Академический Документы
Профессиональный Документы
Культура Документы
For answering this topic we have designed and developed the network in acculearns lab
Lab Setup:
PCs Configuration
Device
IP Address
Subnet Mask
Gateway
VLAN
Connected With
PC0
10.0.0.2
255.0.0.0
10.0.0.1
VLAN 10
PC1
20.0.0.2
255.0.0.0
20.0.0.1
VLAN 20
PC2
10.0.0.3
255.0.0.0
10.0.0.1
VLAN 10
PC3
20.0.0.3
255.0.0.0
20.0.0.1
VLAN 20
PC4
10.0.0.4
255.0.0.0
10.0.0.1
VLAN 10
PC5
20.0.0.4
255.0.0.0
20.0.0.1
VLAN 20
Connected To
VLAN
Link
Status
F0/1
With PC0
VLAN 10
Access
OK
F0/2
With PC1
VLAN 20
Access
OK
Gig1/1
With Router
VLAN 10,20
Trunk
OK
Gig 1/2
With Switch2
VLAN 10,20
Trunk
OK
F0/24
Witch Switch2
VLAN 10,20
Trunk
STP - Blocked
Connected To
VLAN
Link
Status
F0/1
With PC0
VLAN 10
Access
OK
F0/2
With PC1
VLAN 20
Access
OK
Gig 1/2
With Switch1
VLAN 10,20
Trunk
OK
Gig 1/1
With Switch3
VLAN 10,20
Trunk
OK
F0/24
Witch Switch1
VLAN 10,20
Trunk
STP - Blocked
F0/23
Witch Switch3
VLAN 10,20
Trunk
STP - Blocked
Connected To
VLAN
Link
Status
F0/1
With PC0
VLAN 10
Access
OK
F0/2
With PC1
VLAN 20
Access
OK
Gig 1/1
With Switch2
VLAN 10,20
Trunk
OK
F0/24
Witch Switch1
VLAN 10,20
Trunk
STP - Blocked
Router Configuration
Port
Connected To
VLAN
Link
Status
Fa0/0
VLAN 10, 20
Trunk
Ok
VLAN Configuration
VLAN Number
VLAN Name
Gateway IP
PCs
10
Sales
10.0.0.1
PC0,PC2,PC4
20
Management
20.0.0.1
PC1,PC3,PC5
Configure VTP
VLAN Trunk Protocol (VTP) is a Cisco proprietary protocol used to share VLAN configuration across
the network. Cisco created this protocol to share and synchronize their VLAN information
throughout the network. Main goal of VTP is to manage all configured VLANs across the network.
In our network we only have three switches. We can easily add or remove VLAN manually on all
three switches. However this process could be more tedious and difficult if we have 50 switches. In a
large network, we might make a mistake in VLAN configuration. We might forget to add VLAN on
one of the switch, or we may assign wrong VLAN number. Vice versa we may forget to remove VLAN
on one of the switch, while removing VLANs.
VTP is a life saver protocol in this situation. With VTP we can add or remove VLANs on one switch
and this switch will propagate VLAN information to all other switches in network.
VTP Messages
VTP share VLANs information via VTP messages. VTP messages can only be propagate through the
trunk connections. So we need to set up trunk connection between switches. VTP messages are
propagated as layer 2 multicast frames.
VTP Domain
VTP domain is a group of switches that share same VLAN information. A switch can have a single
domain. VTP messages include domain name. Switch only update VLAN information if it receive VTP
message from same domain.
VTP Mode
VTP can be configured in three different modes.
Server
Transparent
Student
VTP Server Mode
VTP Server can add, modify, and delete VLANs. It will propagate a VTP message containing all the
changes from all of its trunk ports. If server receives a VTP message, it will incorporate the change
and forward the message from all remaining trunk ports.
VTP Transparent Mode
VTP Transparent switch can also make change in VLANs but it will not propagate these changes to
other switches. If transparent switch receives a VTP message, it will not incorporate the change and
forward the message as it receives, from all remaining trunk ports.
VTP Student Mode
VTP student switch cannot change the VLAN configurations itself. It can only update its VLAN
configuration through the VTP messages that it receive from VTP server. When it receives a VTP
message, it incorporates with the change and then forwards it from remaining trunk ports.
Configure VTP Server
To configure Office 1 Switch as VTP Server. we have ssh connection through putty Office 1 Switch.
By default all switches work as VTP server so we only need few commands to configure it. In
following commands we will
Set hostname to S1
Set domain name to acculearn
Set password to acculearn. (Password is case sensitive)
Switch>enable
Switch#configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
Switch(config)#hostname S1
Switch>enable
Switch#configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
Switch(config)#hostname S2
S2(config)#vtp mode student
Setting device to VTP STUDENT mode.
S2(config)#vtp domain acculearn
Changing VTP domain name from NULL to acculearn
S2(config)#vtp password acculearn
Setting device VLAN database password to acculearn
S2(config)#
Now access CLI prompts of Office 3 Switch and enter following commands
Switch>enable
Switch#configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
Switch(config)#hostname S3
S3(config)#vtp mode student
Setting device to VTP STUDENT mode.
