Premium Essay

Network Engineer

In: Computers and Technology

Submitted By kbapir
Words 313
Pages 2
I first became interested in information technology and telecommunication network systems when I was working for a civilian company contracted by the United States military in Iraq. I began my career in 2005 after graduating as an electrical System Technology through the Turkish engineering company ASFA Group that provided labor force to the United States military bases. My responsibilities included managing the ASFA Group construction contract as well as managing the company’s employees, where I was solely responsible for four AFSA compounds and four U.S. Military bases resulting in the supervision of 285 employees. In 2010, a manager of the American company AT&T who was impressed with my knowledge in network operations as well as my hard work ethic discovered me. I was immediately offered a position as a network technician, where I was responsible for setting up equipment, acquiring satellites, and monitoring networks in support of U.S. Military operations. After Operation Iraqi Freedom was finished, I was sent to Afghanistan to continue working for the company until summer 2012.
Family matters led me to Turkey immediately following my voluntary resignation. It was in Turkey that I began working at INTA Engineering as a TURKCELL Contractor, the largest mobile service provider in the country. There I monitored and troubleshot network systems in seven cities and 1,300 network devices. I also continued expanding my skills in IP networking engineering and acting as a service provider.
For two years, I have been working in the United States. As an IT manager at Bo Concept New York, I was responsible for maintaining all operation systems. Currently, I am working for the start-up company, Yamach Foods, as an operation‘s manager. In addition to overseeing employees, keeping track of inventory, and following strict regulations of importing products, I also am in charge…...

Similar Documents

Premium Essay

Engineer

...EECE 350/450 Computer Networks Spring 2013 Course information   Catalogue Description   A course that outlines data communications; wide area networks; circuit and packet switching; routing; congestion control; local area networks; communications architecture and protocols; internetworking.   Pre-requisites   By topic: •  Programming language (such as C++) •  Basic understanding of probability theory and data structures •  Basic understanding of the internal operations of computers   By course: •  STAT 230 Probability and Random Variables, and EECE 330 Data Structures and Algorithms. Instructor   Ayman Kayssi                   Office: 404, Raymond Ghosn Building (RGB) Office Hours: Monday 2 – 3:30 pm and by appointment Extension: 3499 Email: ayman@aub.edu.lb Web: aub.edu/~ayman Messaging: +961 3 965 258 LinkedIn: lb.linkedin.com/in/aymankayssi Twitter: akayssi Facebook: akayssi Course objectives   The objectives of this course are to give students:   An understanding of the basic principles of computer networking   An overview of the main technologies used in computer networks   An overview of internetworking principles and how the Internet protocols, routing, and applications operate   The basic background in computer networks that will allow them to practice in this field, and that will form the foundation for more advanced courses in networking   The basic skills needed to write network applications. Topics covered in this......

Words: 1522 - Pages: 7

Premium Essay

Engineer

...deal with any computer-related offence under a singular term, whether as “computer crime” or as a form of “cyber crime”.[3] However, it is important to differentiate offences that are more appropriately termed “computer crime” and those activities that fall under the description of “cyber crime” and to accurately categorize them. A. Computer Crime and Cyber Crime Are Different Offences Computer crimes are to be distinguished from computer-enabled crimes. They relate to crimes against computer hardware as well as the digital contents contained within it such as software and personal data. Computer crimes have an adverse effect on the integrity and trust in information technology infrastructure such as computer or telecommunications networks and in the security of transactions conducted through them. “Computer crimes” is often used to define any criminal activities that are committed against a computer or similar device, and data or program therein. In computer crimes, the computer is the target of criminal activities. The “computer” in this context refers to the hardware, but the crimes, as we shall see, more often than not relate to the software and the data or program contained within it. The criminal activities often relate to the functions of the computer; in particular, they are often facilitated by communications systems that are available and operated through the computer, thereby contributing to a less secure computing environment. Examples of interactive......

