Course Title: Design and manage enterprise networks

Part B: Course Detail

Teaching Period: Term1 2012

Course Code: ISYS5672C

Course Title: Design and manage enterprise networks

School: 130T Vocational Engineering

Campus: City Campus

Program: C6084 - Advanced Diploma of Computer Systems Engineering

Course Contact: Program Manager

Course Contact Phone: +61 3 99254468

Course Contact Email: engineering-tafe@rmit.edu.au


Name and Contact Details of All Other Relevant Staff

Luke Eberbach
Phone: +61 3 9925 4381
Email: luke.eberbach@rmit.edu.au

Nominal Hours: 80

Regardless of the mode of delivery, represent a guide to the relative teaching time and student effort required to successfully achieve a particular competency/module. This may include not only scheduled classes or workplace visits but also the amount of effort required to undertake, evaluate and complete all assessment requirements, including any non-classroom activities.

Pre-requisites and Co-requisites

There are no prerequisite competencies for this unit.

Course Description

This unit covers designing, managing, monitoring and diagnosing enterprise servers. It encompasses safe working practices, designing and managing Domain Name Server (DNS), Email servers, Dynamic Host Configuration Protocol (DHCP), Remote and managing activities.


National Codes, Titles, Elements and Performance Criteria

National Element Code & Title:

UEENEED014B Design and manage enterprise networks

Element:

1 Develop design for an enterprise network.

Performance Criteria:

1.1 OHS processes and procedures for a given work
area are identified, obtained and understood.
1.2 The extent of the network to be designed is
determined from design brief and/or in consultation
with appropriate persons.
1.3 Business requirements of the enterprise are analysed
taking into account existing and projected business
model, organisational and Information Technology
management structures.
1.4 Consideration is given to factors that will have an
impact on the design such as business priorities,
growth, growth strategy, regulatory framework, risk,
and cost.
1.5 Existing and planned technical and environment
goals of the enterprise are evaluated and
documented. (See Note 1)
1.6 Consideration is given to technical factors that will
have an impact on the design. (See Note 2)
1.7 Client access and end-user needs and usage patterns
and disaster recovery requirements are evaluated
and documented.
1.8 Design specification is written using information
obtained from the analysis and evaluations of
enterprise business and technical requirements.
1.9 Network specification is presented and discussed
with person(s) of higher authority.
1.10 Alterations to the network specification resulting
from the presentation/discussion are negotiated with
person(s) of higher authority within the constraints
of organisation’s policy.

Note1. Examples are company size, user and resource distribution, various site connectivity, bandwidth,
service performance, availability and scalability, data and system access patterns, network roles and
responsibilities and security considerations
Note2. Examples are currently available resources, services, network infrastructure, protocols and hosts,
Transmission Control Protocol and Internet Protocol hardware, planned upgrades, support and network
and systems management.

Element:

2 Design an enterprise network.

Performance Criteria:

2.1 Knowledge and complexities of alternative network
infrastructures and currently available technologies
are applied to network design. (See Note 3)
2.2 Network design is developed to incorporate all
required Wide Area Network (WAN) infrastructure,
Internet connectivity and implementation and
management strategies.
2.3 Risk management strategies are sought and obtained
for incorporating into the network design.
2.4 Network design is reviewed against all inputs and
adjusted to rectify any anomalies.
2.5 Network design proposal is documented in
accordance with organisation policies and
procedures.
2.6 Network design is presented and discussed with
person(s) of higher authority.
2.7 Alterations to the network design resulting from the
presentation/discussion are negotiated with
person(s) of higher authority within the constraints
of organisation’s policy.
2.8 Final design is documented and approval obtained
from appropriate person(s).

