
Technology Consultant
Ernst & Young LLP (EY), IndiaNetwork Engineer as Freelancer
FreelancerSystem Engineer
Zamil LLC.Network Engineer
MashTechsolELV Engineer
Berkeley Services LLCIT Engineer as Freelancer
Freelancer
Windows 7

Windows 10

Windows 11

Ubuntu

Mac OS

Visio

Microsoft Office
Hello. Good afternoon. Myself, I completed my BTech in electronics and communication engineer electronics and communication engineering. After that, I have joined I have joined MS Techsoft as a network engineer. And then I have done my freelancing job. Then after I moved in Dubai in Berkeley Industries where I have worked in Dubai airport, where I have to manage a an enterprise infra structure that include various network device network devices network devices and, server storage along with that. I then I worked in Dubai, then I work in Saudi Arabia in Zaman in various oil and gas plant in Sadara, etcetera, Madin, into IT and network infrastructure where I have to manage the IT and network infra. Along with that, we have a virtual virtualized environment for virtualization. after that, I joined, I worked for freelancer, and then I joined as an as a tech consultant. We were being a part of the tech consultant. We have to give, a deep time understanding to the client in the term of technology transformation along with the different, framework like, for ITL framework. And, we have a part of IoT and smart city mission. Under that, we are developing a digital transformation, and we are part of developing a data center, high scale, high scale data center and throughout the network in the city. Thank you.
Actually, in Cisco in Cisco environment, there are some Cisco legacy development, like, in either channel, we have, l a PAGP. So for multivendor ecosystem, we have to configure the switches, for open standard. Like, in, ether channel, we have to configure. We have LACP and PGP. In that scenario, we have to configure LACP because Spoo give more flexibility. They have their legacy protocol, and they have their parallel open source protocol. They are working both seamlessly. We have we have in that scenario, we have to configure, open standard protocol. Like, in term of STP, we have to PBST or MSTP in HSRP or in, like, oh, in, like, routing protocol we have to use. Between, Cisco and multi vendor ecosystem. Either it's market or HP or Aruba or
We VRRP, it is used to create virtual routing protocol. It is pivotal in maintaining network uptime because we are creating a different, virtual routing table for, different type based on the type of the traffic, the application, the application, the network, the management, whatever the type of scenario. In this case, we are creating a virtual traffic, and that reduce the, that reduce the lookup, route lookup time. Mhmm. Route lookup time. And that is, the pivotal for the network uptime, or it is, for maintaining the SLA requirement for the client.
In security and firewall or in the term of security, the intelligence and prevention detection we have, we because our if the system is not designed for multi vendor or some have a legacy protocol integration. In legacy protocol integration, there exist a preexisting security version. So we have we have to configure in open a standard, or we have to upgrade our firewall, or we have to upgrade our firewall system to incorporate the McAfee system if we it if we have to make our system full, well, you know, full vulnerable, if we have to make our system full vulnerable, and if our system is unavailable, then we have to upgrade and integrate the system. if we update with some open standard, then it is easy for us to incorporate the McAfee IPS integration intelligence system.
If there is any surge in the network if there is any surge in the network or that is unusual in the network, we have to identify suppose we have a EMS tools or logs tools or SIM or something SIM or any security tool, we have to analyze the previous traffic and when the spike is going on. In that scenario, we have to check any change configuration happen in the switches itself. And we have we have to analyze the, analyze the traffic by using, network monitoring tool. The process step, we have to analyze using, network monitoring tool. Then, we have to look for the unusual, utilization in the term of, throttling of the bandwidth, CPU utilization, or data plane, or where the traffic is, traffic where the utilization is from, which traffic that create that spike. And according to that, by using the different MSO monitoring tool, we have to troubleshoot in that account after we conclude with conclusion. what is the remedial action for, this?
Actually, we have we have different, we have different network policies. We are implementing for securing the network and, policy in enterprise edition in line with the different framework. and, we have, like, a ISO 27, double 0, 1, or ISMA or CID. And, that assures our network is good provider in the term in the term of external or internal network, and the different procedure are adopted for setting up the policies in line with the guideline provided by c o c value framework that basically enhance. We have to, like, 0
Yes. Server. Scoring an IS server. Being factored, it didn't work in IS server. I don't have IDM, but, if I got a chance to work on that, definitely, I will, on the step and do it.
ST1. ST1 technology is, software defined, by data network, and different, VM have different command. Like, in Cisco, we have Cisco DNS, Cisco ACI, for different data center in it actually segregate the control plane from data plane. And in the control plane, they give a centralized management flexibility to manage all switch from a single place and, single place. And we create, like, a region wise region wise or province wise. We create in multiregional company in multiregional company or multiregional environment. Suppose we have data center in location a and NDR in location b in other region, and for the in another region, then SD WAN give a simplicity or manageability option. We can manage, their data frame from a single place by using their SD WAN tools.
Suppose. here, the main we have to understand first understand the criticality of the network. After taking after that, we have to, do the ARREST assessment. and after finding the after analyzing the ARRIS assessment in FH, we have from we're replacing from HSR, hardware protocol to VRP for device. Actually, HSRP also giving the device wherein we have to move for VRRP. So we plan it accordingly based on the, based on the our assessment, and based on our assessment, we do first assessment, then talk with the client, their requirement and their traffic name, and we identify when it's a good time or best time to do their downtime, and we make one primary switch. In 2nd switch, we configure first that one and then make it one primary. Then we do it for the secondary. And after that, making both the switch up and
Not what's has given. Every certification in IT industry give everyone a confidence, a bit of accomplishment in the term of their hands on experience in that technology because that the OEM or when vendor specific, they will learn the nitty gritty of that technology along with, that standard of operational procedure. And any certification, we are doing that enhance our ability to understand their system in their way or their technology development or the in their way, not any general vendor. That was our hand on experience, and understand the initial, you know, initial understand the core.
We have for, ITIL version 3, the chain minute and process, we have to first identify, the first, we have we are doing the network modification. We have to identify by, what goal we want to achieve after doing modification. We have to an we have to analyze and we have to do a risk assessment and we have to, develop a hierarchy and we have to develop a model how we are going to, do. First way, first way, we have to do so first, we have to give a, first, we have give a collective view collective view of the system. And then after, we have to, we have to dissect, the index section in a small network while we have to analyze it, and they have we have to make a work plan.