Showing posts with label Computer Networking. Show all posts
Showing posts with label Computer Networking. Show all posts

How To: Get the best wireless router settings for your home

Using an Internet connection on a single PC is a pretty simple task that can be done by connecting an Ethernet cable, but  wireless-enabled devices such as smartphones, tablets and laptops require wireless connectivity, which brings in the need for a router. Most users step out and buy a wireless router off the shelf and install it on their own. And since wireless routers usually can operate directly out of the box, they are not secured by default. Some routers, such as Belkin, provide a secured wireless network out of the box, whereas routers from other manufacturers usually have open networks and common administrative passwords. This is an open invitation to anyone in the vicinity to simply search and connect to your network with ease, thus jeopardising your data and even utilising your expensive Internet bandwidth. 
Change the default password of the router
Change the default password of the router


Here is a step by step procedure on how you should configure the router and prevent intruders from entering into your wireless network. Do note that though routers from various manufacturers have different interfaces, the settings should be similar. We will be showing you an example using a Linksys router’s user interface. Perform the following steps after connecting the router to the PC.

To begin with, check the router’s user manual or the sticker on the rear or lower panel of the router for the default IP address, username and password. It would most commonly be 192.168.0.1 or 192.168.1.1. Type this IP address in any Internet browser and you should be greeted with the routers main interface, asking you to give in the username and password. 
Change the default IP address and set the DHCP accordingly
Change the default IP address and set the DHCP accordingly


Change the default password
Once you are logged in, change the password. You should consider this mandatory as routers usually have a common username and password and anyone can easily get in. You should see the option in the Administration section. You can choose to go ahead with the setup wizard to configure the router or stick to manual configuration. We show you the manual method.

Change the default IP address
Next, you should set a local IP address for the router. By default, the manufacturer uses IP addresses such as 192.168.0.1 or the 192.168.1.1. We recommend that you change second-last section to a random number between 1 and 254. For example, you can change it to 192.168.25.1 or to make it safer, you can change the entire subnet to 10.20.xxx.xxx or 172.16.xxx.xxx to be safer. This will now be your router’s default IP address to configure it in future, unless you decide to factory reset the router again.

Set the DHCP server mode to  disable
This is a service built into your router, which automatically assigns an IP address to every computer or device that connects to it. Disabling it will mean every computer or device on the network will have to be assigned with a static IP address. In this way, if a user has access to the router’s username and password, he would still have to guess an IP address to enter the network. If you wish to keep it enabled, you should set the IP address range to a minimum. For example, if you have five devices connecting to your router, set the DHCP server to give out only five IP addresses. This way, the sixth device will not be able to get an IP address and get on the network easily.
Change the channel of the wireless operation accordingly
Change the channel of the wireless operation accordingly


Set up the wireless network
Head on to the wireless section. Here you should give your wireless network an SSID or a network name. Change the default to something else, but resist putting in sensitive information that can give out details stating that it is your network. So if an outsider is scanning for a wireless network and sees your SSID, he should not know whose it is.

Set the wireless channel
A wireless channel is the frequency zone of operation for your router's wireless network. This ranges from channel 1 to 11 with each channel differing marginally in frequency values to keep them apart. This should be done because if you are having other wireless routers in your area (or neighborhood), you could be using the same channel they are using, which will cause interference in both networks and reduce the efficiency and speed of your wireless network. If you know what channel other routers in your area are using, set yours apart from theirs by at least three channels apart. In order to find out the channel numbers of other routers in the vicinity, you can use a utility that will scan the wireless network and list it out to you. You can use inSSIDer for Windows on a laptop or WiFi Analyzer on an Android device.
Check  the signal strength, channels and other wireless networks in the area with utilities
Check the signal strength, channels and other wireless networks in the area with utilities


Disable the Wireless SSID broadcast
This feature will hide your wireless network from anyone who is scanning for an available wireless network in your area. If you disable the broadcast, you will need to manually add your wireless network every time you set up a new device to connect to your router. This feature is recommended for use, as a hidden network is safer than a visible one.

Enable the WPS or SES mode
This is a feature used by most wireless devices to securely connect to a wireless router without entering any passwords. For example, if you want to connect a device to your router, you should press the physical  WPS or SES button on the router to allow your device to be connected without entering any password. So if anyone needs to gain access, he has to press the button on your router.