S3(config)#vtp domain acculearn
Changing VTP domain name from NULL to acculearn
S3(config)#vtp password acculearn
Interfaces
Office 1
Office 2
Office 3
Gig1/1, Gig1/2
By default all interface on switch starts as access link. switchport mode trunk command is used to
change connection link in trunk. Run this command from interface mode. In next section we will
change all necessary interfaces [given in above table] connection link in trunk.
Office 1 Switch
S1(config)#interface fastEthernet 0/24
S1(config-if)#switchport mode trunk
%LINEPROTO-5-UPDOWN: Line protocol on Interface FastEthernet0/24,
changed state to down
%LINEPROTO-5-UPDOWN: Line protocol on Interface FastEthernet0/24,
changed state to up
S1(config-if)#exit
S1(config)#interface gigabitEthernet 1/1
S1(config-if)#switchport mode trunk
S1(config-if)#exit
S1(config)#interface gigabitEthernet 1/2
S1(config-if)#switchport mode trunk
%LINEPROTO-5-UPDOWN: Line protocol on Interface GigabitEthernet1/2,
changed state to down
%LINEPROTO-5-UPDOWN: Line protocol on Interface GigabitEthernet1/2,
changed state to up
S1(config-if)#exit
S1(config)#
Office 2 Switch
S2(config)#interface gigabitEthernet 1/1
S2(config-if)#switchport mode trunk
%LINEPROTO-5-UPDOWN: Line protocol on Interface GigabitEthernet1/1,
changed state to down
%LINEPROTO-5-UPDOWN: Line protocol on Interface GigabitEthernet1/1,
changed state to up
S2(config-if)#exit
S2(config)#interface gigabitEthernet 1/2
S2(config-if)#switchport mode trunk
S2(config-if)#exit
S2(config)#interface fastEthernet 0/23
S2(config-if)#switchport mode trunk
%LINEPROTO-5-UPDOWN: Line protocol on Interface FastEthernet0/23,
changed state to down
%LINEPROTO-5-UPDOWN: Line protocol on Interface FastEthernet0/23,
changed state to up
S2(config-if)#exit
S2(config)#interface fastEthernet 0/24
S2(config-if)#switchport mode trunk
S2(config-if)#exit
Office 3 Switch
S3(config)#interface fastEthernet 0/24
S3(config-if)#switchport mode trunk
S3(config-if)#exit
S3(config)#interface gigabitEthernet 1/1
S3(config-if)#switchport mode trunk
S3(config-if)#exit
So far we have configured VTP server and VTP students. We have also changed necessary links in
trunk. Now we will configure VLANs on VTP server and that will automatically propagate VLANs in
network.
Configure VLAN
Create VLAN
vlan vlan number command is used to create the VLAN. VLANs are created on VTP Server. In our
network, Office 1 Switch is working as VTP Server; thus we will create VLANs on it.
Office 1 Switch
S1(config)#vlan 10
S1(config-vlan)#exit
S1(config)#vlan 20
S1(config-vlan)#exit
S1(config)#
How to assign VLAN Membership
VLAN can be assigned statically or dynamically. In our course we will use static method; therefore we
will also use static method to assign VLAN membership. switchport access vlan [vlan
number] command is used to assign VLAN to the interface. Following commands will assign VLANs to
the interfaces.
Office 1 Switch
S1(config)#interface fastEthernet 0/1
S1(config-if)#switchport access vlan 10
S1(config-if)#interface fastEthernet 0/2
S1(config-if)#switchport access vlan 20
Office 2 Switch
S2(config)#interface fastEthernet 0/1
S2(config-if)#switchport access vlan 10
S2(config-if)#interface fastEthernet 0/2
S2(config-if)#switchport access vlan 20
Office 3 Switch
S3(config)#interface fastEthernet 0/1
S3(config-if)#switchport access vlan 10
S3(config-if)#interface fastEthernet 0/2
S3(config-if)#switchport access vlan 20
Here we have successfully assigned VLAN membership. Now at this point is to test our configuration.
To test this configuration, we will use pingcommand. ping command is used to test connectivity
between two devices. As per our configuration, devices from same VLAN can communicate. Devices
from different VLANs must not be able to communicate with each other without router.
Test VLAN configuration
We have two VLAN configurations VLAN 10 and VLAN 20. We have to test VLAN 10 first. In VLAN 10
we have three PCs with IP addresses 10.0.0.2, 10.0.0.3 and 10.0.0.4. These PCs must be able to
communicate with each other's. At this point PCs from VLAN 10 should not be allowed to access PCs
from VLAN 20. VLAN 20 also has three PCs 20.0.0.2, 20.0.0.3 and 20.0.0.4.
With default configuration we need two physical interfaces on router to make this intra VLAN
communication. Due to price of router, its not a cost effective solution to use a physical interface of
router for each VLAN. Usually a router has one or two Ethernet interface. For example if we have 50
VLANs, we would need nearly 25 routers in order to make intra VLANs communications. To deal with
situation we use Router on Stick.
Router on Stick is router that supports trunk connection and has an ability to switch frames between
the VLANs on this trunk connection. On this router, single physical interface is sufficient to make
communication between our both VLANs.
Access command prompt of Router
To configure Router we have access the router through aux port and gained access to CLI mode.
Router>enable
Router#configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
Router(config)#interface fastEthernet 0/0
Router(config-if)#no ip address
Router(config-if)#no shutdown
Router(config-if)#exit
Router(config)#interface fastEthernet 0/0.10
Router(config-subif)#encapsulation dot1Q 10
Router(config-subif)#ip address 10.0.0.1 255.0.0.0
Router(config-subif)#exit
Router(config)#interface fastEthernet 0/0.20
Router(config-subif)#encapsulation dot1Q 20
Router(config-subif)#ip address 20.0.0.1 255.0.0.0
Router(config-subif)#exit
In above configuration we broke up single physical interface [FastEthernet 0/0] into two logical
interfaces, known as sub-interfaces. Router supports up to 1000 interfaces including both physical
and logical.
By default interface link works as access link. We need to change it into trunk link. encapsulation
commands specify the trunk type and associate VLAN with sub-interface.
In next step we assigned IP address to our sub-interface.
That's all configuration we need to switch VLANs. Now we can test different VLAN communications.
To test intra VLANs communication open command prompt of PC and ping the PC of other VLAN.
PC [10.0.0.3] from VLAN 10 can now access PC [20.0.0.2] from VLAN 20.
Spanning Tree Protocol (STP)
STP is a layer 2 protocol, used for removing loops. For backup purpose we typically create backup
links for important resources. In our scenario, all offices have backup links that create loops in
topology. STP automatically removes layer 2 loops. STP multicasts frame that contain information
about switch interfaces. These frames are called BPDU (Bridge Protocol Data Units). Switch use
BPDUs to learn network topology. If it found any loop, it will automatically remove that. To remove
loop, STP disables port or ports that are causing it.
A Network Topology is the arrangement with which computer systems or network devices are
connected to each other. Topologies may define both physical and logical aspect of the network.
Both logical and physical topologies could be same or different in a same network.
They are just different ways of representing a network architecture. Physical topologies are how the
wires are interconnected, while logical topology is how the network behaves and interoperates.
Here we will discuss the common network topologies
Point-to-Point
Point-to-point networks contains exactly two hosts such as computer, switches or routers, servers
connected back to back using a single piece of cable. Often, the receiving end of one host is
connected to sending end of the other and vice-versa.
If the hosts are connected point-to-point logically, then may have multiple intermediate devices. But
the end hosts are unaware of underlying network and see each other as if they are connected
directly.
Star Topology
All hosts in Star topology are connected to a central device, known as hub device, using a point-topoint connection. That is, there exists a point to point connection between hosts and hub. The hub
device can be any of the following:
Layer-1 device such as hub or repeater
Layer-2 device such as switch or bridge
Layer-3 device such as router or gateway
As in Bus topology, hub acts as single point of failure. If hub fails, connectivity of all hosts to all other
hosts fails. Every communication between hosts, takes place through only the hub. Star topology is
not expensive as to connect one more host, only one cable is required and configuration is simple.
Tree Topology
Also known as Hierarchical Topology, this is the most common form of network topology in use
presently. This topology imitates as extended Star topology and inherits properties of bus topology.
This topology divides the network in to multiple levels/layers of network. Mainly in LANs, a network
is bifurcated into three types of network devices. The lowermost is access-layer where computers
are attached. The middle layer is known as distribution layer, which works as mediator between
upper layer and lower layer. The highest layer is known as core layer, and is central point of the
network, i.e. root of the tree from which all nodes fork.
All neighbouring hosts have point-to-point connection between them. Similar to the Bus topology, if
the root goes down, then the entire network suffers even. Though it is not the single point of failure.
Every connection serves as point of failure, failing of which divides the network into unreachable
segment.
Daisy Chain
This topology connects all the hosts in a linear fashion. Similar to Ring topology, all hosts are
connected to two hosts only, except the end hosts. Means, if the end hosts in daisy chain are
connected then it represents Ring topology.
Each link in daisy chain topology represents single point of failure. Every link failure splits the
network into two segments. Every intermediate host works as relay for its immediate hosts.
Layer 7 Application Layer: The application layer is the OSI layer closest to the end student, which
means that both the OSI application layer and the student interact directly with the software
application. This layer interacts with software applications that implement a communicating
component. Such application programs fall outside the scope of the OSI model. Application layer
functions typically include identifying communication partners, determining resource availability,
and synchronizing communication. Examples of application layer implementations include Telnet,
Hypertext Transfer Protocol (HTTP), File Transfer Protocol (FTP), NFS and Simple Mail Transfer
Protocol (SMTP).
Layer 6 Presentation Layer: The presentation layer provides a variety of coding and conversion
functions that are applied to application layer data. These functions ensure that information sent
from the application layer of one system would be readable by the application layer of another
system. Some examples of presentation layer coding and conversion schemes include common data
representation formats, conversion of character representation formats, common data compression
schemes, and common data encryption schemes, for example, eXternal Data Representation (XDR)
used by Network File System (NFS).
Layer 5 Session Layer: The session layer establishes, manages, and terminates communication
sessions. Communication sessions consist of service requests and service responses that occur
between applications located in different network devices. These requests and responses are
coordinated by protocols implemented at the session layer. Examples of session layer protocols
include NetBIOS, PPTP, RPC and SSH etc.
Layer 4 Transport Layer: The transport layer accepts data from the session layer and segments the
data for transport across the network. Generally, the transport layer is responsible for making sure
that the data is delivered error-free and in the proper sequence. Flow control generally occurs at the
transport layer. Transmission Control Protocol (TCP) and Student Datagram Protocol (UDP) are
popular transport layer protocols.
Layer 3 Network Layer: The network layer defines the network address, which differs from the
MAC address. Some network layer implementations, such as the Internet Protocol (IP), define
network addresses in a way that route selection can be determined systematically by comparing the
source network address with the destination network address and applying the subnet mask.
Because this layer defines the logical network layout, routers can use this layer to determine how to
forward packets. Because of this, much of the design and configuration work for inter-networks
happens at Layer 3, the network layer. The Internet Protocol (IP) and related protocols like ICMP,
BGP etc are commonly used layer 3 protocols.
Layer 2 Data link Layer: The data link layer provides reliable transit of data across a physical
network link. Different data link layer specifications define different network and protocol
characteristics, including physical addressing, network topology, error notification, sequencing of
frames, and flow control. Physical addressing (as opposed to network addressing) defines how
devices are addressed at the data link layer. Asynchronous Transfer Mode (ATM) and Point-to-Point
Protocol (PPP) are common examples of layer 2 protocols.
Layer1 Physical Layer: The physical layer defines the electrical, mechanical, procedural, and
functional specifications for activating, maintaining, and deactivating the physical link between
communicating network systems. Physical layer specifications define characteristics such as voltage
levels, timing of voltage changes, physical data rates, maximum transmission distances, and physical
connectors. Popular physical layer protocols include RS232, X.21, Firewire and SONET.
The term system architecture is used to describe the overall design and structure of a
computer network or system. As information technology has expanded to include a wide
range of physical devices, a method is required to organize and connect these items together
in a cohesive manner. The term is also used to describe complex computer software tools that
include multiple modules.
There are four main components to any system architecture: processing power, storage,
connectivity, and student experience. The complexity of the system varies widely and is
dependent upon student needs, business requirements, funding, and resource availability. It is
important to note that system architecture must be flexible and able to meet changing needs
quickly. A structure that is too rigid will not be able to accommodate new software or
hardware.
Processing power is based on the computer or server. This hardware is akin to the brain of the
system. Purchasing and installing the correct allocation of processors to the system must be
based on the software specifications, number of concurrent students, strength of the
connection, and applications. When designing a system, scalability is critical. The system
architecture must allow additional processors to be added without any interruption to the
current structure.
There are four main components to any system architecture: processing power, storage,
connectivity, and student experience.
Storage space is based on the number and capacity of the hard drives and related devices built
into the system. Cost is a determining factor for this type of equipment, as the cost is
constantly decreasing as the capacity increases. This is due to ongoing improvements in the
production process. However, from an architecture perspective, this adds another element to
the process. As the capacity increases, the overall physical shape can change, making
equipment obsolete.
Managing network traffic and connectivity is an important part of the system design. Much like
roads in everyday life, the performance of the system is dependent upon correctly sizing and
maintaining the connectivity between all aspects of the system. Upgrading network cable, switches,
routers, and other equipment is expensive and time consuming, but has a huge impact on system
performance.
The student experience is based on a combination of system architecture and performance. Business
students typically have minimal understanding or interest in all the aspects of the system that can
positively or negatively impact his or her individual computer. A well-designed support system is
responsive to students need and can support the operation in the long run. The responsibility for the
overall architecture and support typically falls to the technical operations department.
1. Work as a member of a team to achieve defined goals and implement agreed plans
1.1 Effectively plan and manager your own time
My plan for a day working at Acculearn normally consists of the same usual activities which are
assigned to me to complete. So I get into work for half 8 so I can answer the phone if any students
have some early morning problems. Once both of my supervisors are in, I will try and complete any
emails that I have flagged in IT helpdesk.
Whenever we have any activity with new starters or leavers, it is up to me to make sure that
everything is sorted according to a checklist that I have created with my supervisor. I am also in
control of sorting out new computers or laptops when they arrive, by installing our Acculearn
image upon them and installing all of the necessary software. Any events such as meetings or tasks
that I need to perform are recorded and placed within my calendar, to give me a little reminder of
what I need to do on certain days.
Personal data shall be obtained for one or more specified and lawful purposes and must not be
processed in any manner that is incompatible with that purpose or purposes.
Personal data shall be processed fairly and lawfully and not processed unless certain conditions are
met and in the case of sensitive personal data further conditions are met.
Personal data shall be adequate, relevant and not excessive in relation to the purpose or purposes
for which they are processed.
Personal data shall be accurate and, where necessary, kept up to date.
Personal data held for any purpose or purposes shall not be kept for longer than is necessary for that
purpose or those purposes.
Personal data shall be processed in accordance with the rights of data subjects under the 1998 Act.
Appropriate technical and organisational measures shall be taken against unauthorised or unlawful
processing of personal data and against accidental loss or destruction of, or damage to, personal
data.
Personal data shall not be transferred to a country outside the European Economic Area, unless that
country or territory ensures an adequate level of protection for the rights and freedoms of data
subjects in relation to the processing of personal data.
Obviously working for Training they deal with confidential information all the time, so it is up to IT to
make sure that none of this information falls into the wrong hands. We do daily backups of each
server onto backup tapes, that are then stored within a secure safe. We also have to get verification
from the student and their superior before we allow someone to have access to their emails or
h:/drive.
Computer Misuse Act
The implications of the computer misuse act are that any unauthorised access to someones
computer or the data on that computer is deemed illegal. Also the making and supplying of software
that can facilitate these activities is within breach of the act. The act is split into three sections
making the following acts illegal.
Unauthorized access to computer material
Unauthorized access to computer systems with intent to commit another offense
Unauthorized modification of computer material
The first section of the act forbids a person to use someone elses identification to access a
computer, run a program, or obtain any data. The act also outlaws any attempts that are made to
change, delete or move a program and also any attempts to gain someones password.
The second point is more associated with gaining access to a computer system in order to commit or
facilitate a crime. An individual cant use someone elses system to send material that might be
offensive or to start worms or viruses. He also cant give someone his identification so that he can
use a system for this purpose.
When it comes to unauthorized modification on a computer system, an individual cannot delete,
change or corrupt data. So if someone places a virus onto someone elses machine, he would be
violating the act. Usually committing unauthorized access only is thought a crime punishable by fine.
Access with intent and unauthorized modification however is considered more severe and can be
punished by heavy fines and/or jail time.
So when a new starter arrives at Acculearn, they firstly are shown the IT Communication Policy,
which within it states that no software or documentation can be brought over from a previous
company. This is to reduce the risk of any malicious software making its way onto the system.
We also must have verification from the student and their superior, when someone asks for access
to someone else emails or student area. Once we have that authorisation, we will then give the
student access to that certain item, explaining the rights and responsibilities they now have.
2.2 Identify the role of professional bodies for IT, and the benefits of membership to individuals
and organisations
FAST (Federation against Software Theft)
FAST aims to reduce, restrict and or lessen the incidence of unauthorised dealings in computer
software. They handle this with the management of legitimate software and by protecting
publishers intellectual property rights.
The major benefits of associating yourself with FAST are the following bullet points:Business Development and Networking Meet potential and existing partners and customers at
FAST events, sharing your knowledge and insight for the industry.
A voice for the Industry With FAST being a trade association, they look to ensure that their
members voice is heard at a government level and that the economic contribution of the software
industry is valued and supported.
Visibility and Branding Allowing you to raise the profile of your company and the products it
produces and provides via FAST editorial and marketing opportunities.
Intellectual Property Protection Allows you access to an invaluable network of support when your
IP comes under attack from any source.
BCS (British Computer Society)
The British Computer Society is a chartered institute for IT champions, the global IT profession and
the interests of individuals engaged within the profession as well. The major benefits of subscribing
to their services are
There will provide the tools to help develop your career, with methods such as mentoring,
discounted training opportunities, access to Best Practice Portal/Corporate IT Forum.
As a member you will get the opportunity to regularly network with people and discuss various
topics relevant to different areas of IT. Many of these opportunities will take place at official BCS
facilities. You will also be able to network remotely via social media and the BCS Member network.
There is further access to online libraries, such as ITNOW and discount also available for IT eBooks
and IT magazines as well.
2.3 Describe quality management systems and standards for systems development
Quality Management Systems
A quality management system is all about the structure, procedures, processes and resources
needed to implement quality management. Over the years the way in which quality management is
accessed has changed, meaning new methods have come in to help improve the quality of service
that a company will provide. There several elements that make up a QMS and they include:Organisational Structure
Data Management
Customer Satisfaction
Continuous Improvement
Product Quality
Transparency and independent audit
Standards for System Development
The system development life cycle is the process for creating and altering information systems, and
the models and methodologies that people use to develop them. The methodology behind this
system forms the framework for planning and controlling the creation, testing and delivery of an
information system.
The systems development life-cycle concept acts as the foundation for multiple different
development and delivery methodologies, such as hardware and software. But the standard setup
for any system development life cycle normally includes the following basic processes:Planning
Analysis
Design
Implementation
Maintenance
Within each of these processes there are various sub-processes as well which help complete each
stage of the development cycle. Processes such as testing would take place during the design stage
or training and transition processes for the staff and colleagues would take place during the
implementation process.
3. Understand the ethical and legislative environment relating to IT activities
3.1 Identify the types of conflicts of interest which can arise for IT professionals
Working for the IT helpdesk here at Acculearn Training we regularly come across problems which
can cause some kind of commotion which results in different types of conflict. Whenever someone
contacts IT helpdesk with a question; whether it be by email or phone, they are taking time out of
their day where they could be getting on with work for a student.
So it is imperative that we get them back up and running as quickly as we possibly can. Sometimes
however the quick solution isnt achievable due to the severity of the problem or because of reasons
outside of our control. So the longer the problem goes unsolved, the more conflict can arise
between us and the student.
So in this case above the conflict of interest revolves around the basis of the student trying to get
their work done, but their computer then prevents them from carrying out the task meaning that we
then have to provide a helping hand to dismiss the conflict between the two.
3.2 Describe the impact on an organisation of legislation covering:
Processing of financial transactions
This is all covered within the Training Regulations Authority, where finance departments are has to
abide by the account rules, which are the following:The main purpose of the account rules within the Training Regulations Authority is to keep our
students money safe. Our finance department must comply with the below principles, which are the
following:Keep other peoples money separate from money belonging to you or your firm.
Keep other peoples money safely in a bank or building society account identifiable as a student
account (Except when the rules specifically provide otherwise)
Use each students money for that students matter only.
Use money held a trustee of a trust for the purposes of that trust only.
Establish and maintain proper accounting systems, and proper internal controls over those systems,
to ensure compliance with the rules.
Keep proper accounting records to show accurately the position with the regard to the money held
for each student and trust
Account for interest on other peoples money in accordance with the rules.
Co-operate with the SRA in checking compliance with the rules and deliver annual accountants
reports as required by the rules.
When it comes to processing a bill for a student here at Acculearn we will use our case management
software, Student Management System to process and produce the bill. But before we can go
through the process of producing the bill we need to have some form of identification from the
student. This is called anti money laundering (AML) which is a set of rules and regulations that stops
the practice of generating income from illegal actions.
So the way we combat this is by asking for 2 forms of identification from the student, when they are
first added to the system. If we dont have this completed by the time we open a matter on the
student, then we wont accept money generated on the student from bills or time recording.
We also use online banking via Barclays, which always needs authorisation for any payments coming
in or going out. The authorisers in question are people who have worked at Acculearn for more than
6 months. They are provided with tokens which they have to use every time they log into the online
banking.
Once that they are in they will have a list of payments that they will need to authorise, along with
the payment sheets that are provided for them. The information on these sheets should match the
details on the screen. If it does then the authoriser can sign the payment off and hand the sheet
back to the finance department authorised.
Verbal attend
The basis of communication is the interaction between people. Verbal communication is one way
for people to communicate face-to-face. Some of the key components of verbal communication are
sound, words, speaking, and language.
Intonation: intonation is not always used correctly. For instance, the fact that simultaneous
interpreters do not know how the speaker is going to proceed in his or her speech may lead the
interpreters intonation to indicate their state of expectation. In that case, the voice tends to go up
at the end of a sentence. In many languages, a rising intonation is a sign of surprise or a question,
but when being used systematically by the interpreter it becomes very difficult for the audience to
listen and understand where sentences begin and end, or to distinguish what is affirmative and what
is interrogative.
Tone: The tone of voice is a means by which the speaker implies his or her attitude to the message.
It is also a means by which he seeks a reaction from the hearer. In a political debate, for instance,
the tone of voice is likely to be rousing, whereas on television the daily news is communicated in a
more factual tone. Other examples of tone of voice are: aggressive, critical, nervous, disappointed,
monotonous, friendly, enthusiastic, vivid, persuasive, etc.
Feedback: Your audience will provide you with feedback, verbal and non-verbal reactions to your
communicated message. Feedback, as it is the only thing that allows you to be confident that your
audience has understood your message. If you find that there has been a misunderstanding, at least
you have the opportunity to send the message a second time.
Non-verbal techniques
Smiling on phone: Smile while you're talking this has a proven positive effect on the conversation.
Have a pen and paper handy, or be ready at the keyboard to write down or type any addresses,
phone numbers, dates, or other important facts that might be discussed during the call.
Mute or turn off the television before attempting to use the phone
Always say HELLO do not say anything else
Use an approved company greeting when answering a business call
Allow the line to ring at least five before hanging up
If possible ask anyone you call if it is a good time to be calling
Be sure to state the purpose of the call early in the conversation, and thank the other person before
you complete the call
Be patience and listen the caller carefully
Tidy language: Consider how your perceptions of people are affected by the way they sit, walk, stand
up, or hold their head. The way you move and carry you communicates a
Wealth of information to the world. This type of nonverbal communication includes your posture,
bearing, stance, and subtle movements.
Be Open and Confident: When it comes to making the first impression, body language as well as
appearance speaks much louder than words.
Use your body language to project appropriate confidence and self-assurance. Stand tall, smile (of
course), make eye contact, greet with a firm handshake. All of this will help you project confidence
and encourage both you and the other person to feel better at ease.
Attentive listening: Means thinking and acting in ways that connect you with the speaker. While
active listing usually happens naturally when we are very interested in what someone is saying. We
can also choose to listening activity whenever we want to maximize the quality of our listening both
in terms of the effect it has on us and the effect it has on those we are speaking to. By contrast,
when people "multi-task" while someone speaks, they rarely listen effectively.
Difference between hearing and listening: Listening and hearing may be both sensed through our
ears but beyond that listening is very different to hearing. Hearing is just the perception that there
are several sounds going through your ear while listening is parsing every part of the sound and
understanding what it is meant. Therefore, listening begets understanding while hearing does not.
Aside from this, listening requires attentiveness and concentration which requires your brain to
work.
