M04 - Providing Network Systems Administration
M04 - Providing Network Systems Administration
SERVICE LEVEL- IV
Based on November, 2023Version-II
November 2023
Addis Ababa, Ethiopia
NTVET College HNS Level IV: Provide Network System Administration. By Jamara B
Acronym
5G:- Fifth-Generation
ACLs:- Access Control Lists
ATP:- Advanced Threat Protection
DPI:- Deep Packet Inspection
DRP:- Disaster Recovery Plan
IEEE:- Institute Of Electrical And Electronics Engineers
PoE :- Power Over Ethernet
QoS:- Quality Of Service
SLA:- Service Level Agreement
SNMP:- Simple Network Management Protocol
SQL:- Standard Query Language
SSDs:- Solid-State Drives
VLANs:- Virtual Local Area Networks
Wi-Fi:- Wireless Fidelity
WSUS:- Windows Server Update Services
Introduction to module
This module defines the competence required to design and implement an infrastructure for
internet services. Network systems administration refers to the management and maintenance of
computer networks within an organization. It involves the configuration, monitoring, and
troubleshooting of network infrastructure to ensure its optimal performance, security, and
availability.
Disaster recovery for a network involves implementing strategies and procedures to restore
network functionality and data in the event of a major disruption or catastrophic event.
NTVET College HNS Level IV: Provide Network System Administration. By Jamara B
This module is designed to meet the industry requirement under the Hardware and Networking
Service occupational standard, particularly for the unit of competency: Providing Network
System Administration This module covers the units:
Client access and security
Disseminate disaster recovery plan
Monitor network performance
Migrate to New Technology
This guide will also assist you to attain the learning outcome stated in the cover page.
Specifically, upon completion of this learning guide, you will be able to:
Understand network system administration
Explain accounts and files privilege
Determine access privileges
Maintain System integrity and security
Understand concepts of disaster recovery plan
Understand Backup and restore
Analyze and respond information
Monitor software and files
Monitoring performance indicators
Upgrade technology skills
Identify upgraded equipment.
Use new or upgrade equipment
NTVET College HNS Level IV: Provide Network System Administration. By Jamara B
Network administration primarily consists of, but is not limited to, network monitoring, network management,
and maintaining network quality and security.
Network monitoring is essential to monitor unusual traffic patterns, the health of the network infrastructure, and
devices connected to the network. It helps detect abnormal activity, network issues, or excessive bandwidth
consumption early on and take preventative and remedial actions to uphold the network quality and security.
Network management encompasses multiple administrative functions, including network planning,
implementation, and configuration. It involves:
Re-planning the network based on changing organizational requirements
Implementing the network for maximum efficiency
Configuring various networking and security protocols
Applying security patches and updating the firmware of the networking infrastructure, such as routers,
hubs, switches, and firewalls
Assessing the network for weaknesses
Evaluating quality and capacity to increase or decrease network capacity and manage resource wastage
Network security employs various techniques to ensure a network is secure. For example, it uses multiple tools
such as firewalls, intrusion detection or prevention systems, and anti-malware software to prevent or detect
malicious activity in the network.
Network administration goals
Network administration aims to ensure a reliable, secure network conducive to business operations. Generally,
network administration goals include:
Maintain a resilient, high-quality network
Plan and improve network capacity to enable seamless network access and operations
Leverage networking tools for network systems administration and better network administration control
Track and document relevant changes
Evaluate possible risks and orchestrate effective mitigations
Prevent activities compromising or using the network as an attack vector
Identify and mitigate intrusions to avoid security breaches
1.1.1 Network administration key areas
Networks administration consists of five key areas:
1. Fault management: - Monitors the network infrastructure to identify and address issues potentially affecting
the network. It uses standard protocols such as Simple Network Management Protocol (SNMP) to monitor
network infrastructure.
2. Configuration management: - Tracks configuration and related changes of network components, including
switches, firewalls, hubs, and routers. As unplanned changes can affect the network drastically and potentially
cause downtime, it is essential to streamline, track, and manage configuration changes.
3. Account management: - Tracks network utilization to bill and estimate the usage of various departments of
an organization. In smaller organizations, billing may be irrelevant. However, monitoring utilization helps spot
specific trends and inefficiencies.
4. Performance management: - Focuses on maintaining service levels needed for efficient operations. It
collects various metrics and analytical data to continually assess network performance, including response
times, packet loss, and link utilization.
NTVET College HNS Level IV: Provide Network System Administration. By Jamara B
5. Security management:- Aims to ensure only authorized activity and authenticated devices and users can
access the network. It employs several disciplines such as threat management, intrusion detection, and firewall
management. It also collects and analyzes relevant network information to detect and block malicious or
suspicious activity.
