Tuesday 6 October 2015

Diffrence between GPRS and GSM mobile services



There is a great deal of confusion on which is going to survive - GSM or GPRS. I feel that t's a misunderstanding for some people to think that the GSM network will be replaced after the GPRS network enters into operation. Actually, the GPRS is only a sort of technology in mobile telecom that is to be applied to the current GSM network. As a key link between the GSM and the 3G systems, the GPRS takes into consideration the compatibility of both the 3G-system and that of the second-generation i.e. the GSM and the introduction of the GPRS system will help prolong greatly the lifecycle of the GSM system and upgrade it. GPRS is a totally new technology and, the hardware of the cell phone is quite different from that of a GSM cell phone and the software is more powerful in terms of function and, moreover, the GPRS cell phone can also be used under the GSM system too.

There are some major differences between GSM and GPRS (sometimes called 2.5G mobile phones). Both systems use the same TDMA (Time Division Multiple Access) link with the key difference that GSM uses one out of seven time slots. However, the GPRS connection in the t610 can use as many as 4+1 time slots. This gives four times the connection speed and foremost is cheaper if you send small packages of data (as said above) since most service providers charge per sent byte and not per second. This means that using WAP via GRPS is much more efficient since you dont have yo pay for your idle time, whilst in GSM you have to pay for the total duration of your connection.

In other words, The difference between GPRS and GSM is like the difference between having a direct dial up between two pieces of equipment and connecting over the internet. 

A direct dial up commits resources to connecting each unit from its remote location to the back office. The resources could be as simple as the copper cable connecting the modem to the exchange, the capacity in the exchanges and then the copper cable back out to the office. These resources are committed to that call for as long as they are required. 

With GPRS the remote unit is connected but does not claim any resources until some data is sent. The information that needs to be sent is divided into data packets. Each data packet is given an address then ‘posted’ into the network. Each data packet finds its own route through the network, which could be around the world and back. Once at the end destination the data packets are then reassembled into the original message. This means that no resources are committed making the network much more efficient and capable of handling for more traffic than would be the case in a traditional system. 

GSM Data Services 

GSM networks handle both voice and data traffic requirements of the mobile communication by providing two modes of operation: 

Circuit switched (high-speed circuit switched data) 
Packet switched (GPRS) 
Circuit switching provides the customer with a dedicated channel all the way to the destination. The customer has exclusive use of the circuit for the duration of the call, and is charged for the duration of the call. 

With packet switching, the operator assigns one or more dedicated channels specifically for shared use. These channels are up and running 24 hours a day, and when you need to transfer data, you access a channel and transmit your data. Packet switching is more efficient than circuit switching. 

The standard data rate of a GSM channel is 22.8 kbps. 

General Packet Radio Service (GPRS) 

The general packet radio system (GPRS) provides packet radio access for mobile Global System for Mobile Communications (GSM) and time-division multiple access (TDMA) users. In addition to providing new services for today's mobile user, GPRS is important as a migration step toward third-generation (3G) networks. GPRS allows network operators to implement an IP-based core architecture for data applications, which will continue to be used and expanded for 3G services for integrated voice and data applications. The GPRS specifications are written by the European Telecommunications Standard Institute (ETSI), the European counterpart of the American National Standard Institute (ANSI). 

GPRS is the first step toward an end-to-end wireless infrastructure and has the following goals:

Open architecture 
Consistent IP services 
Same infrastructure for different air interfaces 
Integrated telephony and Internet infrastructure 
Leverage industry investment in IP 
Service innovation independent of infrastructure 

Hope this was enough to explain the main differences between GSM and GPRS without becoming too technical.

Tuesday 25 August 2015

Open Systems Interconnection Model (OSI Model)

The Open Systems Interconnection (OSI) Model is a conceptual and logical layout that defines network communication used by systems open to interconnection and communication with other systems. 

The model is broken into seven subcomponents, or layers, each of which represents a conceptual collection of services provided to the layers above and below it. The OSI Model also defines a logical network and effectively describes computer packet transfer by using different layer protocols.