Note3. Examples of network infrastructure are topology, TCP/IP networking strategy, DHCP strategy,
Design of name resolution services, Multi-protocol strategy and Distributed File Strategy

Element:

3 Implement and manage an enterprise network.

Performance Criteria:

3.1 OHS risk control measures and procedures for
carrying out the work are followed.
3.2 Server and client computer hardware are installed
and configures in compliance with design
specifications and network industry standards. (See
Note 4)
3.3 User and Group objects objects are created and
group policy implemented. (Notes 5 and 6)
3.4 Directory services, data storage, shared resources
Internet information services, remote access and
network security are managed to ensure effective
operation of the network. (Notes 7 to 11)
3.5 Approaches to issues/problems are analysed to
provide most effective solutions.
3.6 Quality of work is monitored against personal
performance agreement and/or established
organisational or professional standards

Note4. Hardware installation includes using qualified tools, driver signing options, digital signatures on
driver files and systems support for legacy hardware devices.
Note5. Example of user and group objects are computer accounts, groups configuring accounts via a
directory service, searching for objects, use of templates for creating user accounts and resetting
accounts
Note6. Examples of group policy implemetantion are deploying software, updates and assigning and
publishing applications.
Note7. Examples of directory services are publishing resources, performing searches and configuring printer
objects
Note8. Examples of data storage are NTFS and FAT file systems such as New Technology File Systems
(NTFS) and File Allocation Table (FAT), quotas, Encrypting File Systems, configuring volumes and
basic and dynamic disks, file and folder permissions and compression and domain-based distributed file
systems.
Note9. Examples of shared resources are folders, web sharing, folder permissions, printers and printer
permissions.
Note10. Examples of Internet Information Services are virtual directories and servers, Internet and intranet
browsing, authentication and Secure Sockets Layer (SSL), File Transfer Protocol (FTP) services and
access permissions for intranet server
Note11. Examples of Network security are user account lockout settings, password management, Group
Policy to run logon scripts and link objects, auditing and security log file.

Element:

4 Diagnose network malfunctions. 

Performance Criteria:

4.1 OHS risk control measures and procedures for
carrying out the work are followed.
4.2 Network operation is monitored and malfunctions
are diagnosed to ascertain their cause using network
diagnostic tools. (Note 12)
4.3 Network malfunctions are rectified using effective
techniques and drawing knowledge of network
topology and complexities of network interactivity.
4.4 Approaches to issues/problems are analysed to
provide most effective solutions.
4.5 Quality of work is monitored against personal
performance agreement and/or established
organisational or professional standards

Note12. Examples of network operations are routing TCP/IP, DHCP, Domain Name Service, name
resolution, starting servers, client computers, User and group objects, directory service replication
problems, End-User Group Policy and remote access.

Element:

5 Report network management activities

Performance Criteria:

5.1 Written justification is produced for enterprise
network services solutions and forwarded to
appropriate person/s in accordance with established
procedures.
5.2 Network service development records are
maintained in accordance with established
procedures.


Learning Outcomes



Details of Learning Activities

Students will participate in a variety of teaching methods including lectures, tutorials,practicals, class discussion, audio-visual presentations, prescribed reading, review questions, case projects, and maintenance of an engineering journal.


Teaching Schedule

Week 1: Introducing Windows Server 2008
Lecture: Assign the Engineering Journal to be handed in during week 16. Windows Server Editions,Windows Server 2008 Hardware Requirements, Migrating from Server 2003 to Server 2008, Windows Server 2008 Enhancements, Windows Server 2008 Roles and Features, Planning Windows Server 2008 Networks, Overview of Primary Application Infrastructure Tools and Capabilities,Chapter Summary
Lab: Activity 1-1
Performance Criteria UEENEED014B: 1.1, 1.2, 1.3, 1.4, 1.5, 1.6, 1.7, 1.8, 1.9, 1.10, 2.1, 2.2, 2.3, 2.4, 2.5, 2.6, 2.7, 2.8, 3.1, 4.1, 5.1, 5.2
 

