Course Title: Design and manage enterprise computer networks

Part B: Course Detail

Teaching Period: Term2 2014

Course Code: COSC6153C

Course Title: Design and manage enterprise computer networks

School: 130T Vocational Engineering

Campus: City Campus

Program: C6121 - Advanced Diploma of Computer Systems Engineering

Course Contact: Program Manager

Course Contact Phone: +61 3 9925 4468

Course Contact Email: vocengineering@rmit.edu.au


Name and Contact Details of All Other Relevant Staff

Luke Eberbach
Phone: +61 3 99254381
Email: luke.eberbach@rmit.edu.au

Nominal Hours: 80

Regardless of the mode of delivery, represent a guide to the relative teaching time and student effort required to successfully achieve a particular competency/module. This may include not only scheduled classes or workplace visits but also the amount of effort required to undertake, evaluate and complete all assessment requirements, including any non-classroom activities.

Pre-requisites and Co-requisites

UEENEEE101A

Course Description

This unit covers designing and managing enterprise computer networks. It encompasses safe working practices, the design and management of network and application services, core identity and access management components, directory services infrastructure components, designing physical and logical directory service topologies, designing a public key infrastructure (PKI), designing for business continuity and data availability, and documenting all design and management activities.


National Codes, Titles, Elements and Performance Criteria

National Element Code & Title:

UEENEED114A Design and manage enterprise computer networks

Element:

1 Develop design for an enterprise network.

Performance Criteria:

1.1 OHS processes and procedures for a given work area are identified, obtained and understood.
1.2 The extent of the network to be designed is determined from design brief and/or in consultation with appropriate persons.
1.3 Business requirements of the enterprise are analysed taking into account existing and projected business model, organisational and Information Technology management structures.
1.4 Consideration is given to factors that will have an impact on the design such as business priorities, growth, growth strategy, regulatory framework, risk, and cost.
1.5 Existing and planned technical and environment goals of the enterprise are evaluated and documented. (See Note 1)
1.6 Consideration is given to technical factors that will have an impact on the design. (See Note 2)
1.7 Client access and end-user needs and usage patterns and disaster recovery requirements are evaluated and documented.
1.8 Design specification is written using information obtained from the analysis and evaluations of enterprise business and technical requirements.
1.9 Network specification is presented and discussed with person(s) of higher authority.
1.10 Alterations to the network specification resulting from the presentation/discussion are negotiated with person(s) of higher authority within the constraints of organisation’s policy.
Note:
1. Examples are company size, user and resource distribution, various site connectivity, bandwidth, service performance, availability and scalability, data and system access patterns, network roles and responsibilities and security considerations
2. Examples are currently available resources, services, network infrastructure, protocols and hosts, Transmission Control Protocol and Internet Protocol hardware, planned upgrades, support and network and systems management.

Element:

2 Design an enterprise network.

Performance Criteria:

2.1 Knowledge and complexities of alternative network infrastructures and currently available technologies are applied to network design. (See Note 3)
2.2 Network design is developed to incorporate all required Wide Area Network (WAN) infrastructure, Internet connectivity and implementation and management strategies.
2.3 Risk management strategies are sought and obtained for incorporating into the network design.
2.4 Network design is reviewed against all inputs and adjusted to rectify any anomalies.
2.5 Network design proposal is documented in accordance with organisation policies and procedures.
2.6 Network design is presented and discussed with person(s) of higher authority.
2.7 Alterations to the network design resulting from the presentation/discussion are negotiated with person(s) of higher authority within the constraints of organisation’s policy.
2.8 Final design is documented and approval obtained from appropriate person(s).
Notes:
3. Examples of network infrastructure are topology, TCP/IP networking strategy, DHCP strategy, Design of name resolution services, Multi-protocol strategy and Distributed File Strategy

Element:

3 Implement and manage an enterprise network.

Performance Criteria:

