<?xml version="1.0" encoding="UTF-8"?><?xml-stylesheet type="text/xsl" href="https://sampathblogs.online/wp-content/plugins/rss-feed-styles/public/template.xsl"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	xmlns:rssFeedStyles="http://www.lerougeliet.com/ns/rssFeedStyles#"
>

<channel>
	<title>Hardware &#8211; Sampath Kumar A</title>
	<atom:link href="https://sampathblogs.online/tag/hardware/feed/" rel="self" type="application/rss+xml" />
	<link>https://sampathblogs.online</link>
	<description>Be Concious Be More</description>
	<lastBuildDate>Sun, 09 Feb 2020 08:09:09 +0000</lastBuildDate>
	<language>en-GB</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>
<rssFeedStyles:reader name="Digg Reader" url="http://digg.com/reader/search/https%3A%2F%2Fsampathblogs.online%2Ffeed%2F"/><rssFeedStyles:reader name="Feedly" url="http://cloud.feedly.com/#subscription%2Ffeed%2Fhttps://sampathblogs.online/feed/"/><rssFeedStyles:button name="Like" url="https://www.facebook.com/sharer/sharer.php?u=%url%"/><rssFeedStyles:button name="G+" url="https://plus.google.com/share?url=%url%"/><rssFeedStyles:button name="Tweet" url="https://twitter.com/intent/tweet?url=%url%"/><rssFeedStyles:button name="Pinterest" url="https://www.pinterest.com/pin/create/button?url=%url%"/><rssFeedStyles:button name="LinkedIn" url="https://www.linkedin.com/cws/share?url=%url%"/>	<item>
		<title>Cisco Unified IP Phone : A Basic Setup Guide</title>
		<link>https://sampathblogs.online/2019/01/cisco-unified-ip-phone-a-basic-setup-guide/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=cisco-unified-ip-phone-a-basic-setup-guide</link>
					<comments>https://sampathblogs.online/2019/01/cisco-unified-ip-phone-a-basic-setup-guide/#respond</comments>
		
		<dc:creator><![CDATA[mail2sampath]]></dc:creator>
		<pubDate>Fri, 25 Jan 2019 13:25:48 +0000</pubDate>
				<category><![CDATA[Technical]]></category>
		<category><![CDATA[Basic guide]]></category>
		<category><![CDATA[Hardware]]></category>
		<category><![CDATA[IT Infrastructure Service]]></category>
		<guid isPermaLink="false">http://excelall.byethost32.com/?p=825</guid>