NTVET College HNS Level IV: Provide Network System Administration. By Jamara B
Ensures the network is secure by blocking suspicious activity and mitigating the risk of security
breaches
Implements security programs based on hardware and
software
Manages on-site networking servers responsible for
business operations
Ensures network integrity and resilience to maintain
service levels
Tests the network to uncover weaknesses and mitigate
them
Monitors and tracks utilization
Applies utilization, authentication, and authorization
policies to maintain the quality and security of the network
NTVET College HNS Level IV: Provide Network System Administration. By Jamara B
Access privileges can be viewed and modified in the Operations Server console. The following primary roles
can be subdivided into additional categories if necessary to match your organization:
System Administrator: Responsible for configuring and maintaining the Operations Center environment,
including:
Defining adapter connections to key components such as databases and remote management systems
Defining service model hierarchies, automations, and operations,
Defining custom classes, behavior models, and property pages
Defining calendars, schedules, and jobs
Creating custom SQL Views
Creating Layout views
Determining which users should have access to specific element hierarchies
Security Manager: Responsible for enforcing company security policies regarding user access to the
system, user identification and authorization, password rules, access privileges, and so on. Also responsible
for managing users and groups and enforcing password policies and rules.
End Users: Responsible for analyzing and reporting information collected in Operations Center from
various sources. You should organize users who have similar authorization to access data into groups, such
as by job function or security clearance level.
Table 1. 1 Access Control Privileges
The admins group has Define privileges explicitly defined. The users group has
undefined Define privileges. Therefore, a member of both groups has Define privileges.
NTVET College HNS Level IV: Provide Network System Administration. By Jamara B
Figure 1. 5 Determining access privileges
NTVET College HNS Level IV: Provide Network System Administration. By Jamara B
System Security: System security is a critical aspect of system integrity. It involves protecting the system
against unauthorized access, data breaches, malware, and other security threats. This includes implementing
access controls, strong authentication mechanisms, encryption, intrusion detection and prevention systems, and
ongoing monitoring and auditing of system activities.
Maintaining system integrity is essential to ensure the reliability, availability, and confidentiality of
information, as well as the proper functioning of computer systems and
networks. It requires a combination of technical controls, security
measures, and proactive monitoring to prevent unauthorized changes,
detect potential vulnerabilities, and respond promptly to security
incidents.
NTVET College HNS Level IV: Provide Network System Administration. By Jamara B
Self-check - 1
Part I:- Say True if the given statement is correct else say False
_______1. When determining access privileges in a network system, factors such as user's physical location and
job title should be considered.
_______2. Granting all users the highest level of access possible is a recommended approach for determining
access privileges.
_______3. Storing sensitive data in plain text files is a secure practice for maintaining system integrity and
security.
Part II: - Select the appropriate answer from the given alternative
_______1. When referring to accounts and files privilege in network system administration, what does the term
"privilege escalation" mean?
A. Granting additional permissions to a user
B. Revoking all access privileges from a user
C. Assigning a new username to a user
D. Changing the file ownership to a different user
_______2. In the context of determining access privileges, what is the principle of "least privilege"?
A. Granting users the highest level of access possible
B. Assigning access privileges based on job titles
C. Limiting user access to only the resources necessary for their tasks
D. Providing all users with equal access privileges
_______3. Which of the following is an example of a multifactor authentication method for determining access
privileges?
A. Using a username and password combination
B. Requiring a fingerprint scan and a password
C. Granting access based solely on IP address
D. Sharing a single password among multiple users
_______4. What is the purpose of implementing intrusion detection systems (IDS) in network system
administration?
A. To prevent unauthorized access to the system
B. To monitor network traffic and detect potential security breaches
C. To encrypt sensitive data during transmission
D. To manage user accounts and access privileges
_______5. Which of the following is an example of a security measure for maintaining system integrity and
security?
A. Regularly updating antivirus software
B. Sharing passwords with coworkers for convenience
C. Allowing unrestricted remote access to the system
D. Storing sensitive data in plain text files
Part II: - Give short answer
1. What are the responsibilities of system administrator?
2. Demonstrate the difference between system security and system integrity with example?
3. List and explain Network administration key areas?
NTVET College HNS Level IV: Provide Network System Administration. By Jamara B
Operation sheet 1.1
Operation title: - Accounts and files privilege
Purpose:- Protect and give privilege for user account and computer files
Instruction: Use the figure below, given equipment and task. You have given 45 Minute for the task and you
are expected to complete tasks.
