
Network Engineer
APT Portfolio Pvt.LtdNetwork Engineer
Lumen
VPN

PRTG

Ansible
.jpg)
Grafana
Jira

Bitbucket

Remedy
Hello. Well, my name is Malik. I am from Jammu and Kashmir, India. I have done my schooling from Saint Joseph Senior's School, Chandigarh. I've done BTech in computer science field. I have I've been working in network as a network engineer from last 3 years. My first experience is in Lumen Technologies Private Limited, and my next experience where I'm currently working on is in APT Research, uh, Private Limited company where my role is to configure, maintain the network, configure the switches, firewalls, VPNs, help the end users to check their VPN issues, to communicate with them if we have any outages, and to configure the firewalls. And we in my current role, I do configure the, uh, servers as well from network end, from the installation, and to the, uh, perspective of the from the network end perspective. I configure it all alone, and we do monitor, uh, all the stuff like ping, uh, SNMP, CPU load, uh, NetFlow version 9, version 5. So, basically, I'm working all around to completely and, uh, to completely I'm working as a network engineer in my current organization. And with that, I have a good understanding of network, how it goes, how to route the traffic, how we can add the route in the servers so I have a good understanding of networking.
Throughput is basically when we have a good, uh, understanding of, like, network or the data packets coming from one end to another end. We can see how much the packets are coming and if we have any lag or any issues getting with that packets traveling from one end to another end. And good put is like we are getting good, uh, amount of data without any lag, without any issues. And we can, uh, monitor all the stuff, like, code put and throughput in our network monitoring tools to check whether we are getting good amount of data or not. And, basically, we can use all, our, uh, all the graphs to understand the throughput and the output, how it is getting
So for network troubleshooting, I would say, uh, first, I can check the IP e address command to see how many, uh, like, what IP addresses are given for specific interfaces of the server, and I can check the netstat hyphen g n to check the multicast IPs, uh, which we have subscribed. And I can check, uh, the route hyphen and or net stat hyphen r to check the routing table of the server. And I can, uh, see the configuration files of rocky a rel 8.4 version via going to, uh, the directory of ETC slash, uh, network scripts slash sysconfig slash network scripts where I can check the files of each interface, and I can add the routes in it. And I can manually add the route for a specific interface like IP route at 10.10.10.10./32, um, uh, I p v 4 dev, the specific to the in specific interface name or I can in I can have the VLAN, uh, interfaces also, virtual VLAN interfaces also with the same purpose, like, uh, IP or an MCL icon add, uh, l for example, the name of the interface is l three feet dot hundred, and villain ID is 100 and, uh, I p v four version and the dev, uh, the interface name is l three feet, the physical interface name. So and we have lot of, uh, commands to troubleshoot via troubleshoot the networking in Linux. And, like, we have we can check the SNMP also while checking the system CTL status as an MPD services. Uh, we can check the time stamping by, uh, system CTL status, SFPDPD, their services, or network services. We can restart them. And we do have lot of, uh, commands in Linux to check the network
For configuring the network connectivity on Linux system, for operating system RHEL 8.4 Linux, we have the files stored in the directory like etc sysconfig slash network scripts. There we will get the complete list of the configuration files of the interfaces. We can manipulate those configuration files. We can change those configuration files. We can add new configuration files for there for our specific for the purpose we have like for giving the IPs or adding the routes for IPs. We can have ifs for giving the information like IP to a specific interface. We can give we can create a file like vi space ifcfg hyphen and the name of the interface. So I can go inside it and I can add the IP address by giving the ethernet is equal to this LAN0 type everything I can give there. And then I can add the route also by using route r-o-u-t-e hyphen the name of the interface and I can add the route manually by giving a command ip route add for example 10.10.10.10 slash 22.24 and dev is the name of dev for example LAN0 the name of the interface that the route will go with this interface or I can add the default route as well hyper route add default the name of the IP the next hop and in rocky 9 we have the similar thing but in a bit different way we can we can add those information or the interface information in the directory like etc slash etc network monitors and then system connections there we have everything like we can have we can create manipulate or write the name write the IPs or and for the spare for interface names like if you want to change the names of the interfaces we can go to the file like a slash etc slash udev slash our rules and we can cat can cat the file which starts with 70 slash persistent net rules and we here we can rewrite the name of the interfaces and against the MAC address of those interfaces and if you want to check the sf cards in that so server we can write a command a utility sf key where we will get whether the interface whether the sf cards are of 10g or 20g the the series starts with 2522 is a 10g card which has two ports and the series starts with 2541 is a 40g port which have only one port which can be divided into four 10 10g each ports by using a breakout cable thank you
Okay. In a cloud based data center environment. So what we'll do, first of all, we'll check how much storage we need for that platform, and we'll, uh, check the hardware which we want, uh, as per our needs. And then we can install an operating system, whatever we need, like, uh, we have. We have, different operating systems of Linux. We will install those operating systems, and then we'll ins we'll check the cloud cloud storage we want, how much cloud storage we want for that or in that server, and then we can configure it from the network end, like, uh, adding the routes, adding the IPs for a specific interface or giving, uh, security rules. Like, we can giving the SSH keys, like, for secure connections, and we can check the, uh, SSL certificates by going in, uh, directory, like, uh, /etc/SSL/cert certificates to check whether we have the certificate, and we'll install we'll add those certificates in there. So and then finally, we can start start our server and reverify whether everything is working fine. If it if all everything is working fine, then our process is over. We can end this process, and our server is working fine in a cloud based