Set up the wireless security
Head on to the wireless security section. By default the manufacturer, in most cases, keeps the wireless security disabled. This is highly vulnerable if left untouched, as anyone can wirelessly connect to your router without a password. Always select WPA2 Personal with TKIP or AES algorithms. You will then need to enter a password. Opt for an alphanumeric password and try not using simple or dictionary words that can make it easy for anyone to guess, or for a password cracking utility to break through. Try using longer passwords.
Ensure the strongest security configuration for the wireless network
Ensure the strongest security configuration for the wireless network


Use MAC filters
Using the wireless MAC filter is one of the best security feature possible for a router. You can configure the router in such a way that it can only allow known computers and devices to enter the network and reject all unknown ones. You should configure this section carefully and only after noting the MAC addresses of every computer and device you will connect to it. To get the MAC address of each device, you can check the network device’s properties section or check out for any sticker on the product itself.
Enable MAC filters to deny unknown devices to the network
Enable MAC filters to deny unknown devices to the network


Tweak signal strength
Head on to the advanced wireless settings if your router features it. Here you can fine tune the  router’s wireless network to work more efficiently. Basically, we would recommend tweaking the transmission strength or the wireless signal settings to the required level. This feature will only beam out your wireless signals in your area of required coverage and not further. If all your wireless devices are located inside your house, there should be no reason the wireless signals should go outside your house. To know the signal strength, you can use InSSIDer or WiFi Analyzer to know the signal strength of your wireless network and increase/lower it accordingly. Note: Some routers do not have this feature and you can skip this section.

Access restriction and parental control
This section can be set up if you want to control how your users can access the Internet. You can set up devices to use the Internet at particular times or on specified days of the week only. This way you can control your Internet bandwidth wastage and also set up access restrictions to other users on the network. This section also can help block websites by name or keywords. Use this feature if you want parental control over your users.
Setup access restrictions and parental controls
Set up access restrictions and parental controls


Logging and updates
Logs and firmware updates should be monitored frequently. Enable logging to know your router's network usage where you can be informed about devices connecting and leaving the network, or the bandwidth used by particular devices. This feature can help you check if anyone is entering your network without your knowledge. If your router has options to send you alerts via email or SMS, we recommend using it. Lastly, keep your router’s firmware updated to the latest. This can help you gain additional features and improve its security if the manufacturer has rectified some bugs in the firmware. Use the auto update feature if available.
Keep the firmware updated at all times
Keep the firmware updated at all times


Passwords
Maintain the habit of using random passwords and changing them frequently—try this weekly or at least twice a month. This can act as an additional security level—it can hurl out an undetected user who has already logged on to your network, without your knowledge, the next time he or she connects again. It can also discourage them from trying to hack into your network again as it would involve a lot of hard work hacking all over again.

Router placement
Place the router in a perfect area to maximise its coverage and get the highest speed. As most routers use an Omni-directional antenna, the radio waves are spread all around instead of being thrown a in a single direction. Hence, routers placed near a wall have their transmission half inside the room and the remaining half outside the room. In this way, your network is seen outside your area and there is a loss of power because the radio waves are not being used efficiently. Always place the router in the central zone of the entire coverage area to make the best use of the wireless power and also lower the leakage of the radio waves outside your room. Lastly, keep all other equipment that work on a similar wireless frequency away from the router or switch them off. Equipment such as Bluetooth devices, microwave ovens, cordless telephones, and a few remote controlled toys operate on the 2.4GHz frequency, which can cause an interference with your wireless router.  
Decide the best location for your router.
Decide the best location for your router.


Physical wireless switch
If your router has a physical switch to turn off the radio, you can use this feature to disable the wireless networking when you are not using any wireless devices. This feature only turns off the wireless network while keeping the computers on the wired network untouched. This feature also saves you the trouble of logging into your router’s firmware and switching off the radio from the firmware.

Configure Guest network
A few new router models are seen featuring an additional virtual network called Guest network or Guest SSID, which allows your friends or guests to gain temporary access to your network and use the Internet. But this Guest network isolates all other computers in the LAN from the guest user and denies permissions to shared drives and such. The feature is good for securing your local network from friends, but not the Internet usage. Enable this feature only if you need it.
Enable and make use the Guest SSID feature if available
Enable and make use of the Guest SSID feature if available


Upgrade your wireless clients to the latest technology
If you are using older generation 802.11 b or 802.11 g devices, it is advisable to use the latest 802.11 n technology-based devices for superior performance and increased coverage area. When buying a new router and/or laptop, always opt for the 802.11 n technologies.  