Tools and requirement:,- Computes
Task 1:- Give full access privilege for user
Step 1:- Open File Explorer.
Step 2:- Browse and find the file or folder you want to
have full access.
Step3:- Right-click it, and select Properties.
Step 4:- Click the Security tab to access the NTFS
permissions.
Step 5:- Click the Advanced button.
NTVET College HNS Level IV: Provide Network System Administration. By Jamara B
Step 13:- Click OK again.
Step 14:- Click OK one more time to complete this task.
NTVET College HNS Level IV: Provide Network System Administration. By Jamara B
Step 10:-On "Permission Entry", check the Full control option.
Step 11:-Click OK
LAP Test
Task 1. Create one administrator account and standard account in one computer
Task 2. On the above administrator account on local desk C:/ create one folder called user privilege
Task 3. Give full access privilege for the above created standard account
NTVET College HNS Level IV: Provide Network System Administration. By Jamara B
1.5. 2.1. Basic concepts of disaster recovery plan
A Disaster Recovery Plan (DRP) is a structured approach to responding to and recovering from events that can
cause data loss, system downtime, and other disruptions to normal business operations. Modern organizations
have to operate on a 24/7 basis in order to stay competitive in the market. It is important to create a disaster
recovery (DR) plan so as to ensure that your business can continue to operate even during a DR event.
However, when designing a DR plan, many businesses overlook the importance of network disaster recovery.
In this blog post, we will discuss what network disaster recovery planning entails and how to securely protect
your organization against network failures.
A network disaster recovery plan includes a set of procedures required to effectively respond to a disaster that
affects a network and causes its disruption. Network disaster recovery planning generally entails:
Listing the steps which should be undertaken in order to restore network connectivity
Identifying people responsible for conducting network disaster recovery
Assessing possible consequences of a network failure
Determining the best strategies to mitigate them
The main purpose of network disaster recovery is to ensure that business services can be delivered to customers
despite a disruption in network connectivity. However, disasters come in different forms and sizes, which
makes it hard to predict what their impact would be, which network components would be affected, and how
many resources would be required to restore network connectivity.
NTVET College HNS Level IV: Provide Network System Administration. By Jamara B
1.6. 2.2. Backup and restore
2.2.1. Backup for disaster recovery
Backup is a crucial element of disaster recovery, providing a means to safeguard critical data, applications, and
systems in case of unforeseen events. It involves creating duplicate copies of essential information and storing
them on separate devices or off-site locations. These backups are performed regularly to capture the most up-to-
date data and ensure its availability for recovery purposes.
In the event of a disaster or data loss, such as hardware failures, natural disasters, cyberattacks, or accidental
deletions, the backups serve as a reliable source for restoring the affected systems. By having comprehensive
backups, organizations can minimize downtime and mitigate the potential loss of data, enabling them to recover
quickly and resume normal operations. Backup strategies often include different levels of redundancy,
encryption, and verification processes to ensure the integrity and security of the stored information.
There are several types of backups that can be employed, each offering different levels of data protection and
recovery options. Some common types of backups include:
1. Full Backup: A full backup involves creating a complete copy of all data and files in a system or
storage device. It captures all data, regardless of whether it has changed since the last backup. Full
backups are comprehensive but can be time-consuming and require significant storage space.
2. Incremental Backup: Incremental backups only capture and store changes made since the last backup,
whether it was a full or incremental backup. This approach is more efficient in terms of time and storage
space, as it only backs up the modified or new data. However, recovery from incremental backups may
require multiple backup sets to be restored.
3. Differential Backup: Differential backups capture all changes made since the last full backup. Unlike
incremental backups, which only include changes since the last backup (whether full or incremental),
differential backups include changes since the last full backup. This results in faster recovery compared
to incremental backups, as only the last full backup and the differential backup need to be restored.
NTVET College HNS Level IV: Provide Network System Administration. By Jamara B
Figure 2. 4 Differential Backup
4. Mirror Backup: A mirror backup creates an exact replica of the source data or system. It involves
copying all files and directories to a separate storage device or location. Mirror
backups provide a straightforward recovery process, as the backup is a direct copy of
the original data. However, they can consume significant storage space and may not
offer versioning or point-in-time recovery capabilities.
5.
6. Snapshot Backup: Snapshot backups capture the state of a system or data at a specific point in time.
Instead of copying all data, snapshot backups store the differences or changes made
since the previous snapshot. This allows for fast and efficient backups and provides
the ability to restore data to specific points in time.
7. Cloud Backup: Cloud backup involves storing data backups in off-site cloud
storage. It offers the advantage of scalability, accessibility from anywhere with an internet connection,
and built-in redundancy provided by the cloud service provider. Cloud
backups can be performed using various backup methods, such as
full, incremental, or snapshot backups.