So latency issues in a network is like, uh, see how we'll find those latency issues. Let's say, if we are pinging something and we are getting very high latency, uh, by with that RTT value. So if we want to check why we are getting it, we can use the trace route command to see from where our data is going, like, the pathway of our data which is taking place. So if we found that it is going with the, uh, with the other way or with the way we which it should not be taken, it should take the shortest path, so we can manipulate the route. We can manipulate the traffic in that specific router and make it easy for, um, like, easy for them to use the shortest path so that our latency will come down. And latency issues may also, uh, come when we have some, uh, flapping issues with our ISP links. So at the time, also, latency issue can come. So, basically, uh, to over overcome all those latency issues, we need to monitor our network properly. We need to monitor, uh, the sensors which we have for latencies, why we are getting high latency. Like, it should be coming in nanoseconds. Right? So we can check it. And we do have the tool like PRTG through which we monitor the latency issues, like how to resolve it and how can we overcome these latency issues, like the routes, the path, how we are getting those, uh, path from where we are getting that, uh, route, and we what is the RTT time of it?
The scenario where we can investigate and it is the discrepancy like throughput is the total like quantity of the data transferred through the network right but and including overheads data as well. Goodput is the amount of useful data transmitted minus overhead, goodput is the total amount of data transmitted minus overhead. So if describes a situation where network goodput does not match the expected throughput including how you would investigate and it is discrepancies. So basically if the goodput is not matching with the throughput. So goodput is actually the lesser amount of data than the throughput. If the goodput is not matching with what it is expected via the throughput then it should have some issue with the throughput. So we can check the links, we can check the bandwidth of the link how why it is not getting like how we are getting the data whether the packets are getting dropped or not because the goodput is the amount of data the useful data without overhead but the throughput includes the amount of complete amount of data total amount of data including the overheads also. So if it is not matching we have an idea like throughput might have some issue or packets are getting dropped or we have some bandwidth issues or there is some glitch there is some issue with the link like we are getting data drops and all.
So to manage bandwidth utilization and locate resources for high priority services. So in that case, we can use the quality of services in in the router. And, uh, we, like, we can manually configure the quality of services where we can give the, uh, priority for, uh, some specific, uh, task to some specific task and give the highest bandwidth to them, uh, for and we do we can do this with, uh, with the firewall also. Like, in Meraki firewall, we have we can make the policy of, um, like, if, for example, if we have, uh, 40 Mbps of bandwidth, total bandwidth, we can make the policy, like, we need to give the 30 Mbps of bandwidth to a specific, uh, IP address or to a number of IP addresses. So we can add the policy with that where those, uh, with the highest priority jobs will get in first and will be you will we will be able to use the highest possible bandwidth, which we have already configured via US policies or via the policies.
Steps required to design and specify system requirements for a new network solution. So okay. So, basically, what if if we if we are starting from the scratch, then basically, we need 1 router, which will be connected with the ISP in the end of the edge will be connected with the ISP. And we need to focus on the scalability also. So we'll we'll find the router which is which has all the features of layer 3 router. Uh, like, we can we can use the protocols like OSP, BGP in that. And then we will see what other requirements we need. Like, for example, if, uh, if we have a new setup, then basically, we it should be connected completely. So we might need, uh, access points for office setup Wi Fis and all. We might need switches. Uh, we we we need not to buy the high end switches, which are very costly. We can buy the switches, which are, like, fair which are okay with, uh, with the performance we want. So we can, uh, we can buy the micro routers. We can buy the, uh, s g 300 switches, which are not much cost cost here as compared to Nexus, which is, like, in that also, we can run everything. Uh, so Nexus are the layered layered 3 switches in which we can add the BGP routes also in there. So, basically, it depends upon what we are going to design what we are going to design and what are the requirements. Like, Uh, for a simple design, we can have 1 router if we are talking about the same area in a specific area if you're, we can have a router which supports the VPNs. We we can have, like, I can give an example of microtic routers, which are not much costlier. We can have switches. We we should have a firewall, which will manage our security traffic, which will allow and deny the traffic based on our needs, whether we want SSH or we want ping to be enabled or to be allowed with that. So, basically, all of them.
yeah to optimize server utilization in a data center virtualization technologies so basically we have a lot of virtual technologies like the server kept in the cloud or kept you using the cloud servers or the virtual servers are very beneficial as we don't need any space for it we just have to pay amount after a month or a year so it is very useful because if you are if you are going to bug go and buy a server it will definitely be and like it will be very costly to buy a server and to have a space for it in the data center so instead we can have a server virtual server in the cloud and if you want we can increase the storage as well easily without any issues or glitches so we can optimize the servers with the with optimize the servers which are virtually placed because it is very easy we don't ourself have to do anything we just have to request the company who's managing our servers virtual servers so it is very easy and very optimistic way to run our servers in a virtual format because it will optimize the overall performance of the server and we did not want to have any space in our personal data centers or we do not want to buy any racks for those servers so it will be very very very leveraged for us to optimize the server utilization
What process will you use to update and manage? So, basically, we can have a backup of, uh, configuration firewall configurations And, uh, how we'll manage it throughout the network is, like, we have different if we have different sites of a network, so, uh, how will we do? We will, uh, if you want to, like, monitor any of, uh, the thing or manage any firewall configurations, what we'll do, we can take a backup of those configurations or either we can have just check the router switches and firewalls.