					<description><![CDATA[Phone and Network Overview Cisco Unified IP Phones enable you to communicate by using voice over a data network. To provide this capability, the Cisco Unified IP Phones depend upon and interact with several other key Cisco Unified IP Telephony... <a class="more-link" href="https://sampathblogs.online/2019/01/cisco-unified-ip-phone-a-basic-setup-guide/">Continue Reading &#8594;</a>]]></description>
										<content:encoded><![CDATA[<h4><strong>Phone and Network Overview</strong></h4>
<p>Cisco Unified IP Phones enable you to communicate by using voice over a data network. To provide this capability, the Cisco Unified IP Phones depend upon and interact with several other key Cisco Unified IP Telephony components like the networking device,i.e, a Cisco Catalyst switch and DNS, DHCP, TFTP servers, and other switches and also the IP Phone should be registered on the Cisco Unified Communications Manager system.</p>
<p>The following figure identifies the important parts of the phone.</p>
<div id="attachment_1258" style="width: 404px" class="wp-caption aligncenter"><img fetchpriority="high" decoding="async" aria-describedby="caption-attachment-1258" class="wp-image-1258 size-full" src="https://sampathblogs.online/wp-content/uploads/2020/01/ciscoip.jpg" alt="" width="394" height="416" srcset="https://sampathblogs.online/wp-content/uploads/2020/01/ciscoip.jpg 394w, https://sampathblogs.online/wp-content/uploads/2020/01/ciscoip-284x300.jpg 284w" sizes="(max-width: 394px) 100vw, 394px" /><p id="caption-attachment-1258" class="wp-caption-text">Figure 1: Cisco IP Phone</p></div>
<ul>
<li><strong>Programmable buttons</strong>: Buttons illuminate to indicate status or can be programmed as speed dial buttons,<br />
<a name="P746_RF_B02D3240_00__image_933383511D7442A8A8953BB107FED8EB"></a><a class="show-image-alone" title="Related image, diagram or screenshot." href="https://www.cisco.com/c/dam/en/us/td/i/000001-100000/95001-100000/99001-100000/99986.ps/_jcr_content/renditions/99986.jpg"><img decoding="async" src="https://www.cisco.com/c/dam/en/us/td/i/000001-100000/95001-100000/99001-100000/99986.ps/_jcr_content/renditions/99986.jpg" height="17" /></a> Green, steady—Active call or two-way intercom call<br />
<a name="P746_RF_B02D3240_00__image_933383511D7442A8A8953BB107FED8EB"></a><a class="show-image-alone" title="Related image, diagram or screenshot." href="https://www.cisco.com/c/dam/en/us/td/i/000001-100000/95001-100000/99001-100000/99986.ps/_jcr_content/renditions/99986.jpg"><img decoding="async" src="https://www.cisco.com/c/dam/en/us/td/i/000001-100000/95001-100000/99001-100000/99986.ps/_jcr_content/renditions/99986.jpg" height="17" /></a> Green, flashing—Held call<br />
<a name="P746_RF_B02D3240_00__image_AF5C16E9BA2241FC97E2FC9AEE3881EC"></a><a class="show-image-alone" title="Related image, diagram or screenshot." href="https://www.cisco.com/c/dam/en/us/td/i/000001-100000/95001-100000/99001-100000/99988.ps/_jcr_content/renditions/99988.jpg"><img decoding="async" src="https://www.cisco.com/c/dam/en/us/td/i/000001-100000/95001-100000/99001-100000/99988.ps/_jcr_content/renditions/99988.jpg" height="17" /></a> Amber, steady—Privacy in use, one-way intercom call, DND active<br />
<a name="P746_RF_B02D3240_00__image_FAEBE71030584338AB4E18C198BA66E2"></a><a class="show-image-alone" title="Related image, diagram or screenshot." href="https://www.cisco.com/c/dam/en/us/td/i/000001-100000/95001-100000/99001-100000/99988.ps/_jcr_content/renditions/99988.jpg"><img decoding="async" src="https://www.cisco.com/c/dam/en/us/td/i/000001-100000/95001-100000/99001-100000/99988.ps/_jcr_content/renditions/99988.jpg" height="17" /></a> Amber, flashing—Incoming call or reverting call<br />
<a name="P746_RF_B02D3240_00__image_05821FCD59DD4862AD5F4C2E340D68FD"></a><a class="show-image-alone" title="Related image, diagram or screenshot." href="https://www.cisco.com/c/dam/en/us/td/i/000001-100000/95001-100000/99001-100000/99987.ps/_jcr_content/renditions/99987.jpg"><img decoding="async" src="https://www.cisco.com/c/dam/en/us/td/i/000001-100000/95001-100000/99001-100000/99987.ps/_jcr_content/renditions/99987.jpg" height="17" /></a> Red, steady—Remote line in use</li>
<li><strong>Handset light strip</strong>: Red illumination indicates an incoming call or new voice message.</li>
<li><strong>Messages button</strong>: Auto-dials your voice message service.</li>
<li><strong>Directories button</strong>: Opens/closes the Directories menu. Use the button to access call logs and directory extension# of any employee.</li>
<li><strong>Settings button</strong>: Opens and closes the Settings menu. Use the button to change phone screen contrast, ring settings and to find the MAC address of the IP Phone.</li>
<li><strong>Services button</strong>: Opens and closes the Services menu. This button is used to guide the user to login screen to make use of the Extension Mobility(EMCC) feature.</li>
<li><strong>Phone screen</strong>: Shows call features. The above figure shows a Cisco 7961/62/42 screen, whereas the Cisco 7975/71/65/45 model provides a color screen.</li>
</ul>
<p>The back of the Cisco Unified IP Phone includes these ports: Network port, Access port, Headset port and the Handset port.</p>
<h4><strong>Cisco Unified IP Phones and VLAN Interaction, Power</strong></h4>
<p>The Cisco Unified IP Phones have an internal Ethernet switch, enabling forwarding of packets to the phone, and to the access port and the network port on the back of the phone.</p>
<p>If a computer is connected to the access port, the computer and the phone share the same physical link to the switch and share the same port on the switch. This shared physical link has the implication of Data traffic present on the VLAN supporting phones might reduce the quality of VoIP traffic.Network security may need to isolate the VLAN voice traffic from the VLAN data traffic. You can resolve these issues by isolating the voice traffic onto a separate VLAN. The switch port that the phone is connected to would be configured to have separate VLANs for carrying:</p>
<ul>
<li>Voice traffic to and from the phone (auxiliary VLAN on the Cisco Catalyst 6000 series, for example)</li>
<li>Data traffic to and from the PC connected to the switch through the access port of the phone (native VLAN)</li>
</ul>
<p>The Cisco Unified IP Phones is powered with Power over Ethernet (PoE). PoE is provided by a switch through the Ethernet cable attached to a phone.</p>
<h4><strong>Cisco Unified IP Phone and Cisco Unified Communications Manager Interactions</strong></h4>
<p>Cisco Unified Communications Manager is an open and industry-standard call processing system. Cisco Unified Communications Manager software sets up and tears down calls between phones, integrating traditional PBX functionality with the corporate IP network. Cisco Unified Communications Manager manages the components of the IP telephony system—the phones, the access gateways, and the resources necessary for features such as call conferencing and route planning. Cisco Unified Communications Manager also provides:</p>
<ul>
<li>Firmware for phones</li>
<li>Authentication and encryption</li>
<li>Configuration, certificate trust list (CTL), and Identity Trust List (ITL) files via the TFTP service</li>
<li>Phone registration</li>
<li>Call preservation, so that a media session continues if signaling is lost between the primary Communications Manager and a phone</li>
</ul>
<h5><strong>Cisco Unified Communications Manager Administration Phone Addition</strong></h5>
<p>You can add phones individually to the Cisco Unified Communications Manager database by using Cisco Unified Communications Manager Administration. To do so, you first need to obtain the MAC address for each phone.</p>
<p>You can determine a phone MAC address in these ways:</p>
<ul>
<li>From the phone, press the <em>Settings</em> button, select <em>Network Configuration</em> and look at the MAC Address field.</li>
<li>Look at the MAC label on the back of the phone.</li>
<li>Display the web page for the phone and click the Device Information hyperlink.</li>
</ul>
<p>After you have collected MAC addresses, in Cisco Unified Communications Manager Administration, choose <em>Device &gt; Phone</em> and search the device by selecting the <em>Device Name, contains</em> option from the drop down menu and enter the MAC address as shown in the below <em><strong>Figure 2</strong></em>.</p>
<div id="attachment_1273" style="width: 941px" class="wp-caption alignnone"><img decoding="async" aria-describedby="caption-attachment-1273" class="wp-image-1273 size-full" src="https://sampathblogs.online/wp-content/uploads/2020/01/cucm_1.png" alt="" width="931" height="395" srcset="https://sampathblogs.online/wp-content/uploads/2020/01/cucm_1.png 931w, https://sampathblogs.online/wp-content/uploads/2020/01/cucm_1-300x127.png 300w, https://sampathblogs.online/wp-content/uploads/2020/01/cucm_1-768x326.png 768w, https://sampathblogs.online/wp-content/uploads/2020/01/cucm_1-600x255.png 600w" sizes="(max-width: 931px) 100vw, 931px" /><p id="caption-attachment-1273" class="wp-caption-text">Figure 2: Device search using MAC address</p></div>
<p>Click on <em>Find</em> and the Cisco IP phone connected to the network will show up in the search result. Now click on the device name link and the below screen will show up.</p>
<div id="attachment_1275" style="width: 686px" class="wp-caption aligncenter"><img decoding="async" aria-describedby="caption-attachment-1275" class="wp-image-1275 size-large" src="https://sampathblogs.online/wp-content/uploads/2020/01/cucm_2-1-1024x587.png" alt="" width="676" height="388" srcset="https://sampathblogs.online/wp-content/uploads/2020/01/cucm_2-1-1024x587.png 1024w, https://sampathblogs.online/wp-content/uploads/2020/01/cucm_2-1-300x172.png 300w, https://sampathblogs.online/wp-content/uploads/2020/01/cucm_2-1-768x440.png 768w, https://sampathblogs.online/wp-content/uploads/2020/01/cucm_2-1-945x542.png 945w, https://sampathblogs.online/wp-content/uploads/2020/01/cucm_2-1-600x344.png 600w, https://sampathblogs.online/wp-content/uploads/2020/01/cucm_2-1.png 1050w" sizes="(max-width: 676px) 100vw, 676px" /><p id="caption-attachment-1275" class="wp-caption-text">Figure 3: Device Information Entry</p></div>
<p>Enter all the necessary information and click on <em>Save, Apply Config</em> buttons at the top left to update the changes on the device. On the Phone screen, a maximum of 6 user numbers can be displayed including own number.The directory number setting and phone screen display setting for a user can be done by clicking on &#8220;<em>Line[1]</em> to <em>Line[5]</em>&#8221; under the Association section. Clicking on <em>Line[1]</em> will display the below screen.</p>
<div id="attachment_1276" style="width: 688px" class="wp-caption aligncenter"><img loading="lazy" decoding="async" aria-describedby="caption-attachment-1276" class="wp-image-1276 size-full" src="https://sampathblogs.online/wp-content/uploads/2020/01/cucm_3.png" alt="" width="678" height="683" srcset="https://sampathblogs.online/wp-content/uploads/2020/01/cucm_3.png 678w, https://sampathblogs.online/wp-content/uploads/2020/01/cucm_3-298x300.png 298w, https://sampathblogs.online/wp-content/uploads/2020/01/cucm_3-150x150.png 150w, https://sampathblogs.online/wp-content/uploads/2020/01/cucm_3-600x604.png 600w" sizes="auto, (max-width: 678px) 100vw, 678px" /><p id="caption-attachment-1276" class="wp-caption-text">Figure 4: Directory Number Information Setup</p></div>
<p>Enter the user extension/directory number, name and other required information. Scroll down to the <em>Call Forward and Call Pickup Settings</em> as shown in <strong><em>Figure 5</em></strong>. In case of forwarding all the calls to some other extension (Eg:when the user is on leave), enter the same in the <em>Forward All</em> section.The <em>Call Pickup Group</em> indicates that all the members in the group can pickup the call.</p>
<div id="attachment_1277" style="width: 1254px" class="wp-caption aligncenter"><img loading="lazy" decoding="async" aria-describedby="caption-attachment-1277" class="wp-image-1277 size-full" src="https://sampathblogs.online/wp-content/uploads/2020/01/cucm_4.jpg" alt="" width="1244" height="441" srcset="https://sampathblogs.online/wp-content/uploads/2020/01/cucm_4.jpg 1244w, https://sampathblogs.online/wp-content/uploads/2020/01/cucm_4-300x106.jpg 300w, https://sampathblogs.online/wp-content/uploads/2020/01/cucm_4-1024x363.jpg 1024w, https://sampathblogs.online/wp-content/uploads/2020/01/cucm_4-768x272.jpg 768w, https://sampathblogs.online/wp-content/uploads/2020/01/cucm_4-945x335.jpg 945w, https://sampathblogs.online/wp-content/uploads/2020/01/cucm_4-600x213.jpg 600w" sizes="auto, (max-width: 1244px) 100vw, 1244px" /><p id="caption-attachment-1277" class="wp-caption-text">Figure 5: Call Forward Setting</p></div>
<p>Scrolling down further will take us to the Display Setting as shown in <strong><em>Figure 6</em></strong>. The entry made in the <em>Line Text Label</em> section will be displayed on the Phone screen. The <em>External Phone Number Mask</em> is the User Direct Access number from outside office and the masked area (XXXX) will automatically be filled with the last four numbers of the extension on the phone screen. Click on <em>Save, Apply Config</em> buttons at the top left in <em><strong>Figure 4</strong></em> to update the changes on the device.</p>
<div id="attachment_1278" style="width: 643px" class="wp-caption aligncenter"><img loading="lazy" decoding="async" aria-describedby="caption-attachment-1278" class="wp-image-1278 size-full" src="https://sampathblogs.online/wp-content/uploads/2020/01/cucm_5.png" alt="" width="633" height="502" srcset="https://sampathblogs.online/wp-content/uploads/2020/01/cucm_5.png 633w, https://sampathblogs.online/wp-content/uploads/2020/01/cucm_5-300x238.png 300w, https://sampathblogs.online/wp-content/uploads/2020/01/cucm_5-600x476.png 600w" sizes="auto, (max-width: 633px) 100vw, 633px" /><p id="caption-attachment-1278" class="wp-caption-text">Figure 6: Display Setting</p></div>
<p>After the completion of the above settings,the Phone screen display will appear as shown in the <strong><em>Figure 7</em></strong> below.</p>