Third party firmware
If you are an advanced user, or if you want to have additional features enabled for minute tweaking of the wireless router’s settings, you can also opt to change the default firmware to a DDWRT-based or Tomato-based third party firmware. You can log on to the DDWRT website and check if there is an available firmware for your router. 

Now that you have configured your router, you can sit back and relax without the worry of anyone trying to intrude into your network. But you can never be sure since hackers are constantly developing better cracking utilities to break into secured networks. Neverthless, you should take your necessary precautions. Maintain the habit of frequently changing passwords, SSID names and the IP address range of the router. Try not to keep sensitive data open on your network, which can lure an intruder into sabotaging your privacy. Finally, make sure you use a good firewall, antivirus and privacy suite to be safe.
www.facebook.com/pages/TechadvancesbyTechnology/293331837349083!

iPhone 5S and iPhone 5C: Release date, colors, and hardware specs rounded up


iPhone 5S


We’re now just a few days away from Apple’s announcement of the iPhone 5S and iPhone 5C. The iPhone 5S will most likely be released towards the end of September, alongside the iPhone 5C. The iPhone 5S, like the 4S, will be an incremental update (but with the addition of champagne- and graphite-colored variants), while the 5C will be a brand-new, plastic-chassis smartphone that comes in a variety of colors. Yes, at long last, it looks like Apple is finally kowtowing to the consumers who have been begging for a cheaper iPhone for years. The rumored iPhone 5S specs, except for the possibility of an integrated fingerprint scanner, aren’t all that exciting, however.
Let’s dive straight into what we know (and don’t know) about the iPhone 5S and iPhone 5C, including the hardware specs, software specs, and release date.

iPhone 5S, in black, champagne, and graphite

iPhone 5S: Hardware and software specs

The best leaks currently peg the iPhone 5S’s hardware as a somewhat incremental upgrade of the iPhone 5. There will the same dual-core CPU (but clocked a bit higher), an upgraded quad-core SGX544MP4 GPU, 2GB of RAM, and an IGZO screen (for increased brightness and/or reduced power consumption). The camera should be bumped up to 12-megapixels, and there should be a dual-LED flash. Perhaps most significantly, it currently looks like there will be a champagne (light gold) and graphite variant of the iPhone 5S (see image above). These are only marginally different from the existing slate-black and silver-white models, but they fit in nicely with Apple’s drive to provide more variety.
In terms of new features, the iPhone 5S will seemingly have NFC and a fingerprint reader. NFC functionality isn’t all that surprising, considering many Android phones have supported it for two years or more. The fingerprint reader is an interesting rumor that hasn’t gone away since Apple acquired Authentec, which has lots of fingerprint scanning-related IP. A recent rumor suggests that the Apple will use a sapphire glass Home button, with a fingerprint reader underneath it. Sapphire glass, as we’ve covered before, is very durable — though, unless you have adamantium claws like a certain hirsute superhero, sapphire glass is probably a bit overkill.
Champagne iPhone 5S
Another option is that Apple will embed the fingerprint scanning technology in the display itself, though we think that’s unlikely; the Home button makes a lot more sense.
As always with an “S” model, we don’t expect anything too crazy, hardware-wise. To be honest, I still think Apple will wait for the iPhone 6 before introducing the fingerprint reader, but we’ll see. Software-wise, the iPhone 5S will of course run iOS 7, which will be released for other iOS devices around the same time.
iPhone 5C, color variants (white, blue, green, red, yellow)

