Before delving into VoIP configurations, a brief introduction with terminology is necessary:

 

  • Public Switched Telephone Network (PSTN) —PSTN is the world’s collection of interconnected public voice telephone networks. It is also known as the Plain Old Telephone Service (POTS). It is set up and managed by the government and commercial organizations. It has evolved from the early days of Alexander Graham Bell to mostly digital, circuit-switched telephone network.
  • Private branch exchange (PBX) —This is a device located within an organization that routes telephone calls to internal extensions or to the PSTN. It provides additional features such as voicemail and call-forwarding. A PBX is less expensive than connecting an external line to every telephone. Numbers within the PBX (internal numbers) can be dialed using the last few numbers of the entire phone number and without going through the PSTN. A PBX usually has more than 125 ports.
  • Key telephone system —This is used like a PBX in small offices where far fewer phones are required. Each key telephone system supports up to a hundred ports.
  • Software IP phones —These consist of a headset that plugs into the USB or serial interface of a PC. The PC needs client software that supports IP telephony.
  • Hardware IP phones —These look like regular telephone sets, but they are plugged into a LAN switch. Most IP phones get power from the switch (power over Ethernet or PoE) and encapsulate voice data into IP frames for transmission over the LAN.
  • H.323—This was approved by the International Telecommunications Union (ITU) in 1996 as a standard for multimedia and audiovisual transmission across disparate networks. In 1998, it was followed by version 2. It also includes several functions such as bandwidth management, call control, multimedia management, and interoperability between different network types. H.323 has come to be the most popular protocol for VoIP.
  • Session initiation protocol (SIP)—SIP is IETF’s standard for multimedia communication over IP networks. It is an application-layer control protocol that initiates, manages, and terminates calls between two or more terminals. It is picking up as an alternative to H.323.

Blade computing introduces a new data center paradigm where various thin compute blades share centralized resources in a single chassis. Ablade server is a single circuit board populated with components such as memory, processors, I/O adapters, and network connections that are often found on multiple boards. Server blades are built to slide into existing servers. They are smaller, need less power, and are more cost-efficient than traditional box-based servers.

 

Managing these servers requires the following:

  • A virtualized view of the servers and resources it uses (such as storage)
  • A high level of security within the server and on the network devices
  • Dynamic resource provisioning that is automated as much as possible
  • A layout that is easy to scale to meet ever-increasing user demands

Data centers will realize a shift from box-based servers to densely packed racks of blade-based servers.

 

System area networks (SANs) represent an area of computer architecture that has evolved quickly. The term SAN in this section refers to “system” (not “storage”) area networks. After various competing standardization efforts starting in the late 1990s, the state of the SAN field became temporarily unclear. However, the technology has emerged with a richer set of

features that promise to impact the server and clustering arena.

 

A SAN uses high-speed connections to attach high-performance computers in a cluster configuration. The configuration delivers very high bandwidth of 1+ GB/sec with very low latency. They are switched, with a typical hub What’s Next 579 supporting 4 to 8 nodes. Larger SANs are built with cascading hubs with cable length limitations that vary from a few meters to a few kilometers.

 

Interconnections in a SAN differ from other existing high-performance media (such as gigabit Ethernet and ATM) in several ways. SAN adapters implement reliable transport services that are similar to TCP or SPX, but directly in hardware. SANs have very low error rates. SANs are often made highly available by deploying redundant interconnect fabrics.

 

SANs provide bulk data transfer through a remote direct memory access (RDMA) mechanism. The performance within a SAN resembles more that of a memory subsystem than a traditional network (such as an Ethernet LAN). The initiator specifies a buffer on the local system and a buffer on the remote system. Data is then transferred directly between the local and remote systems by the network adapters without involving either of the host CPUs. Both read and write operations are supported in this manner.

 

 

Subnetting is a technique of dividing a full Class A, B, or C network into smaller networks. It defines how 1 or more bits are taken from the host portion and added to the network portion. Following are the advantages of this technique:

 

  •  Saves IP addresses —Avoids the need to assign an entire IP range within a network to one location.
  •  Simplifies network management—Smaller, independent subnets can be created by routers. Internal networks can be restructured without impacting DMZ or external networks.
  •  Reduces network traffic —Links with high network traffic can be isolated to a subnet. Examples are NFS and backup subnets. NFS client (such as a filer) interfaces can be on a one subnet and backup server and dedicated client NICs on another.
  •  Improves security —It is easy to keep DMZ and front-facing networks separated from internal networks.