3.1 OHS risk control measures and procedures for carrying out the work are followed.
3.2 Server and client computer hardware are installed and configured in compliance with design specifications and network industry standards. (See Note 4)
3.3 User and Group objects objects are created and group policy implemented. (Notes 5 and 6)
3.4 Directory services, data storage, shared resources Internet information services, remote access and network security are managed to ensure effective operation of the network. (Notes 7 to 11)
3.5 Approaches to issues/problems are analysed to provide most effective solutions.
3.6 Quality of work is monitored against personal performance agreement and/or established organisational or professional standards
Notes:
4. Hardware installation includes using qualified tools, driver signing options, digital signatures on driver files and systems support for legacy hardware devices.
5. Example of user and group objects are computer accounts, groups configuring accounts via a directory service, searching for objects, use of templates for creating user accounts and resetting accounts
6. Examples of group policy implementation are deploying software, updates and assigning and publishing applications.
7. Examples of directory services are publishing resources, performing searches and configuring printer objects
8. Examples of data storage are NTFS and FAT file systems such as New Technology File Systems (NTFS) and File Allocation Table (FAT), quotas, Encrypting File Systems, configuring volumes and basic and dynamic disks, file and folder permissions and compression and domain-based distributed file systems.
9. Examples of shared resources are folders, web sharing, folder permissions, printers and printer permissions.
10. Examples of Internet Information Services are virtual directories and servers, Internet and intranet browsing, authentication and Secure Sockets Layer (SSL), File Transfer Protocol (FTP) services and access permissions for intranet server
11. Examples of Network security are user account lockout settings, password management, Group Policy to run logon scripts and link objects, auditing and security log file.

Element:

4 Diagnose network malfunctions.

Performance Criteria:

4.1 OHS risk control measures and procedures for carrying out the work are followed.
4.2 Network operation is monitored and malfunctions are diagnosed to ascertain their cause using network diagnostic tools. (Note 12)
4.3 Network malfunctions are rectified using effective techniques and drawing knowledge of network topology and complexities of network interactivity.
4.4 Approaches to issues/problems are analysed to provide most effective solutions.
4.5 Quality of work is monitored against personal performance agreement and/or established organisational or professional standards
Notes:
12. Examples of network operations are routing TCP/IP, DHCP, Domain Name Service, name resolution, starting servers, client computers, User and group objects, directory service replication problems, End-User Group Policy and remote access

Element:

5 Report network management activities.

Performance Criteria:

5.1 Written justification is produced for enterprise network services solutions and forwarded to appropriate person/s in accordance with established
procedures.
5.2 Network service development records are maintained in accordance with established procedures.


Learning Outcomes


Refer to Elements

 


Details of Learning Activities

You will be involved in the following learning activities to meet requirements for this competency and stage 1 competencies for Engineering Associates.
• Lectures
• Tutorials
• Practicals
• Review questions
• Case projects
• Lab journal


Engineers Australia Mapping Information:
This course is mapped against stage 1 competencies for Engineering Associates developed by Engineers Australia as detailed below:

EA1.1. Comprehensive, theory based understanding of the underpinning natural and physical sciences and the engineering fundamentals applicable to the engineering
EA1.2. Conceptual understanding of the, mathematics, numerical analysis, statistics, and computer and information sciences which underpin the engineering discipline.
EA1.3. In-depth understanding of specialist bodies of knowledge within the engineering discipline.
EA1.4. Discernment of knowledge development and research directions within the engineering discipline.
EA1.5. Knowledge of contextual factors impacting the engineering discipline.
EA1.6. Understanding of the scope, principles, norms, accountabilities and bounds of contemporary engineering practice in the specific discipline.
EA2.1. Application of established engineering methods to complex engineering problem solving.
EA2.2. Fluent application of engineering techniques, tools and resources.
EA2.3. Application of systematic engineering synthesis and design processes.
EA2.4. Application of systematic approaches to the conduct and management of engineering projects.
EA3.1. Ethical conduct and professional accountability.
EA3.2. Effective oral and written communication in professional and lay domains.
EA3.3. Creative, innovative and pro-active demeanour.
EA3.4. Professional use and management of information.
EA3.5. Orderly management of self and professional conduct.
EA3.6. Effective team membership and team leadership

Engineers Australia Stage 1 Competencies are mapped with competency UEENEED114A in the Assessment Matrix.