iPhone 5C: Hardware and software specs

The iPhone 5C is essentially a slightly curvier, plastic-backed iPhone 5. The C probably stands for “Color,” but of course this model is expected to be a lot Cheaper, too. So far, Apple has relied on cut-price older iPhones to capture the mid-range market, but as this market continues to grow (thanks to developing markets in Brazil, Russia, India, China), Apple has been losing ground to Samsung and other smartphone makers. With the rich Western markets reaching smartphone saturation, and no visible strategy from Apple on how to compete with the growing threat of Samsung, Apple’s stock value has been steadily nibbled away by Wall Street.
Color-wise, the iPhone 5C is expected to come in up to six shades, including white, blue, green, red, and yellow. A black iPhone 5C hasn’t been leaked yet, and Apple might keep black as a “premium-only” iPhone 5S color. In the image below, you can see that the iPhone 5C packaging will have a see-through lid, so that you can see what color you’re getting — and so that retailers can create attractive, rainbow-like displays. (That’ll make quite a difference from the usual monochrome of Apple stores, eh?)
iPhone 5C packaging
Anyway, back to the iPhone 5C’s specs: Expect something very similar to the iPhone 5(dual-core CPU, tri-core GPU, 8-megapixel camera), but with a plastic back. These plastic backs should come in a variety of colors, and will be permanent — you won’t be switching out your iPhone’s chassis for another color. Again, software-wise, the 5C will run iOS 7. Recent rumors suggest that Siri might be yanked from the iPhone 5C’s version of iOS 7, though, to further differentiate the cheaper phone from its flagship sibling. Like the fingerprint scanner, I think it makes more sense to debut an iPhone Lite/Mini alongside the iPhone 6 — but the rumor mill is obviously against me here, insisting that we will see an iPhone 5C on September 10.
With two new iPhones, and perhaps two new iPads as well, it’s clear that the September 10 event will be massively significant, both for consumers and shareholders. With Samsungtaking control of the smartphone market over the last year, and its dominance of the tablet market being diminished by Google, Amazon, and Samsung, Apple will need to deliver something spectacular on September 10. We’ll be there, of course, and reporting it live
www.facebook.com/pages/TechadvancesbyTechnology/293331837349083!

Use YouTube-dI To Download Videos On Newer Versions Of Ubuntu!

Downloading videos from YouTube used to be quick and easy on Ubuntu as it required only copying and pasting. But it is no longer going to be so on the newer versions i.e Firefox or Chrome. Now high quality videos can be downloaded on Ubuntu using a special command line tool known as Youtube-dI.

The new tool is a command line tool, which could be a deterrent for some users. Apart from this, it is a really powerful tool as it makes it much simpler to download videos from YouTube than any other application with a GUI at present.

This tool can also be downloaded from default Ubuntu repositories. It is really simple to install it. Click a button, which redirects you to the specific Software Center page. You can also download the tool by copying and pasting the command “ sudo apt-get install youtube-dI” in your terminal.
Using the Youtube-dl in Ubuntu 12.04, Ubuntu 12.10 and Ubuntu 13.04

As per techdrivein.com, this tool is really simple and easy to configure. You can download a video from YouTube by simply typing youtube-dl and then clicking the link that points to the actual video. The tool will then download the highest quality version of that video. For the lowest quality version of that video, you need to type “youtube-dI –f worst”.

Apart from this, you can also state the format quality of the video as well as extract the audio from the file that has been downloaded. For further details you need to check out the youtube-dI page.

The tool also supports other sites such as Comedy Central, Dailymotion, Facebook, Metacafe, MyVideo, Photobucket, Vimeo, Yahoo!, blip.tv, Soundcloud, InfoQ, Mixcloud, OpenClassRoom among others. 
YouTube videos, YouTube on Ubuntu, videos on Ubuntu, YouTube-dI, Videos, Tool, Download, Firefox, Chrome, Browsers, Terminal, Youtube-dI, Configure, Tool
www.facebook.com/pages/TechadvancesbyTechnology/293331837349083!

8 Must-Have Android Apps For You!

 With the increasing popularity of android phones, there’re numerous apps craving for your attention. App ecosystem is growing and so is the usage of apps. People now depend on apps for their day to day tasks. We are presenting a list of such apps that can make your life easier.

Any.DO

Available for Free, though there are numerous task managers and to-do list related apps in the Android market, but Any.DO is a must-have app for you as it is easy to operate. You can easily add anything that comes into your mind, and the app enables you to drag and drop that task into diverse folders or in different days. You can get the versions for Chrome, the Internet, and even the iPhone. 

Dolphin Browser HD

Available for free, the Dolphin Browser HD allows you to set up custom gestures, offers syncing with Google bookmarks. Also, it supports a couple of plug-ins. The app was PCMag's Editors' Choice for Android browsers.

Pocket

There are numerous read-later apps in the market, but Pocket does it better than any other app and it is available for free as well. As it has extensions for all key browsers and apps for both Android and iOS devices, it surely is a one-stop-shop for compiling an basic personalised reading list. You can sync it across devices. However, you just need to Archive stories after you’ve read them. All articles in your inbox are searchable by title and URL. 

