List the assessment methods to be used and the context and resources required for assessment. Copy and paste the relevant sections from the evidence guide below and then re-write these in plain English.
ELEMENT | PERFORMANCE CRITERIA |
Elements describe the essential outcomes. | Performance criteria describe the performance needed to demonstrate achievement of the element. |
1. Confirm client requirements and network equipment required | 1.1 Identify and clarify organisational requirements of the client 1.2 Evaluate client requirements along with business needs in order to translate into technical requirements 1.3 Review existing network design documentation to ensure it is authorised, current and complete 1.4 Identify network topology 1.5 Identify the components required to be installed to meet the technical requirements 1.6 Contact vendors and service suppliers to obtain specifications and availability of identified components 1.7 Ensure preliminary work is completed within the required timeframe |
2. Prepare for installation | 2.1 Ensure client and users are aware of date and time of installation 2.2 Gather, prepare and check installation and safety equipment 2.3 Assess on-site safety arrangements for installers and users |
3. Select, install and configure access points and other wireless devices | 3.1 Select appropriate hardware based on identified components 3.2 Install and configure hardware to provide wireless access to network 3.3 Ensure connections are secured against intrusion or data access by unauthorised persons, are safe for users, and are protected from the environment 3.4 Configure security, monitoring, logging and quality of service features consistent with standards and protocols 3.5 Ensure test equipment is calibrated 3.6 Test wireless network systems performance and verify that it meets enterprise requirements and is consistent with standards and protocols |
4. Select, install and configure antennas | 4.1 Select appropriate antennas based on design plan 4.2 Safely install and configure antennas to provide wireless access to network 4.3 Measure and assess signal strength within and outside building 4.4 Resolve and report radio frequency interference issues |
5. Select, install and configure antennas | 5.1 Identify possible security threats to assets 5.2 Configure client server and helper security devices 5.3 Configure associations and filters |
6. Train users | 6.1 Provide training for users to establish and manage network connections 6.2 Resolve pairing and log-on difficulties for users 6.3 Inform users of wireless network etiquette and traffic capacity issues 6.4 Advise users of help desk contact details |
7. Monitor and administer wireless network | 7.1 Monitor wireless network performance using diagnostic tools, including appropriate software 7.2 Debug networking issues to maintain trouble-free wireless connection 7.3 Document current settings and store securely, consistent with commercial and business requirements |
8. Finalise build process | 8.1 Review network for performance issues, planned maintenance or upgrade requirements 8.2 Report to client with network documentation and recommendations for performance issues 8.3 File documentation according to organisational guidelines |
Evidence of the ability to:
confirm client organisational and business requirements
determine hardware and software requirements
prepare for safe installation
select, install and configure required wireless hardware
train users
test, monitor, and administer the installation
finalise installation and prepare required documents documentation.
Note: If a specific volume or frequency is not stated, then evidence must be provided at least once.
To complete the unit requirements safely and effectively, the individual must:
Identify and describe current wireless local area network (WLAN) and wireless area network (WAN) solutions, including:
audit and intrusion detection systems
auditing and penetration testing techniques
bandwidth and quality of service
factors affecting signal quality
layer 2 and layer 3 design issues
suitability for small office home office (SOHO) and enterprise local area networks (LANs)
transmission control protocols or internet protocols (TCPs/IPs) and applications
wireless topologies
describe the common features of security threats and how to develop a security strategy, including:
security protocols
standards
data encryption
identify and describe common network protocols and operating systems.
Gather evidence to demonstrate consistent performance in conditions that are safe and replicate the workplace. Noise levels, production flow, interruptions and time variances must be typical of those experienced in the network industry, and include access to:
technical requirements
network infrastructure, including wireless hardware and software.
Assessors must satisfy NVR/AQTF assessor requirements.