Teaching Schedule

 The proposed teaching schedule for this competency is detailed below:

1.1, 1.2, 1.3, 1.4, 1.5, 1.6, 1.7, 1.8, 1.9, 1.10, 2.1, 2.2, 2.3, 2.4, 2.5, 2.6, 2.7, 2.8, 3.1, 3.2, 3.3, 3.4, 3.5, 3.6, 4.1, 4.2, 4.3, 4.4, 4.5, 5.1, 5.2

WeekTopics DeliveredElements/Performance Criteria
1Lecture: Assign the lab journal to be handed in during week 16. A sample of the lab journal is to be submitted in week 4 for feedback. Basic review of Active Directory domain services, Understanding domain and forest functional levels, Designing Active Directory domains and forests
Lab: Activities 1-1, 1-2, 1-3, 1-4, 1-5, 1-6


 
1.1, 1.2, 1.3, 1.4, 1.5, 1.6, 1.7, 1.8, 1.9, 1.10, 2.1, 2.2, 2.3, 2.4, 2.5, 2.6, 2.7, 2.8, 3.1, 3.2, 3.3, 3.4, 3.5, 3.6, 4.1, 4.2, 4.3, 4.4, 4.5, 5.1, 5.2
2Lecture: Understanding trusts, Using ADPrep, Migration strategies, Chapter Summary
Lab: Activities 1-7, 1-8, 1-9, 1-10, 1-11
 1.1, 1.2, 1.3, 1.4, 1.5, 1.6, 1.7, 1.8, 1.9, 1.10, 2.1, 2.2, 2.3, 2.4, 2.5, 2.6, 2.7, 2.8, 3.1, 3.2, 3.3, 3.4, 3.5, 3.6, 4.1, 4.2, 4.3, 4.4, 4.5, 5.1, 5.2
3Lecture: Implementing sites, designing the branch office, Understanding operations master roles, Using RODCs, Chapter Summary
Lab: Activities 2-1, 2-2, 2-3, 2-4, 2-5, 2-6, 2-7, 2-8
1.1, 1.2, 1.3, 1.4, 1.5, 1.6, 1.7, 1.8, 1.9, 1.10, 2.1, 2.2, 2.3, 2.4, 2.5, 2.6, 2.7, 2.8, 3.1, 3.2, 3.3, 3.4, 3.5, 3.6, 4.1, 4.2, 4.3, 4.4, 4.5, 5.1, 5.2
4Lecture: Improvements in Windows Server 2008 DNS, Name resolution in a Domain, DNS zones, zone files, and zone resource records
Lab: Activities 3-1, 3-2, 3-3, 3-4, 3-5, Lab Journal review and feedback
1.1, 1.2, 1.3, 1.4, 1.5, 1.6, 1.7, 1.8, 1.9, 1.10, 2.1, 2.2, 2.3, 2.4, 2.5, 2.6, 2.7, 2.8, 3.1, 3.2, 3.3, 3.4, 3.5, 3.6, 4.1, 4.2, 4.3, 4.4, 4.5, 5.1, 5.2
5Lecture: Designing DNS zones, designing zone replication scope, Chapter Summary
Lab: Activities 3-6, 3-7, 3-8, 3-9
1.1, 1.2, 1.3, 1.4, 1.5, 1.6, 1.7, 1.8, 1.9, 1.10, 2.1, 2.2, 2.3, 2.4, 2.5, 2.6, 2.7, 2.8, 3.1, 3.2, 3.3, 3.4, 3.5, 3.6, 4.1, 4.2, 4.3, 4.4, 4.5, 5.1, 5.2
6Lecture: Designing organisational units, Reviewing Group Policy basics, Group Policy settings
Lab: Activities 4-1, 4-2, 4-3, 4-4, 4-5