<div id="attachment_1349" style="width: 627px" class="wp-caption aligncenter"><img loading="lazy" decoding="async" aria-describedby="caption-attachment-1349" class="wp-image-1349 size-full" src="https://sampathblogs.online/wp-content/uploads/2020/01/preface0.jpg" alt="" width="617" height="469" srcset="https://sampathblogs.online/wp-content/uploads/2020/01/preface0.jpg 617w, https://sampathblogs.online/wp-content/uploads/2020/01/preface0-300x228.jpg 300w, https://sampathblogs.online/wp-content/uploads/2020/01/preface0-600x456.jpg 600w" sizes="auto, (max-width: 617px) 100vw, 617px" /><p id="caption-attachment-1349" class="wp-caption-text">Figure 7 : Phone screen with User1 setting done</p></div>
<p>As we look at the screen ,we can observe the User name, direct access number, extension displayed as per the settings done. But, at the bottom of the screen we can see one more entry, i.e, the branch/office extension which we will be looking into from now on. The first step would be to click on <em>Line [5]</em> in the <em><strong>Figure 3</strong></em> which will direct us to the following screen.</p>
<div id="attachment_1321" style="width: 694px" class="wp-caption aligncenter"><img loading="lazy" decoding="async" aria-describedby="caption-attachment-1321" class="wp-image-1321 size-full" src="https://sampathblogs.online/wp-content/uploads/2020/01/main-1.jpg" alt="" width="684" height="500" srcset="https://sampathblogs.online/wp-content/uploads/2020/01/main-1.jpg 684w, https://sampathblogs.online/wp-content/uploads/2020/01/main-1-300x219.jpg 300w, https://sampathblogs.online/wp-content/uploads/2020/01/main-1-600x439.jpg 600w" sizes="auto, (max-width: 684px) 100vw, 684px" /><p id="caption-attachment-1321" class="wp-caption-text">Figure 8 : Office Main Line Setting</p></div>
<p>The office extension should be entered in the <em>Directory Number</em> section and the other areas will be automatically populated if the number is already registered in the directory, else the other sections need to be corrected manually if already registered under a different name or need to be registered newly. Since new customers access the office number directly, all the frontline members need to have this setting on their respective IP Phones. The <em>Associated Devices</em> section indicates all the IP Phones having this particular setting and all the phones will ring once an external customer calls the office number.</p>
<p>Scrolling down will take us to the <em>Call Forward and Call Pickup</em> Settings, where none of the sections are touched except for the <em>Call Pickup Group</em> which will be the same as in <strong><em>Figure 5</em></strong>. This indicates that all the members in the group with this directory number setting on their IP Phones can pickup the call. Scrolling down further will bring us to the phone screen display setting as shown in the <em><strong>Figure 9</strong></em> below.</p>
<div id="attachment_1322" style="width: 650px" class="wp-caption aligncenter"><img loading="lazy" decoding="async" aria-describedby="caption-attachment-1322" class="wp-image-1322 size-full" src="https://sampathblogs.online/wp-content/uploads/2020/01/main-2.jpg" alt="" width="640" height="502" srcset="https://sampathblogs.online/wp-content/uploads/2020/01/main-2.jpg 640w, https://sampathblogs.online/wp-content/uploads/2020/01/main-2-300x235.jpg 300w, https://sampathblogs.online/wp-content/uploads/2020/01/main-2-600x471.jpg 600w" sizes="auto, (max-width: 640px) 100vw, 640px" /><p id="caption-attachment-1322" class="wp-caption-text">Figure 9 : Main Line Display Setting</p></div>
<p>Input the Name to displayed on Line [5] in the <em>Line Text Label</em> section and the Office/Branch Main line number in the <em>External Phone Number Mask</em> section. Click on <em>Save, Apply Config</em> buttons at the top left in <em><strong>Figure 8</strong></em> to update the changes on the device. So, when anyone calls the Office main line number, all the IP phones with this particular setting will ring and the respective programmable button next to the &#8216;Main Line&#8217; will flash with Amber light indicating an incoming call.</p>
<p><strong>Enabling the Special features:</strong></p>
<ul>
<li>Addition of Expansion Module</li>
</ul>
<p>The Cisco Unified IP Phone Expansion Module attaches to a Cisco Unified IP Phone 7962G, 7961G and 7961G-GE to extend the number or line appearances or programmable buttons on your phone. These phones support the Cisco Unified IP Phone Expansion Model 7914, 7915, and 7916. You can customize the button templates for the Cisco Unified IP Phone Expansion Module to determine the number of line appearances and speed dial buttons.</p>
<div id="attachment_1289" style="width: 442px" class="wp-caption aligncenter"><img loading="lazy" decoding="async" aria-describedby="caption-attachment-1289" class="wp-image-1289 size-full" src="https://sampathblogs.online/wp-content/uploads/2020/01/expansion.jpg" alt="" width="432" height="291" srcset="https://sampathblogs.online/wp-content/uploads/2020/01/expansion.jpg 432w, https://sampathblogs.online/wp-content/uploads/2020/01/expansion-300x202.jpg 300w" sizes="auto, (max-width: 432px) 100vw, 432px" /><p id="caption-attachment-1289" class="wp-caption-text">Figure 10 : Setting up of Expansion Module on CUCM</p></div>
<p>You can attach a Cisco Unified IP Phone Expansion Module 7914 to the Cisco Unified IP Phone 7961G and 7961G-GE by using the following methods:<br />
When you initially add the phone to Cisco Unified Communications Manager (CUCM), you can choose <em>7914 14-Button Line Expansion Module</em> in the Module 1 or Module 2 fields as shown in the figure above which appears as we scroll down from the <em><strong>Figure 3</strong></em> screen. Another method is after the phone is configured in Cisco Unified Communications Manager.</p>
<p>When the Expansion Module is added, the <em>Add On Module(s)</em> section as shown in <em><strong>Figure 3</strong></em> will be populated with Lines which can be updated with the user extension numbers.</p>
<ul>
<li>Extension Mobility</li>
</ul>
<p>This feature allows a user to log into the Extension Mobility service on a phone by pressing the Services button and have the phone use the user&#8217;s phone number and user profile settings. Extension Mobility can be useful if users work from a variety of locations within your company or if they share a workspace with coworkers.</p>
<div id="attachment_1291" style="width: 548px" class="wp-caption aligncenter"><img loading="lazy" decoding="async" aria-describedby="caption-attachment-1291" class="wp-image-1291 size-full" src="https://sampathblogs.online/wp-content/uploads/2020/01/extension1.jpg" alt="" width="538" height="394" srcset="https://sampathblogs.online/wp-content/uploads/2020/01/extension1.jpg 538w, https://sampathblogs.online/wp-content/uploads/2020/01/extension1-300x220.jpg 300w" sizes="auto, (max-width: 538px) 100vw, 538px" /><p id="caption-attachment-1291" class="wp-caption-text">Figure 11 : Extension Mobility</p></div>
<p>The above screen appears once we scroll down from <em><strong>Figure 3</strong></em> on CUCM. To enable the extension mobility we need to check the option as shown in the section(<em>a</em>) and once the user has logged onto to a different phone we can see the section(<em>b</em>) login information for that particular user.</p>
<ul>
<li>Do Not Disturb</li>
</ul>
<p>This feature allows to mute the ringing and/or reject calls to an IP phone which may be helpful at times like when it is unused or when the user wants to just mute the ringing sound.</p>
<div id="attachment_1284" style="width: 452px" class="wp-caption aligncenter"><img loading="lazy" decoding="async" aria-describedby="caption-attachment-1284" class="wp-image-1284 size-full" src="https://sampathblogs.online/wp-content/uploads/2020/01/dnd.jpg" alt="" width="442" height="116" srcset="https://sampathblogs.online/wp-content/uploads/2020/01/dnd.jpg 442w, https://sampathblogs.online/wp-content/uploads/2020/01/dnd-300x79.jpg 300w" sizes="auto, (max-width: 442px) 100vw, 442px" /><p id="caption-attachment-1284" class="wp-caption-text">Figure 12 : DND Setting</p></div>
<p>On CUCM, check the <em>Do Not Disturb</em> option and select the appropriate item from the <em>DND Option</em> drop down selection as shown in the above figure, which shows up once we scroll down from the <em><strong>Figure 3</strong></em> screen.</p>
<h4><strong>Cisco Unity Connection Administration</strong></h4>
<p>A tool used in most of the administrative tasks such as, customizing user settings and implementing a call management plan. This includes handling messages and distribution lists, managing audio formats, managing user passwords and PINs etc.</p>
<p>Cisco Unity Connection users are created to administer or provide access to the voice messaging system. The user attributes are the objects that enable you to control which users can connect to the system, and determine the system features and resources they can access. You can either manually add users or import them from the LDAP directory on the Cisco Unity Connection Administration page. Refer <em><strong>Figure 13</strong></em> below right side window to <em>Edit/Update User Basics</em> setting.</p>
<p>Each user and administrator account that you add in Unity Connection is based on a user template. The user template settings include authentication rules and schedules. The authentication rules dictate the password or PIN and account lockout policy for the users that you create. You must review the settings in the user templates that you plan to use before creating a user account. This helps you to determine whether you need to make changes to an existing user template or create new user templates. For each template, consider the features that you want to enable, specify a class of service, set a schedule and time zone for the accounts you want to create.</p>
<div id="attachment_1271" style="width: 1195px" class="wp-caption aligncenter"><img loading="lazy" decoding="async" aria-describedby="caption-attachment-1271" class="wp-image-1271 size-full" src="https://sampathblogs.online/wp-content/uploads/2020/01/cuca1.jpg" alt="" width="1185" height="536" srcset="https://sampathblogs.online/wp-content/uploads/2020/01/cuca1.jpg 1185w, https://sampathblogs.online/wp-content/uploads/2020/01/cuca1-300x136.jpg 300w, https://sampathblogs.online/wp-content/uploads/2020/01/cuca1-1024x463.jpg 1024w, https://sampathblogs.online/wp-content/uploads/2020/01/cuca1-768x347.jpg 768w, https://sampathblogs.online/wp-content/uploads/2020/01/cuca1-945x427.jpg 945w, https://sampathblogs.online/wp-content/uploads/2020/01/cuca1-600x271.jpg 600w" sizes="auto, (max-width: 1185px) 100vw, 1185px" /><p id="caption-attachment-1271" class="wp-caption-text">Figure 13 : User Settings &amp; Search</p></div>
<p>Cisco Unity Connection Administration allows you to find users based on search criteria that you enter. You can enter all or part of a name, extension, and/or user alias (ID) to find a user. In the above figure, we are using the <em>extension</em> number to find the user details.</p>
<p>Users with voice mailboxes are end users and the users without voice mailboxes are system administrators. Before you add user accounts individually, you need to select and define a template and class of service (COS) for each type of account you need to add. In case of end users, the default voicemail PINs and web application passwords are applied to each user account that you create. The voicemail PIN can be changed by clicking on <em>Change Password</em> as shown in the figure below.</p>
<div id="attachment_1272" style="width: 1132px" class="wp-caption aligncenter"><img loading="lazy" decoding="async" aria-describedby="caption-attachment-1272" class="wp-image-1272 size-full" src="https://sampathblogs.online/wp-content/uploads/2020/01/cuca2.jpg" alt="" width="1122" height="689" srcset="https://sampathblogs.online/wp-content/uploads/2020/01/cuca2.jpg 1122w, https://sampathblogs.online/wp-content/uploads/2020/01/cuca2-300x184.jpg 300w, https://sampathblogs.online/wp-content/uploads/2020/01/cuca2-1024x629.jpg 1024w, https://sampathblogs.online/wp-content/uploads/2020/01/cuca2-768x472.jpg 768w, https://sampathblogs.online/wp-content/uploads/2020/01/cuca2-945x580.jpg 945w, https://sampathblogs.online/wp-content/uploads/2020/01/cuca2-600x368.jpg 600w" sizes="auto, (max-width: 1122px) 100vw, 1122px" /><p id="caption-attachment-1272" class="wp-caption-text">Figure 14 : User Voice mail setting</p></div>
<p>Unity Connection comes with a set of default notification devices that can be configured as required. Following are the default notification devices:</p>
<ul>
<li>Pager</li>
<li>Work Phone</li>
<li>Home Phone</li>
<li>Mobile Phone</li>
<li>SMTP</li>
<li>HTML</li>
</ul>
<p>The default <em>notification devices</em> can be modified or enabled but cannot be deleted. An administrator can add, edit or delete additional notification devices whereas a user can only edit the notification devices.</p>
<p>Our point of focus here would be to setup <em>SMTP</em> Message notification as shown in the figure above. Cisco Unity Connection can notify a user of new messages by calling a phone or pager. Also, you can set up Unity Connection to send message, mail and calendar event notifications in the form of text messages to text pagers, mail address and text-compatible mobile phones using SMTP.</p>
<p>When a user observes red illumination on the handset light strip, it means that a voice mail has arrived. The user can press on the Messages button on the IP Phone and enter the voice mail PIN to listen to the voice mail.</p>
<p><em><strong>Credits:</strong></em><br />
Experience<br />
Knowledge<br />
<a href="https://www.cisco.com/c/en/us/support/collaboration-endpoints/unified-ip-phone-7900-series/products-maintenance-guides-list.html"><code class="EnlighterJSRAW" data-enlighter-language="html">https://www.cisco.com/c/en/us/support/collaboration-endpoints/unified-ip-phone-7900-series/products-maintenance-guides-list.html</code></a><br />
<a href="https://www.cisco.com/c/en/us/td/docs/voice_ip_comm/connection/10x/administration/guide/10xcucsagx/10xcucsag010.html#24744"><code class="EnlighterJSRAW" data-enlighter-language="html">https://www.cisco.com/c/en/us/td/docs/voice_ip_comm/connection/10x/administration/guide/10xcucsagx/10xcucsag010.html#24744</code></a><br />
Other online articles</p>
]]></content:encoded>
					