Words: 24175 - Pages: 97

Premium Essay

Engineer

...Essay on Facebook Posted by admin as Example papers Social Networking Sites like Facebook Made the World a Better Place Appearing on the world stage in 2003, Facebook has revolutionized the average person’s social network into an unprecedented web of information available in the palm of a hand. With just a few clicks or taps on one’s mobile app, one can meet people, see friends from high school and even make contacts with potential business interests. Unfortunately, social networking sites like Facebook have not made the world a better place because it is a waste of time for the user. As time is important to people, it can be better spent doing productive things, beneficial for one’s life. As the old adage goes, time is of the essence, and if it is not used wisely, the consequences are never good. Social networks have become more than just connections with people, they have accumulated add-ons like Farmville, Mafia Wars and other games in order to keep users entertained. In these games, the user plays for virtual money, often spending many hours each day building farms and collecting sheep and other animals. With millions of users signed-up for such add-ons, it is not hard to deduce that they are wasting millions of hours each day decorating farms and collecting garden tools. It is, however, true that if used right, the site can connect users with people of same interests, thus building a name for a person, if s/he is a writer for example. Nevertheless, a few possible......

Words: 6232 - Pages: 25

Free Essay

Engineer

...Secondary Data Center (220 Cabinets) and Disaster Recovery Site (88 Cabinets) * Preparation of the technical studies on the urbanization and the network cabling for the new data centers according to the ANSI/TIA-942 standard. * Design of the network architectures "Cloud Ready" and drafting of the technical specifications for the solution to be deployed, according to the reference model "Cisco Virtualized Multi-Tenant Data Center" (VMDC 2.2). * Data Center Interconnect design for virtualization needs, geoclustering and Disaster Recovery * Primary Data Center Network Infrastructure Project Manager (92 Cabinets) * Network cabling and urbanization design * Design and deployment of the network infrastructure following the business requirements in term of Colocation and Hosting and according to the Multi-Tenant consumption model. * Deployment of new technologies for the unified network and virtualization (FCoE VDC, VPC,VSAN…). * Procurement and following the infrastructure deployment of the computing, the storage environment and the virtualization solutions via VMware and Hyper V. * "Hosted Exchange" Project Manager * Validation of the HLD and the LLD and following the deployment and the test of the solution. * Definition and deployment of the solution for high availability, load balancing and network security as validated by Cisco and Microsoft. * Study of some Data Center Infrastructure Management solutions (DCIM), selection and......

Words: 679 - Pages: 3

Free Essay

Engineers

...ENGINEERS AUSTRALIA INFORMATION BOOKLET How to increase your chances of getting your first engineering job in Australia Guide for migrant professional engineers, engineering technologists and engineering associates JENNIFER O’DONOVAN 2 “How to increase your chances of getting your first engineering job in Australia” Author: Jennifer O’Donovan, Manager Career Development Centre, Engineers Australia, Sydney Editor: Dr Dietrich Georg Copyright 2013 © Engineers Australia All rights reserved Published by Engineers Media Pty Ltd, Crows Nest, Sydney, www.engineersmedia.com.au, on behalf of Engineers Australia Cataloguing-in-Publication entry is available from the National Library of Australia http://catalogue.nla. gov.au/ ISBN 978-1-922107-26-8 The material contained in this practice note is in the nature of general comment only and is not advice on any particular matter. No one should act on the basis of anything contained in this note without taking appropriate professional advice upon the particular circumstances. The publisher and the author do not accept responsibility for the consequences of any action taken or omitted to be taken by any person on the basis of anything contained in or omitted from this note. Engineers Australia “How to increase your chances of getting your first engineering job in Australia” 3 CONTENTS 1. Introduction 2. Preparing yourself 2.1. Language skills 2.2 Communication skills 2.3. Further study 2.4. Continuing......

Words: 6101 - Pages: 25

Premium Essay

Network Engineer

...user passwords are not part of the intellectual property laws. Now for server patches licensing would have to be valid for any of our software. Since we are now hosting other customer’s data and equipment we had to sign contracts. So customers hosting their information with us stays on their system and not copied to or given to another customer for cash. All technicians have been certified in each of the major vendors such as Microsoft, Cisco, Sonic Wall, and VMware. In our datacenter we have to keep all customers data safe and not able to fall in the wrong hands because my company could get sued for not having the proper security for their systems. All of the customers equipment is locked up separated and segregated from our internal network. We hire a third party to do security audit to help keep up with the security precautions. IT Asset Description | Seven Domains of Typical IT | Privacy Data Impact | Assessment[Critical-Major-Minor] | User Passwords | Workstation Domain | User and company Data | Major | Server patches an security | Lan domain | Company data | Major | Cisco ASA (Old users and ACL on our Ip lists.) | Lan to WAN domain | Company | Major | Remote users security | Remote access domain | User/ Company data | Major | Webserver (Updates and services not needed) | System/application Domain | Company | Minor | RDP Servers Security | System/application Domain | Company | Major | IT security to Datacenter | User domain | Company | Major | ......

