Vous êtes sur la page 1sur 30

Sections of the Presentation

•Introduction and Work Experience


•Core Infrastructure Analysis
•Service Oriented Approach to Value
INTRODUCTION AND WORK EXPERIENCE
Academic Certifications
Bsc, Computer Information Systems - Cleveland State University
Masters in Business Administration- University of Akron, Ohio

Professional Certifications
Cisco: Certified Internetworking Expert-(written)
Certified Networking Associate

Microsoft:Certified Information Technology Professional-Svr 2008


Certified Technology Specialist- Hyper-v 2008

PMI: Project Management Professional- Approved in Lieu..


Experience - Metro Deployments
Mostly campus wide implemenations that follow a three tiered
model which are access,distribution and edge. Being IT Support,
have been very used to a ticketing escalation methodology and
the best practrices of IT Helpdesk function. Examples would be a
Regional billing Center and two universities.
Botoseal: Data Quality & Aggregation --> Improved System Mgmt.

MORE CLIENTS = MORE DATA


MORE DATA = MORE QUALITY
MORE QUALITY is postively correlated to MORE CLIENTS
and possibly
MORE TECHNICAL SYSTEM RESOURCES
CORE INFRASTRUCTURE SERVICES
Network Infrastructure as a Catalyst
The network will provide and act as a backbone for quality
services that are extensible and also robustable. We would be
looking to integrate with partners as such, would be looking to
invest in a methodology that makes Integration as seemless and
efficient as possible.
Cisco SAFE Model
Is a hybrid model that focuses on six domain areas for
security namely: Secure Services, Threat defence,Segmentation,
compliance,security intelligence and management.
Management: Incidence Reporting,Analysis and Cnfg Mgmt.
Security Intelligence: Accounts for different threats dynamically.
Compliance : Addresses policies meeting recognized standards.
Segmentation: Utilizes advanced network policies for scalability.
Threat Defense: Gives visibility into evasive cyber threats.
Secure Services: Framework for Access Control,applications and
VPNs.
Management
Secuity Intelligence
Compliane Capabilities
Segmentation Capabilities
Threat Defense
Secure Services Capabilities
Core Infrastructure:Servers
The Servers refers to a computer program that turns a
computer into a server, e.g. Windows service. The servers will
handle requests from internal external users and make sure that
network policies are being adhered to at the application layer
and the network layer.
Routers
The router is a networking device that forwards data packets
between computer networks. Routers perform the traffic
directing functions on the Internet. A data packet is typically
forwarded from one router to another router through the
networks that constitute an internetwork until it reaches its
destination node.
Switches
The network switch also called switching hub, bridging hub,
officially MAC bridge is a computer networking device that
connects devices together on a computer network by using
packet switching to receive, process, and forward data to the
destination device. Modern network switches do have routing
capabilities.
Printers
The printers are primarily designed to support individual
users, and may be connected to only a single computer or
via a network. These printers are designed for volume-
centric short-turnaround print jobs, requiring minimal setup
time to produce a hard copy of software resources.
Cables
Networking cables are networking hardware used to connect
one network device to other network devices or to connect two
or more computers to share printers, scanners etc. Different
types of network cables, such as coaxial cable, optical fiber
cable, and twisted pair cables, are used depending on the
network's physical layer, topology, and size. The most common
to be used would be Cat-4,Cat-5 and Cat-6 as well as fibre optic
cables that can be used with SFP modules of the devices.
Wireless, Satellite and Telco Integration
A wireless network is a computer network that uses wireless
data connections between network nodes. Wireless
networking is a method by which telecommunications
networks and business installations avoid the costly process of
introducing cables into a building, or as a connection between
various equipment ...
Smartphones
The smartphone is a handheld personal computer with a mobile
operating system and an integrated mobile broadband cellular
network connection for voice, SMS, and Internet data
communication; most if not all smartphones also support
Wi-Fi. Smartphones are typically pocket-sized, as opposed to
tablets, which are much larger.
Biometric Scanning Devices
The Biometric device is a security identification and
authentication device. Such devices use automated methods of
verifying or recognising the identity of a living person based on
a physiological or behavioral characteristic. These characteristics
include fingerprints, facial images, Iris prints and voice
recognition.
SERVICE-ORIENTED APPROACH
TO VALUE CREATION
Network Implementation Methodology
The Hierarchical internetworking model is a three-layer model
for network design first proposed by Cisco. It divides enterprise
networks into three layers: core, distribution, and access layer.
high-speed,forwarding Combines the
services to move Distribution
packets between and Core
distribution-layer using
devices in different technologies
regions of the network. like Cisco
Stackwise and
is cost
Routing, filtering,
efficient.
and QoS policies
are managed

User connection
via Ethernet
Network Management Tools
• Network Monitoring Tools: Solarwinds, Whatsup Gold..
• Incident Management Software: Proprietery or OffShelf
• Server resources for archival purposes.
• Free networking tools with high utility. Eg. Wireshark for
ip packet analysis
• User reference guides (where applicable) for end users
for recurring incidents.
Security Infrastructure Services
Firewalls: Configuration of Authentication, Authorization and
Accounting Services.
As many rule sets that meet the Company's Objectives.
Intrusion detection Mechanisms: That dynamically adjust and
are being monitored. Can be achieved with the Cisco
Adaptive Security Appliance Device.
Network Policies: At as many layers and boundaries that
satisfy end user requests and re-inforce more quality.
(Segmentation Framework)
Wireless Network Services
Discovery and Planning Phase: Site Assesment and identify all
potential issues that could be.
WLAN Design: Actual Installation and configuration of Access
points and Wlan Controllers to satisfy employee and Guests.
Wireless Post-Verification Survey: Will look to analyze
performance after a while, the quality of the spectrum and its
delivery.
Continuous Optmization: As needed, will be looking to relocate
Access points, given the quality of performace is
below the given slack level.
Project Management Methodology
PMBOK vs Agile.. (IT Project Management Specific)
PMBOK now offers an ideal certification route and a methodology
structurally focused on Schedule Management. Time is finite.
Control of time is a competitive advantage. There are many
tools and techniques available to manage schedules, much of
which is connected to overall project planning and sequencing
of activities.
THANK YOU

Vous aimerez peut-être aussi