					<wfw:commentRss>https://sampathblogs.online/2019/01/cisco-unified-ip-phone-a-basic-setup-guide/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Enterprise IT Infrastructure &#038; Support</title>
		<link>https://sampathblogs.online/2018/12/enterprise-it-infrastructure-support/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=enterprise-it-infrastructure-support</link>
					<comments>https://sampathblogs.online/2018/12/enterprise-it-infrastructure-support/#respond</comments>
		
		<dc:creator><![CDATA[mail2sampath]]></dc:creator>
		<pubDate>Mon, 24 Dec 2018 20:30:12 +0000</pubDate>
				<category><![CDATA[Technical]]></category>
		<category><![CDATA[Hardware]]></category>
		<category><![CDATA[IT Infrastructure Service]]></category>
		<guid isPermaLink="false">http://excelall.byethost32.com/?p=809</guid>

					<description><![CDATA[Introduction The IT infrastructure in organizations today is an outgrowth of decades of evolution in computing platforms.The most recent eras are the general-purpose mainframe and minicomputer computing, personal computers, client/server networks, and the current enterprise and Internet computing.These eras do... <a class="more-link" href="https://sampathblogs.online/2018/12/enterprise-it-infrastructure-support/">Continue Reading &#8594;</a>]]></description>
										<content:encoded><![CDATA[<h3>Introduction</h3>
<div data-canvas-width="564.0222823529413">
<p>The IT infrastructure in organizations today is an outgrowth of decades of evolution in computing platforms.The most recent eras are the general-purpose mainframe and minicomputer computing, personal computers, client/server networks, and the current enterprise and Internet computing.These eras do not necessarily end for all organizations at the same time, and the technologies that characterize one era may also be used in another time period for other purposes. For example, mainframe computers today are used as massive servers supporting large Websites and corporate enterprise applications.</p>
<div id="attachment_1286" style="width: 553px" class="wp-caption aligncenter"><img loading="lazy" decoding="async" aria-describedby="caption-attachment-1286" class="wp-image-1286 size-full" src="https://sampathblogs.online/wp-content/uploads/2020/01/enterprise_infra.jpg" alt="" width="543" height="437" srcset="https://sampathblogs.online/wp-content/uploads/2020/01/enterprise_infra.jpg 543w, https://sampathblogs.online/wp-content/uploads/2020/01/enterprise_infra-300x241.jpg 300w" sizes="auto, (max-width: 543px) 100vw, 543px" /><p id="caption-attachment-1286" class="wp-caption-text">Enterprise Internet Computing</p></div>
</div>
<div data-canvas-width="564.0222823529413">
<p data-canvas-width="564.0671029411767">The success of the client/server model posed a new set of problems for corporations. Many large firms found it difficult to integrate all of their local area networks (LANs) into a single, coherent corporate computing environment. Applications developed by local departments and divisions in a firm, or in different geographic areas, could not communicate easily with one another and share data.</p>
<p data-canvas-width="564.0671029411767">
</div>
<div data-canvas-width="564.0222823529413">
<p data-canvas-width="564.0703044117648">As the Internet developed into a trusted communications environment, business firms began using the Transmission Control Protocol/ Internet Protocol (TCP/IP) networking standard to tie their disparate networks together. The resulting enterprise networks link mainframes, servers, PCs, mobile phones, and other handheld devices across the organization and between the firm and other organizations for free flow of information and also connect to public infrastructures such as the telephone system, the Internet, and public network services.</p>
</div>
<h3>A Basic Enterprise LAN Network Architecture</h3>
<p>The below diagram shows you the connectivity architecture of the major components that form an enterprise network.</p>
<div id="attachment_1251" style="width: 643px" class="wp-caption aligncenter"><img loading="lazy" decoding="async" aria-describedby="caption-attachment-1251" class="wp-image-1251 size-full" src="https://sampathblogs.online/wp-content/uploads/2020/01/archii.jpg" alt="" width="633" height="447" srcset="https://sampathblogs.online/wp-content/uploads/2020/01/archii.jpg 633w, https://sampathblogs.online/wp-content/uploads/2020/01/archii-300x212.jpg 300w, https://sampathblogs.online/wp-content/uploads/2020/01/archii-600x424.jpg 600w" sizes="auto, (max-width: 633px) 100vw, 633px" /><p id="caption-attachment-1251" class="wp-caption-text">LAN Architecture Sketch and Components</p></div>
<p>The <strong>Internet</strong> cloud refers to the source of the Internet to an organization. The organization could be connected to the Internet via Internet Leased Lines/ Broadband/ 3G etc. For connectivity to other branches, a VPN Network over the Internet could be used.</p>
<p>Before going ahead with the description of other components, lets get to know about switches. Network switches are always seen in data centers or server rooms for data transmission. Switch is used for linking the network devices together and switching the data from one port to another based on information from the packets being transmitted. The information complies with the OSI (Open Systems Interconnection) seven-layer model to ensure product interoperability.</p>
<div id="attachment_1340" style="width: 471px" class="wp-caption aligncenter"><img loading="lazy" decoding="async" aria-describedby="caption-attachment-1340" class="wp-image-1340 size-full" src="https://sampathblogs.online/wp-content/uploads/2020/01/OSI.jpg" alt="" width="461" height="388" srcset="https://sampathblogs.online/wp-content/uploads/2020/01/OSI.jpg 461w, https://sampathblogs.online/wp-content/uploads/2020/01/OSI-300x252.jpg 300w" sizes="auto, (max-width: 461px) 100vw, 461px" /><p id="caption-attachment-1340" class="wp-caption-text">OSI seven-layer model</p></div>
<p>As for small networks, Layer 2 switches might be a good option. However, most networks will combine the Layer 2 and Layer 3 switches. Layer 3 is more intelligent and provides all the functionality of Layer 2 networks. Layer 4 switch is the enhanced version of Layer 3 and provides higher class of service for controlling the network traffic.</p>
<p><img loading="lazy" decoding="async" class="wp-image-1318 size-full aligncenter" src="https://sampathblogs.online/wp-content/uploads/2020/01/layersnw.jpg" alt="" width="437" height="338" srcset="https://sampathblogs.online/wp-content/uploads/2020/01/layersnw.jpg 437w, https://sampathblogs.online/wp-content/uploads/2020/01/layersnw-300x232.jpg 300w" sizes="auto, (max-width: 437px) 100vw, 437px" /></p>
<p>The Enterprise <strong>Router</strong> is basically a Layer-3 Network device that connects disparate networks. It acts as a gateway between the LAN and the WAN networks and the Internet Leased Lines/ MPLS Circuits/ Managed Leased Lines/ Broadband networks are all terminated on the router. Some Routers support additional modules for secure connectivity to other branches through VPN, Intrusion Prevention and Content Filtering etc.</p>
<p>The Unified Threat Management Appliance (or software) is for providing gateway level network security for the various end points used in the organization.The UTM Devices provide the following network security options: <strong>Firewall</strong>, Anti-Spam, Anti-Virus, Content Filtering, URL Filtering, Intrusion Prevention (IPS), Virtual Private Network (VPN), Protection from Internet threats like Phishing etc.</p>
<p>A Core/<strong>Backbone</strong> <strong>Switch</strong> is generally a Layer-3 based Network Switch that connects to the various distribution switches, edge switches (through distribution switches / directly) using Optical Fiber Networks or UTP Copper cabling. They generally also connect to the computer servers (ERP, Web Server, Mail Server, Database Server, Application Servers, etc). The core switch is in the center of an enterprise network and it also provides Inter-VLAN routing.</p>
<p>A <strong>NAS</strong> Device refers to a Network Area Storage Appliance (This could also be a Storage Area Network, depending upon the storage requirements) where bulk of the files/ data are stored for the servers and individual users (PC’s) to access them over the network whenever required.</p>
<p>There are many access points to provide wireless (Wi-Fi) access to the PC’s/ Laptops/ Wi-Fi Phones in the enterprise. All these Access Points are managed/ controlled by an appliance called ‘<strong>Wireless Controller</strong>’ which provides centralized authentication and other functionalities required for the wireless users across the network. The <strong>IP Telephony Server</strong> provides the call control functions (voice switching) for the telephony operations in an enterprise network. Since the <strong>IP Phones</strong> connect to the computer networks, these IP Telephony Servers provide centralized administration and connectivity to <strong>PSTN Lines</strong> to all the IP Phones/ VOIP devices over the network.</p>
<h3>Enterprise IT</h3>
<p>Enterprise IT includes the technology staff, services, and support associated with enterprise systems and services, as well as their strategy, management, budgets, and policy. Enterprise IT also includes many of the infrastructure and services that companies or institutions use to store and manage data and processes, regardless of whether they are hosted on campus, in the cloud, or through shared services. It primarily has an administrative focus rather than one of research. Because it deals with core organizational business activities, enterprise IT is central to the success of any company or institution. In the below picture, one can get an idea of all the components like the development of enterprise IT, testing the same and implementing. Once implemented, the support team needs to provide the users with support relating to application or system issues.</p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-1311 size-full" src="https://sampathblogs.online/wp-content/uploads/2020/01/ITsupport.jpg" alt="" width="901" height="500" srcset="https://sampathblogs.online/wp-content/uploads/2020/01/ITsupport.jpg 901w, https://sampathblogs.online/wp-content/uploads/2020/01/ITsupport-300x166.jpg 300w, https://sampathblogs.online/wp-content/uploads/2020/01/ITsupport-768x426.jpg 768w, https://sampathblogs.online/wp-content/uploads/2020/01/ITsupport-600x333.jpg 600w" sizes="auto, (max-width: 901px) 100vw, 901px" /></p>
<p>One of the main component here is Enterprise Performance Management (EPM) as well, which is a type of business planning that relates to business intelligence (BI), which involves evaluating and managing performance for an enterprise to reach performance goals, enhance efficiency or maximize business processes. Enterprise Resource Planning (ERP) can be said to be a part of EPM.</p>
<p>Management of these core organizational services goes beyond just taking care of the technology. For example, as institutions move services into the cloud, the responsibility for managing the service remains a responsibility of enterprise IT. The transition from on-premise to cloud causes IT to shift focus and concentrate on contract management, vendor relations, collaborations with functional and business units, and data integration issues.</p>
<p>Our focus here will be on &#8216;end user support&#8217; or the &#8216;application and system operations support&#8217;&nbsp;which mainly includes IT Service Desk Support, Desktop Management Services etc.</p>
<h4><strong>Application and System Operations Support</strong></h4>
<p>Enterprise support services manage the daily activities to keep end users PC, applications and related infrastructure highly available and secure which ensures the organization to focus on its own core business.</p>
<h5><strong>Desktop Management Services &amp; IT Support</strong></h5>
<p><strong>BMC Remedyforce:</strong><br />
A best-practice approach to the management of incidents, problems, service requests, and tasks. The relevant data for any record is displayed in a visual format, making it easy to access all related information to fulfill a request. See which tasks are open, pending, or closed and get details about the record’s action history as well.<strong><br />
</strong></p>
<div id="attachment_1253" style="width: 835px" class="wp-caption aligncenter"><img loading="lazy" decoding="async" aria-describedby="caption-attachment-1253" class="wp-image-1253 size-full" src="https://sampathblogs.online/wp-content/uploads/2020/01/bmc.jpg" alt="" width="825" height="424" srcset="https://sampathblogs.online/wp-content/uploads/2020/01/bmc.jpg 825w, https://sampathblogs.online/wp-content/uploads/2020/01/bmc-300x154.jpg 300w, https://sampathblogs.online/wp-content/uploads/2020/01/bmc-768x395.jpg 768w, https://sampathblogs.online/wp-content/uploads/2020/01/bmc-600x308.jpg 600w" sizes="auto, (max-width: 825px) 100vw, 825px" /><p id="caption-attachment-1253" class="wp-caption-text">BMC Remedyforce</p></div>
<p>There are various user applications used at organizations, like the MS Office, Adobe Acrobat, Document Manager, Sharefile, Skype for Business etc., as well as OS regarding which issues or queries may come up and would require IT support team to address them. So when a user request or escalation comes up, the best practice approach of handling the requests in the form of tickets is used so that the issue can be resolved by the concerned IT support team or can be routed to the next level IT support team for better handling of the issue.</p>
<p>The generation of a new ticket w.r.t a user request would involve inputting the following sections;<br />
Client ID/Name, Incident Title, Description, Category, Impact, Priority, Incident Source, Incident Type ,Urgency, Status, Date and Time, Queue, Staff</p>
<p><strong>OS Image Install:</strong><br />
The computer must be connected to the LAN network when re-imaging a managed computer/laptop. Restart the computer. Click on F1 to enter the bios menu. Here the standard setting under Startup &#8220;UEFI/Legacy Boot&#8221; would be Legacy Only or both. Security &#8220;Secure Boot&#8221; to be set to disabled and &#8220;Security Chip&#8221; to be made active and to be set to 1.2 TPM. Save the setting and press F12 to enter the boot menu. Once you arrive at the boot menu, select the option to boot to the Onboard Network Interface Card (NIC). Upon arriving at the next screen, enter the necessary password if any. Next, it’ll prompt you to “Select the operating system you want to install” – choose the appropriate installation image (operating system) for that type of computer. The installation is expected to complete in a couple of hours in case of no issues.</p>
<p>Once the OS is setup and the user credentials are received from the <em>Active Directory administrator</em>, login using the user credentials and check whether the necessary applications are installed properly and also do the necessary setting which allows remote login with or without permissions. Use the desktopadmin login to perform the necessary settings or to do the group policy update.</p>
<p><strong>Symantec Encryption Server Administration:</strong><br />
Symantec<img src="https://s.w.org/images/core/emoji/17.0.2/72x72/2122.png" alt="™" class="wp-smiley" style="height: 1em; max-height: 1em;" /> Encryption Management Server is a console that manages the applications that provide email, disk, and network file encryption. Symantec Encryption Desktop, a client product, creates PGP keypairs , encrypts user email, encrypts entire, or partial, hard drives etc. This is mainly used when WDRT&#8217;s are to be generated. Whole disk recovery tokens (WDRTs) are a means by which an encrypted device is accessed once a user has been locked out or has forgotten their password. This is especially valuable when the device is not in the same location as the administrator.</p>
<p><strong>System Center Configuration Manager:</strong><br />
Configuration Manager console provides remote control, patch management, software distribution, operating system deployment, network access protection and hardware &amp; software inventory. Once OS is installed on a PC we can see the PC getting listed on SCCM which must be deleted inorder to perform re-installation of OS image on the same PC the next time in case of need. Once the device is detected on SCCM, set the device as a primary device for the user.</p>
<div id="attachment_1361" style="width: 789px" class="wp-caption aligncenter"><img loading="lazy" decoding="async" aria-describedby="caption-attachment-1361" class="wp-image-1361 size-full" src="https://sampathblogs.online/wp-content/uploads/2020/01/sccm.jpg" alt="" width="779" height="482" srcset="https://sampathblogs.online/wp-content/uploads/2020/01/sccm.jpg 779w, https://sampathblogs.online/wp-content/uploads/2020/01/sccm-300x186.jpg 300w, https://sampathblogs.online/wp-content/uploads/2020/01/sccm-768x475.jpg 768w, https://sampathblogs.online/wp-content/uploads/2020/01/sccm-600x371.jpg 600w" sizes="auto, (max-width: 779px) 100vw, 779px" /><p id="caption-attachment-1361" class="wp-caption-text">Configuration Manager Console</p></div>
<p>In case we need to push a new application or a patch which is present on SCCM to a PC remotely, we can go to the respective folder as shown inside the red frame in the above picture ,i.e, &#8220;<em>Device Collections &gt; Desktop Team &gt; Application Deployment Collections</em>&#8221; &gt; Application name &gt; Application&nbsp; Installation &gt; Deploy Device item. Now right click on the options to select &#8220;<em>Add Resources</em>&#8221; , type in the PC name here to push the application install which might take time to install on the remote system. Also click on &#8220;<em>Client Notifications &gt; Evaluate Application Deployments</em>&#8221; to cross check the installation.</p>
<p>Configuration manager can be configured to deploy content to a device based on the primary device setting.</p>
<p><strong>Proxy Master &amp; Proxy Pro Host Control Panel:</strong><br />
PROXY Pro Master is a program developed by Proxy Networks. It allows administrator to view and operate PROXY Pro Hosts. PROXY Pro Host application enables the desktop/laptop of a Windows PC or server to be viewed and controlled remotely. As shown in the below figure, five devices can be viewed to be online and can be controlled by the administrator by clicking on the respective item to remotely perform any activity on the user&#8217;s PC. In case we want to access the PC which is not displayed in the list, just type in the PC name or IP address in the &#8220;Station&#8221; box to search the PC and remotely login to the online PC.<strong><br />
</strong></p>
<div id="attachment_1351" style="width: 536px" class="wp-caption aligncenter"><img loading="lazy" decoding="async" aria-describedby="caption-attachment-1351" class="wp-image-1351 size-full" src="https://sampathblogs.online/wp-content/uploads/2020/01/proxy.jpg" alt="" width="526" height="288" srcset="https://sampathblogs.online/wp-content/uploads/2020/01/proxy.jpg 526w, https://sampathblogs.online/wp-content/uploads/2020/01/proxy-300x164.jpg 300w" sizes="auto, (max-width: 526px) 100vw, 526px" /><p id="caption-attachment-1351" class="wp-caption-text">Proxy Pro Master Application</p></div>
<p>Proxy Pro Host Control Panel is basically installed on all the PCs. The client/user access permission can be set so that the administrator can remotely access the PC with/without permission. Here the client/user PC name can be changed on the user&#8217;s PC so that we should be able to recognize the correct user name on the Proxy master window while remoting on to the user&#8217;s system.</p>
<p><strong>ForeScout CounterACT:</strong><br />
In response to enhanced client security requirements, a new technology to protect the firm’s network from unauthorized computers and other devices. Such devices could be used to gain access to sensitive data belonging to the firm and clients, so going forward only devices which are recognized as our company supplied devices will be able to gain network access.<strong><br />
</strong></p>
<div id="attachment_1293" style="width: 974px" class="wp-caption aligncenter"><img loading="lazy" decoding="async" aria-describedby="caption-attachment-1293" class="wp-image-1293 size-full" src="https://sampathblogs.online/wp-content/uploads/2020/01/forescout.jpg" alt="" width="964" height="563" srcset="https://sampathblogs.online/wp-content/uploads/2020/01/forescout.jpg 964w, https://sampathblogs.online/wp-content/uploads/2020/01/forescout-300x175.jpg 300w, https://sampathblogs.online/wp-content/uploads/2020/01/forescout-768x449.jpg 768w, https://sampathblogs.online/wp-content/uploads/2020/01/forescout-945x552.jpg 945w, https://sampathblogs.online/wp-content/uploads/2020/01/forescout-600x350.jpg 600w" sizes="auto, (max-width: 964px) 100vw, 964px" /><p id="caption-attachment-1293" class="wp-caption-text">ForeScout Application</p></div>
<p>ForeScout will be enabled and lock out machines that do not pass internal compliance: If any of these applications / key is not present or modified(not to standard) ForeScout will go ahead and lock the machine out of the network.<br />
•Tanium (Investigation Software)<br />
•Symantec EndPoint (Antivirus)<br />
•Cylance (Antivirus)<br />
•Cyber Reason (Investigation Software)<br />
•A registry key</p>
<p>In case of any PC blockage due to known modifications or issues which can be checked under the <em>compliance</em> tab at the center of the screen, the blacklisted PC can whitelisted on the ForeScout Application by the administrator.</p>
<p><strong>Cisco IP User phone:</strong><br />
Cisco Unified Communications Manager (CUCM) administrative page is accessed to perform moves, adds, and changes of <a href="https://sampathblogs.online/2019/01/25/cisco-unified-ip-phone-a-basic-setup-guide/" target="_blank" rel="noopener noreferrer">Cisco IP phones</a>, while configuring users and associating them with phones. Configuring simple features, such as DND, Music on Hold, as well as access to CUCM user web pages can be done. Cisco Expansion module configuration can also be done using CUCM.</p>
<p>Cisco Unity Connection Administration tool is used in most of the administrative tasks such as, customizing user settings(voice messaging, mailbox storage etc) and implementing a call management plan. Unity Connection Administration also provides access to several other tools including the Bulk Administration Tool (BAT), Custom Keypad Mapping, Task Management, and Migration Utilities.&nbsp;<strong><br />
</strong></p>
<p>We already know that IP Phones connect to the computer networks and they do so through VLANs similar to PCs. To brief about VLANs, they are a method of creating logically-independent networks within a huge network interconnected through switches. A VLAN consists of a network of computers that behave as if connected to the same wire &#8211; even though they may actually be physically connected to different segments of a LAN. Several VLANs can co-exist within such a network. This helps in reducing the broadcast domain and therefore the effects of broadcast storms, worms and viruses, and Denial of Service (DoS) attacks. VLANs are therefore often deployed to improve the overall system performance and availability, which are important security considerations. IP Phone connection illustration: Cisco IP Phone connect to PoE network point through LAN cable which inturn connects to VLAN10(Layer 2 segment) port in the server room.</p>
<p><strong>Mobile Device Management:</strong><br />
The IBM® MaaS360® Mobile Device Management (SaaS) is an enterprise mobility management (EMM) platform that provides visibility and control of smartphones and tablets in the enterprise. The IBM MaaS360 software supports devices such as iPhone, iPad, Android, and Windows Phone.</p>
<div id="attachment_1320" style="width: 977px" class="wp-caption aligncenter"><img loading="lazy" decoding="async" aria-describedby="caption-attachment-1320" class="wp-image-1320 size-full" src="https://sampathblogs.online/wp-content/uploads/2020/01/maas.jpg" alt="" width="967" height="504" srcset="https://sampathblogs.online/wp-content/uploads/2020/01/maas.jpg 967w, https://sampathblogs.online/wp-content/uploads/2020/01/maas-300x156.jpg 300w, https://sampathblogs.online/wp-content/uploads/2020/01/maas-768x400.jpg 768w, https://sampathblogs.online/wp-content/uploads/2020/01/maas-945x493.jpg 945w, https://sampathblogs.online/wp-content/uploads/2020/01/maas-600x313.jpg 600w" sizes="auto, (max-width: 967px) 100vw, 967px" /><p id="caption-attachment-1320" class="wp-caption-text">IBM MaaS360</p></div>
<p>The above figure shows the administrative screen of MaaS360 application. Either the firm issued mobile device or the self owned device can be configured using this application for any user. Once the device registration link is accessed from the mobile device, MaaS360 mailbox will be installed automatically which can be used to check corporate emails or perform secure browsing with the MaaS browser.</p>
<p><strong>Power Outage Support:</strong><br />
Sometimes there will be a need to switch off all the devices of the organization which includes the server room as well due to some maintenance activity or power outage. So one needs to make sure each employee switches off his/her PC and other associated devices beforehand. Moving on to the server room activity of the branch/main office, the virtual machines(VM) running on the servers need to be turned off followed by the shutdown of servers with UCS and finally the storage array devices using the concerned application by IT support staff with administrative access. During power outage, the DNS server routing will be changed to <a href="https://sampathblogs.online/2018/05/05/understanding-data-center-and-service-desk-operations/">data center</a> from the local server. Once the outage activity is complete, the storage arrays, servers and VMs need to be restored and the network access need to be checked by turning on the PC and other associated devices.</p>
<p>The Cisco Unified Computing System is a next-generation data center platform that unites compute, network, storage access, and virtualization into a cohesive system designed to reduce total cost of ownership (TCO) and increase business agility. Virtualization helps data centers the most when servers are configured into resource pools that can be harnessed on demand to meet fluctuating workload requirements; deploy new applications without tying them to specific hardware; and move virtual machines between servers to balance workloads, meet service-level agreements (SLAs), or prepare a server for scheduled downtime. Cisco UCS Manager transforms the resources of the Cisco Unified Computing System into a single cohesive system that is ideal for establishing resource pools for virtualized environments.</p>
<p>Finally coming to one of the most important Microsoft service ,i.e, the directory service that Microsoft developed for the Windows domain networks called the <strong>Active Directory(AD)</strong> as mentioned in the <em>OS image install</em> section. Starting with Windows Server 2008, Active Directory became an umbrella title for a broad range of directory-based identity-related services. A server running Active Directory Domain Services (AD DS) is called a domain controller. It authenticates and authorizes all users and computers in a Windows domain type network—assigning and enforcing security policies for all computers and installing or updating software. For example, when a user logs into a computer that is part of a Windows domain, Active Directory checks the submitted password and determines whether the user is a system administrator or normal user. Also, it allows management and storage of information, provides authentication and authorization mechanisms, and establishes a framework to deploy other related services.</p>
<p><strong><em>Credits:</em><br />
</strong><em>Knowledge, Experience</em></p>
]]></content:encoded>
					
