Technology Consultant
Ernst & Young LLP (EY), IndiaNetwork Engineer as Freelancer
FreelancerSystem Engineer
Zamil LLC.Network Engineer
MashTechsolELV Engineer
Berkeley Services LLCIT Engineer as Freelancer
FreelancerWindows 7
Windows 10
Windows 11
Ubuntu
Mac OS
Visio
Microsoft Office
Hello. Good afternoon. Myself, I completed my BTech in electronics and communication engineer electronics and communication engineering. After that, I have joined I have joined MS Techsoft as a network engineer. And then I have done my freelancing job. Then after I moved in Dubai in Berkeley Industries where I have worked in Dubai airport, where I have to manage a an enterprise infra structure that include various network device network devices network devices and, uh, server storage along with that. I then I worked in Dubai, then I work in Saudi Arabia in Zaman in various oil and gas plant in Sadara, etcetera, Madin, into IT and network infrastructure where I have to manage the IT and network infra. Along with that, we have a virtual virtualized environment for virtualization. Uh, after that, I joined, I worked for freelancer, and then I joined as an as a tech consultant. We were being a part of the tech consultant. We have to give, um, a deep time understanding to the client in the term of technology transformation along with the the different, uh, framework like, for ITL framework. And, uh, we have a part of IoT and smart city mission. Under that, we we are developing a digital transformation, and we are part of developing a data center, high scale uh, high scale data center and throughout the network in the city. Thank you.
Actually, in Cisco in Cisco environment, there are some Cisco legacy development, like, in either channel, we have, um, l a PAGP. So for multivendor ecosystem, we have to configure the switches, uh, for for open standard. Like, in, uh, ether channel, we have to configure. We have LACP and PGP. In that scenario, we have to configure LACP because Spoo give more flexibility. They have their their legacy protocol, and they they have their parallel open source protocol. They are working both seamlessly. We have we have in that scenario, we have to configure, uh, open standard protocol. Like, in in term of STP, we have to PBST or MSTP in HSRP or in, like, oh, in, like, routing protocol we have to use. Between, uh, Cisco and multi vendor ecosystem. Either it's market or HP or Aruba or
We VRRP, it is used to create virtual virtual, uh, virtual routing protocol. It is pivotal in maintaining network uptime because we we we are creating a different, uh, virtual routing table for, uh, different different type based on the type of the traffic, the application, uh, the the application, the network, the management, whatever the type of scenario. In this case, we are creating a virtual virtual virtual traffic, and that reduce the, uh, that reduce reduce the lookup, uh, route route lookup time. Mhmm. Route lookup time. And that is, uh, the pivotal for the network uptime, or it is, uh, for maintaining the SLA requirement for the client.
In in security and firewall or in in the term of security, the intelligence and prevention detection we have, uh, we because our if the system is not designed for multi vendor or some have a legacy protocol integration. In in legacy protocol integration, there exist a preexisting security version. So we have we have to configure in open a standard, or we have to upgrade our, uh, our firewall firewall, or we have to upgrade our firewall system to incorporate the McAfee system if we it if we have to make make our system full, well, you know, full vulnerable, uh, if we have to make make our system full vulnerable, and if our system is unavailable, then we have to upgrade and integrate the system. Uh, if we update with some open standard, then it is easy for us to incorporate the McAfee IPS integration intelligence intelligence system.
If if there is any surge in the network if there is any surge in the network or that is unusual in the network, we have to identify suppose we have a EMS tools or logs tools or SIM or something SIM or or any security tool, we have to analyze the previous traffic and when the spike is going on. In that scenario, we have to check any change configuration happen in the switches itself. And and we we have we have to analyze the, um, analyze analyze the traffic by using, uh, network monitoring monitoring tool. The process step, we have to analyze using, uh, network monitoring tool. Then, uh, we have to look for the unusual unusual, uh, utilization in the term of, uh, throttling throttling of the bandwidth, CPU utilization, or data plane, or where the traffic is, um, traffic where the utilization is from, uh, which which traffic that create that spike. And according to that, uh, by using the different MSO monitoring tool, we have to troubleshoot in that account after we we conclude with conclusion. Um, what is the remedial action for, uh, this, uh, this?
Actually, we have we have different, uh, we have different network policies. We we are implementing for securing the network and, uh, policy in enterprise edition in line with the different framework. Uh, and, uh, we have, like, a ISO 27, double 0, 1, or ISMA or CID. And, um, that assures our network is good provider in the term in the term of of external or internal network, and the different procedure are adopted for setting up the policies in in in line with the guideline provided by c o c value framework that basically enhance. We have to, um, like, um, 0
Yes. Server. Scoring an IS server. Being factored, uh, it didn't work in IS server. I don't have IDM, but, uh, if I got a chance to work on that, definitely, I will, um, on the step and do it.
ST1. ST1 technology is, uh, software software defined, uh, by data network, uh, and different, VM have different command. Like, in Cisco, we have Cisco DNS, Cisco ACI, uh, for different data center in it actually segregate the control plane from data plane. And in the control plane, they give a centralized management flexibility to manage all switch from a single place and, uh, single place. And we create, like, a region wise region wise or province wise. We we we create in multiregional company in multiregional company or multiregional environment. Suppose we have data center in location a and and NDR in location b in other region, and for the in another another region, then SD WAN give give a simplicity or manageability option. We can manage, uh, their data frame from, uh, from a single place by using their SD WAN tools.
Suppose. Uh, here here, the main we have to understand first understand the criticality of the network. After taking after that, we have to, um, do the ARREST assessment. Uh, and after finding the after analyzing the ARRIS assessment in in FH, we we have from we're replacing from HSR, hardware protocol to VRP for device. Actually, HSRP also giving the device wherein we have to move move for, uh, for VRRP. So we we plan it accordingly based on the, uh, based on the our assessment, uh, and based on our assessment, we do first assessment, then talk with the client, uh, their their requirement and their traffic name, and we identify when it's a good time or best time to do do their downtime, and we make one primary switch. In 2nd switch, we configure first that one and then make it one primary. Then we do it for the secondary. And after that, making both the switch up and
Not what's has given. Every certification in IT industry give everyone a confidence, a bit of accomplishment in the term of their hands on experience in that technology because that the OEM or when when vendor specific, uh, they will learn the nitty gritty of that technology along with uh, that standard of operational procedure procedure. And any certification, uh, we are doing that enhance our ability to understand their system in their way or their technology development or the in their way, not any general vendor. That was our hand on experience, uh, and understand the initial, you know, initial understand the core.
We have for, um, ITIL version 3, the chain chain minute and process, uh, we have to first first identify, um, the the first, we have we are doing the network modification. We have to identify by, um, what goal we want to achieve after doing modification. We have to an we have to analyze and we have to do a risk assessment and we have to, um, develop a a hierarchy and we have to develop a model how we are going to, um, do. First way, um, first way, we have to do so first, we have to give a, um, first, we have give a collective view collective view of the system. And then after, we have to, um, we have to dissect, uh, the index section in in a small network while we have to analyze it, and they have we have to make a work plan.