The choice of backup type depends on factors such as the data volume,
frequency of changes, recovery requirements, available storage resources, and budgetary considerations. A
combination of backup types can be employed to create a comprehensive backup strategy that meets specific
needs for data protection and recovery.
2.2.2. Restore for disaster recovery
In the context of disaster recovery, the term "restore" refers to the process of recovering and returning critical
data, applications, and systems to their operational state following a disruptive event or data loss. The restore
phase is a key component of the overall disaster recovery plan and involves the following:
1. Assess the situation: Before initiating the restore process, assess the extent of the damage caused by the
disaster and determine the scope of the restoration effort. Identify the affected systems, applications, and
data that need to be restored.
2. Activate the disaster recovery plan: Refer to the documented disaster recovery plan, which should
outline the procedures and guidelines for restoring various components of the IT infrastructure. Follow the
plan's instructions to ensure a structured and organized approach to the restore process.
3. Retrieve backups: Retrieve the backup copies of the affected data, applications, or systems from the
designated backup storage location. This may involve accessing backup tapes, disk-based backups, or
cloud-based backups depending on the backup strategy and technology in place.
4. Validate backup integrity: Verify the integrity and consistency of the backup data before proceeding with
the restore process. This step ensures that the backups are viable and can be relied upon for successful
recovery.
NTVET College HNS Level IV: Provide Network System Administration. By Jamara B
5. Restore data and applications: Start the restoration of data and applications based on the recovery
priorities defined in the disaster recovery plan. Begin with the most critical systems and work your way
down to less critical ones. Follow the appropriate procedures for each type of backup (e.g., full backups,
incremental backups) to restore the data and applications to their original or alternative locations.
6. Test and verify: After the restore process, conduct thorough testing to validate the restored data,
applications, and systems. Perform functional tests, check for data integrity, and ensure that the restored
components are working correctly.
7. Update configurations and connections: Adjust configurations and re-establish connections as necessary
to integrate the restored systems back into the production environment.
8. Document the restore process: Maintain detailed documentation of the restore process, including the
steps performed, any issues encountered, and the actions taken to resolve them.
Self-check - 2
Part I:- Say True if the given statement is correct else say False
_______1. A disaster recovery plan (DRP) only focuses on recovering data and does not address other aspects of
business operations.
_______2. Backup and restore processes are only necessary for natural disasters and do not apply to other types of
disruptions.
_______3. Having a backup solution in place guarantees instant recovery of data and systems in the event of a
disaster.
_______4. Data backup and replication are interchangeable terms, representing the same process.
Part II: - Select the appropriate answer from the given alternative
NTVET College HNS Level IV: Provide Network System Administration. By Jamara B
1. List and explain types of backups?
2. Demonstrate the main purpose of network disaster recovery in large and small organization?
3. Demonstrate disaster restore phase?
Step 5:- Click the "Create a system image" option from the left pane.
NTVET College HNS Level IV: Provide Network System Administration. By Jamara B
Step
6:- Select the "On a hard disk" option.
Step 7: -Use the "On a hard disk" drop-down menu and select the location to export the Windows 10 full
backup.
NTVET College HNS Level IV: Provide Network System Administration. By Jamara B
Step 12:- Click the No button.
Step 13:- Click the Close button.
Step 5:- On the "Windows Setup" page, click the Next button.
NTVET College HNS Level IV: Provide Network System Administration. By Jamara B
Step 6:- Click the "Repair your computer" option from the bottom-left corner of the screen.
NTVET College HNS Level IV: Provide Network System Administration. By Jamara B
Step 9:- Select the Windows 10 option as the target operating system.
Step 10:- On the "Re-image your computer" page, select the "Use the latest available system image" option.
Quick tip: You can use the "Select a system image" option if you have multiple backups and you are trying to
restore an older version of the system and files.
NTVET College HNS Level IV: Provide Network System Administration. By Jamara B
Step 14:- Click the Next button.
Step 15:- Click the Finish button.
LAP Test
Task 1:- Create a full backup of Windows 10 with the system image tool
Task 2:- Restore damage computer by using bootable Windows 10 operating system.
This unit is developed to provide you the necessary information regarding the following content
coverage and topics:
Performing diagnostic test
Analyzing and responding information
Monitoring software and files
Monitoring performance indicators
Improving network and systems
This unit will also assist you to attain the learning outcomes stated in the cover page. Specifically,
upon completion of this learning guide, you will be able to:
Perform diagnostic test
Analyze and responding information
NTVET College HNS Level IV: Provide Network System Administration. By Jamara B
Monitor software and files
Monitor performance indicators
Improve network and systems
NTVET College HNS Level IV: Provide Network System Administration. By Jamara B
Once the issues are identified, implement appropriate solutions. This could include adjusting network
configurations, upgrading hardware, optimizing settings, or addressing specific issues with network
devices.