					<wfw:commentRss>https://sampathblogs.online/2018/12/enterprise-it-infrastructure-support/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>IT Hardware : Understanding the Building Blocks</title>
		<link>https://sampathblogs.online/2018/09/it-hardware-understanding-the-building-blocks/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=it-hardware-understanding-the-building-blocks</link>
					<comments>https://sampathblogs.online/2018/09/it-hardware-understanding-the-building-blocks/#respond</comments>
		
		<dc:creator><![CDATA[mail2sampath]]></dc:creator>
		<pubDate>Mon, 24 Sep 2018 15:00:01 +0000</pubDate>
				<category><![CDATA[Technical]]></category>
		<category><![CDATA[Hardware]]></category>
		<guid isPermaLink="false">http://excelall.byethost32.com/?p=677</guid>

					<description><![CDATA[Introduction In information technology, hardware is the physical aspect of computers, network devices and others. The term is a way to distinguish the &#8220;box&#8221; and the electronic circuitry and components of a computer/network device from the program you put in... <a class="more-link" href="https://sampathblogs.online/2018/09/it-hardware-understanding-the-building-blocks/">Continue Reading &#8594;</a>]]></description>
										<content:encoded><![CDATA[<h3>Introduction</h3>
<p>In information technology, hardware is the physical aspect of computers, network devices and others. The term is a way to distinguish the &#8220;box&#8221; and the electronic circuitry and components of a computer/network device from the program you put in it to make it do things. The program came to be known as the software.</p>
<p>Software or programming can easily be varied. You can put an entirely new program in the hardware and make it create an entirely new experience for the user. You can, however, change the modular configurations that most computers come with by adding new adapters or cards that extend the computer&#8217;s capabilities. Hardware being a collective term, includes computers and its peripheral devices, cables, power devices, display devices, telecom equipment to name a few.</p>
<h3>Basics</h3>
<h4><strong>Components</strong></h4>
<p>Let&#8217;s make sure that we know the markings for all the types of resistors, capacitors, ICs, and everything else required to know.</p>
<p><strong>Resistors</strong></p>
<p><em>Through Hole Resistors</em><br />
Standard resistors are NOT polarized and can be placed in the PCB either way round.The most common have four bands. Bands 1 and 2 identify the first two digits, band 3 is the Multiplier and band 4 is the tolerance (normally Gold 5%). The through hole technology refers to the use of leads on the components that are inserted into holes drilled in <a title="Printed circuit board" href="https://en.wikipedia.org/wiki/Printed_circuit_board">printed circuit boards</a> (PCB) and soldered to pads on the opposite side.</p>
<div id="attachment_1339" style="width: 505px" class="wp-caption aligncenter"><img loading="lazy" decoding="async" aria-describedby="caption-attachment-1339" class="wp-image-1339 size-full" src="https://sampathblogs.online/wp-content/uploads/2020/01/ohm1.jpg" alt="" width="495" height="491" srcset="https://sampathblogs.online/wp-content/uploads/2020/01/ohm1.jpg 495w, https://sampathblogs.online/wp-content/uploads/2020/01/ohm1-300x298.jpg 300w, https://sampathblogs.online/wp-content/uploads/2020/01/ohm1-150x150.jpg 150w" sizes="auto, (max-width: 495px) 100vw, 495px" /><p id="caption-attachment-1339" class="wp-caption-text">Resistor Colour Codes</p></div>
<p><em>SMD Resistors</em><br />
SMD resistors or Surface Mount Device resistors are rectangular in shape. These chip resistors [Fig:<img loading="lazy" decoding="async" class="alignnone wp-image-1371" src="https://sampathblogs.online/wp-content/uploads/2020/01/smd.jpg" alt="" width="37" height="20">] have metallised areas at either end of the body and this enables them to make contact with the printed circuit board through the solder. A three figure SMD resistor coding system is the one that is normally used. The first two figures in the code indicate the significant figures, and the third is a multiplier. This is the same as the coloured rings used for wired resistors, except that actual numbers are used instead of colours.</p>
<p>When resistance value falls below ten ohms, the letter &#8220;R&#8221; is used to indicate the position of the decimal point. Also a four digit marking is used for high tolerance resistors.</p>
<p><strong>Capacitors</strong></p>
<p><em>Electrolytic Capacitors</em><br />
Electrolytic capacitors are polarized devices which means they must be inserted with the correct polarity. Electrolytic have one lead longer than the other and this denotes the POSITIVE lead and on the opposite side of body is a black band with a minus sign.</p>
<p><em>Ceramic Capacitors</em><br />
Ceramic Capacitors are non-polar device, that means they do no have polarities. So we can connect it in any direction on a circuit board.</p>
<p><em>Surface Mount Ceramic Capacitors</em><br />
Surface-mount components like MLCCs(Multi Layer Ceramic Capacitors) are non-polar and are cheaper (because they have no leads) and a little bit smaller than their counterparts with leads, and they need no holes in the PCB, a second reduction of costs. They are designed to be handled by machines rather than by humans, to reduce costs.</p>
<div id="attachment_1255" style="width: 640px" class="wp-caption aligncenter"><img loading="lazy" decoding="async" aria-describedby="caption-attachment-1255" class="wp-image-1255 size-full" src="https://sampathblogs.online/wp-content/uploads/2020/01/caps.jpg" alt="" width="630" height="317" srcset="https://sampathblogs.online/wp-content/uploads/2020/01/caps.jpg 630w, https://sampathblogs.online/wp-content/uploads/2020/01/caps-300x151.jpg 300w, https://sampathblogs.online/wp-content/uploads/2020/01/caps-600x302.jpg 600w" sizes="auto, (max-width: 630px) 100vw, 630px" /><p id="caption-attachment-1255" class="wp-caption-text">Capacitor codes and markings</p></div>
<p><strong>ICs</strong></p>
<p><em>Programmable Logic Device</em><br />
A PLD, or programmable logic device, is an electronic component that is used in order to build digital circuits that are reprogrammable. The PLD types are Complex Programmable Logic Device(CPLD), Field Programmable Gate Array(FPGA) etc., which you will be able to choose based on their technical attributes and your search results will be narrowed to match your specific programmable logic device application complexity needs. There are a lot of manufacturers like Xilinx, Altera, Lattice, Atmel etc., who have a range of surface mount or through hole ICs to choose from with their own specific markings.</p>
<p><em>Platform Flash PROM</em><br />
The in-system programmable configuration Programmable ROMs are basically used in combination with FPGA. Unlike CPLDs which are EEPROM based, FPGAs lose their configuration on power reboot, hence an additional flash memory would be required on board to configure it each time on power up. There are many Flash ROMs available and usually the PLD manufacturers release their own PROMs with specific marking which represents different memory capacities.</p>
<p><em>PSoC Mixed Signal Array</em><br />
PSoC is an FPGA that includes programmable analog capabilities as well. They are generally expensive and are largely limited to fairly narrow application domains where the use of external analog components is undesirable from either a board space or power consumption perspective.PSoC devices include a fast CPU, Flash program memory, SRAM data memory, and configurable blocks of analog, digital logic and IO are included in a range of convenient pinouts and packages.</p>
<div id="attachment_1261" style="width: 564px" class="wp-caption aligncenter"><img loading="lazy" decoding="async" aria-describedby="caption-attachment-1261" class="wp-image-1261 size-full" src="https://sampathblogs.online/wp-content/uploads/2020/01/compo1.jpg" alt="" width="554" height="453" srcset="https://sampathblogs.online/wp-content/uploads/2020/01/compo1.jpg 554w, https://sampathblogs.online/wp-content/uploads/2020/01/compo1-300x245.jpg 300w" sizes="auto, (max-width: 554px) 100vw, 554px" /><p id="caption-attachment-1261" class="wp-caption-text">Integrated Circuit (Through Hole/SMD)</p></div>
<p><em>Oscillators</em><br />
Most electronic circuitry uses the oscillator when there is a requirement of clock signal. This includes the FPGA board as well.The oscillators come in 4 pins package and contain the electronic required to oscillate, so that an oscillator generates a clock by itself when it is powered-up.They are selected based on the circuit clock frequency requirement like 25MHz, 50MHz etc.The metal case of canned oscillators is connected to ground and provides shielding.</p>
<p><em>Transceivers</em><br />
The Transceiver(Eg:RS232) is a hardware layer protocol converter IC. Commonly known as a RS-232 Transceiver, it consists of a pair of drivers and a pair of receivers. At a very basic level, the driver converts TTL or CMOS voltage levels of the circuitry to TIA/EIA-232-E levels, which are compatible for serial port communications. The receiver performs the reverse conversion.</p>
<p><em>Buffer/Driver</em><br />
Buffer ICs with open-collector outputs form the basis of a number of clever tricks for level-shifting and interfacing between different types of logic(TTL/CMOS), and from logic to other types of electronic circuits. So, where with most digital electronics, the output of a buffer (or other logic gate) is a “high” or “low” voltage, an open collector has two different states: Output transistor disabled or output transistor enabled.This, therefore, is a neat way to build a logic-level shifter where the output when disabled can be pulled up to any desired voltage like 3.3V, 5V, 12V etc.</p>
<p><strong>Other Components</strong></p>
<p>There are various other components which may be required for building a circuit. Some of which are shown in the figure below.</p>
<div id="attachment_1328" style="width: 685px" class="wp-caption aligncenter"><img loading="lazy" decoding="async" aria-describedby="caption-attachment-1328" class="wp-image-1328 size-full" src="https://sampathblogs.online/wp-content/uploads/2020/01/Misc1.jpg" alt="" width="675" height="212" srcset="https://sampathblogs.online/wp-content/uploads/2020/01/Misc1.jpg 675w, https://sampathblogs.online/wp-content/uploads/2020/01/Misc1-300x94.jpg 300w, https://sampathblogs.online/wp-content/uploads/2020/01/Misc1-600x188.jpg 600w" sizes="auto, (max-width: 675px) 100vw, 675px" /><p id="caption-attachment-1328" class="wp-caption-text">Other Components(Through Hole/SMD)</p></div>
<h4><strong>I/O Ports</strong></h4>
<p>I/O stands for Input and Output. In computing, input/output or I/O is the communication between an information processing system (such as a computer) and the outside world, possibly a human or another information processing system. Inputs are the signals or data received by the system, and outputs are the signals or data sent from it. A few of the I/O ports are as follows;</p>
<p><strong>RS232</strong><br />
Despite the development of newer digital interface standards, the humble RS-232 serial port is still a very popular means of data transfer. It is also called &#8220;EIA-232&#8221;. The purpose and timing of the signal lines and the connectors are to be defined (D-sub 25-pin or D-sub 9-pin). RS-232C is a short distance(15m), full duplex, 1:1 connection standard. Check the below figure for the details on pin signal assignments.</p>
<div id="attachment_1358" style="width: 493px" class="wp-caption aligncenter"><img loading="lazy" decoding="async" aria-describedby="caption-attachment-1358" class="wp-image-1358 size-full" src="https://sampathblogs.online/wp-content/uploads/2020/01/rs232.jpg" alt="" width="483" height="388" srcset="https://sampathblogs.online/wp-content/uploads/2020/01/rs232.jpg 483w, https://sampathblogs.online/wp-content/uploads/2020/01/rs232-300x241.jpg 300w" sizes="auto, (max-width: 483px) 100vw, 483px" /><p id="caption-attachment-1358" class="wp-caption-text">RS232 pin layout and connection</p></div>
<p><strong>PCI-X</strong><br />
Stands for &#8220;Peripheral Component Interconnect Extended.&#8221; Once again, &#8220;Ex&#8221; is abbreviated with an &#8220;X&#8221; instead of an &#8220;E.&#8221; Most desktop computers include one or more PCI slots for expanding the computer&#8217;s I/O capabilities. Common PCI cards include network cards, sound cards, and video cards. PCI-X cards are available at speeds of 66MHz,133MHz &amp; 533MHz compared to the earlier PCI which supported only 66MHz data speed.PCI-X cards can only be installed in PCI-X slots, but the slots themselves are backwards compatible with PCI cards.Going forward, PCIe ,i.e, PCI express, the high-speed serial computer expansion bus standard, is expected to replace PCI &amp; PCI-X standards.</p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-1343 size-full" src="https://sampathblogs.online/wp-content/uploads/2020/01/PCIX.jpg" alt="" width="400" height="179" srcset="https://sampathblogs.online/wp-content/uploads/2020/01/PCIX.jpg 400w, https://sampathblogs.online/wp-content/uploads/2020/01/PCIX-300x134.jpg 300w" sizes="auto, (max-width: 400px) 100vw, 400px" /></p>
<p><strong>JTAG</strong><br />
Joint Test Action Group, also known as JTAG, is the common name for IEEE std 1149.1. This standard defines a particular method for testing board-level interconnects, which is also called Boundary Scan. In short, JTAG was created as a way to test for common problems, but lately has become a way of configuring devices. FPGA manufacturers allow configuring the FPGA through JTAG connector, and use the JTAG signals inside the FPGA core.</p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-1313 size-full" src="https://sampathblogs.online/wp-content/uploads/2020/01/jtag2.jpg" alt="" width="584" height="212" srcset="https://sampathblogs.online/wp-content/uploads/2020/01/jtag2.jpg 584w, https://sampathblogs.online/wp-content/uploads/2020/01/jtag2-300x109.jpg 300w" sizes="auto, (max-width: 584px) 100vw, 584px" /></p>