Week 2: Deploying Windows Servers
Lecture: Deploying Images Using Windows Deployment Services, Installing Windows Deployment Services, Configuring Windows Deployment Services, Capturing and Deploying WDS images, Uninstalling Windows Deployment Services, Other common Deployment Tasks Volume Activation,Chapter Summary
Lab: Activities 2-1,2-2,2-3,2-4,2-5,2-6,2-7
Performance Criteria UEENEED014B: 1.1, 2.1, 3.1, 3.2, 3.3, 3.4, 3.5, 3.6, 4.1, 4.2, 4.3, 4.4, 4.5

Week 3: Configuring Windows Server 2008 Storage Services
Lecture: Basic Storage Terminology, Overview of Disk Management Capabilities, Manage Virtual Hard Disks
Lab: Activites3-1,3-2,3-3,3-4,3-5
Performance Criteria UEENEED014B: 1.1, 2.1 3.1, 3.2, 3.4, 3.5, 3.6, 4.1, 4.2, 4.3, 4.4, 4.5

Week 4: Configuring Windows Server 2008 Storage Services
Lecture: Mount Points, MultipathI/O(MPIO), Microsoft iSCSI Software Initiator,Storage Area Networks(SANs), Chapter Summary
Lab: Activites3-6,3-7,3-8,3-9,3-10,3-11
Performance Criteria UEENEED014B: 1.1, 2.1 3.1, 3.2, 3.4, 3.5, 3.6, 4.1, 4.2, 4.3, 4.4, 4.5

Week 5: Windows Server 2008 Remote Desktop Services, Part1
Lecture: Remote Desktop Connection,Desktop Experience Enhancements, Authentication and Single Sign-On,Remote Desktop Services Role
Lab: Activites 4-1,4-2,4-3,4-4,4-5
Performance Criteria UEENEED014B: 1.1, 1.2, 1.3, 1.4, 1.5, 1.6, 1.7, 1.8, 1.9, 1.10, 2.1, 2.2, 2.3, 2.4, 2.5, 2.6, 2.7, 2.8, 3.1, 3.2, 3.3, 3.4, 3.5, 3.6, 4.1, 4.2, 4.3, 4.4, 4.5, 5.1, 5.2 

Week 6: Windows Server 2008 Remote Desktop Services, Part1  
Lecture: Publishing Remote Applications, Packaging RemoteApp Programs, Remote Desktop Web Access, Remote Desktop Gateway,Chapter Summary
Lab: Activities 4-6,4-7,4-8,4-9,4-10,4-11
Performance Criteria UEENEED014B: 1.1, 1.2, 1.3, 1.4, 1.5, 1.6, 1.7, 1.8, 1.9, 1.10, 2.1, 2.2, 2.3, 2.4, 2.5, 2.6, 2.7, 2.8, 3.1, 3.2, 3.3, 3.4, 3.5, 3.6, 4.1, 4.2, 4.3, 4.4, 4.5, 5.1, 5.2

Week 7: Windows Server 2008 Remote Desktop Services, Part2
Lecture: Managing the Remote Desktop Session Host, RD Gateway, Remote Desktop Connection Broker, RD Licensing, Chapter Summary
Lab: Activities 5-1,5-2,5-3,5-4,5-5
Performance Criteria UEENEED014B: 1.1, 1.2, 1.3, 1.4, 1.5, 1.6, 1.7, 1.8, 1.9, 1.10, 2.1, 2.2, 2.3, 2.4, 2.5, 2.6, 2.7, 2.8, 3.1, 3.2, 3.3, 3.4, 3.5, 3.6, 4.1, 4.2, 4.3, 4.4, 4.5, 5.1, 5.2

Week 8: Windows Server 2008 Web Services, Part1
Lecture: Configuring Web Applications, Managing Web Sites, Configuring an FTP Server, FTP7, Configuring and SMTP Server, Chapter Summary
Lab: Activities 6-1,6-2,6-3,6-4,6-5,6-6,6-7
Performance Criteria UEENEED014B: 1.1, 1.2, 1.3, 1.4, 1.5, 1.6, 1.7, 1.8, 1.9, 1.10, 2.1, 2.2, 2.3, 2.4, 2.5, 2.6, 2.7, 2.8, 3.1, 3.2, 3.3, 3.4, 3.5, 3.6, 4.1, 4.2, 4.3, 4.4, 4.5, 5.1, 5.2