SnapPea

It is available for free. You can consider SnapPea as the iTunes for your Android Device. You can even install the software on your PC, make some changes in phone settings, and then use it to manage your music, videos, photos and contacts. It is surely the best way to export big files on and off from your mobile phone. 

Slacker

Available for free, load up Slacker for Internet radio on the go, though you have pay for the premium account in order to listen to stations, but streaming is completely free. It comes with some annoying ads too.

Mint

Available for free, this little app can manage all your banking information. Mint enables you to password protect the app, so your safety is guarded too. Mint just shows you what you have and what you have spent, but it not meant for making transactions. 

SnapSeed for Android

It provides a sophisticated photo editing experience! Though there are lots of one-click filters you can choose from, but a detailed image manipulation is also possible. Also, you can share to Facebook, Twitter, and other social networks by using the Share function available in the gallery. It is available for free. 

NewsRob

NewsRob allows quick scanning of your RSS feeds. You will find the interface clean. It is possible to send your stories to your e-mail, Twitter account, EverNote, or even to Instapaper with few quick clicks. You can scan 150 to 175 headlines on your 20-minute metro ride to work. The app is available for free. 
Any.DO, Dolphin Browser HD, Pocket, Free, android, apps, top 8, mint, slacker, snapseed, facebook, newsrob, instapaper, iPhone, rss reader
www.facebook.com/pages/TechadvancesbyTechnology/293331837349083!

Basics of Cell Phone Technology



It would be useful to give an overview of the cell phone technology here as this is quite inline with our installation. Let's see how a cell phone works? What makes it different from a regular phone? What do all those confusing terms like PCS, GSMCDMA and TDMA mean? 

Let's start with the basics: In essence, a cell phone is a radio. One of the most interesting things about a cell phone is that it is actually a radio -- an extremely sophisticated radio, but a radio nonetheless. The telephone was invented by Alexander Graham Bell in 1876, and wireless communication can trace its roots to the invention of the radio by Nikolai Tesla in the 1880s (formally presented in 1894 by a young Italian named Guglielmo Marconi). It was only natural that these two great technologies would eventually be combined!

In the dark ages before cell phones, people who really needed mobile-communications ability installed radio telephones in their cars. In the radio-telephone system, there was one central antenna tower per city, and perhaps 25 channels available on that tower. This central antenna meant that the phone in your car needed a powerful transmitter -- big enough to transmit 40 or 50 miles (about 70 km). It also meant that not many people could use radio telephones -- there just were not enough channels.

The genius of the cellular system is the division of a city into small cells. This allows extensive frequency reuse across a city, so that millions of people can use cell phones simultaneously. In a typical analog cell-phone system in the United States, the cell-phone carrier receives about 800 frequencies to use across the city. The carrier chops up the city into cells. Each cell is typically sized at about 10 square miles (26 square kilometers). Cells are normally thought of as hexagons on a big hexagonal grid.  .
Each cell has a base station that consists of a tower and a small building containing the radio equipment (more on base stations later). 
A single cell in an analog system uses one-seventh of the available duplex voice channels. That is, each cell (of the seven on a hexagonal grid) is using one-seventh of the available channels so it has a unique set of frequencies and there are no collisions:

  • A cell-phone carrier typically gets 832 radio frequencies to use in a city.
  • Each cell phone uses two frequencies per call -- a duplex channel -- so there are typically 395 voice channels per carrier. (The other 42 frequencies are used for control channels -- more on this on the next page.)
  • Therefore, each cell has about 56 voice channels available.
In other words, in any cell, 56 people can be talking on their cell phone at one time. With digital transmission methods, the number of available channels increases. For example, a TDMA-based digital system can carry three times as many calls as an analog system, so each cell has about 168 channels available (see this page for lots more information on TDMA, CDMA, GSM and other digital cell-phone techniques).
Cell phones have low-power transmitters in them. Many cell phones have two signal strengths: 0.6 watts and 3 watts (for comparison, most CB radios transmit at 4 watts). The base station is also transmitting at low power. Low-power transmitters have two advantages:
  • The transmissions of a base station and the phones within its cell do not make it very far outside that cell. Therefore, in the figure above, both of the purple cells can reuse the same 56 frequencies. The same frequencies can be reused extensively across the city.
  • The power consumption of the cell phone, which is normally battery-operated, is relatively low. Low power means small batteries, and this is what has made handheld cellular phones possible.
The cellular approach requires a large number of base stations in a city of any size. A typical large city can have hundreds of towers. But because so many people are using cell phones, costs remain low per user. Each carrier in each city also runs one central office called the Mobile Telephone Switching Office (MTSO). This office handles all of the phone connections to the normal land-based phone system, and controls all of the base stations in the region.
Now let's analyses what happens we as you (and your cell phone) move from cell to cell.