1.1, 1.2, 1.3, 1.4, 1.5, 1.6, 1.7, 1.8, 1.9, 1.10, 2.1, 2.2, 2.3, 2.4, 2.5, 2.6, 2.7, 2.8, 3.1, 3.2, 3.3, 3.4, 3.5, 3.6, 4.1, 4.2, 4.3, 4.4, 4.5, 5.1, 5.2
7Lecture: Manipulating GPO deployments with advanced options, Fine-Grained account policies, Chapter Summary
Lab: Activities 4-6, 4-7, 4-8
1.1, 1.2, 1.3, 1.4, 1.5, 1.6, 1.7, 1.8, 1.9, 1.10, 2.1, 2.2, 2.3, 2.4, 2.5, 2.6, 2.7, 2.8, 3.1, 3.2, 3.3, 3.4, 3.5, 3.6, 4.1, 4.2, 4.3, 4.4, 4.5, 5.1, 5.2
8Lecture: Designing remote access, Network access protection, Planning for terminal services, Chapter Summary
Lab: Activities 5-1, 5-2, 5-3, 5-4, 5-5, 5-6, 5-7, 5-8, 5-9, 5-10, 5-11
1.1, 1.2, 1.3, 1.4, 1.5, 1.6, 1.7, 1.8, 1.9, 1.10, 2.1, 2.2, 2.3, 2.4, 2.5, 2.6, 2.7, 2.8, 3.1, 3.2, 3.3, 3.4, 3.5, 3.6, 4.1, 4.2, 4.3, 4.4, 4.5, 5.1, 5.2
9Lecture: An overview of PKI and certificates, Certificate life-cycle management, Types of certification authorities
Lab: Activities 6-1, 6-2, 6-3, 6-4, 6-5
1.1, 1.2, 1.3, 1.4, 1.5, 1.6, 1.7, 1.8, 1.9, 1.10, 2.1, 2.2, 2.3, 2.4, 2.5, 2.6, 2.7, 2.8, 3.1, 3.2, 3.3, 3.4, 3.5, 3.6, 4.1, 4.2, 4.3, 4.4, 4.5, 5.1, 5.2
10Lecture: Active Directory certificate services (AD CS), Implementing AD CS, Chapter Summary
Lab: Activities 6-6, 6-7, 6-8, 6-9
1.1, 1.2, 1.3, 1.4, 1.5, 1.6, 1.7, 1.8, 1.9, 1.10, 2.1, 2.2, 2.3, 2.4, 2.5, 2.6, 2.7, 2.8, 3.1, 3.2, 3.3, 3.4, 3.5, 3.6, 4.1, 4.2, 4.3, 4.4, 4.5, 5.1, 5.2
11Lecture: Hardening a system, Reducing the attack surface, Compliance auditing, Keeping a system up to date, Perimeter networks, Chapter Summary
Lab: Activities 7-1, 7-2, 7-3, 7-4, 7-5, 7-6, 7-7, 7-8, 7-9
1.1, 1.2, 1.3, 1.4, 1.5, 1.6, 1.7, 1.8, 1.9, 1.10, 2.1, 2.2, 2.3, 2.4, 2.5, 2.6, 2.7, 2.8, 3.1, 3.2, 3.3, 3.4, 3.5, 3.6, 4.1, 4.2, 4.3, 4.4, 4.5, 5.1, 5.2
12Lecture: Load balancing and fault tolerance, Network load balancing
Lab: Activities 8-1, 8-2, 8-3, 8-4, 8-5
1.1, 1.2, 1.3, 1.4, 1.5, 1.6, 1.7, 1.8, 1.9, 1.10, 2.1, 2.2, 2.3, 2.4, 2.5, 2.6, 2.7, 2.8, 3.1, 3.2, 3.3, 3.4, 3.5, 3.6, 4.1, 4.2, 4.3, 4.4, 4.5, 5.1, 5.2
13Lecture: Failover clusters, Active Directory backup and restores, Chapter Summary
Lab: Activities 8-6, 8-7, 8-8, 8-9, 8-10