The OSI Model may also be referred to as the seven-layer OSI Model or the seven-layer model.
Techopedia explains Open Systems Interconnection Model (OSI Model)

The OSI Model was developed by the International Organization for Standardization (ISO) in 1978. While working on a network framework, ISO decided to develop the seven-layer model. 

OSI’s seven layers are divided into two portions: hot layers and media layers. The hot portion includes the application, presentation, session and transport layers; the media portion includes the network, data link and physical layers.

The OSI Model works in a hierarchy, assigning tasks to all seven layers. Each layer is responsible for performing assigned tasks and transferring completed tasks to the next layer for further processing. Today, many protocols are developed based on the OSI Model working mechanism.

Wednesday 4 March 2015

5 Solid Reasons You Should Step Into A Networking Career

We all know that network administration is not for everyone and it offers a number of rewarding and profitable challenges for people who are very much into technical knowledge and put that technical knowledge into some practical use.
Industries that are more into a career spectrum and all the major industries around the world mainly depends on computer networking and they keep their employees always connected and business flowing. These networks require administrators, hardworking people who know how to work around a computer and they are not afraid for taking a hands on approach for troubleshooting. In this post we will give you 5 strong reasons for why you should learn networking for your career growth.

1. You Will Keep Learning New Things On Your Way
The jobs that are related to network engineering and network administration lean heavily on the buzzwords and things like hardware evaluation, network configuration and high level management. Well the truth is that no two corporate networks are similar and almost all the company’s network procedures will have been straightened through a long-term tailoring process. This means that most of your particular specificities of a job will be covered on your on-site training, as one qualification of the company elaborate though they are not likely to translate the things directly to some other company’s networking needs.

2. You Will Always Be In Demand And We Know Demand Always Grow
The United States Bureau of Labor in the year 2012 has given the statistics on the median annual wages for the network administrators at $74,270. But if we talk about network administrators, they don’t just pull in the wages well above the national median, they have become the necessary part of any company, and this will mean that the rate of hiring will always be on an upward curve, even if there seems to be a global recession.
The U.S. Department of Labor has an estimated a count of labor as 96,600 and it has been reported that there will be new network administration posts to be opened in between 2010 and 2020, and if you check it out you will see that already more than 300,000 jobs are already available there. If you are planning to break into the industry looking into the long-term growth potential, network administration will be a great fit for you.

3. It is like an Inroad To Almost Any Industry
Networks are known to be the integral of almost all types of large business, starting from manufacturing of food service to the industries selling science or any other non-profit activism. Once you have proved yourself to be a dependable administrator, you will always be able to advertise your business as one of the useful assets anywhere in your business that will spark out your curiosity. In fact, developing nations will also express more curiosity and interest in building up their technological infrastructure. This means that network administration will work as your ticket for visiting the exotic places across the globe, contributing to a real world impact wherever you go.

4. It Opens Up New Career Branches For You
With a little experience in network administration, you will be able to get better equipped than ever and will also be able to become a freelance field technician, a perfect network engineer or an amazing system analyst. If you like the security of regular health benefits and your regular paychecks there will be a a list of things that you need to fill – but you might also be in a position that you would like to work from home, setting your own working hours or may be charging a consultation fee only for providing your technological expertise. As you will get more businesses coming your way will depend on the networks, your options will also broaden.

5. It Will Be Challenging But Worthy Of Your Skill
You do not need to work for years in computer science training for a simple entry-level admin position; each day this will offer some new opportunities to bring some unique and highly creative solutions to the complex problems.
As you will get the right things to be trusted with more responsibilities and also your technical skills will keep on growing. This will help you in increasing your confidence level and will also improve on your values as an academic worker.
Network administration is not the most glamorous job on the earth, but yes it offers a number of chances for you to prove to the world how smart you are, and all this will bring some practical benefits to you and to your co-workers. It is not just like any other field but has a lot more to offer if considered seriously.

