, and Design" by James D. McCabe
6.
7. List of website
8.
1. https://www.windowscentral.com/how-make-full-backup-windows-10#section-how-to-
restore-a-backup-with-system-image-tool-on-windows-10
2. https://www.comparitech.com/net-admin/network-troubleshooting-tools/
3. https://www.itechguides.com/how-to-get-administrator-privileges-on-windows-10/
4. Make an administrator account to a standard user on Windows 10/11 (softwareok.com)
5. https://www.devicemag.com/network-testing-tool/
6. https://www.itopvpn.com/blog/speed-up-internet-on-windows-10-3123
9.
10.
11.
12.
13.
14.
15.
16.
17.
18.
19.
20.

Page 74 of 76 Ministry of Labor and Providing network systems Version -1


Skills
administration level - IV December , 2023
Author/Copyright

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy