...Services (Voice, Data & Video Services). To contribute to the growth of a progressive company with quality products and services in the field of Telecommunications and Information Technology (ICT). SUMMARY OF SKILLS AND EXPERIENCE • Total 2 years and 4 months of experience with Advanced Diploma in Telecommunication Engineering and Cisco Certified Network Associate (CCNA). • 2 years and 8 months of experience as Network Engineer (Windows/Linux/Network). Possess the expertise in the following: Networking • Installations, Configurations and Troubleshooting of; • Wireless local Area network (WLAN) • Local Area Network (LAN) and Wide Area Network (WAN) Security • Wimax CPE (Alvarion) for SAFARICOM and ACCESSKENYA networks • Free Space Optic link (FSO) • Mikrotik CPE and router. • Nanostation 2.4Ghz and 5Ghz • Cisco routers and switches • Firewalls rules implementation • VoIP servers using IP PABX • Network IP planning • Software and hardware Windows •...
Words: 1141 - Pages: 5
...Currently, we are in the post-PC era where smart-phones and other handheld devices are changing our environment by making it more interactive as well as informative. Mark Weiser, the forefather of ubicomp, defined a smart environment as ‘‘the physical world that is richly and invisibly interwoven with sensors, actuators, displays, and computational elements, embedded seamlessly in the everyday objects of our lives, and connected through a continuous network.’’ The creation of the Internet has marked a foremost milestone toward achieving ubicomp’s vision which enables individual devices to communicate with any other device in the world. The amount of distributed computing resources and storage owned by various...
Words: 986 - Pages: 4
...students with the fundamental knowledge of IT. • This course will cover the outline and topics which defined as syllabus of the course and upon successful completion of the course, the main outcome for students will be as below: Understanding the basic terminology of computer and IT Getting familiar with programming language - Exploring some ethical and social issues associated with IT Network and growth of Internet The role of IT in system development stages. Erican College – IT App. – Session 01 – 21 Jan 2014 – By: Hosseinpour ASSESSMENT • Assignment 30% • Class participation 10% • Examinations 60% Erican College – IT App. – Session 01 – 21 Jan 2014 – By: Hosseinpour Information Technology Application – IT App. Part I: Computer Hardware Part II: Computer Software Part III: Basic Concepts of Network Part IV: IT and Organization Erican College – IT App. – Session 01 – 21 Jan 2014 – By: Hosseinpour Outline of the Course • Fundamentals of Information Technology (IT) • Fundamentals of Computer Hardware – – – – CPU Peripherals Input / Output Memory • • • • • • • • • • Computer Software The Number System Basic Assembly Coding Programming Languages (Overview) Understanding Operating System Networking Fundamentals Internet (Intranet-LAN-WAN-MAN) Information Technology in Organizations System Development Future Computing Erican College – IT App. – Session 01 – 21 Jan 2014 – By: Hosseinpour Fundamentals of IT Fundamentals of IT is the first...
Words: 1881 - Pages: 8
...it relates to network design considerations. It describes the rise of big data and the transition of traditional enterprise data models with the addition of crucial building blocks to handle the dramatic growth of data in the enterprise. According to IDC estimates, the size of the "digital universe" in 2011 will be 1.8 zettabytes (1.8 trillion gigabytes). With information growth exceeding Moore's Law, the average enterprise will need to manage 50 times more information by the year 2020 while increasing IT staff by only 1.5 percent. With this challenge in mind, the integration of big data models into existing enterprise infrastructures is a critical element when considering the addition of new big data building blocks while considering the efficiency, economics and privacy. This document also shows that the Cisco Nexus ® architectures are optimized to handle big data while providing integration into current enterprise infrastructures. In reviewing multiple data models, this document examines the effects of Apache Hadoop as a building block for big data and its effects on the network. Hadoop is an open source software platform for building reliable, scalable clusters in a scaled-out, "shared-nothing" design model for storing, processing, and analyzing enormous volumes of data at very high performance. The information presented in this document is based on the actual network traffic patterns of the Hadoop framework and can help in the design of a scalable network with the right...
Words: 1384 - Pages: 6
...situations related to complaints as well as harassment, are cataloged using Microsoft Excel that has got no real safety measures apart from a meager password protection alternative. In addition to that, hardcopy files of organization, worker, and customer information are saved in manager’s offices which are just protected by a wooden door (Apollo Group, 2004). Recommendations Because of a terrific lack in data protection features, the following suggestions are recommended: technique as well as risk evaluation, update on physical protection parts, and perform computer system and network protection. Strategy and risk assessment. All around data protection starts with the detection of dangers and the technique on the means to fix those dangers. This can easily be achieved by a Strengths, Weaknesses, Opportunities, and Threats (SWOT) assessment. Weaknesses and strengths are based on internal elements, for example workers, whereas possibilities and risks are based on...
Words: 540 - Pages: 3
...Basic Components of Network Management Systems Matthew D. Miller DeVry University A network management system is a system that is made up of hardware and software, whose job it is to manage the communications, software, and computer hardware of a network (Hill Associates, 2008). There are many different tools and components that help to make up a network management system. Some of these tools include trouble ticket systems, help desk systems, alarm correlation, maintenance tools, etc (Hill Associates, 2008). Along with all these tools there are four basic components that a network management system consists of. They are the agent, network management station, network management protocol, and the management information (Hill Associates, 2008). As mentioned before a network management system has many tools available to use. Trouble ticket systems are used to manage and keep track of any and all issues relating to the network (OTRS Team, 2012). A very useful feature of trouble ticket systems is that they save and archive the tickets with all pertinent information like who was involved, the problem and any notes or solutions (OTRS Team, 2012). In case a particular event occurs again the help desk team has a reference to look to for assistance. With any kind of machine or system, maintenance must take place in order for it to perform to its full potential. Software and hardware updates are essential for the smooth running of a network (TWD & Associates, Inc., 2012)...
Words: 861 - Pages: 4
...Chapter 1 Data Communications Introduction 1 Chapter Objectives: Defined data communications Introduced data communications needs Communications model Overview of networks Introduce Internet 2 Data, Data Communication Data is an entity that convey some meaning based on some mutually agreed upon rules/conventions between a sender and a receiver. Data Communication deals with the transmission of signals in a reliable and efficient manner 3 Data Communication Topics covered include: Signal Transmission Transmission Media Signal Encoding Interfacing Data link control Multiplexing 4 Computer Science and Data Communications Merger In 1970s and 1980s The computer communications revolution has produced several remarkable facts. There is no fundamental difference between data processing (computers) and data communications (transmission and switching equipment). There is no fundamental difference among data, voice, and video communications. The distinction among single processor computer, multiprocessor computer, local network, metropolitan network, and long-haul network has blurred. 5 Today’s Trends Three different forces have consistently driven the architecture and evolution of data communications and networking facilities: Traffic growth Development of new services Advances in technology 6 Communication Traffic Both local (within a building or building complex) and Long distance having transmission of Voice, video and data The increased emphasis on office automation...
Words: 2260 - Pages: 10
...for telecommunications and computer networks. This course covers the concepts and application of the Internet; server and storage architectures; and regulatory considerations. Policies Faculty and students/learners will be held responsible for understanding and adhering to all policies contained within the following two documents: • University policies: You must be logged into the student website to view this document. • Instructor policies: This document is posted in the Course Materials forum. University policies are subject to change. Be sure to read the policies at the beginning of each class. Policies may be slightly different depending on the modality in which you attend class. If you have recently changed modalities, read the policies governing your current class modality. Course Materials Fitzgerald, J. & Dennis, A. (2009). Business data communications & networking (10th ed.). Hoboken, NJ: Wiley. Iniewski, K., McCrosky, C., & Minoli, D. (2008). Network infrastructure and architecture: Designing high-availability networks. Hoboken, NJ: Wiley-Interscience. Turban, E. & Volonino, L. (2009). Information technology for management: Improving performance in the digital economy (7th ed.). Hoboken, NJ: Wiley. Supplemental Resources Element K. (2010). Fundamentals of Data Communication: Level 1. Element K. (2010). Fundamentals of Data Communication: Level 2. Element K. (2010). Network Security Fundamentals. Article References Aird, C....
Words: 2439 - Pages: 10
...in a safe way, an organization might invest in an Enterprise Resource Planning system, or ERP for short. This system, although expensive, can monitor and control all aspects of data transfer within an organization. Using an ERP system can accurately report inventories, product details, work audits, and several other aspects of running a business (www.netsuite.com, 2001). Most important of all is accuracy. By Utilizing an ERP system the business will have several checkpoints where products and the processes for creating them are monitored. By always sending out the right product or information an organization can save a fortune in clean up costs and legal fees in the event of an error. An organization must also look at physical and network security options to protect all their assets, the integrity of the ERP system, and any other critical data flowing through or stored in the company. External Information Flow Mentioned before, external information flow can be represented as coming into or coming out of the company. This flow can be represented as supplies or finished product respectively. Each aspect has different challenges and requirements for effectively managing data and other resources. Incoming external information flow is all...
Words: 1041 - Pages: 5
...Network Design Following the acquisition of new premises comprising a two-story office in Adeplhi, Maryland this provides UMUC with the ability to revise and improve their network topology accordingly and ensure that not only is connectivity provided in a consistent fashion but also to provide the required security for information accordingly. One of the fundamental requirements is to ensure that data is segregated in terms of staff and students so this will require the creation of dedicated subnets accordingly to follow through and implement the solution, while there is also a requirement to provide wireless connectivity for students in the lobby area. Given that there is a specific opportunity to develop a comprehensive infrastructure it is important that the fundamental basis in terms of cabling is of a sufficiently high quality to support current and future operational requirements. Due to the size of the building there would be limitations if using Cat 5 based Ethernet cables for example and so therefore there should be a requirement to utilize Cat 6 based Ethernet as this will support a maximum cable length in excess of 300 ft without there being any connectivity or performance issues (Mitchell, 2014). Each of the two floors will have a designated server room that is designed to provide a central point of connectivity for all locations on that floor, and each of the rooms on the first and second floor will require a certain number of data ports based on their expected utilization...
Words: 1451 - Pages: 6
...sustain a certain level of Security for this, so that nobody can enter from the outside, only the IT Department may grant access privilege for Remote Access. The User Domain will enforce an acceptable use policy (AUP) to define which user can and cannot do with any company data that he or she has access to. Also, every user on the company is responsible for the safekeeping of the environment. 2. LAN Domain The Local Area Network Domain is a group of computers that are all connected to a single LAN domain. The LAN Domain is a collection of computers connected to each another or to a common medium. All LAN domains have data closets, physical elements of the LAN, and logical elements as designated by authorized personnel. It involves strong security and access controls. This domain can access company-wide systems, applications, and data from anyplace within the LAN. The LAN support group is in control of maintaining and securing the domain. The biggest threat to the LAN domain is an Un-authorized access to anything on the network. For example: LAN, the systems, and data. One thing we can do is require strict security protocols for this domain, such as disabling all external access ports for the workstation. This would cause a no access protocol. 3. Workstation Domain Workstation Domain is where all the users work. Before a user can log into the machine, he or she will need to be confirmed in order to gain admission. At Richman Investments, we will...
Words: 358 - Pages: 2
...CHaPTer Firewall Fundamentals 2 T O SOME NETWORK ADMINISTRATORS, A FIREWALL is the key component of their infrastructure’s security. To others, a fi rewall is a hassle and a barrier to accomplishing essential tasks. In most cases, the negative view of fi rewalls stems from a basic misunderstanding of the nature of fi rewalls and how they work. This chapter will help dispel this confusion. This chapter clearly defi nes the fundamentals of fi rewalls. These include what a fi rewall is, what a fi rewall does, how it performs these tasks, why fi rewalls are necessary, the various fi rewall types, and fi ltering mechanisms. Once you understand these fundamentals of fi rewalls, you will able to look beyond the unschooled opinions, common mythology, and marketing hype surrounding them, and the crucial benefi ts of effective fi rewall architecture will become clear. Like any tool, fi rewalls are useful in solving a variety of particular problems and in supporting essential network security. Chapter 2 Topics This chapter will cover the following topics and concepts: • What a fi rewall is • Why you need a fi rewall • How fi rewalls work and what they do • What the basics of TCP/IP are • What the types of fi rewalls are • What ingress and egress fi ltering is • What the types of fi rewall fi ltering are • What the difference between software and hardware fi rewalls is • What dual-homed and triple-homed fi rewalls...