Wednesday 24 December 2014

An Introduction to Networking Terminology, Interfaces, and Protocols

Introduction

A basic understanding of networking is important for anyone managing a server. Not only is it essential for getting your services online and running smoothly, it also gives you the insight to diagnose problems.
This document will provide a basic overview of some common networking concepts. We will discuss basic terminology, common protocols, and the responsibilities and characteristics of the different layers of networking.
This guide is operating system agnostic, but should be very helpful when implementing features and services that utilize networking on your server.

 

Networking Glossary

Before we begin discussing networking with any depth, we must define some common terms that you will see throughout this guide, and in other guides and documentation regarding networking.
These terms will be expanded upon in the appropriate sections that follow:
  • Connection: In networking, a connection refers to pieces of related information that are transfered through a network. This generally infers that a connection is built before the data transfer (by following the procedures laid out in a protocol) and then is deconstructed at the at the end of the data transfer.
  • Packet: A packet is, generally speaking, the most basic unit that is transfered over a network. When communicating over a network, packets are the envelopes that carry your data (in pieces) from one end point to the other.
Packets have a header portion that contains information about the packet including the source and destination, timestamps, network hops, etc. The main portion of a packet contains the actual data being transfered. It is sometimes called the body or the payload.
  • Network Interface: A network interface can refer to any kind of software interface to networking hardware. For instance, if you have two network cards in your computer, you can control and configure each network interface associated with them individually.
A network interface may be associated with a physical device, or it may be a representation of a virtual interface. The "loopback" device, which is a virtual interface to the local machine, is an example of this.
  • LAN: LAN stands for "local area network". It refers to a network or a portion of a network that is not publicly accessible to the greater internet. A home or office network is an example of a LAN.
  • WAN: WAN stands for "wide area network". It means a network that is much more extensive than a LAN. While WAN is the relevant term to use to describe large, dispersed networks in general, it is usually meant to mean the internet, as a whole.
If an interface is said to be connected to the WAN, it is generally assumed that it is reachable through the internet.
  • Protocol: A protocol is a set of rules and standards that basically define a language that devices can use to communicate. There are a great number of protocols in use extensively in networking, and they are often implemented in different layers.
Some low level protocols are TCP, UDP, IP, and ICMP. Some familiar examples of application layer protocols, built on these lower protocols, are HTTP (for accessing web content), SSH, TLS/SSL, and FTP.
  • Port: A port is an address on a single machine that can be tied to a specific piece of software. It is not a physical interface or location, but it allows your server to be able to communicate using more than one application.
  • Firewall: A firewall is a program that decides whether traffic coming into a server or going out should be allowed. A firewall usually works by creating rules for which type of traffic is acceptable on which ports. Generally, firewalls block ports that are not used by a specific application on a server.
  • NAT: NAT stands for network address translation. It is a way to translate requests that are incoming into a routing server to the relevant devices or servers that it knows about in the LAN. This is usually implemented in physical LANs as a way to route requests through one IP address to the necessary backend servers.
  • VPN: VPN stands for virtual private network. It is a means of connecting separate LANs through the internet, while maintaining privacy. This is used as a means of connecting remote systems as if they were on a local network, often for security reasons.
There are many other terms that you may come across, and this list cannot afford to be exhaustive. We will explain other terms as we need them. At this point, you should understand some basic, high-level concepts that will enable us to better discuss the topics to come.

 

Network Layers

While networking is often discussed in terms of topology in a horizontal way, between hosts, its implementation is layered in a vertical fashion throughout a computer or network.
What this means is that there are multiple technologies and protocols that are built on top of each other in order for communication to function more easily. Each successive, higher layer abstracts the raw data a little bit more, and makes it simpler to use for applications and users.
It also allows you to leverage lower layers in new ways without having to invest the time and energy to develop the protocols and applications that handle those types of traffic.
The language that we use to talk about each of the layering scheme varies significantly depending on which model you use. Regardless of the model used to discuss the layers, the path of data is the same.
As data is sent out of one machine, it begins at the top of the stack and filters downwards. At the lowest level, actual transmission to another machine takes place. At this point, the data travels back up through the layers of the other computer.
Each layer has the ability to add its own "wrapper" around the data that it receives from the adjacent layer, which will help the layers that come after decide what to do with the data when it is passed off.