<p><strong>Other Ports</strong><em><br />
</em>There are so many different ways to interface to TVs, Computers, monitors and other electronic devices these days — and it can get confusing, especially because so many of these ports and connectors have become obsolete over the years. The ones which can still be seen are USB, HDMI, DVI, Display Port, VGA to name a few.<em><br />
</em></p>
<h4><strong>Test Equipments</strong></h4>
<p><em>DC Power Supply</em><br />
As the name says, DC power supply provides the DC voltage to power the circuit. The advantage of using a programmable power supply is that it can cater to circuits with varying ranges of voltages and current requirements.</p>
<p><em>Signal/Function generator</em><br />
A function generator is usually a piece of electronic test equipment or software used to generate different types of electrical waveforms over a wide range of frequencies.They are used in the development, test and repair of electronic equipment.Some of the most common waveforms produced by the function generator are the sine wave , square wave, triangular wave and sawtooth shapes.Another feature included on many function generators is the ability to add a DC offset.</p>
<p><em>Multi-meter</em><br />
A multimeter or a multitester is an electronic measuring tool that is a combination of several tools in one unit. It usually includes an ammeter, voltmeter, and ohmmeter. Digital multimeters are sometimes called DMM too. Often they include a number of additional specialized features or advanced options. Technicians with specific needs, therefore, can seek out a model targeted for particular tasks.</p>
<div id="attachment_1381" style="width: 936px" class="wp-caption aligncenter"><img loading="lazy" decoding="async" aria-describedby="caption-attachment-1381" class="wp-image-1381 size-full" src="https://sampathblogs.online/wp-content/uploads/2020/01/test1.jpg" alt="" width="926" height="563" srcset="https://sampathblogs.online/wp-content/uploads/2020/01/test1.jpg 926w, https://sampathblogs.online/wp-content/uploads/2020/01/test1-300x182.jpg 300w, https://sampathblogs.online/wp-content/uploads/2020/01/test1-768x467.jpg 768w, https://sampathblogs.online/wp-content/uploads/2020/01/test1-600x365.jpg 600w" sizes="auto, (max-width: 926px) 100vw, 926px" /><p id="caption-attachment-1381" class="wp-caption-text">Test Equipments</p></div>
<p><em>CRO</em><br />
An oscilloscope or Cathode Ray Oscilloscope, is a type of electronic test instrument that allows observation of varying signal voltages, usually as a two-dimensional plot of one or more signals as a function of time. Oscilloscopes are used to observe the change of an electrical signal over time, such that voltage and time describe a shape which is continuously graphed against a calibrated scale. The observed waveform can be analyzed for such properties as amplitude, frequency, rise time, time interval, distortion and others. However, oscilloscopes are somewhat limited with only two or four input channels to correlate a small number of digital, analog and serial signals.</p>
<p><em>Logic Analyzers</em><br />
A logic analyzer is an electronic instrument that captures and displays multiple signals(&gt;34 channels) from a digital system or a complex digital circuit. A logic analyzer may convert the captured data into timing diagrams, protocol decodes, state machine traces, assembly language, or may correlate assembly with source-level software. Logic Analyzers have advanced triggering capabilities, and are useful when a user needs to see the timing relationships between many signals in a digital system.</p>
<h3>Board build</h3>
<h4><strong>Design Schematics</strong></h4>
<p>Circuit diagrams are designed based on specifications and entered using an easy to use schematic editor like Design works. Component symbols chosen from the component bar are positioned, moved, rotated and/or mirrored on the screen by the mouse.You can open any number of circuit files or sub-circuits, cut, copy and paste circuit segments from one circuit into another, and, of course analyze any of the currently open circuits using waveforms.</p>
<div id="attachment_1259" style="width: 906px" class="wp-caption aligncenter"><img loading="lazy" decoding="async" aria-describedby="caption-attachment-1259" class="wp-image-1259 size-full" src="https://sampathblogs.online/wp-content/uploads/2020/01/ckt1.jpg" alt="" width="896" height="682" srcset="https://sampathblogs.online/wp-content/uploads/2020/01/ckt1.jpg 896w, https://sampathblogs.online/wp-content/uploads/2020/01/ckt1-300x228.jpg 300w, https://sampathblogs.online/wp-content/uploads/2020/01/ckt1-768x585.jpg 768w, https://sampathblogs.online/wp-content/uploads/2020/01/ckt1-600x457.jpg 600w" sizes="auto, (max-width: 896px) 100vw, 896px" /><p id="caption-attachment-1259" class="wp-caption-text">Part of a Schematic (Circuit editor window in red frame)</p></div>
<p>Apart from the schematic data, the schematic editor can be used to generate bill of material list and the netlist. The netlist file(mostly) or schematic file(some cases) can be used as an input to the PCB layout generation tool depending on the <span id="hs_cos_wrapper_post_body" class="hs_cos_wrapper hs_cos_wrapper_meta_field hs_cos_wrapper_type_rich_text" data-hs-cos-general-type="meta_field" data-hs-cos-type="rich_text">design bureau</span> requirements.</p>
<div id="attachment_1334" style="width: 966px" class="wp-caption aligncenter"><img loading="lazy" decoding="async" aria-describedby="caption-attachment-1334" class="wp-image-1334 size-full" src="https://sampathblogs.online/wp-content/uploads/2020/01/netlst.jpg" alt="" width="956" height="437" srcset="https://sampathblogs.online/wp-content/uploads/2020/01/netlst.jpg 956w, https://sampathblogs.online/wp-content/uploads/2020/01/netlst-300x137.jpg 300w, https://sampathblogs.online/wp-content/uploads/2020/01/netlst-768x351.jpg 768w, https://sampathblogs.online/wp-content/uploads/2020/01/netlst-945x432.jpg 945w, https://sampathblogs.online/wp-content/uploads/2020/01/netlst-600x274.jpg 600w" sizes="auto, (max-width: 956px) 100vw, 956px" /><p id="caption-attachment-1334" class="wp-caption-text">BOM &amp; Netlist</p></div>
<h4><strong>PCB layout to the Final Board</strong></h4>
<p>PCB layers are the determining factor in the power and capacity of a printed circuit board. People often wonder whether a one-layer PCB will suffice, or if it is better to go with a two- or four-layer PCB.The number of layers largely depend on your budget and functional needs in a PCB.Anything more than 2 layers is referred to as a multilayered board.</p>
<p>The layout or the film diagram(4 layers) of the circuit as shown in the below figure will be generated by the design bureau which needs to be checked before giving a go ahead to the board generation.The visual continuity check can done by taking the netlist as a reference and would be required since the netlist might have been modified by the vendor due to compatibility issues with their PCB film generation tool.</p>
<div id="attachment_1341" style="width: 972px" class="wp-caption aligncenter"><img loading="lazy" decoding="async" aria-describedby="caption-attachment-1341" class="wp-image-1341 size-full" src="https://sampathblogs.online/wp-content/uploads/2020/01/pcb.jpg" alt="" width="962" height="437" srcset="https://sampathblogs.online/wp-content/uploads/2020/01/pcb.jpg 962w, https://sampathblogs.online/wp-content/uploads/2020/01/pcb-300x136.jpg 300w, https://sampathblogs.online/wp-content/uploads/2020/01/pcb-768x349.jpg 768w, https://sampathblogs.online/wp-content/uploads/2020/01/pcb-945x429.jpg 945w, https://sampathblogs.online/wp-content/uploads/2020/01/pcb-600x273.jpg 600w" sizes="auto, (max-width: 962px) 100vw, 962px" /><p id="caption-attachment-1341" class="wp-caption-text">PCB Layers Layout</p></div>
<p>Making sure your schematic is correct and when you are done with the layout check, it is time to get your PCB design ready for manufacturing. So, once your PCB returns from the manufacturing with the components mounted , it looks like the one shown in the figure below(part of a board). You wanna make sure you do the necessary steps for a good board bring-up. Failing to do it would result in a dead or fried board. Or it could be worse – a board that looks like it works, but actually has hidden hardware issues that only crop up later when developing firmware/software, which are very difficult to debug.</p>
<div id="attachment_1342" style="width: 271px" class="wp-caption aligncenter"><img loading="lazy" decoding="async" aria-describedby="caption-attachment-1342" class="wp-image-1342 size-full" src="https://sampathblogs.online/wp-content/uploads/2020/01/pcb-1.jpg" alt="" width="261" height="427" srcset="https://sampathblogs.online/wp-content/uploads/2020/01/pcb-1.jpg 261w, https://sampathblogs.online/wp-content/uploads/2020/01/pcb-1-183x300.jpg 183w" sizes="auto, (max-width: 261px) 100vw, 261px" /><p id="caption-attachment-1342" class="wp-caption-text">Final Board</p></div>
<p>The first check you want to do is <em>continuity testing</em>. This might be daunting because there are many pads on an average PCB and checking each of the connection with a multimeter would be cumbersome. It will be over quicker than you’d think, and it’s very worth your time to catch issues early on like a pad isn’t connected to a desired power rail, or that two power rails are shorted to each other etc.&nbsp;The second check you want to do is a <em>visual inspection</em>. If you have small parts on your PCB, this is much easier with a magnifying glass. This inspection would detect issues like un-drilled vias and through holes, shorted pads and traces etc.</p>
<p>After you’ve done as many checks as you can, take a deep breath and power it on using the programmable power supply with the required voltage and current. If you have done your checks properly you should be confident of the board powering up without any issues.</p>
<h3>Implementing PLD designs</h3>
<p>Before starting with the CPLD/FPGA coding, we need to create a design document based on which can start coding.The design document should detail on the low level FPGA/CPLD architecture which should contain the description of functionalities of each of the modules, pin details, internal architecture, implementation details and timing analysis of the block as a whole.Let us consider implementing a simple UART with only the receiver functionality, the block diagram of which is shown as below;</p>
<div id="attachment_1386" style="width: 503px" class="wp-caption aligncenter"><img loading="lazy" decoding="async" aria-describedby="caption-attachment-1386" class="wp-image-1386 size-full" src="https://sampathblogs.online/wp-content/uploads/2020/01/uart2.jpg" alt="" width="493" height="317" srcset="https://sampathblogs.online/wp-content/uploads/2020/01/uart2.jpg 493w, https://sampathblogs.online/wp-content/uploads/2020/01/uart2-300x193.jpg 300w" sizes="auto, (max-width: 493px) 100vw, 493px" /><p id="caption-attachment-1386" class="wp-caption-text">Block Diagram</p></div>
<h4><strong>Description &amp; Coding</strong></h4>
<p>A UART is one of the simplest methods of talking to your FPGA. It can be used to send commands from a computer to an FPGA(here) and vice versa. A UART is an asynchronous interface.In any asynchronous interface, the first thing you need to know is when in time you should sample (look at) the data. If you do not sample the data at the right time, you might see the wrong data. In order to receive your data correctly, the transmitter and receiver must agree on the baud rate. The baud rate is the rate at which the data is transmitted.</p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-1359 size-full" src="https://sampathblogs.online/wp-content/uploads/2020/01/rs232-1.jpg" alt="" width="685" height="401" srcset="https://sampathblogs.online/wp-content/uploads/2020/01/rs232-1.jpg 685w, https://sampathblogs.online/wp-content/uploads/2020/01/rs232-1-300x176.jpg 300w, https://sampathblogs.online/wp-content/uploads/2020/01/rs232-1-600x351.jpg 600w" sizes="auto, (max-width: 685px) 100vw, 685px" /></p>
<p>The FPGA is continuously sampling the serial data input line. Once it sees the line transition from high to low, it knows that a UART data word is coming. This first transition indicates the start bit. Once the beginning of the start bit is found, the FPGA waits for one half of a bit period. This ensures that the middle of the data bit gets sampled. From then on, the FPGA just needs to wait one bit period (as specified by the baud rate) and sample the rest of the data. The FSM below depicts the whole cycle of operations.</p>
<div id="attachment_1295" style="width: 685px" class="wp-caption aligncenter"><img loading="lazy" decoding="async" aria-describedby="caption-attachment-1295" class="wp-image-1295 size-full" src="https://sampathblogs.online/wp-content/uploads/2020/01/fsm1.jpg" alt="" width="675" height="398" srcset="https://sampathblogs.online/wp-content/uploads/2020/01/fsm1.jpg 675w, https://sampathblogs.online/wp-content/uploads/2020/01/fsm1-300x177.jpg 300w, https://sampathblogs.online/wp-content/uploads/2020/01/fsm1-600x354.jpg 600w" sizes="auto, (max-width: 675px) 100vw, 675px" /><p id="caption-attachment-1295" class="wp-caption-text">UART Receiver State Machine</p></div>
<p><strong>VHDL Implementation</strong></p>
<pre class="EnlighterJSRAW" data-enlighter-language="vhdl">-- This file contains the UART Receiver.  This receiver is able to
-- receive 8 bits of serial data, one start bit, one stop bit,
-- and no parity bit.  When receive is complete o_rx_dv will be
-- driven high for one clock cycle.
-- 
-- Set Generic g_CLKS_PER_BIT as follows:
-- Example: 16.9344 MHz Clock, 2400 baud UART
-- (16934400)/(2400) = 7056 Clocks per bit
--
library ieee;
use ieee.std_logic_1164.ALL;
use ieee.numeric_std.all;
 