Words: 15354 - Pages: 62
...Name and SSN: Robert Boss 789-78-9789 8. Organizational Unit: Network Services SECTION 2. PRIMARY PURPOSE OF POSITION | Develop an integrated (linked) comprehensive surveillance system that tracks community-level data, program services delivered and meets all minimum data element requirements by the end of the first fiscal year. Designs network installations and expansions to include all hardware, devices and cabling schemes, and performs, directs and/or coordinates network installations with personnel. Organize efficient communication between staff. SECTION 3. WORK AREA AND INFORMATION TECHNOLOGY ENVIRONMENT Supports personnel with telecommunications systems, data and voice integration, network architecture and engineering, and network operations. Ethernet, FDDI networking, some token ring, Centrex telephone environment, Novell, Banyan, peer-to-peer networking over IP, SNA, connections used by mainframe, and 120+ dial-in modems. SECTION 4. MAJOR JOB FUNCTIONS JOB FUNCTIONS | PERCENT OF TOTAL WORKING TIME | ADA (E OR M) | Comp Level of Function (CL 1, 2 or 3) | Network Design and ImplementationConsults with departments interested in expanding existing voice and data communications networks or installing new networks. Analyzes and determines capacity and access needs and recommends cost-effective system proposals, including estimates of cost and installation time frame. Designs network...
Words: 1884 - Pages: 8
...Network Attached Storage ITMO 557 Research Paper Submitted by: Ashif Anwar CWID: A20318587 Date of Submission: This is a research paper on Network attached storage covering the various areas given in the contents below. Fall 2014 ASHIF ANWAR Illinois Institute of Technology-Chicago 11/30/2014 Contents: 1. Introduction. 2. History. 3. Product demonstration. 4. NAS future perspective. 5. Introduction Network Attached Storage is basically defined as a file level computer data storage server connected to a computer network. It is specialized for file server operation by its hardware, software or configuration of elements to provide data access to wide range of clients (Wikipedia, 2014). In simple words we can say “a network attached storage is a external hard drive which is a computer storage system that access and remains on a computer network via Ethernet and wireless connections. The drive is then accessible to all computers in a network, instead of one just hard wired computer”(Networking, 2014). Figure-1: NAS Storage on a network infrastructure. (slideshare, 2013). NAS is one of the popular approaches which allow homes and business to store and retrieve large amounts of data in an efficient and affordable manner. One can wirelessly backup their computer files such as music, videos and other important documents...
Words: 661 - Pages: 3
...Foundations of Network Security Fundamentals of Network Security 2 Firewall Fundamentals 43 VPN Fundamentals 79 Network Security Threats and Issues 111 CHAPTer Fundamentals of Network Security 1 C OMPUTER NETWORK SECURITY is very complex. New threats from inside and outside networks appear constantly. Just as constantly, the security community is always developing new products and procedures to defend against threats of the past and unknowns of the future. As companies merge, people lose their jobs, new equipment comes on line, and business tasks change, people do not always do what we expect. Network security configurations that worked well yesterday, might not work quite as well tomorrow. In an ever-changing business climate, whom should you trust? Has your trust been violated? How would you even know? Who is attempting to harm your network this time? Because of these complex issues, you need to understand the essentials of network security. This chapter will introduce you to the basic elements of network security. Once you have a firm grasp of these fundamentals, you will be well equipped to put effective security measures into practice on your organization’s network. While this textbook focuses on general network security, including firewalls and virtual private networks (VPNs), many of the important basics of network security are introduced in this chapter. In Chapters 1–4, network security fundamentals, concepts...
Words: 16205 - Pages: 65