 

OSI Model

Historically, one method of talking about the different layers of network communication is the OSI model. OSI stands for Open Systems Interconnect.
This model defines seven separate layers. The layers in this model are:
  • Application: The application layer is the layer that the users and user-applications most often interact with. Network communication is discussed in terms of availability of resources, partners to communicate with, and data synchronization.
  • Presentation: The presentation layer is responsible for mapping resources and creating context. It is used to translate lower level networking data into data that applications expect to see.
  • Session: The session layer is a connection handler. It creates, maintains, and destroys connections between nodes in a persistent way.
  • Transport: The transport layer is responsible for handing the layers above it a reliable connection. In this context, reliable refers to the ability to verify that a piece of data was received intact at the other end of the connection.
This layer can resend information that has been dropped or corrupted and can acknowledge the receipt of data to remote computers.
  • Network: The network layer is used to route data between different nodes on the network. It uses addresses to be able to tell which computer to send information to. This layer can also break apart larger messages into smaller chunks to be reassembled on the opposite end.
  • Data Link: This layer is implemented as a method of establishing and maintaining reliable links between different nodes or devices on a network using existing physical connections.
  • Physical: The physical layer is responsible for handling the actual physical devices that are used to make a connection. This layer involves the bare software that manages physical connections as well as the hardware itself (like Ethernet).
As you can see, there are many different layers that can be discussed based on their proximity to bare hardware and the functionality that they provide.

 

TCP/IP Model

The TCP/IP model, more commonly known as the Internet protocol suite, is another layering model that is simpler and has been widely adopted. It defines the four separate layers, some of which overlap with the OSI model:
  • Application: In this model, the application layer is responsible for creating and transmitting user data between applications. The applications can be on remote systems, and should appear to operate as if locally to the end user.
The communication is said to take place between peers.
  • Transport: The transport layer is responsible for communication between processes. This level of networking utilizes ports to address different services. It can build up unreliable or reliable connections depending on the type of protocol used.
  • Internet: The internet layer is used to transport data from node to node in a network. This layer is aware of the endpoints of the connections, but does not worry about the actual connection needed to get from one place to another. IP addresses are defined in this layer as a way of reaching remote systems in an addressable manner.
  • Link: The link layer implements the actual topology of the local network that allows the internet layer to present an addressable interface. It establishes connections between neighboring nodes to send data.
As you can see, the TCP/IP model, is a bit more abstract and fluid. This made it easier to implement and allowed it to become the dominant way that networking layers are categorized.

 

Interfaces

Interfaces are networking communication points for your computer. Each interface is associated with a physical or virtual networking device.
Typically, your server will have one configurable network interface for each Ethernet or wireless internet card you have.
In addition, it will define a virtual network interface called the "loopback" or localhost interface. This is used as an interface to connect applications and processes on a single computer to other applications and processes. You can see this referenced as the "lo" interface in many tools.
Many times, administrators configure one interface to service traffic to the internet and another interface for a LAN or private network.
In DigitalOcean, in datacenters with private networking enabled, your VPS will have two networking interfaces (in addition to the local interface). The "eth0" interface will be configured to handle traffic from the internet, while the "eth1" interface will operate to communicate with the private network.

 

Protocols

Networking works by piggybacking a number of different protocols on top of each other. In this way, one piece of data can be transmitted using multiple protocols encapsulated within one another.
We will talk about some of the more common protocols that you may come across and attempt to explain the difference, as well as give context as to what part of the process they are involved with.
We will start with protocols implemented on the lower networking layers and work our way up to protocols with higher abstraction.