 
1.1, 1.2, 1.3, 1.4, 1.5, 1.6, 1.7, 1.8, 1.9, 1.10, 2.1, 2.2, 2.3, 2.4, 2.5, 2.6, 2.7, 2.8, 3.1, 3.2, 3.3, 3.4, 3.5, 3.6, 4.1, 4.2, 4.3, 4.4, 4.5, 5.1, 5.2
14Lecture: Understanding the System Centre suite, Designing for data security, Designing for data accessibility and redundancy with DFS, Designing for data collaboration, Designing for additional Active Directory services, Chapter Summary
Lab: Activities 9-1, 9-2, 9-3, 9-4, 9-5, 9-6, 9-7, 9-8
 1.1, 1.2, 1.3, 1.4, 1.5, 1.6, 1.7, 1.8, 1.9, 1.10, 2.1, 2.2, 2.3, 2.4, 2.5, 2.6, 2.7, 2.8, 3.1, 3.2, 3.3, 3.4, 3.5, 3.6, 4.1, 4.2, 4.3, 4.4, 4.5, 5.1, 5.2
15Lecture: Application virtualisation, Microsoft application virtualisation, Using virtual PCs for applications, Server virtualisation, Virtualisation management, Chapter Summary
Lab: Revision
1.1, 1.2, 1.3, 1.4, 1.5, 1.6, 1.7, 1.8, 1.9, 1.10, 2.1, 2.2, 2.3, 2.4, 2.5, 2.6, 2.7, 2.8, 3.1, 3.2, 3.3, 3.4, 3.5, 3.6, 4.1, 4.2, 4.3, 4.4, 4.5, 5.1, 5.2
16Lecture: Revision
Lab: Practical Test
Lab journal submission
 1.1, 1.2, 1.3, 1.4, 1.5, 1.6, 1.7, 1.8, 1.9, 1.10, 2.1, 2.2, 2.3, 2.4, 2.5, 2.6, 2.7, 2.8, 3.1, 3.2, 3.3, 3.4, 3.5, 3.6, 4.1, 4.2, 4.3, 4.4, 4.5, 5.1, 5.2
17-18Closed Book Test 1.1, 1.2, 1.3, 1.4, 1.5, 1.6, 1.7, 1.8, 1.9, 1.10, 2.1, 2.2, 2.3, 2.4, 2.5, 2.6, 2.7, 2.8, 3.1, 3.2, 3.3, 3.4, 3.5, 3.6, 4.1, 4.2, 4.3, 4.4, 4.5, 5.1, 5.2


Learning Resources

Prescribed Texts

MCITP Guide to Microsoft Windows Server 2008 Enterprise Administration (Exam#70-647), Darril Gibson

9781423902393


References


Other Resources

Study materials will be available on myRMIT>Studies>COSC6153C

Oracle Virtual Box virtualisation software - available for download from https://www.virtualbox.org/wiki/Downloads
Microsoft Windows 7 Enterprise 90-day Trial - available for download from http://technet.microsoft.com/en-us/evalcenter/cc442495.aspx
Microsoft Windows Server 2008 Up to 120-Day Evaluation - supplied with the prescribed text
External USB Hard disk storage device with minimum capacity of 500GB
 


Overview of Assessment

The assessment is conducted in both theoretical and practical aspects of the course according to the performance criteria set in the National Training Package. Assessment may incorporate a variety of methods including written/oral activities and demonstration of practical skills to the relevant industry standards. Participants are advised that they are likely to be asked to personally demonstrate their assessment activities to their teacher/assessor. Feedback will be provided throughout the course. To successfully complete this course you will be required to demonstrate competency in each assessment task detailed under Assessment Tasks:

Assessment 1: Lab Journal
Weighting towards final grade (%): 20

Assessment 2: Practical Test
Weighting towards final grade (%): 40

Assessment 3: Closed Book Test
Weighting towards final grade (%): 40

These tasks assesses the following Course Learning Outcomes (CLOs):

Assessment Mapping Matrix

Elements/Performance CriteriaLab JournalPractical TestClosed Book Test
1.1xxx
1.2x x
1.3xxx
1.4xxx
1.5x x
1.6xxx
1.7 xx
1.8xxx
1.9xxx
1.1xxx
2.1 xx
2.2xxx
2.3xxx
2.4xxx
2.5xxx
2.6xxx
2.7xxx
2.8 xx
3.1 xx
3.2xxx
3.3xxx
3.4xxx
3.5xxx
3.6xxx
4.1xxx
4.2xxx
4.3xxx
4.4xxx
4.5xxx
5.1xxx
5.2 xx

