Elements and Performance Criteria
- Plan and design VoIP infrastructure to meet business requirements
- Ascertain end-user requirements in consultation with client
- Select VoIP infrastructure in line with business and end-user requirements, within budget limitations
- Select protocols for converged networks
- Select hardware, software, network and security requirements according to agreed business and end-user specifications
- Investigate factors affecting bandwidth and calculate bandwidth usage for various codecs, including considerations of overhead, connection quality and connection speeds
- Install and configure VoIP infrastructure to meet business requirements
- Implement telephone number mapping (ENUM), number portability, end-point addressing, path selection, calling classes and overlapping number ranges
- Install, configure and test gatekeepers
- Install and test convergent terminal equipment and software
- Install software, and configure and test VoIP services
- Configure security access levels to safeguard data, making use of appropriate tools
- Configure UC network
- Obtain topology and components of UC network
- Analyse potential of IP multimedia subsystem (IMS) network architecture to enable convergence of voice, video and data applications and various mobile network technologies over IP based layer
- Incorporate use of a communications server to provide real-time multimedia communications
- Select common video conferencing codecs according to standards and practices
- Select voice and video conferencing hardware
- Implement IP-private branch exchange (PBX) functionalities in the UC network
- Test and evaluate performance of convergent networks
- Develop possible network congestion solutions for common network congestions to meet the specified quality of service (QoS)
- Provide solutions for problems with contacting emergency services
- Analyse network traffic and resolve problems using packet sniffer, monitoring software and hardware solutions
- Troubleshoot convergent communications over wireless networks
- Analyse types and effects of attacks, including man-in-the- middle attacks
- Plan ways to counteract denial of service (DoS) and distributed DoS (DDoS) attacks
- Predict the impact of virtual local area network (VLAN) hopping, media access control (MAC) address movements, additions and changes on network
- Test and verify security access levels
- Complete documentation and sign-off procedures