 

Media Access Control

Media access control is a communications protocol that is used to distinguish specific devices. Each device is supposed to get a unique MAC address during the manufacturing process that differentiates it from every other device on the internet.
Addressing hardware by the MAC address allows you to reference a device by a unique value even when the software on top may change the name for that specific device during operation.
Media access control is one of the only protocols from the link layer that you are likely to interact with on a regular basis.

 

IP

The IP protocol is one of the fundamental protocols that allow the internet to work. IP addresses are unique on each network and they allow machines to address each other across a network. It is implemented on the internet layer in the IP/TCP model.
Networks can be linked together, but traffic must be routed when crossing network boundaries. This protocol assumes an unreliable network and multiple paths to the same destination that it can dynamically change between.
There are a number of different implementations of the protocol. The most common implementation today is IPv4, although IPv6 is growing in popularity as an alternative due to the scarcity of IPv4 addresses available and improvements in the protocols capabilities.

 

ICMP

ICMP stands for internet control message protocol. It is used to send messages between devices to indicate the availability or error conditions. These packets are used in a variety of network diagnostic tools, such as ping and traceroute.
Usually ICMP packets are transmitted when a packet of a different kind meets some kind of a problem. Basically, they are used as a feedback mechanism for network communications.

 

TCP

TCP stands for transmission control protocol. It is implemented in the transport layer of the IP/TCP model and is used to establish reliable connections.
TCP is one of the protocols that encapsulates data into packets. It then transfers these to the remote end of the connection using the methods available on the lower layers. On the other end, it can check for errors, request certain pieces to be resent, and reassemble the information into one logical piece to send to the application layer.
The protocol builds up a connection prior to data transfer using a system called a three-way handshake. This is a way for the two ends of the communication to acknowledge the request and agree upon a method of ensuring data reliability.
After the data has been sent, the connection is torn down using a similar four-way handshake.
TCP is the protocol of choice for many of the most popular uses for the internet, including WWW, FTP, SSH, and email. It is safe to say that the internet we know today would not be here without TCP.

 

UDP

UDP stands for user datagram protocol. It is a popular companion protocol to TCP and is also implemented in the transport layer.
The fundamental difference between UDP and TCP is that UDP offers unreliable data transfer. It does not verify that data has been received on the other end of the connection. This might sound like a bad thing, and for many purposes, it is. However, it is also extremely important for some functions.
Because it is not required to wait for confirmation that the data was received and forced to resend data, UDP is much faster than TCP. It does not establish a connection with the remote host, it simply fires off the data to that host and doesn't care if it is accepted or not.
Because it is a simple transaction, it is useful for simple communications like querying for network resources. It also doesn't maintain a state, which makes it great for transmitting data from one machine to many real-time clients. This makes it ideal for VOIP, games, and other applications that cannot afford delays.

 

HTTP

HTTP stands for hypertext transfer protocol. It is a protocol defined in the application layer that forms the basis for communication on the web.
HTTP defines a number of functions that tell the remote system what you are requesting. For instance, GET, POST, and DELETE all interact with the requested data in a different way.

 

FTP

FTP stands for file transfer protocol. It is also in the application layer and provides a way of transferring complete files from one host to another.
It is inherently insecure, so it is not recommended for any externally facing network unless it is implemented as a public, download-only resource.

 

DNS

DNS stands for domain name system. It is an application layer protocol used to provide a human-friendly naming mechanism for internet resources. It is what ties a domain name to an IP address and allows you to access sites by name in your browser.

 

SSH

SSH stands for secure shell. It is an encrypted protocol implemented in the application layer that can be used to communicate with a remote server in a secure way. Many additional technologies are built around this protocol because of its end-to-end encryption and ubiquity.
There are many other protocols that we haven't covered that are equally important. However, this should give you a good overview of some of the fundamental technologies that make the internet and networking possible.