entity UART_RX is
  generic (
    g_CLKS_PER_BIT : integer := 7056     -- Needs to be set correctly
    );
  port (
    i_Clk       : in  std_logic;
    i_RX_Serial : in  std_logic;
    RST_L       : in  std_logic;
    o_RX_DV     : out std_logic;
    o_RX_Byte   : out std_logic_vector(7 downto 0)
    );
end UART_RX;
 
 
architecture rtl of UART_RX is
 
  type t_SM_Main is (s_Idle, s_RX_Start_Bit, s_RX_Data_Bits,
                     s_RX_Stop_Bit, s_Cleanup);
  signal r_SM_Main : t_SM_Main := s_Idle;
 
  signal r_RX_Data_R : std_logic := '0';
  signal r_RX_Data   : std_logic := '0';
   
  signal r_Clk_Count : integer range 0 to g_CLKS_PER_BIT-1 := 0;
  signal r_Bit_Index : integer range 0 to 7 := 0;  -- 8 Bits Total
  signal r_RX_Byte   : std_logic_vector(7 downto 0) := (others =&gt; '0');
  signal r_RX_DV     : std_logic := '0';
   
begin
 
  -- Purpose: Double-register the incoming data.
  -- This allows it to be used in the UART RX Clock Domain.
  -- (It removes problems caused by metastabiliy)
  p_SAMPLE : process (i_Clk, RST_L)
  begin
    if&nbsp;RST_L&nbsp;=&nbsp;'0' then
      r_RX_DV&nbsp;    &lt;=&nbsp;'0';&nbsp;
      r_Clk_Count&nbsp;&lt;=&nbsp;0;
      r_RX_Byte   &lt;= (others&nbsp;=&gt;&nbsp;'0');
    elsif rising_edge(i_Clk) then
      r_RX_Data_R &lt;= i_RX_Serial;
      r_RX_Data   &lt;= r_RX_Data_R;
    end if;

    
  end process p_SAMPLE;
   
 
  -- Purpose: Control RX state machine
  p_UART_RX : process (i_Clk)
  begin
    if rising_edge(i_Clk) then
         
      case r_SM_Main is
 
        when s_Idle =&gt;
          r_RX_DV     &lt;= '0';
          r_Clk_Count &lt;= 0;
          r_Bit_Index &lt;= 0;
 
          if r_RX_Data = '0' then       -- Start bit detected
            r_SM_Main &lt;= s_RX_Start_Bit;
          else
            r_SM_Main &lt;= s_Idle;
          end if;
 
           
        -- Check middle of start bit to make sure it's still low
        when s_RX_Start_Bit =&gt;
          if r_Clk_Count = (g_CLKS_PER_BIT-1)/2 then
            if r_RX_Data = '0' then
              r_Clk_Count &lt;= 0;  -- reset counter since we found the middle
              r_SM_Main   &lt;= s_RX_Data_Bits;
            else
              r_SM_Main   &lt;= s_Idle;
            end if;
          else
            r_Clk_Count &lt;= r_Clk_Count + 1;
            r_SM_Main   &lt;= s_RX_Start_Bit;
          end if;
 
           
        -- Wait g_CLKS_PER_BIT-1 clock cycles to sample serial data
        when s_RX_Data_Bits =&gt;
          if r_Clk_Count &lt; g_CLKS_PER_BIT-1 then
            r_Clk_Count &lt;= r_Clk_Count + 1;
            r_SM_Main   &lt;= s_RX_Data_Bits;
          else
            r_Clk_Count            &lt;= 0;
            r_RX_Byte(r_Bit_Index) &lt;= r_RX_Data;
             
            -- Check if we have sent out all bits
            if r_Bit_Index &lt; 7 then
              r_Bit_Index &lt;= r_Bit_Index + 1;
              r_SM_Main   &lt;= s_RX_Data_Bits;
            else
              r_Bit_Index &lt;= 0;
              r_SM_Main   &lt;= s_RX_Stop_Bit;
            end if;
          end if;
 
 
        -- Receive Stop bit.  Stop bit = 1
        when s_RX_Stop_Bit =&gt;
          -- Wait g_CLKS_PER_BIT-1 clock cycles for Stop bit to finish
          if r_Clk_Count &lt; g_CLKS_PER_BIT-1 then
            r_Clk_Count &lt;= r_Clk_Count + 1;
            r_SM_Main   &lt;= s_RX_Stop_Bit;
          else
            r_RX_DV     &lt;= '1';
            r_Clk_Count &lt;= 0;
            r_SM_Main   &lt;= s_Cleanup;
          end if;
 
                   
        -- Stay here 1 clock
        when s_Cleanup =&gt;
          r_SM_Main &lt;= s_Idle;
          r_RX_DV   &lt;= '0';
 
             
        when others =&gt;
          r_SM_Main &lt;= s_Idle;
 
      end case;
    end if;
  end process p_UART_RX;
 
  o_RX_DV   &lt;= r_RX_DV;
  o_RX_Byte &lt;= r_RX_Byte;
   
end rtl;</pre>
<p>The code above uses one Start Bit, one Stop Bit, eight Data Bits, and no parity half-duplex communication. The IDE for either the Altera or Xilinx device enables analysis and synthesis of HDL designs, which makes the developer to compile their designs, perform timing analysis, examine RTL diagrams, simulate a design&#8217;s reaction to different stimuli, and configure the target device with the programmer. .</p>
<h4><strong>Functional Simulation</strong></h4>
<p>If you want to simulate your code (and you should) you need to use a testbench. The testbench below tests the above Receiver code. It is programmed to work at 2400 baud. Note that this test bench is for simulation only and cannot be synthesized into functional FPGA code. Scripting language like the Tcl/tk can be used to run the verification environment which consists of the source code, test bench and any other additional modules. ModelSim simulator is one of the most reliable simulators used by many to verify their complex VHDL/Verilog code designs.</p>
<p><strong>VHDL Testbench</strong></p>
<pre class="EnlighterJSRAW" data-enlighter-language="vhdl">library ieee;
use ieee.std_logic_1164.ALL;
use ieee.numeric_std.all;
 
entity uart_tb is
end uart_tb;
 
architecture behave of uart_tb is
  component uart_rx is
    generic (
      g_CLKS_PER_BIT : integer := 7056   -- Needs to be set correctly
      );
    port (
      i_clk       : in  std_logic;
      rst_l       : in  std_logic;
      i_rx_serial : in  std_logic;
      o_rx_dv     : out std_logic;
      o_rx_byte   : out std_logic_vector(7 downto 0)
      );
  end component uart_rx;


  -- Test Bench uses a 16.9344&nbsp;MHz Clock
  -- Want to interface to 2400 baud UART
  -- 16934400 / 2400 = 7056 Clocks Per Bit.

  constant c_CLKS_PER_BIT : integer := 7056;
 
  constant c_BIT_PERIOD : time := 417 us;

  signal r_CLOCK     : std_logic    := '0';
  signal r_RST       : std_logic;

  signal w_RX_DV     : std_logic;
  signal w_RX_BYTE   : std_logic_vector(7 downto 0);
  signal r_RX_SERIAL : std_logic := '1';

  -- Low-level byte-write
  procedure UART_WRITE_BYTE (
    i_data_in       : in  std_logic_vector(7 downto 0);
    signal o_serial : out std_logic) is
  begin
 
    -- Send Start Bit
    o_serial &lt;= '0';
    wait for c_BIT_PERIOD;
 
    -- Send Data Byte
    for ii in 0 to 7 loop
      o_serial &lt;= i_data_in(ii);
      wait for c_BIT_PERIOD;
    end loop;  -- ii
 
    -- Send Stop Bit
    o_serial &lt;= '1';
    wait for c_BIT_PERIOD;
  end UART_WRITE_BYTE;

begin

  -- Instantiate UART Receiver
  UART_RX_INST : uart_rx
    generic map (
      g_CLKS_PER_BIT =&gt; c_CLKS_PER_BIT
      )
    port map (
      i_clk       =&gt; r_CLOCK,
      rst_l       =&gt; r_RST,
      i_rx_serial =&gt; r_RX_SERIAL,
      o_rx_dv     =&gt; w_RX_DV,
      o_rx_byte   =&gt; w_RX_BYTE
      );
 
  r_CLOCK &lt;= not r_CLOCK after 50 ns;
  r_RST   &lt;= '1';
   
  process is
  begin
    -- Send a command/data to the UART
    wait until rising_edge(r_CLOCK);
    UART_WRITE_BYTE(X"69", r_RX_SERIAL);
    wait until rising_edge(r_CLOCK);
 
    -- Check that the correct command/data was received
    if w_RX_BYTE = X"69" then
      report "Test Passed - Correct Byte Received" severity note;
    else
      report "Test Failed - Incorrect Byte Received" severity note;
    end if;
 
    assert false report "Tests Complete" severity failure;
     
  end process;
   
end behave;</pre>
<p>Through the test bench code we are writing the data &#8220;0x69&#8221; and reading it which verifies the functionality of the UART receiver design. Also the o_RX_DV signal should be observed to go high once the stop bit is read.</p>
<div id="attachment_1403" style="width: 1124px" class="wp-caption aligncenter"><img loading="lazy" decoding="async" aria-describedby="caption-attachment-1403" class="wp-image-1403 size-full" src="https://sampathblogs.online/wp-content/uploads/2020/01/wf2.jpg" alt="" width="1114" height="370" srcset="https://sampathblogs.online/wp-content/uploads/2020/01/wf2.jpg 1114w, https://sampathblogs.online/wp-content/uploads/2020/01/wf2-300x100.jpg 300w, https://sampathblogs.online/wp-content/uploads/2020/01/wf2-1024x340.jpg 1024w, https://sampathblogs.online/wp-content/uploads/2020/01/wf2-768x255.jpg 768w, https://sampathblogs.online/wp-content/uploads/2020/01/wf2-945x314.jpg 945w, https://sampathblogs.online/wp-content/uploads/2020/01/wf2-600x199.jpg 600w" sizes="auto, (max-width: 1114px) 100vw, 1114px" /><p id="caption-attachment-1403" class="wp-caption-text">UART receiver receiving 0x69</p></div>
<h4><strong>Synthesis, Place &amp; Route</strong></h4>
<p>Analysis stage of Analysis &amp; Synthesis examines the logical completeness and consistency of the project, and checks for boundary connectivity and syntax errors. Analysis &amp; Synthesis also synthesizes and performs technology mapping on the logic in the design entity or project’s files. It infers flip flops, latches, and state machines from Verilog HDL and VHDL. It creates state assignments for state machines and makes choices that minimize resources usage. It also uses algorithms to minimize gate count, remove redundant logic, and use the device architecture (e.g. DSP blocks and memory blocks) as efficiently as possible.</p>
<p><span class="ui_qtext_rendered_qtext">The Place &amp; Route tool will do an optimal job at implementing timing specifications. </span>It automatically assigns each logic function to the best logic cell location for routing and timing, and selects appropriate interconnection paths and pin assignments. <span class="ui_qtext_rendered_qtext">However this will not be the case in challenging designs.</span><span class="ui_qtext_rendered_qtext">If user have a very good idea about the design then user can find a good way to place different components of design using floor planner manually or fine tune already placed design. For example you can place your DDR logic nearby to DDR pins or take advantage of using clock tree etc. Also, many things can pop out when visually inspecting critical paths and component placements,&nbsp; which will not be obvious when looking at text-based reports and summaries.<br />
</span></p>
<h4><strong>Programming the Device &amp; Testing on PCB</strong></h4>
<p>Once you have successfully compiled and simulated a project with the Altera Quartus/Xilinx ISE software, you can program the respective device with the configuration file(*.pof/*.sof) and test it in the target circuit. The software includes interfaces to the Altera Programming Unit (APU). The APU provides the hardware and software needed for programming Altera devices, when used with the appropriate programming adapters. Altera programming software can also be used with download cables such as USB-BlasterTM, ByteBlasterTM II, ByteBlasterMVTM or MasterBlasterTM cables.</p>
<div id="attachment_1294" style="width: 541px" class="wp-caption aligncenter"><img loading="lazy" decoding="async" aria-describedby="caption-attachment-1294" class="wp-image-1294 size-full" src="https://sampathblogs.online/wp-content/uploads/2020/01/fpga-steps.jpg" alt="" width="531" height="432" srcset="https://sampathblogs.online/wp-content/uploads/2020/01/fpga-steps.jpg 531w, https://sampathblogs.online/wp-content/uploads/2020/01/fpga-steps-300x244.jpg 300w" sizes="auto, (max-width: 531px) 100vw, 531px" /><p id="caption-attachment-1294" class="wp-caption-text">Configuring Altera Device</p></div>
<p>Once the device is successfully programmed, the board as a whole can be tested for serial communication with a terminal. Here the test equipments like multimeter, oscilloscope etc., can be used as and when required in order to make the board work as per the requirements.</p>
<p><strong><em>Credits:</em><br />
</strong><em>Knowledge, Experience, Datasheets<br />
</em></p>
]]></content:encoded>
					
					<wfw:commentRss>https://sampathblogs.online/2018/09/it-hardware-understanding-the-building-blocks/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Understanding Data Center and Service Desk Operations</title>
		<link>https://sampathblogs.online/2018/05/understanding-data-center-and-service-desk-operations/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=understanding-data-center-and-service-desk-operations</link>
					<comments>https://sampathblogs.online/2018/05/understanding-data-center-and-service-desk-operations/#respond</comments>
		