 

Subnetting requires taking a bit from the host portion and giving it to the network portion. The more bits we steal from host portion, the more the number of subnets. But more subnets come at the expense of IPs that would otherwise be used for hosts. Each new subnet requires two IP addresses: one for the network ID and the other for its broadcast ID.

Hubs and switches are similar in many ways. Both contain connection ports into which twisted-pair RJ-45 connectors (similar to phone RJ-11 jacks) plug. They can be administered remotely. Either can be used to create a LAN, and they funnel messages to the network backbones.

 

There are salient differences between hubs and switches, however:

 

  • Shared or dedicated bandwidth —The main distinction is how they operate. Hosts in a hub-based network share the full bandwidth, but a switch is capable of creating independent full-speed connections for any two devices on the LAN that must communicate. Each connection operates at the full switch bandwidth.
  • How they handle signals —A hub acts like a repeater. It takes an incoming frame and retransmits it to all other attached hosts. Each hub port has a single host connected to it. Hubs are dumb devices and cannot learn. Switches examine incoming frames and immediately transmit them to one or more other ports. This process is very fast. Each switch port can have a single host or a LAN segment connected to it. Switches learn media access control (MAC) addresses and build a contentaddressable memory (CAM) table.
  •  Cost —Switches are more expensive than hubs for the same number of ports because they have more powerful hardware and software capabilities. Switches have more memory, a CPU, and a complete suite of software tools to manage them. Hubs have a trimmed-down version of the firmware code.

 

Like switches, bridges are also layer 2 devices. They learn MAC addresses, filter and forward frames, and can be used to segment LANs. However, they usually have 16 or fewer ports. Much of the functionality of bridges has been moved to routers.

 

Just as routers have replaced bridges at layer 3, switches (as their cost continues to fall) may eventually replace hubs at layer 2, but that has not happened yet. Hubs, it must be pointed out, have become smarter, less expensive, and easier to set up and manage. As more and more LANs are being set up, network managers continue to deploy hubs as an easy and inexpensive way to connect printers, low-traffic servers, PCs, and management consoles. The number of installed hubs is increasing mainly because of cost and simplicity.

Smart card logon is supported for Windows 2000 and Windows Server 2003. To implement smart cards, you must deploy an enterprise certification authority rather than a stand-alone or third-party certification authority to support smart card logon to Windows Server 2003 domains. Windows Server 2003 supports industry standard Personal Computer/Smart Card (PC/SC)–compliant smart cards and readers and provides drivers for commercially available plug and play smart card readers. Windows Server 2003 does not support non-PC/SC-compliant or non–plug and play smart card readers. Some manufacturers might provide drivers for non–plug and play smart card readers that work with Windows Server 2003; however, it is recommended that you purchase only plug and play PC/SC-compliant smart card readers.

The cost of administering a smart card program depends on several factors, including:

■ The number of users enrolled in the smart card program and their location.

■ Your organization’s practices for issuing smart cards to users, including the requirements for verifying user identities. For example, will you require users to simply present a valid personal identification card or will you require a back-ground investigation? Your policies affect the level of security provided as well as the actual cost.

■ Your organization’s practices for users who lose or misplace their smart cards. For example, will you issue temporary smart cards, authorize temporary alternate logon to the network, or make users go home to retrieve their smart cards? Your policies affect how much worker time is lost and how much help desk support is needed.

Your smart card authentication strategy must describe the network logon and authentication methods you use, including:

■ Identify network logon and authentication strategies you want to deploy.

■ Describe smart card deployment considerations and issues.

■ Describe PKI certificate services required to support smart cards.

In addition to smart cards, third-party vendors offer a variety of security products to provide two-factor authentication, such as “security tokens” and biometric accessories. These accessories use extensible features of the Windows Server 2003 graphical logon user interface to provide alternate methods of user authentication.

EF Englishtown Innovation

Posted: May 18, 2011 in EF
Tags:

Guys Check the link

www.this-is-my-story.com/v/E30C6K9BM7DP.

Job Description

Service Desk Analysts (1-2 years)

Division

EF Education First Global IT

Location

Bangalore, India

The Role

Working as part of the EF Remote Support team in Bangalore, this position will be responsible for providing remote desktop support to EF users worldwide.