From Cell to Cell
All cell phones have special codes associated with them. These codes are used to identify the phone, the phone's owner and the service provider.
Let's say you have a cell phone, you turn it on and someone tries to call you. Here is what happens to the call:
  • When you first power up the phone, it listens for an SID (see sidebar) on the control channel. The control channel is a special frequency that the phone and base station use to talk to one another about things like call set-up and channel changing. If the phone cannot find any control channels to listen to, it knows it is out of range and displays a "no service" message.
  • When it receives the SID, the phone compares it to the SID programmed into the phone. If the SIDs match, the phone knows that the cell it is communicating with is part of its home system.
  • Along with the SID, the phone also transmits a registration request, and the MTSO keeps track of your phone's location in a database -- this way, the MTSO knows which cell you are in when it wants to ring your phone.
  • The MTSO gets the call, and it tries to find you. It looks in its database to see which cell you are in.
  • The MTSO picks a frequency pair that your phone will use in that cell to take the call.
  • The MTSO communicates with your phone over the control channel to tell it which frequencies to use, and once your phone and the tower switch on those frequencies, the call is connected. You are talking by two-way radio to a friend!
  • As you move toward the edge of your cell, your cell's base station notes that your signal strength is diminishing. Meanwhile, the base station in the cell you are moving toward (which is listening and measuring signal strength on all frequencies, not just its own one-seventh) sees your phone's signal strength increasing. The two base stations coordinate with each other through the MTSO, and at some point, your phone gets a signal on a control channel telling it to change frequencies. This hand off switches your phone to the new cell.

As you travel, the signal is passed from cell to cell.
Roaming
If the SID on the control channel does not match the SID programmed into your phone, then the phone knows it is roaming. The MTSO of the cell that you are roaming in contacts the MTSO of your home system, which then checks its database to confirm that the SID of the phone you are using is valid. Your home system verifies your phone to the local MTSO, which then tracks your phone as you move through its cells. And the amazing thing is that all of this happens within seconds!

www.facebook.com/pages/TechadvancesbyTechnology/293331837349083!

How To Troubleshoot Your System For Memory Problems In Windows 7

Windows 7 includes built-in features to help you identify and diagnose problems with memory.

If you suspect a computer has a memory problem that isn’t being automatically detected, you can run the Windows Memory Diagnostics utility by completing the following steps:

Step 1: - Click Start, type mdsched.exe in the Search box, and then press Enter

Step 2: - Choose whether to restart the computer and run the tool immediately or schedule the tool to run at the next restart.

Windows Memory Diagnostics runs automatically after the computer restarts and performs a standard memory test automatically. If you want to perform fewer or more tests, press F1, use the Up and Down arrow keys to set the Test Mix as Basic, Standard, or Extended, and then press F10 to apply the desired settings and resume testing.

When testing is completed, the computer restarts automatically. You’ll see the test results when you log on.

Note that if a computer crashes because of failing memory, and Windows Memory Diagnostics detects this, the system will prompt you to schedule a memory test the next time the computer is restarted.

www.facebook.com/pages/TechadvancesbyTechnology/293331837349083!

Careers

Careers

iGATE is a ~$1 billion organization, providing full-spectrum consulting, technology and business process outsourcing services differentiated by a Business Outcomes-based business model. Driven by the philosophy of "Accountable for Clients' Business" powered by iTOPS (Integrated Technology and Operations) platforms, iGATE provides effective solutions to over 184 Fortune 1000 clients globally across verticals including Insurance and Healthcare, Life Sciences, Banking and Financial Services, Manufacturing, Retail, Logistics and Distribution, Communications, Energy and Utilities, Media, Entertainment, Leisure, Travel, and Public Sector and Independent Software Vendors.
Walk-in Details Date-17th December to 21st December, Starting Time: 3 PM
Designation Team Lead - Networking - Walk-in
Job Description Walk-in for Level 2- Networking at iGate from 17th to 21st Dec'12 from 3-5pm