Document and Report:
Document the results of your diagnostic tests and the actions taken to address any issues. This
documentation is valuable for future reference and can help in maintaining a proactive approach to
network management.
Continuous Monitoring:
Establish a routine for continuous monitoring of the network. Regularly perform diagnostic tests to
identify and address potential issues before they impact network performance.
1. Implement network-monitoring tools: Use network monitoring software or tools to capture and analyze
network traffic. These tools can provide real-time visibility into network activity, including bandwidth
utilization, packet loss, latency, and security events.
2. Establish baseline and thresholds: Establish a baseline of normal network behavior by monitoring
network traffic patterns over time. Set thresholds or alerts for abnormal network behavior, such as
unusually high traffic volume, network congestion, or security breaches.
3. Monitor network traffic: Continuously monitor network traffic to identify any anomalies or deviations
from the baseline. Observe patterns, trends, and irregularities that may indicate network performance
issues or security incidents.
4. Analyze network logs: Analyze log files generated by network devices, servers, and security systems.
Logs can provide valuable information about network events, errors, and security incidents. Look for any
suspicious or unusual activities that may require investigation or response.
5. Identify security threats: Use intrusion detection and prevention systems (IDS/IPS) or security
information and event management (SIEM) solutions to detect and respond to security threats. Analyze
network traffic for signs of malware infections, unauthorized access attempts, or other malicious
activities.
6. Investigate network issues: When an issue or anomaly is detected, investigate the root cause by
analyzing relevant network logs, traffic patterns, and system configurations. Identify the source of the
problem, whether it's a misconfiguration, hardware failure, software bug, or security incident.
7. Respond to network incidents: Take appropriate actions to address network incidents or issues. This
may involve implementing security measures, such as blocking malicious IP addresses or isolating
compromised devices. Troubleshoot network performance problems and apply necessary fixes or
optimizations.
8. Document and report: Keep detailed records of network incidents, actions taken, and their outcomes.
Document any changes made to network configurations or security settings. Prepare reports summarizing
network performance, security incidents, and actions taken for management and future reference.
9. Continuous improvement: Regularly review and update network monitoring and response strategies
based on lessons learned from past incidents. Stay updated with emerging threats, new technologies, and
best practices in network monitoring and security.
Analyzing and responding to information in a network requires a proactive and vigilant approach. It is crucial to
have skilled network administrators or security professionals who can effectively interpret network data,
identify potential risks or issues, and take prompt actions to maintain the network's integrity and performance.
3.4. Monitor software and files
To monitor software and files using a network, you can employ various network monitoring techniques and
tools. Here are some steps to monitor software and files using a network:
NTVET College HNS Level IV: Provide Network System Administration. By Jamara B
1. Choose network-monitoring tools: Select network monitoring software or tools that offer features for
monitoring software and file activities. Look for tools that provide real-time monitoring, alerting, and
reporting capabilities specific to software and file monitoring.
2. Install monitoring agents or software: Install monitoring agents or software on the systems or servers
where the software and files are located. These agents will collect data and send it to the central
monitoring system for analysis.
3. Set up file integrity monitoring: Implement file integrity monitoring (FIM) to detect unauthorized
changes to files. FIM tools can monitor file attributes, checksums, or digital signatures to ensure the
integrity and security of critical files. Any unauthorized modifications can trigger an alert.
4. Monitor network traffic: Utilize network-monitoring tools to capture and analyze network traffic that is
related to software and file activities. This can help identify any unusual or unauthorized network
connections, file transfers, or software downloads.
5. Enable logging and auditing: Enable logging and auditing features on servers and systems hosting the
software and files. Configure the logging settings to capture relevant information about software
installations, file accesses, modifications, and user activities. Regularly review the logs for any suspicious
or unauthorized activities.
6. Configure alerts and notifications: Set up alerts and notifications within the network monitoring tools to
inform you of any abnormal software or file-related activities. Configure the alerts to be sent via email,
SMS, or other communication channels, ensuring that the right individuals or teams are notified promptly.
7. Perform regular analysis and reporting: Regularly analyze the collected data, generate reports on
software, and file activities. Look for patterns, trends, or anomalies that may indicate security risks,
compliance violations, or performance issues. Share these reports with relevant stakeholders for visibility
and informed decision-making.