Positive and negative language: Positive body language is when a person is showing they are happy
or comfortable e.g. leaning towards the person they are talking to/with or simply smiling
Negative body language is showing the person is uncomfortable or unhappy e.g. crossed arms,
frowning, looking around the room aimlessly (bored).
Active listening:
Active listening is a communication technique. Active listening requires the listener to understand,
interpret, and evaluate what they hear. The ability to listen actively can improve personal
relationships through reducing conflicts, strengthening cooperation, and fostering understanding.
When you do active listening, you're agreeing to focus on a common goal: to improve your ability to
deal with the problems in your relationship.
Active listening is very different from the way we usually deal with arguments. It will be difficult to
make this kind of change when both of you feel very upset. Don't get discouraged if it doesn't work
right away.
Summarising: A summary is an overview of a text. The main idea is given, but details, examples and
formalities are left out. Used with longer texts, the main aim of summarizing is to reduce or
condense a text to its most important ideas. Summarizing is a useful skill for making notes from
readings and in lectures, writing an abstract/synopsis and incorporating material in assignments.
Paraphrasing: A paraphrase is a passage borrowed from a source and rewritten in your own words. A
paraphrase should be true to the original authors idea, but is rewritten in your own words and
sentence structure. Since you are using someone elses ideas and expressing them in your own
words, it is very important to give credit to the source of the idea.
Body language: Body language is a form of non-verbal communication, which consists of body
posture, gestures, facial expressions, and eye movements. Humans send and interpret such signals
subconsciously. Body language is one our most subtle, yet important modes of communication.
Understanding body language, or non-verbal communication, enables us to positively develop our
communication style, and improve our relationships with people around us.
Listening barriers: Listening barriers can prevent effective listening if they arent understood and
managed.
Background noise: Background noise is any sound element that tends to distract or in some manner
interfere with the ability of the individual to hear or be heard. There are many different types of
background noises, ranging from those that are almost undetectable to others that are extremely
irritating. Fortunately, there are often ways to minimize the intrusion of this secondary noise and
overcome the irritation. When you talk to the customer make sure you are not in noisy place and
make sure you have no background noise dont listen music, talk in mobile phone and talking with
friend. If you are doing these things you maybe lose your job.
Distractions: Holding ones attention today is difficult enough without distractions. We need to
minimize distractions. Some of the standard distractions are:
Noise: Many times it is difficult to have meaningful conversations due to a noisy location.
Visual: It can tough to concentrate when there is a lot activity or other visual distraction in the
area.
Stress: The stress is someone life can make it difficult to concentrate. Stress can be for many
reasons such as family issues, work problems, financial concerns, illness of self or a family member,
and more.
A manner of speaking in which the loudness, pitch, or tone of the voice is modified
Business Or Technical Terminology
Technical terminology is the specialized vocabulary of any field not just technical field.
Vocabulary
Your success in most every area of life is directly connected to your level of vocabulary knowledge. If
you don't know a lot of English vocabulary, you will struggle. If you know a lot of words, and have a
lot of verbal confidence, you will be able to understand, learn, and express yourself better. Other
people will be more inclined to respect and follow you, and you will be more successful in whatever
you do.
Large vocabulary helps you organize your thoughts with clarity and distinction. Building word power
is a lifelong, ongoing process, and Learn That Word is the perfect tool to guide you along. If you are
sure of what you know your confidence will nurture everything you say, write or do.
Choose the best communication channel for your specific message. A communication channel
is the way in which you communicate. For example, phone calls, texts, email, and face-to-face are all
communication channels. If your message is long or complicated, an email or text is not suitable. If
you're worried about becoming too angry during a face-to-face conversation, then maybe an email is
the way to go.
Choose an appropriate time to have a conversation. If you want to ask your boss for a raise,
you should not do so during the company's busiest week, or you risk your boss not being able to
listen or absorb what you're saying.
Speak clearly when talking to someone. This doesn't just refer to the volume or annunciation
of your message, but also the terms you are using. Many times doctors will explain a patient's
condition to them in medical terms, which most patients are not familiar with, so the patient walks
away confused. Do not use slang or terminology that the listener is not familiar with.
Listen when the other person is speaking. Instead of thinking about what you will say next,
actually take in what the other person is saying so you are able to receive their message, as well.
Cultural Difference
Cultural differences are the variations in the way of life, beliefs, traditions and laws between
different countries, religions, societies and people. Many people see culture as an all-encompassing
overview of large groups of people. However, the word culture can be used to describe the way of
life of much smaller groups.
The most common meaning of culture, as suggested, is that of large groups of people and how their
lifestyles and beliefs differ; this is where cultural differences come in. Where we live and what we
believe has a great impact on all aspects of our life whether we realise it or not. Some of the
differences between cultures are enforced by internal rules (such as legal age of marriage) whereas
others just happen through many years of development towards a certain way over another.
For this assignment I have been asked to provide support and advice in assessing and
minimising risks related to work activities such as:Effects on customer operations
Loss or corruption of data
Loss of service
Damage to equipment
For each point I will explain the meaning of the statement and then talk about an example
where advice would have been given to a student here at Acculearn.