CCNA certification must
4-5 years experience in routing switching.
Router & switch configuration.
Deep understanding of routing protocols like OSPF and EIGRP.
Understanding of VRFs and route leaking.
Manage routes filtering and routing manipulation.
Good understanding of BGP.
Understanding of wan protocols.
Identify actual and potential Network bottlenecks
Optimize and improve the performance and design of the Network using data gathered from performance monitoring and forecasting activities
Assess and implement alternate methods and procedures to reduce Network errors and Network downtime
Creating and maintaining applicable documentation (Knowledge Base articles, process documentation, quality deliverables, etc)
Support service improvement initiatives that pertain to Network infrastructure support.
Hands on experience with higher end switches/routers like Cisco Catalyst 6500, Cisco 4500 etc.

Desired Profile CCNA certification must
4-5 years experience in routing switching.
Router & switch configuration.
Deep understanding of routing protocols like OSPF and EIGRP.
Understanding of VRFs and route leaking.
Manage routes filtering and routing manipulation.
Good understanding of BGP.
Understanding of wan protocols.
Identify actual and potential Network bottlenecks
Optimize and improve the performance and design of the Network using data gathered from performance monitoring and forecasting activities
Assess and implement alternate methods and procedures to reduce Network errors and Network downtime
Creating and maintaining applicable documentation (Knowledge Base articles, process documentation, quality deliverables, etc)
Support service improvement initiatives that pertain to Network infrastructure support.
Hands on experience with higher end switches/routers like Cisco Catalyst 6500, Cisco 4500 etc. Should be ok with 24/7 shifts & 1year service agreement


Additional Information/Walk-in details Walk-in for Level 2- Networking at iGate from 17th to 21st Dec'12 from 3-5pm Please walk-in at iGATE Global Solutions Limited. II Floor, 139-140 Noida Special Economic Zone (NSEZ), Block-B, Sector-82 Noida-UP-201305 Contact- Namrata Wason

Recruiter Name along with email id Namrata Wason / namrata.wason@igate.com

Experience 4 - 5 Years
Industry Type IT Software, Software Services
Role Team Lead/ Technical Lead
Functional Area Network Administration, Security
Education UG - Any Graduate - Any Specialization
PG - Any PG Course - Any Specialization, Post Graduation Not Required
DOCTORATE - Doctorate Not Required
Location Noida
Keywords Team Lead, Networking, Cisco Catalyst 6500, Cisco 4500
Contact Namrata Wason
iGATE
142 E&F, Block 'B'
NOIDA Special Economic Zone (NSEZ)
Dadri Road,NOIDA Ph II (Near Kedriya Vihar, Sector 82)
NOIDA,Uttar Pradesh,India 201305
Telephone 0120-91-3320000
Website http://www.igate.com
Job Posted 15 Dec
Reference 127448

www.facebook.com/pages/TechadvancesbyTechnology/293331837349083!

Reliance Industries in talks with global players to launch hi-speed broadband:

Reliance Industries (RIL) is in the process of finalising agreements with global technology players and service providers to offer high speed broadband wireless services in the country, the company said today. 

"...Is in the process of setting up a world class broadband wireless network using state-of-art technologies and finalising the arrangement with leading global technology players, service providers and infrastructure providers, application developers, device manufacturers and others to help usher the 4G revolution into India," RIL said in a statement while announcing the second quarter results. 

Last year, Mukesh Ambani-led RIL had forayed into the telecom arena with a bang, announcing the acquisition of Infotel, which had emerged as the sole winner of pan-India broadband spectrum, for Rs 4,800 crore. 

"Reliance also made a substantial commitment to being a leader in the evolution of India's digital economy by acquiring control of a nationwide broadband wireless access licence. We are fully geared to participate in India's growth and continued global recovery in the coming years," Ambani said. 

In June this year, Ambani had said that the services would be in the domain of education, healthcare, entertainment, financial services and government-citizen interfaces. 

Reliance Industries had a cash and cash equivalent of Rs 42,393 crore (USD 9.5 billion) for the year ended March 31, 2011. 

Broadband and broadband-enabled digital services are the next big leap forward in the digital transformation of our knowledge economy, he had said.
www.facebook.com/pages/TechadvancesbyTechnology/293331837349083!