8. Maintain patch management and vulnerability scanning: Regularly apply software patches and
updates to address known vulnerabilities. Conduct vulnerability scans to identify any weaknesses in
software or files that could be exploited by attackers. Monitor the results of patching and vulnerability
scanning activities to ensure compliance and mitigate risks.
9. Continuously review and refine monitoring strategies: Review your monitoring strategies and tools
periodically to ensure they remain effective and aligned with your organization's evolving needs. Stay
informed about emerging threats, new monitoring technologies, and best practices in software and file
monitoring to enhance your monitoring capabilities.
3.5. Monitor performance indicators
Monitoring the performance indicators of a network is essential to ensure its optimal functionality. To monitor
network performance, start by identifying relevant performance indicators such as bandwidth utilization,
latency, packet loss, network throughput, and response times. Next, select network monitoring tools that can
collect and analyze data on these indicators. Deploy monitoring agents or sensors on critical network devices
and configure real-time monitoring to continuously track performance metrics. Set up performance thresholds
and alerts to receive notifications when indicators exceed or fall below acceptable levels. Analyze historical
data to identify trends and patterns, and periodically conduct performance assessments. Utilize network traffic
analysis tools to examine traffic patterns and generate performance reports to gain insights into the network's
health. Continuously review and optimize your monitoring strategy to align with evolving network
requirements and industry best practices.
Monitoring network performance involves selecting relevant performance indicators, deploying monitoring
tools and agents, configuring real-time monitoring, setting up thresholds and alerts, analyzing historical data,
conducting periodic assessments, utilizing network traffic analysis, and generating performance reports. By
following these steps, you can proactively identify and address performance issues, optimize network resources,
and ensure a reliable and efficient network infrastructure. Regularly reviewing and optimizing your monitoring
strategy is crucial to stay aligned with changing network requirements and technological advancements.
3.6. Improve network and systems
Improving network and systems involves implementing strategies to enhance performance,
A step to enhance your network performance can enhance your overall productivity and business continuity.
NTVET College HNS Level IV: Provide Network System Administration. By Jamara B
1. Reconfigure Your Network
Your network configuration can affect performance. For
instance, if you install an update and it doesn't configure
your devices, this can have a large impact on your
performance. A good example is the personal area network
devices that should not be more than 10 meters apart.
Devices with short-range connectivity should be close to
each other to prevent network delays between the hardware
components.
Reconfiguring your hardware components will help the
devices communicate with each other effectively.
2. Check for System Defects And Viruses
Viruses and system defects can break down a network
infrastructure and degrade the network performance. Some
malwares can also control programs and applications in
your network. A flaw in the components or system can cause a network to behave unexpectedly.
Cable defects such as core rapture are a good example of issues that can cause failure in the conduction of
electricity, interfering with communication in a network. Checking for malware and fixing system defects can
address the situation and restore optimal performance.
3. Upgrade and Update Firmware and Software
Often, businesses cannot keep up with the pace of technology and balance with the software they run. You may
end up having software running on outdated technology in your network. You can also have old machines with
new programs.
Usually, there is no guarantee that programs and the existing technology are fully compatible, which can
negatively impact the network performance. Outdated software and programs also have bugs that can break
down your infrastructure.
NTVET College HNS Level IV: Provide Network System Administration. By Jamara B
7. Network Monitoring:- Monitoring your network for traffic jams and bottlenecks can help you diagnose
problems, solve them in good time, and prevent advancing network issues. For instance, if the network admin
identifies backups as the reason behind substandard network performance,
they can schedule them for a time when the personnel are not utilizing
most of the network resources.
Regular network monitoring can help you spot the bottlenecks, address
them, and enhance network performance.
Figure 1. 8 Network Monitoring
Self-check - 3
Part I:- Say True if the given statement is correct else say False
_______1. Performing diagnostic tests involves analyzing and responding to information.
_______2. Monitoring software and files is not a part of the diagnostic testing process.
_______3. Diagnostic testing does not involve monitoring performance indicators.
Part II: - Select the appropriate answer from the given alternative
_______1. What is the purpose of analyzing and responding to information in network administration?
A. Improving network aesthetics C. Identifying performance bottlenecks
B. Monitoring software license usage D. Ensuring physical security measures
_______2. which of the following is a common performance indicator monitored in
network administration.
A. Keyboard typing speed C. File compression ratio
B. Server room temperature D. Network bandwidth utilization
_______3. How does improving network and systems contribute to network
administration?
A. Increasing software licensing costs
B. Enhancing data backup and recovery
C. Monitoring physical server dimensions
D. Optimizing network configurations
_______4. How does improving network and systems contribute to network
administration?