 


Assessment Tasks

• Lab Journal,20%
• Practical Test, 40%
• Closed Book Test, 40 %

This course is graded as Competent or Not Yet Competent and subsequently the following course grades are allocated:

80 - 100: CHD - Competent with High Distinction
70 - 79: CDI - Competent with Distinction
60 - 69: CC - Competent with Credit
50 - 59: CAG - Competency Achieved - Graded
0 - 49: NYC - Not Yet Competent
DNS - Did Not Submit for Assessment.
 


Assessment Matrix

Assessment vs UEENEED114A Elements & Performance Criteria

 UEENEED114A Elements & Performance Criteria
Assessments1.11.21.31.41.51.61.71.81.91.102.12.22.32.42.52.62.72.83.13.23.33.43.53.64.14.24.34.44.55.15.2
Lab Journalxxx x xx xxx x x x x x x   x xxxxxxxxxx 
Practical Testx xx xxxxxxxxxxxxxxxxxxxxxxxxxx
Closed Book Testxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx

Assessment vs Engineers Australia Stage 1 Competencies

 Engineers Australia Stage 1 Competencies
 AssessmentsEA1.1EA1.2EA1.3EA1.4EA1.5EA1.6EA2.1EA2.2EA2.3EA2.4EA3.1EA3.2EA3.3EA3.4EA3.5EA3.6
Lab Journal X XXX XX  XXXXX 
Practical Test  XXX  XX X  X X X XX X
Closed Book Test   X X XX X  X   X X
All Assessments

UEENEED114A
 

1032303320232232
0 (Blank)Graduate attribute is not assessed.
1Graduate attribute is assessed in at least one, but less than one-third, of the Element
2Graduate attribute is assessed in at least one third, but less than two-thirds, of the Element
3Graduate attribute is assessed in more than two-thirds of the Element

Other Information

• Student directed hours involve completing activities such as reading online resources, assignments, individual student-teacher course-related consultation. Students are required to self-study the learning materials and complete the assigned out of class activities for the scheduled non-teaching hours. The estimated time is 20 hours outside the class time.

Study and Learning Support:

Study and Learning Centre (SLC) provides free learning and academic development advice to you. Services offered by SLC to support your numeracy and literacy skills are:

- Assignment writing, thesis writing and study skills advice
- Maths and science developmental support and advice
- English language development

Please Refer http://www.rmit.edu.au/studyandlearningcentre to find more information about Study and learning Support

Disability Liaison Unit:

If you are suffering from long-term medical condition or disability, you should contact Disability Liaison Unit to seek advice and support to complete your studies.

Please Refer http://www.rmit.edu.au/disability to find more information about services offered by Disability Liaison Unit.

Late Submission:

If you require an Extension of Submittable Work (assignments, reports or project work etc.) for 7 calendar days or less (from the original due date) and have valid reasons, you must complete and lodge an Application for Extension of Submittable Work (7 Calendar Days or less) form and lodge it with the Senior Educator/ Program Manager.
The application must be lodged no later than one working day before the official due date. You will be notified within no more than 2 working days of the date of lodgement as to whether the extension has been granted.

If you seek an Extension of Submittable Work for more than 7 calendar days (from the original due date) must lodge an Application for Special Consideration form under the provisions of the Special Consideration Policy, preferably prior to, but no later than 2 working days after the official due date.

Submittable Work (assignments, reports or project work etc.) submitted late without approval of an extension will not be accepted or marked.

Special Consideration:

Please refer http://www.rmit.edu.au/students/specialconsideration to find more information about special consideration


Plagiarism:

Plagiarism is a form of cheating and it is very serious academic offence that may lead to expulsion from the University.

Please Refer: http://www.rmit.edu.au/academicintegrity to find more information about plagiarism.

Email Communication:

All email communications will be sent to your RMIT email address and you must regularly check your RMIT emails.

Course Overview: Access Course Overview