Responsibilities:

  • Responding to support requests that come through the issue tracker or mail
  • Connecting to user PCs and resolving issues related to desktop, network, email etc.
  • Responding to server and network alerts and first level of troubleshooting
  • Solving first-level server, network, and application problems
  • Ensuring patch level and hot fixes are updated in all servers
  • Escalating critical issues to L2 and other senior members of the support team
  • Ensuring regular backups are completed at all locations
  • Hands-on troubleshooting
  • Troubleshooting / Addressing Web Access Problems
  • Compliance to EF policies and procedures.

Requirements:

  • 1 – 2 years experience of basic Laptop /desktop troubleshooting: providing LAN support, installing software, Configuring Outlook, handling printer issues, providing Email solutions.
  • Experience in remote support is a must.
  • Should have basic knowledge on Windows XP/Networking
  • Excellent communication skills in English, written and spoken
  • Good analytical skills
  • Should be willing to work in 24/7 shift system.

Advantages:

  • Experience with setting up Dell servers
  • Experience with configuring and troubleshooting CISCO networking devices
  • Knowledge and experience on MOM
  • Experience in Active Directory, configuring group policies, WAN, VPN and wireless networking
  • Experience working in a fast-paced, cross-cultural professional environment

Additional Information

EF is the world leader in international education. Our mission is to break down barriers in language, culture, and geography and so far we have helped over 15 million people learn a language, discover the world or earn an academic degree.

EF is an equal opportunities employer. If you are motivated by the prospect of design career with an international and forward-thinking company, we want to hear from you.

Interested candidates should send a CV and cover letter to:  itjobs@ef.com

Job Description

Network Technical Lead (8+ years)

Division:

EF Education First Global IT

Location:

Bangalore, India

The role

  • Support of IT infrastructure using Incident, Problem , change and Configuration Management
  • Designing, engineering, maintenance, and support of in the area of data and voice networks, Network designing, testing, technical writing and other duties required to create a robust support structure, standardize and implement the IT department
  • Thorough understanding of BGP, ISIS, OSPF, and MPLS, and should be familiar with MPLS Traffic Engineering (TE) as well as VPN technologies such as L2VPNs, RFC2547, and VPLS. Knowledge of MEF based L2 switching/bridging (STP, VLANs, Ethernet), Class of Service (QOS) specifically TOS and DiffServ and related Queuing algorithms is a plus, a through understanding of VOIP and security devices (such as IDS, IPS and open source IDS)

Requirements (All candidates)

  • CCIE is desirable (CCNP must) with hands on design and implementation experience
  • Ability to take the team of specialist along with him and mentor them as per requirement
  • Good in design reengineering and must have service design and systems integration skills and capability in handling heterogeneous network

Additional Information

EF is the world leader in international education. Our mission is to break down barriers in language, culture, and geography and so far we have helped over 15 million people learn a language, discover the world or earn an academic degree.

EF is an equal opportunities employer. If you are motivated by the prospect of design career with an international and forward-thinking company, we want to hear from you.

Interested candidates should send a CV and cover letter to:  itjobs@ef.com

Job Description

Server Specialists (6- 10 years)

Division

EF Education First Global IT

Location

Bangalore, India

The Role

Support of IT infrastructure using Incident, Problem, change and Configuration Management

Responsible for administering, monitoring, and maintaining Microsoft server Windows-2008 R2 AD and Exchange -2007, convert business and technical requirements into both high-level architecture and detailed design specifications

Maintain the VMware Enterprise Cluster and Virtual Servers (Windows & Linux) ensuring uptime and site responsiveness.

Provide recommendations to improve the SAN infrastructure, and address/lead critical issues and root cause analysis.

Must handle problem tickets, assist other teammates in technical decision making, support current business applications.

Requirements (All candidates)

Must have Good understanding of Scripts and Power shell and Exchange

Has good knowledge of multiple Microsoft Technologies e.g. AD, Exchange SCOM, SCCM, Collaboration and Share point

System administration skills on SAN (Netapp/EMC), VMware and Linux

Additional Information

EF is the world leader in international education. Our mission is to break down barriers in language, culture, and geography and so far we have helped over 15 million people learn a language, discover the world or earn an academic degree.

EF is an equal opportunities employer. If you are motivated by the prospect of design career with an international and forward-thinking company, we want to hear from you.

Interested candidates should send a CV and cover letter to: itjobs@ef.com