A. Monitoring office supply inventory
B. Increasing software licensing compliance
C. Enhancing network security measures
D. Optimizing printer paper tray configurations
Part III: - Give short answer
1. List and explain ways of analyze and respond to information in a network?
2. Demonstrate the way of improve network and systems?
3. Demonstrate the technic of monitor software and files using a network?
Operation sheet 3.1.
Operation title: - Diagnostic network performance
Purpose: - To recover network problem and test performance.
Instruction: Use the figure below, given equipment and task. You have given 45 Minute for the
task and you are expected to complete tasks.
Tools and requirement:-Compute
Procedures:-
NTVET College HNS Level IV: Provide Network System Administration. By Jamara B
Step 1:- Press Windows + I to open Settings
Step 2:- Click on Network and Internet
Step 3:- Under the left-hand panel, option Status navigate to Network Troubleshooter and click
it
Step 4:- Then the tool will start to run a network check to find what can be possibly wrong with
the connectivity
I will show you how it will work. Let’s say I am not connected to my preferred network. Then
upon running a network check using the Network Troubleshooter, I will get the following result.
NTVET College HNS Level IV: Provide Network System Administration. By Jamara B
Operation sheet 3.2.
Operation title: - Speed up Internet connection on Windows 10
Purpose: - To increase download and upload speed of internet connection.
Instruction: Use the figure below, given equipment and task. You have given 45 Minute for the
task and you are expected to complete tasks.
Tools and requirement:-Compute, Internet, Internet cable, NW driver
Procedures:-
To speed up Windows 10 internet, you can make some small changes on Windows 10 to
quickly resolve these culprits for slow internet speed and enjoy faster internet in five ways.
Way 1. Change Bandwidth Limit to Speed up Internet on Windows 10
Step 1. Open the Settings on your Windows 10.
Step 2. Click Update & Security Advanced options in turn.
NTVET College HNS Level IV: Provide Network System Administration. By Jamara B
Step 3. In the Advanced options window, scroll down to find Delivery Optimization and click it.
Step 4. Choose advanced options again at the bottom.
Step 5. After that, you will see an adjuster for both Download settings and Upload settings. Here,
you can reset the amount of bandwidth that Windows can use for your core tasks.
NTVET College HNS Level IV: Provide Network System Administration. By Jamara B
Way 2. Get the Best VPN to Speed up Internet on Windows 10
Step 1. Download this free VPN on your Windows and launch it.
Step 2. Click All Servers in the left navigator. You will see a long list of all available servers in
multiple countries, like USA, Mexico, Canada, United Kingdom, etc.
Step 3. To speed up internet on Windows 10, select a server (USA, for instance) and click
Connect. Then you can enjoy faster speeds with the USA server in no time.
NTVET College HNS Level IV: Provide Network System Administration. By Jamara B
Way 3. Reset DNS Settings to Speed up Internet on Windows 10
Step 1. Search view network connections in search box of Windows 10 and enter it.
Step 2. Then right click on your network adapter and select Properties at the bottom.
Step 3. Now, select Internet Protocol Version 4 from the list under Networking and click on the
Properties tab.
Step 4. Now, select Use the following DNS server addresses and type to enter Google DNS as
follows: 8.8.8.8
8.8.4.4
St
NTVET College HNS Level IV: Provide Network System Administration. By Jamara B
Step 2. Now, select Update & Security and click Windows Update from the left menu.
Step 3. Then click on Advanced options from the right side.
Step 4. Turn off Download updates over metered connections (extra charges may apply).
NTVET College HNS Level IV: Provide Network System Administration. By Jamara B
Way 6. Clear Temp and Cached Files to Speed up Internet on Windows 10
Step 1. Search Disk Cleanup in your Windows 10
search box.
Step 2. Next, click on Disk Cleanup.
Step 3. Select C Drive in the pop-up box.
Step 4. Then, select all files from the files list and
click OK to delete all useless files on your PC at
present.
LAP Test
Task 1:- Diagnostic and test network performance
Task 2:- Test download and upload speed of your computer Internet
NTVET College HNS Level IV: Provide Network System Administration. By Jamara B
Unit Four : Migrate to New Technology
This unit is developed to provide you the necessary information regarding the following content
coverage and topics:
Developing new skills.
Upgraded technology skills
Identifying upgraded equipment.
Sources of information for new or upgraded equipment
Using new or upgraded equipment
This unit will also assist you to attain the learning outcomes stated in the cover page. Specifically,
upon completion of this learning guide, you will be able to:
Develop new skills.
Upgraded technology skills
Identify upgraded equipment.