Week 9: Windows Server 2008 Web Services, Part2
Lecture: Managing Internet Information Services(IIS), Configuring SSL Security, Configuring Web Site Permissions and Authentication, Chapter Summary
Lab: Activities 7-1,7-2,7-3,7-4,7-5,7-6,7-7
Performance Criteria UEENEED014B: 1.1, 1.2, 1.3, 1.4, 1.5, 1.6, 1.7, 1.8, 1.9, 1.10, 2.1, 2.2, 2.3, 2.4, 2.5, 2.6, 2.7, 2.8, 3.1, 3.2, 3.3, 3.4, 3.5, 3.6, 4.1, 4.2, 4.3, 4.4, 4.5, 5.1, 5.2

Week 10: Configuring Windows Server 2008 Network Application Services
Lecture: Configuring Windows Media Server, Securing Content
Lab: Activities 8-1,8-2,8-3
Performance Criteria UEENEED014B: 1.1, 3.1, 3.2, 3.3, 3.4, 3.5, 3.6, 4.1, 4.2, 4.3, 4.4, 4.5

Week 11: Configuring Windows Server 2008 Network Application Services
Lecture: Configuring Microsoft Windows SharePoint Services Server Options, Chapter Summary 
Lab: Activities 8-4,8-5,8-6,8-7
Performance Criteria UEENEED014B: 1.1, 3.1, 3.2, 3.3, 3.4, 3.5, 3.6, 4.1, 4.2, 4.3, 4.4, 4.5

Week 12: Configuring Windows Server 2008 Hyper-V Virtualization
Lecture: A Virtualisation Primer, Virtualisation in the IT Datacenter, Hyper-V Installation, Creating Virtual Machines in Hyper-V
Lab: Activities 9-1,9-2,9-3,9-4,9-5
Performance Criteria UEENEED014B: 1.1, 3.1, 3.2, 3.3, 3.4, 3.5, 3.6, 4.1, 4.2, 4.3, 4.4, 4.5

Week 13: Configuring Windows Server 2008 Hyper-V Virtualisation
Lecture: Hyper-V Virtual Networks,Working with Virtual Hard Disks Managing Virtual Machines, Chapter Summary
Lab: Activities 9-6,9-7,9-8,9-9,9-10
Performance Criteria UEENEED014B: 1.1, 3.1, 3.2, 3.3, 3.4, 3.5, 3.6, 4.1, 4.2, 4.3, 4.4, 4.5

Week 14: Configuring Windows Server 2008 for High Availability
Lecture: Windows Server 2008 High Availability Technologies, Round-Robin Load Balancing
Lab: Activities 10-1,10-2,10-3,10-4,10-5,10-6,10-7,10-8
Performance Criteria UEENEED014B: 1.1, 3.1, 3.2, 3.3, 3.4, 3.5, 3.6, 4.1, 4.2, 4.3, 4.4, 4.5

Week 15: Configuring Windows Server 2008 for High Availability
Lecture: Network Load Balancing, Failover Clusters,Chapter Summary
Lab: Revision
Performance Criteria UEENEED014B: 1.1, 3.1, 3.2, 3.3, 3.4, 3.5, 3.6, 4.1, 4.2, 4.3, 4.4, 4.5
 

Week 16: Revision Week and Open Book Practical Test
Lecture: Revision
Lab: Open Book Practical Test

Week17&18: Centralised Closed Book Test


Learning Resources

Prescribed Texts

MCTS Guide to Microsoft Windows Server 2008 Applications Infrastructure Configuration(Exam#70-643), Tucker et al.