Words: 301 - Pages: 2

Free Essay

Network Engineer

...body. How? Because if the CPU (Central Processing Unit) were the brain of the machine, then the motherboard would have to be the nervous system. It works very similarly to the nervous system, in that it essentially coordinates the actions and signals from the CPU (brain) to and from the rest of the machine. A. Motherboard Components: 1. Back panel connectors and Ports: Connectors and ports for connecting the computer to external devices such as display ports, audio ports, USB ports, Ethernet ports, PS/2 ports. 2. PCI SLOTS: PCI: Peripheral Component Interconnect Slot for older expansion cards such as sound cards, network cards, connector cards. See image below for a close-up view. Have been largely replaced by PCI-Express x1 slots (see motherboard parts #3 below). 3. PCI Express x1 slots: Slot for modern expansion cards such as sound cards, network cards (Wi-Fi, Ethernet, and Bluetooth), connector cards (USB, FireWire, eSATA) and certain low-end graphics cards. See image below for a close-up view. 4. PCI Express x16 slots: Slot for discrete graphic cards and high bandwidth devices such as top-end solid state drives. See image below for a close-up view. 5. Northbridge: Also known as Memory Controller Hub (MCH). Chipset that allows the CPU to communicate with the RAM and graphics card. 6. CPU Socket: Insert CPU here. To learn how to install a CPU. 7. ATX 12V Power Connector: Connects to the 4-pin power cable of a power supply unit which supplies power to the......

Words: 523 - Pages: 3

Premium Essay

Engineer

...history Date Location Company Title Job Description 1-1-2011 to now Joseph Tito Petrojet Contract Engineer 1- review and understand terms, conditions and obligations in the assigned contract 2- Identify risks and opportunities in the contract 3- Implement tendering/contracting policies and procedures. 4- Provide support to supply chain in handling contractual matters with main subcontractors 5- Act as contracts representative for specified projects. 6- Develop, implement, and manage contract correspondence system or change order mechanism 7- Negotiate contracts within delegated authority with both customers and suppliers 8- Advise project managers/staff with regard to contractual issues. 1-2-2009 to 31-12-2010 El Dokki Midlocalize Project Coordinator 1- Determines project responsibilities by identifying project phases and elements; assigning personnel to phases and elements. 2- Maintains project schedule by monitoring project progress; coordinating activities 3- Maintains project data base by writing computer programs; entering and backing up data. 4- Controls project costs by approving expenditures 15-7-2005 to 15-8-2005 El Ein El Sokhna way – El Katamia Powerwell services Trainee 15-7-2006 to 22-7-2006 El Maadi Khalda Company Trainee 15-7-2007 to 15-8-2007 6th October – The third industrial area Daewoo Factory Trainee 1-1-2010 to 30-3-2010 El-Dokki Mercedes Time keeper engineer (trainee) Date Location Company Title Job Description ...

Words: 432 - Pages: 2

Free Essay

Engineer

...City, Kuwait Mobile: (+965) 600 834 45. Email: m.m.g@live.co.uk PERSONAL STATEMENT I’m an adaptable and innovative qualified Mechanical Engineer with experience creating cost efficient HVAC designs, and Plumbing Equipment sales engineer I’m looking to develop my expertise in new concept development within a forward thinking company. Date of Birth 10th of oct. 1989 Passport No. A14116639 Marital Status Single KEY SKILLS Technical Skills * AutoCAD (2D). * AutoCAD (3D). * Autodesk Inventor. * HAP. * MS Office. * Adobe PhotoShop. * Automation Studio. Certificates * PMP (Project Management Professionals) – 48 attending hours. * Sales Training at WILO Pumps ME. * Training in MEDOM Company for Oil industry. * Training in Hydraulic System for Aeroplanes – Cairo Airport Workshops. * Technical Training at POTAGLAS Corporation. Memberships * Arab engineers association. * Egyptian Engineers Syndicate. * Kuwait Engineers Syndicate. EDUCATION * SBS Swiss Business School Master of Business Administration (M.B.A.) 2013 – 2015 * Alexandria University BSc Mechanical Engineering 2006 - 2011 Graduation project HVAC (Central Air Conditioner for sport Arenas) 2011 EMPLOYMENT Sales Engineer Al-Madadd Trading and Contracting Company | Hawally, Kuwait 04.2012 > Current Al-Madadd Co. is one of the biggest supplier company for......