 

Conclusion

At this point, you should be familiar with some basic networking terminology and be able to understand how different components are able to communicate with each other. This should assist you in understanding other articles and the documentation of your system.

Friday 19 December 2014

Career Choices You Will Regret In 20 Years

Every day we are faced with choices in our careers that will affect us over the long term. Should I volunteer for that new project? Should I ask for a raise? Should I take a sabbatical? Should I say yes to overtime?
But sometimes we miss the biggest choices that will cause us to look back on our careers 20 years from now with pride and contentment — or regret.
Here are some of the career choices we often make but will regret deeply in 20 years’ time:

Pretending to be something you’re not.

Maybe you’re pretending to be a sports fan to impress your boss, or you’re keeping your mouth shut about something to keep the peace. Maybe you’re pretending that you’re an expert in something that’s really not your cup of tea. But continuously pretending to be something you’re not is not being true to yourself and will keep you feeling empty.

Making decisions based only on money.

Whether we’re talking about your personal salary or your project’s budget, making decisions solely based on money is almost never a good idea. Sure, it’s important to run the numbers, but there are dozens of other factors — including your gut feeling — you’ll want to take into account.

Thinking you can change something about the job.

Much like a relationship, if you go into a job thinking, “This would be the perfect job, if only…” that’s a red flag. Chances are, unless you’re taking a leadership, C-level position, you aren’t going to be able to change things that are fundamentally wrong.

Settling.

You’ve got an OK job, with an OK salary, and OK benefits, but what you really want is… You’re not doing yourself any favors settling for something that is just OK. Believe in yourself enough to go after what you deserve, whether it’s a new position, a pay rise, or an opportunity.

Working 50, 60, 80 hour weeks.

You might think you have to work that much — because it’s expected, because you need the money, because you want to look good to your boss — but no one reaches their deathbed and says, “Gosh, I wish I’d spent more time working.”

Putting friends and family last.

Being successful at your career means surrounding yourself with supportive people — and often, those people aren’t your coworkers or employees, they’re your friends and family. Ruin those relationships and you may find your career success just doesn’t matter as much.

Micromanaging everything.

This applies to your team and employees, but also to life in general. If you micromanage everything instead of sometimes just letting life happen, you’ll find yourself constantly battling anxiety and overwhelm.

Avoid making mistakes.

If you’re actively avoiding making mistakes in your career, then you’re not taking risks. And while you may keep up the status quo, you won’t be rewarded, either. Take the risk. Make the mistake. Own it and learn from it.

Thinking only of yourself.

The best networking strategy you can possibly have is to actively look for opportunities to help others. If you’re always putting yourself and your needs first, you’ll find you don’t get very far.

Not valuing your own happiness.

It’s a sad truth that people often believe they can put off happiness until later, but sometimes later doesn’t come. Prioritize being happy today. That might mean switching jobs, or it might just mean choosing to be happier with the job you’ve got.
What do you think are the biggest career choices people regret? As always, I’d love to hear your ideas and stories in the comments below.

Saturday 29 November 2014

Computer software

Software is a program that enables a computer to perform a specific task, as opposed to the physical components of the system (hardware).

This includes application software such as a word processor, which enables a user to perform a task, and system software such as an operating system, which enables other software to run properly, by interfacing with hardware and with other software.

Practical computer systems divide software into three major classes: system software, programming software and application software, although the distinction is arbitrary, and often blurred.

Computer software has to be "loaded" into the computer's storage (such as a hard drive, memory, or RAM).
Once the software is loaded, the computer is able to execute the software.

Computers operate by executing the computer program.

This involves passing instructions from the application software, through the system software, to the hardware which ultimately receives the instruction as machine code.

Each instruction causes the computer to carry out an operation -- moving data, carrying out a computation, or altering the control flow of instructions.

System Administrator

ESSENTIAL FUNCTIONS:

The System Administrator (SA) is responsible for effective provisioning, installation/configuration, operation, and maintenance of systems hardware and software and related infrastructure. This individual participates in technical research and development to enable continuing innovation within the infrastructure. This individual ensures that system hardware, operating systems, software systems, and related procedures adhere to organizational values, enabling staff, volunteers, and Partners.