Effect on Customer Operations
The customers that we deal with here at Acculearn are students that our fee earners will
represent in a certain manner. With that being the case; we need a secure and legitimate way
of keeping track of every step we are involved with our students.
Creating a student and uploading all the documents are produced on each matter is the main
advantage of having Student Management System, allowing us to keep all the information in
track for meetings with students.
To help ensure that students have all the information they need on both of these programs, we
will talk them through the basics when they attend their induction training. We then supplied
any further documents on the intranet in the Help section, where student can look for advice
and information on certain activity. So say a student would like a refresher on how to create a
new student on Student Management System, they would simply connect to the intranet
(which we set as everyone homepage when they open internet explorer.) and on the toolbar
across the top select Help. Inside will be a folder labelled Student Management System
which contains a word document explaining every point used in adding a contact to the
database.
We however do have some occurrences that required our assistance; most commonly due to
the fact the student may lose connection to the Student Management System server. In this
situation the solution is a simple fix, but we will talk the student through the steps for future
references if this problem occurs again. All the students need to do is the following steps:Close all Microsoft Office programs that you are currently using completely
Close down any Student Management System program or application you may be using
Open Task Manager and stop the process called DAPSER-1.EXE
Re-open all previously closed programs and continue with your work
Archiving data
This is a simple procedure that can save a lot of hassle later down the line if a student was to
encounter a problem. The data in question here are the emails accounts of every student that
study here at Acculearn. Whenever we have a new student start at Acculearn they are given
two things, a studentname login and an email account. This account will allow them to
communicate with their fellow employees and students about matters involved around their
job.
Problem is over time with the influx of emails and documents, the student mailbox size will
increase to an unstable proportion. This is when we will ask them to use a simple technique to
decrease the size of their mailbox, without losing any access to those emails. This is called
archiving, which allows our student to select whatever folder they may wish (inbox, sent
items, drafts, etc) and create a .pst file, which is then saved onto the local disk.
Loss of service
There will sometimes be circumstances that will cause a server running in an office to crash
and stop working. Whether it is because a drive has failed or the server itself just got too hot
and shut down under the intense heat, they will just sometimes stop working, therefore
creating problems for our students and us in IT. Recently we had the file server in our own
Ilford office go offline, which meant several functions and services were then unavailable to
our students. We sent an email around the office explaining what to do and not to do for
the time being.
Saving documents
Once the file server goes down, students will experience difficulty in accessing drives and
documents that they have previously used in the past. This is mainly because the root of the
drives are located on the local file server, so with it being down and inaccessible people
wont be able to save or open saved documents. In this situation we advise people to save any
documents they are working on during the outage, onto their desktop or My Documents
folder. Then once we have solved the problem and restored the server to it normal state that
they then transfer across any files produced during the down time onto their home drive, to
avoid the risk of exceeding the profile size limit on the computer.
Network connection problems
We do also sometimes lose the network connection in an office, meaning that such activities
as searching the internet and sending emails to students and other students. When a situation
like this arises, we would make sure we contact our network provider so we know that the
problem is being dealt with while we deal with our own students and their predicaments.
Another problem we encounter when the network is down is the loss of calling desktop
phones internally; this means that we must use the direct dial extension to get hold of people
in the outer office. We would make sure that we contact the member of staff that is currently
on reception, due to the fact they are responsible to retrieving calls from students and passing
them onto the fee earner needed.
We need to make sure that they can still receive calls from external numbers, because if this
is not the case we must contact our phone system provider and ask them to forward all calls
to that administrators company provided phone, where we can then control the distribution
of the calls ourselves to whichever office may need them . For the students within that office,
their calls would be transferred over from our reception directly to their phones so they can
then communicate with the caller.
Damage to equipment
Firstly when every student starts here they are given the basic items, a keyboard, a mouse and
a computer. Obviously then depending on their job title they are then given any extra
equipment (headphones, foot pedals, dictation devices, etc), but we always advise people on
the proper use of the equipment within IT communication policy on the intranet.
Certain pieces of advice ranges from simple little measures like setting up the height of your
monitor and computer. Mainly due to health and safety and insuring that we dont get any
complaints about bad backs and sore necks from sitting at awkward angles, we suggest to
people that they set:Monitor at head height (to avoid and neck discomfort)
Keyboard and mouse are a reasonable distance away from the body (to avoid stretching too far)
Make sure your chair is supportive and comfortable on your shoulders and back (if not, make sure
you ask for help adjusting)
The second piece of advice they will receive when reading the document is about when
certain pieces of equipment suddenly stop working or become problematic. We firstly ask
then to contact us either via email or phone, at which point we will go to the student desk and
try and witness or replicate the problem they described earlier.
With regards to damaged equipment here at Acculearn; once we know a certain item is
broken and we cant repair it or it not worth repairing, we place it in basement ready to be
removed at a later date by a removal firm. Obviously we need to abide by the WEEE
regulations (Waste Electrical and Electronic Equipment) otherwise we could face fines for
illegal dumping. So once we have established that a piece of equipment is broken, we supply
the student with a replacement of that certain object while taking the old one away for storage
in the basement which will be removed at a later date.