Words: 621 - Pages: 3

Free Essay

Engineer

...smooth migration paths from 2G networks. To that end, a standard called UMTS rose to the top as the 3G choice for GSM operators, and CDMA2000 came about as the backward-compatible successor to IS-95. Following the precedent set by GPRS, CDMA2000 offered CDMA networks an "always-on" data connection in the form of a technology called 1xRTT. Here's where it gets a little confusing: even though CDMA2000 on the whole is officially a 3G standard, 1xRTT is only slightly faster than GPRS in real-world use -- 100kbps or so -- and therefore is usually lumped in with GPRS as a 2.5G standard. Fortunately, CDMA2000 also defined the more advanced 1xEV-DO protocol, and that's where the real 3G money was at, topping out at around 2.5Mbps. The first CDMA2000 and UMTS networks launched between 2001 and 2003, but that wasn't to say that manufacturers and standards organizations were standing still with the 2G technology path, either. EDGE -- Enhanced Data-rates for GSM Evolution -- was conceived as an easy way for operators of GSM networks to squeeze some extra juice out of their 2.5G rigs without investing serious money on UMTS hardware upgrades and spectrum. With an EDGE-compatible phone, you could get speeds over double what you got on GPRS; not bad at the time. Many European operators didn't bother with EDGE, having already committed to going big with UMTS, but Cingular -- likely looking to buy itself time -- jumped at the opportunity and became the first network to roll it out in......

Words: 477 - Pages: 2

Premium Essay

It Engineer

...Telecommunication Networks, Network Operations, and Management. Good at communication and presentation. I have strong analytical and writing skills. EXPEREINCE (3 years) IT & Telecom. Internee(NIP) January 2010 – January 2011 At National Telecommunication Corporation HQ, Islamabad, Capital Territory, Pakistan Network/System Support, Hardware troubleshooting, Data Communication, Next generation Network, Switching, Transmission and Information technology departments Jr. Netwrok Administrator January 2008 to January 2010 WOL Telecom. Islamabad, Capital Territory, Pakistan LAN Management, Administration, Design and Support, Firewall management. RESEARCH Published Waqas Haider, Abdul Wahab "A review on Cloud Computing Architectures and Applications" Vol.2. No.4 (2011) of Computer Engineering and Intelligent Systems Under Review • Abdul Wahab , Waqas Haider, Muhammad Sharif, Mudassarr Raza “The Realization of Personalized E-Learning platform based on 3G Mobile phone and NGN control frame work for SIP based IP Networks”, TURKISH JOURNAL OF ELECTRICAL ENGINEERING & COMPUTER SCIENCES • Abdul Wahab , Waqas Haider, Muhammad Sharif, Mudassarr Raza “A Hybrid Method of Edge Continuity based on Pixel Neighbor Pattern Analysis (PNPA)”, ERCEMAPI 2011 - Artigos ACADIMICS BS Telecommunication and Networking August 2009 at Comsats institute of IT, Wah Cantt., punjab, Pakistan, with (Grade/GPA)......

Words: 387 - Pages: 2

Premium Essay

Engineer

...straightforward: “What’s the revenue potential of this business five years from now?” “I’m estimating eight million to ten million dollars by the end of year five,” she says. “That’s chump change to us,” he laughs. “Talk to me again when you have something with a revenue potential of a hundred million or more. Anything less is too small for us.” The VP isn’t necessarily being arrogant or short-sighted; huge corporations are handicapped in dealing with what are, to them, small business opportunities. Their human and physical assets are configured to address large markets. Thus, many worthy projects are rejected. These discarded opportunities, however, may be gold mines for small, entrepreneurial businesses. In fact, many managers and engineers leave their companies to exploit projects that their employers have rejected as too small. Ironically, the big, inflexible corporations that will not pursue small, entrepreneurial ventures often end up writing huge checks to acquire these same ventures after they are successful and have grown substantially. The case of Snapple is instructive. Snapple was an entrepreneurial firm that developed a very successful ice-tea and fruitdrink business. And it was growing fast. Between 1991 and 1994, its revenues skyrocketed from $95 million to $516 million. Instead of starting its own ice-tea and fruit-drink enterprise, U.S. food giant Quaker, a unit of PepsiCo, acquired Snapple in 1994 for $1.7 billion. 14 Entrepreneur’s......