This individual will assist project teams with technical issues in the Initiation and Planning phases of our standard Project Management Methodology. These activities include the definition of needs, benefits, and technical strategy; research & development within the project life-cycle; technical analysis and design; and support of operations staff in executing, testing and rolling-out the solutions. Participation on projects is focused on smoothing the transition of projects from development staff to production staff by performing operations activities within the project life-cycle.

This individual is accountable for the following systems: Linux and Windows systems that support GIS infrastructure; Linux, Windows and Application systems that support Asset Management; Responsibilities on these systems include SA engineering and provisioning, operations and support, maintenance and research and development to ensure continual innovation.

SA Engineering and Provisioning

1. Engineering of SA-related solutions for various project and operational needs.

2. Install new / rebuild existing servers and configure hardware, peripherals, services, settings, directories, storage, etc. in accordance with standards and project/operational requirements.

3. Install and configure systems such as supports GIS infrastructure applications or Asset Management applications.

4. Develop and maintain installation and configuration procedures.

5. Contribute to and maintain system standards.

6. Research and recommend innovative, and where possible automated approaches for system administration tasks.  Identify approaches that leverage our resources and provide economies of scale.

Operations and Support

7. Perform daily system monitoring, verifying the integrity and availability of all hardware, server resources, systems and key processes, reviewing system and application logs, and verifying completion of scheduled jobs such as backups.

8. Perform regular security monitoring to identify any possible intrusions.

9. Perform daily backup operations, ensuring all required file systems and system data are successfully backed up to the appropriate media, recovery tapes or disks are created, and media is recycled and sent off site as necessary.

10. Perform regular file archival and purge as necessary.

11. Create, change, and delete user accounts per request.

12. Provide Tier III/other support per request from various constituencies.  Investigate and troubleshoot issues.

13. Repair and recover from hardware or software failures.  Coordinate and communicate with impacted constituencies.

Maintenance

14. Apply OS patches and upgrades on a regular basis, and upgrade administrative tools and utilities. Configure / add new services as necessary.

15. Upgrade and configure system software that supports GIS infrastructure applications or Asset Management applications per project or operational needs.

16. Maintain operational, configuration, or other procedures.

17. Perform periodic performance reporting to support capacity planning.

18. Perform ongoing performance tuning, hardware upgrades, and resource optimization as required.  Configure CPU, memory, and disk partitions as required.

19. Maintain data center environmental and monitoring equipment.

KNOWLEDGE/SKILLS:

1. Bachelor (4-year) degree, with a technical major, such as engineering or computer science.

2. Systems Administration/System Engineer certification in Unix and Microsoft.

3. Four to six years system administration experience.

COMPLEXITY/PROBLEM SOLVING:

1. Position deals with a variety of problems and sometime has to decide which answer is best. The question/issues are typically clear and requires determination of which answer (from a few choices) is the best.

DISCRETION/LATITUDE/DECISION-MAKING:

1. Decisions normally have a noticeable effect department-wide and company-wide, and judgment errors can typically require one to two weeks to correct or reverse.

RESPONSIBILITY/OVERSIGHT –FINANCIAL & SUPERVISORY:

1. Functions as a lead worker doing the work similar to those in the work unit; responsibility for training, instruction, setting the work pace, and possibly evaluating performance.

2. No budget responsibility.

COMMUNICATIONS/INTERPERSONAL CONTACTS:

1. Interpret and/or discuss information with others, which involves terminology or concepts not familiar to many people; regularly provide advice and recommend actions involving rather complex issues. May resolve problems within established practices.

2. Provides occasional guidance, some of which is technical.

WORKING CONDITIONS/PHYSICAL EFFORT:

1. Responsibilities sometimes require working evenings and weekends, sometimes with little advanced notice.

2. No regular travel required.