		<dc:creator><![CDATA[mail2sampath]]></dc:creator>
		<pubDate>Fri, 04 May 2018 15:08:37 +0000</pubDate>
				<category><![CDATA[Functional]]></category>
		<category><![CDATA[Technical]]></category>
		<category><![CDATA[Basic guide]]></category>
		<category><![CDATA[Best practice]]></category>
		<category><![CDATA[Hardware]]></category>
		<category><![CDATA[IT Infrastructure Service]]></category>
		<guid isPermaLink="false">http://excelall.byethost32.com/?p=188</guid>

					<description><![CDATA[A data center is a facility that centralizes an organization&#8217;s IT operations and equipment, as well as where it stores, manages, and diseminates its data. Data centers house a network&#8217;s most critical systems and are vital to the continuity of... <a class="more-link" href="https://sampathblogs.online/2018/05/understanding-data-center-and-service-desk-operations/">Continue Reading &#8594;</a>]]></description>
										<content:encoded><![CDATA[<p>A data center is a facility that centralizes an organization&#8217;s IT operations and equipment, as well as where it stores, manages, and diseminates its data. Data centers house a network&#8217;s most critical systems and are vital to the continuity of daily operations. Consequently, the security and reliability of data centers and their information is a top priority for organizations.</p>
<p>Although data center designs are unique, they can generally be classified as internet-facing and enterprise (or internal) data centers. Internet-facing data centers usually support relatively few applications, are typically browser-based, and have many users, typically unknown. In contrast, enterprise data centers service fewer users, but host more applications that vary from off-the-shelf to custom applications.</p>
<p>The main purpose of a data centre design is to run core business or mission critical applications and store operational data as well as providing Disaster Recover (DR) facilities. Typical applications will be enterprise software systems such as Enterprise Resource Planning (ERP) and Customer Relationship Management (CRM) services. Data center architectures and requirements can differ significantly.<br />
For example, a data center built for a cloud service provider like Amazon EC2 satisfies facility, infrastructure, and security requirements that significantly differ from a completely private data center, such as one built for the Pentagon that is dedicated to securing classified data.</p>
<h3>Why data centers are business-critical</h3>
<p>Most data center deployments are carried out for the following reasons:<br />
•<em>Availability</em>: Maximizing the availability of IT services to the organization.<br />
•<em>Business continuity</em>: The redundancy, monitoring and infrastructure provided by most data centers means that the potential for business  interruption is very low.<br />
•<em>Lower total cost of ownership</em>: Where an organization has several silos of data, it can combine resources and reduce the amount of separate data servers required.<br />
Staff overhead is reduced as administrative operations are simplified, whilst energy and floor space costs are reduced.<br />
•<em>Agility</em>: Centralizing IT infrastructure within a data center creates greater agility since new deployments do not have to be rolled out to multiple physical locations.</p>
<p>Basically, an effective data center operation is achieved through a balanced investment in the facility and equipment housed. The elements of a data center break down as follows:</p>
<p><strong>Facility</strong> &#8211; the location and white space or usable space, that is available for IT equipment. Providing round-the-clock access to information makes data centers some of the most energy-consuming facilities in the world. A high emphasis is placed on design to optimize white space and environmental control to keep equipment within manufacturer-specified temperature/humidity range.</p>
<p><strong>Support infrastructure</strong> &#8211; equipment contributing to securely sustaining the highest level of availability possible.<br />
Some components for supporting infrastructure include:<br />
•Uninterruptible Power Sources (UPS) &#8211; battery banks, generators and redundant power sources.<br />
•Environmental Control &#8211; computer room air conditioners (CRAC), heating, ventilation, and air conditioning (HVAC) systems, and exhaust systems.<br />
•Physical Security Systems &#8211; biometrics and video surveillance systems.</p>
<p><strong>IT equipment</strong> &#8211; actual equipment for IT operations and storage of the organization&#8217;s data. This includes servers, storage hardware, cables and racks, as well as a variety of information security elements, such as firewalls.</p>
<p><strong>Operations staff</strong> &#8211; to monitor operations and maintain IT and infrastructural equipment around the clock.</p>
<p>Data centers have evolved significantly in recent years, adopting technologies such as virtualization to optimize resource utilization and increase IT flexibility. As enterprise IT needs continue to evolve toward on-demand services, many organizations are moving toward cloud-based services and infrastructure. A focus has also been placed on initiatives to reduce the enormous energy consumption of data centers by incorporating more efficient technologies and practices in data center management. Data centers built to these standards have been coined green data centers.</p>
<h3>Data Center Solutions</h3>
<p>So, what exactly do data centers offer? What&#8217;s so great about them versus doing everything in-house.Below is a list of some of the services offered:<br />
<em>•Colocation Services</em><br />
A colocation data center lies on the opposite spectrum of the in-house data center. Colocation facilities are third party organizations that are multi-tenant accessible, meaning that multiple businesses of any size or industry may house their equipment within the data center. Customers are able to select from a variety of solutions to accommodate the specific requirements for their business.</p>
<p><em>•Cloud Services like Iaas, Paas, Saas</em></p>
<p><em>•Disaster Recovery</em><br />
This is a flexible and scalable service to enable the recovery or continuation of vital technology infrastructure and systems following a natural or human-induced disaster. Disaster recovery focuses on the IT or technology systems supporting critical business functions,as opposed to business continuity, which involves keeping all essential aspects of a business functioning despite significant disruptive events. Disaster recovery is therefore a subset of business continuity.</p>
<p><em>•Managed Services</em><br />
Managed hosting service provider is a company or individual that remotely manages a customer’s IT infrastructure.Many small and medium sized businesses tend to use the services of a managed service provider for web servers and website management.</p>
<p>Managed providers will each specialize in a different area of IT. Some may be experts in managed colocation services whereas others are more focused on business connectivity and cloud services.</p>
<p><em>•High Availability</em><br />
High availability in the data center refers to systems and components that are continuously operational for a long time. It typically means the systems have been thoroughly tested, are regularly maintained and have redundant components installed to ensure continuous operation.</p>
<p>These services and much more are managed professionally by IT administrators who stay up-to-date with the latest technology and ultimately help a data center&#8217;s overall efficiency.</p>
<p>Data center administrators have a long to-do list when it comes to infrastructure monitoring. From server and equipment monitoring &#8212; and in some cases, mainframe monitoring &#8212; it&#8217;s a practice that&#8217;s often difficult to juggle, especially if you work in a large data center. But monitoring is an essential task. By obtaining the data you need, you can increase security and scalability, efficiently automate and better align resources with capacity needs.</p>
<p>Instead of scrambling to fix a problem after it occurs, data center admins should strive to be proactive, anticipating issues before end users even notice. But that can be difficult to do without the right data center monitoring tools and strategy.Trends such as mobility, virtualization adoption, new and increasing compliance and governance requirements, and the need to modernize existing infrastructure add further complication to managing the IT environment.</p>
<p>To make information across the enterprise readily available requires an enterprise infrastructure that is managed as an integrated whole. The go to ITSM tool(Example:Opsmart, Remedy etc.,) should provide a flexible, scalable, and open solution.Also the tool should align ITSM resources to support customer business objectives.These services create a centralized operations and support center, providing the customer a cohesive approach to integrate process optimization, systems development and support, and network and service desk management across the business enterprise.</p>
<h4>Moving Forward</h4>
<p>Due to the cloudification of data centers, current situation is such that it is no longer reserved for any specific type of organizations any longer; they&#8217;ve become accessible to almost anyone. Even if in-house IT operations are conceivable for small or large companies, wise IT administrators are choosing to outsource some portions of IT management. In the long run, it saves time, money, and manpower and it&#8217;s much less of a headache.</p>
<h2>Service Desk Operations</h2>
<p>Operations staff have direct responsibility for the availability of computer services; nonetheless, they also have direct contact with users and decision makers. One part of the Operations ,i.e,the service desk also known as the “help desk” is the single point of contact for users to report incidents. Without the service desk, users will contact support staff without the limitations of structure or prioritization. This means that a high-priority incident may be ignored while the staff handles a low-priority incident.</p>
<p>IT Infrastructure Library, ITIL is a set of best practices for an effective IT Service management, ITSM is followed across companies of all sizes.<br />
ITIL enables businesses to handle IT issues and service requests efficiently by assigning clear roles and responsibilities. It helps individuals and organizations to realize business growth and transformation.</p>
<h3>ITIL Service Life cycle</h3>
<p>ITIL service lifecycle consists of five stages. Each stage has a set of ITIL processes and it is significant to understand the purpose of each process before implementing. However, companies may selectively implement few processes that are necessary.</p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-1310 size-full" src="https://sampathblogs.online/wp-content/uploads/2020/01/itil-service.jpg" alt="" width="629" height="422" srcset="https://sampathblogs.online/wp-content/uploads/2020/01/itil-service.jpg 629w, https://sampathblogs.online/wp-content/uploads/2020/01/itil-service-300x201.jpg 300w, https://sampathblogs.online/wp-content/uploads/2020/01/itil-service-600x403.jpg 600w" sizes="auto, (max-width: 629px) 100vw, 629px" /></p>
<p><em>• Service strategy</em> &#8211; Service strategy involves clear understanding of customer’s and market’s needs. This advocates a long-term market driven approach to deliver IT support. Service strategy include strategy management for IT services, service portfolio management, demand management, financial management for IT services and business relationship management that focuses on customer satisfaction.</p>
<p><em>• Service design</em> &#8211; This is an holistic approach to design a support service. The right service design approach translates to higher customer satisfaction and usability. Some of the ITIL service design processes include service level agreement, service catalog management, availability management and IT service continuity management.</p>
<p><em>• Service Transition</em> &#8211; This stage ensures changes in service lifecycle are handled with minimum risk and impact so that there is minimal or no downtime. Some of the processes here include change management, release management, configuration management database, knowledge management.</p>
<p><em>• Service Operation</em> &#8211; ITIL service operation ensures seamless service in day to day business activities. Actual delivery and consumption of services happen during this stage. This has a direct impact on the productivity of end users. Typical processes include <em>incident management, request fulfillment</em>, problem management.</p>
<p><em>• Continual Service Improvement</em> &#8211; CSI aims for process review and improvement throughout the service lifecycle. This is applicable to all service stages including strategy, design, transition and operation. Metrics definition and performance review happen at this stage which help companies to revisit existing process.</p>
<h4>Incident Management</h4>
<p>ITIL defines an incident as an unplanned interruption to or quality reduction of an IT service. The service level agreements (SLA) defines the agreed-upon service level between the provider and the customer. Incident management focuses solely on handling and escalating incidents to the next level as they occur to restore defined service levels. Incident management does not deal with root cause analysis or problem resolution. The main goal is to take user incidents from a reported stage to a closed stage.</p>
<p>The below figure depicts a sample incident management flow.</p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-1309 size-full" src="https://sampathblogs.online/wp-content/uploads/2020/01/itil-flow.jpg" alt="" width="666" height="454" srcset="https://sampathblogs.online/wp-content/uploads/2020/01/itil-flow.jpg 666w, https://sampathblogs.online/wp-content/uploads/2020/01/itil-flow-300x205.jpg 300w, https://sampathblogs.online/wp-content/uploads/2020/01/itil-flow-600x409.jpg 600w" sizes="auto, (max-width: 666px) 100vw, 666px" /></p>
<p>The Alerts and incident calls may be related in cases where the incidents result in Alerts on the monitoring tool. However, Alert may occur on tool independently and follows the flow 1 &#8211; 3 &#8211; 4 &#8211; 5 and finally closure of the ticket raised w.r.t to the Alert generated on tool.</p>
<p>The other case is when the Client or user calls up regarding a service disruption issue or a service enhancement support. In such cases, the flow 1 or 2 &#8211; 3 &#8211; 4 &#8211; 5 &#8211; 6 is followed. Here as well, once the issue is resolved the concerned ticket is closed.</p>
<p>Operational incident management requires several key pieces:<br />
1.A service level agreement between the provider and the customer that defines incident priorities, escalation paths, and response/resolution time frames<br />
2.Incident models, or templates, that allow incidents to be resolved efficiently<br />
3.Categorization of incident types for better data gathering and problem management<br />
4.Agreement on incident statuses, categories, and priorities<br />
5.Establishment of a major incident response process<br />
6.Agreement on incident management role assignment</p>
<h3>Incident statuses</h3>
<p>Incident statuses mirror the incident process and include:<br />
•New<br />
•Assigned<br />
•In progress<br />
•On hold or pending<br />
•Resolved<br />
•Closed</p>
<p>The <em>new</em> status indicates that the service desk has received the incident but has not assigned it to an agent.<br />
The <em>assigned</em> status means that an incident has been assigned to an individual service desk agent.<br />
The <em>in-progress</em> status indicates that an incident has been assigned to an agent but has not been resolved. The agent is actively working with the user to diagnose and resolve the incident.<br />
The <em>on-hold</em> status indicates that the incident requires some information or response from the user or from a third party. The incident is placed “on hold” so that SLA response deadlines are not exceeded while waiting for a response from the user or vendor.<br />
The <em>resolved</em> status means that the service desk has confirmed that the incident is resolved and that the user’s service has restored to the SLA levels.<br />
The <em>closed </em>status indicates that the incident is resolved and that no further actions can be taken.</p>
<p>Incident management follows incidents through the service desk to track trends in incident categories and time in each status. The final component of incident management is the evaluation of the data gathered. Incident data guides organizations to make decisions that improve the quality of service delivered and decrease the overall volume of incidents reported. Incident management is just one process in the service operation framework.</p>
<p><em><strong>Sources:</strong></em><br />
<em>Work Experience, Online Learning</em></p>
]]></content:encoded>
					
					<wfw:commentRss>https://sampathblogs.online/2018/05/understanding-data-center-and-service-desk-operations/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