Words: 11777 - Pages: 48

Free Essay

Network Engineer

...Fargo, ND 58106 701-318-7480 mschufletowski1@hotmail.com EDUCATION BS Information Technology Management Network Administration Rasmussen College, Fargo, ND AAS Architectural Drafting and Estimating Technology North Dakota State College of Science, Wahpeton, ND AAS Construction Management Technology North Dakota State College of Science, Wahpeton, ND SKILLS * * Server+ Certification * Project+ Certification * Network+ Certification * A+ Certification * VMWare VTSP,VTSP-SV, VOP, VSP * Cisco Certified Network Training * Crystal Reports Level I & II Training * Certified Fiber Optics Technician * NIMS 100,700 & 800 * Windows Servers * VMWare 5.2- 6.0 * VSphere * Citrix Zen Server * Active Directory * Exchange 2003/2010 * AutoCAD * MAC OS * SharePoint * Office 2013 * Linux Red Hat * Front Page * Cobol * Turbo C * Microsoft Visual 6.0 * C+ and C # * UnixVB.Net * HTML, JAVA and Perl * MS 2000/XP Client * SQL Server and MySql * Brocade * Cisco Network Systems * Extreme Network Systems * Netgear Network Systems * Sky Pilot Networks * Cisco Merauki, Selinux * Apache * Verbal and Written Communications * Customer Service EXPERIENCE Sr. Network Engineer ......

Words: 438 - Pages: 2

Premium Essay

Engineer

... Figure 4. Traction Alternator and Auxiliary Alternator Excitation Circuits There are two separate circuits that receive power from the AA excitation supply windings. The upper circuit in Figure 4 provides excitation for the auxiliary alternator. The lower circuit provides excitation for the traction alternator. We will look at each individually. Auxiliary alternator excitation circuit Components Besides the AA excitation supply windings, there are three other components in the AA excitation supply circuit: the AAC (auxiliary alternator field controller), the CDS (capacitor discharge switch), and the AA excitation field winding. Figure 4 also shows the control network connection to Smart Display 3, which directs the operation of the AAC. Table 1 lists the location on the ES44AC and the function of each device. |Component |Location |Function | |AA excitation windings |Blower compartment (BLO) |Provides three-phase AC power to excite the AA | |AAC |CA5 |Converts the three-phase AC output of the AA excitation| | | |windings into DC | |CDS |CA5 |Mechanical safety switch which controls current flow to| | ...

Words: 5913 - Pages: 24

Premium Essay

It Engineer

...that simultaneity support the target of providing goods or services at ethical response. These components are commitments, connections and consistency. At any weakness of any one of these components will cause a failure in order to achieve a real corporate responsibility (CR) from literature review that will result to failure in addressing one of the three keys perspectives present in the existing literature (John Meehan, 2006, p. 12). The first elemnt of 3C-SR is the ethical and social commitments, These commitments are letters that written by the firm includes the polices of the firm and the statement of mission and the firm goals (John Meehan, 2006, p. 9). The second element of the 3C-SR is connection with partners and values network. Values network are set between two different business sectors in order to come up with relationship rules of doing business together (John Meehan, 2006, p. 9). The third element of the 3C-SR is the consistency of behavior, this component refers to the credibility of firms wither they follow their commitments and the behavior of the organization through their operations not only how the firm interact with costumers but also among the behavioral standards in internal policies (John Meehan, 2006, p. 10). Bibliography * Carroll, A. B. (1991). The Pyramid of Corporate Social Responsibility: Toward the Moral Management of Organizational Stakeholders. Business Horizons, 39-48 accesed April 20,2012. * Harvard, T. P. (2008). DEFINING......

Words: 1439 - Pages: 6