Understand Sources of information for new or upgraded equipment
Use new or upgraded equipment
NTVET College HNS Level IV: Provide Network System Administration. By Jamara B
updates. Dedicate time regularly to learn and stay updated on advancements in the
technology you're focusing on.
2. Smartphones:
Flagship smartphones with faster
figure 1. 9 upgraded computer processors, larger RAM capacity, and improved
camera technologies.
Devices with 5G connectivity for faster internet speeds and lower latency.
Smartphones equipped with advanced biometric authentication methods like facial
recognition or under-display fingerprint sensors.
NTVET College HNS Level IV: Provide Network System Administration. By Jamara B
Figure 4. 1 upgraded smartphone
3. Networking:
Upgraded routers with the latest Wi-Fi standards (such as Wi-Fi 6 or Wi-Fi 6E)
offering faster speeds and better network performance.
Network switches with higher port densities, increased bandwidth, and support for
advanced features like Power over Ethernet (PoE) or Quality of Service (QoS).
Firewall appliances with enhanced security capabilities, such as intrusion prevention
systems (IPS), deep packet inspection (DPI), or advanced threat protection (ATP).
NTVET College HNS Level IV: Provide Network System Administration. By Jamara B
Figure 4. 3 History of camera
NTVET College HNS Level IV: Provide Network System Administration. By Jamara B
4.6. Use new or upgraded equipment
When organizations want to make a significant change to their business systems, new technology
or new equipment is generally part of the change. Using new or upgraded equipment typically
involves several steps to ensure a smooth and efficient transition. Here is a general guide:
1. Read the Manual:- Start by thoroughly reading the user manual or any accompanying
documentation that comes with the equipment. This will provide you with a detailed
understanding of its features, functionalities, and proper usage.
NTVET College HNS Level IV: Provide Network System Administration. By Jamara B
5. Troubleshooting and Maintenance: Familiarize yourself with common troubleshooting
techniques specific to the equipment. Learn how to identify and resolve common issues that
may arise during usage.
Self-check - 4
Part I: - Say True if the given statement is correct else say False
_______1. Upgrading technology skills involves identifying upgraded equipment.
_______2. Understanding sources of information for new or upgraded equipment is necessary when
upgrading technology skills.
_______3. Using new or upgraded equipment is not important in the process of upgrading
technology skills.
Part II: - Select the appropriate answer from the given alternative
1. Which of the following is a benefit of identifying upgraded equipment when upgrading
technology skills?
A. It improves physical fitness C. It boosts creativity in art and design
B. It enhances problem-solving abilities D. It promotes healthy eating habits
2. How does using new or upgraded equipment contribute to upgrading technology skills?
A. It improves social interaction skills
B. It enhances critical thinking abilities
C. It promotes physical well-being
D. It develops musical talent
3. Which of the following is an example of upgraded equipment in the context of upgrading
technology skills?
A. Pencil and paper C. Smartphone
B. Typewriter D. Abacus
4. Which of the following is a direct outcome of upgrading technology skills?
NTVET College HNS Level IV: Provide Network System Administration. By Jamara B
A. Building a sandcastle C. Writing poetry
B. Solving complex technological D. Playing sports
problems
Part III: - Give short answer
1. List and explain Sources of information for new or upgraded equipment?
2. Demonstrate the way of develop new skills in emerging technologies?
3. List and explain upgraded equipment in ICT?
Reference
List of Books
1. The Practice of System and Network Administration
2. Network Security Essentials: Applications and Standards" by William Stallings
3. Network Programmability and Automation: Skills for the Next-Generation Network
Engineer" by Jason Edelman, Scott S. Lowe, and Matt Oswalt
4. Network Management: Principles and Practice" by Mani Subramanian:
5. Network Analysis, Architecture, and Design" by James D. McCabe
List of website
1. https://www.windowscentral.com/how-make-full-backup-windows-10#section-how-to-
restore-a-backup-with-system-image-tool-on-windows-10
2. https://www.comparitech.com/net-admin/network-troubleshooting-tools/
3. https://www.itechguides.com/how-to-get-administrator-privileges-on-windows-10/
4. Make an administrator account to a standard user on Windows 10/11 (softwareok.com)
5. https://www.devicemag.com/network-testing-tool/
6. https://www.itopvpn.com/blog/speed-up-internet-on-windows-10-3123
Developer profile
No Name Qualificatio Field of Study Organization/ Mobile number E-mail
n (Level) Institution
1 Zerihun Abate MSc ITM Sebata PTC 0911858358 zedoabata2017@gmail.com
NTVET College HNS Level IV: Provide Network System Administration. By Jamara B