9781423902379


References


Other Resources

Oracle Virtual Box virtualisation software - available for download from https://www.virtualbox.org/wiki/Downloads
Microsoft Windows 7 Enterprise 90-day Trial - available for download from http://technet.microsoft.com/en-us/evalcenter/cc442495.aspx
Microsoft Windows Server 2008 Up to 120-Day Evaluation - supplied with the prescribed text
External USB Hard disk storage device with minimum capacity of 500GB


Overview of Assessment

Laboratories
Practical Tests
Written Test


Assessment Tasks

You are required to complete the following three assessment tasks:

1. Open Book Practical Test  - Week 16
2. Lab Journal - Assigned in week 1 and due for submission in week 16
3. Centralised Closed Book  Test - to be held during weeks 17&18
 


Assessment Matrix

 

Assessment TaskWeightingPerformance Criteria
Open Book Practical Test40% 1.1, 1.6, 1.7, 1.8, 1.9, 1.10, 3.1, 3.2, 3.3, 3.4, 3.5, 3.6, 4.1, 4.2, 4.3, 4.4, 4.5
Lab Journal20% 1.1, 1.2, 1.3, 1.4, 1.5, 1.6, 1.7, 1.8, 1.9, 1.10, 2.1, 2.2, 2.3, 2.4, 2.5, 2.6, 2.7, 2.8, 3.1, 3.5, 4.1, 4.4, 4.5, 5.1, 5.2
Centralised Closed Book Test40% 1.1, 1.2, 1.3, 1.4, 1.5, 1.6, 1.7, 1.8, 1.9, 1.10, 2.1, 2.2, 2.3, 2.4, 2.5, 2.6, 2.7, 2.8, 3.1, 3.2, 3.3, 3.4, 3.5, 3.6, 4.1, 4.2, 4.3, 4.4, 4.5, 5.1, 5.2


 

Other Information

Study and learning Support:

Study and Learning Centre (SLC) provides free learning and academic development advice to you.
Services offered by SLC to support your numeracy and literacy skills are:

assignment writing, thesis writing and study skills advice
maths and science developmental support and advice
English language development

Please Refer http://www.rmit.edu.au/studyandlearningcentre to find more information about Study and learning Support

Disability Liaison Unit:

If you are suffering from long-term medical condition or disability, you should contact Disability Liaison Unit to seek advice and
support to complete your studies.

Please Refer http://www.rmit.edu.au/disability to find more information about services offered by Disability Liaison Unit

Late submission:

If you require an Extension of Submittable Work (assignments, reports or project work etc.) for 7 calendar days or less (from the original due date) and have valid reasons, you must complete and
lodge an Application for Extension of Submittable Work (7 Calendar Days or less) form and lodge it with the Senior Educator/ Program Manager.
The application must be lodged no later than one working day before the official due date. You will be notified within
no more than 2 working days of the date of lodgment as to whether the extension has been granted.

If you seek an Extension of Submittable Work for more than 7 calendar days (from the original due date) must lodge an Application for Special
Consideration form under the provisions of the Special Consideration Policy, preferably prior to, but no later than 2 working days
after the official due date.

Submittable Work (assignments, reports or project work etc.) submitted late without approval of an extension will not be accepted or marked.

Special consideration:

Please Refer http://www.rmit.edu.au/browse;ID=riderwtscifm to find more information about special consideration

Plagiarism:

Plagiarism is a form of cheating and it is very serious academic offence that may lead to expulsion from the University.

Please Refer: www.rmit.edu.au/academicintegrity to find more information about plagiarism.

Other Information:

All email communications will be sent to your RMIT email address and you must regularly check your RMIT emails.

In this cluster, minimum student directed hours are 8 in addition to 72 scheduled teaching hours. Student directed hours involve completing activities such as reading online resources, reading text based resources, practising lab activities, individual student-teacher course related consultation,and writing reflective journals.
 

Course Overview: Access Course Overview