Elements and Performance Criteria
- Plan and design VoIP infrastructure to meet business requirements
- Ascertain end-user requirements in consultation with client
- Select VoIP infrastructure in line with business and end-user requirements, within budget limitations
- Select protocols for converged networks
- Select hardware, software, network and security requirements according to agreed business and end-user specifications
- Investigate factors affecting bandwidth and calculate bandwidth usage for various codecs, including considerations of overhead, connection quality and connection speeds
- Install and configure VoIP infrastructure to meet business requirements
- Implement telephone number mapping (ENUM), number portability, end point addressing, path selection, calling classes and overlapping number ranges
- Install, configure and test gatekeepers
- Install and test convergent terminal equipment and software
- Install software and configure and test VoIP services
- Configure security access levels to safeguard data, making use of appropriate tools
- Configure a UC network
- Obtain the topology and components of a UC network
- Analyse the potential of IP multimedia subsystem (IMS) network architecture to enable the convergence of voice, video and data applications and various mobile network technologies over IP based layer
- Incorporate the use of a communications server to provide real-time multimedia communications
- Select common videoconferencing codecs according to standards and practices
- Select voice and video conferencing hardware
- Implement IP-private branch exchange (PBX) functionalities in the UC network
- Test and evaluate the performance of convergent networks
- Develop possible network congestion solutions for common network congestions to meet quality of service (QoS) specified
- Provide solutions for problems in contacting emergency services
- Analyse network traffic and resolve problems using packet sniffer, monitoring software and hardware solutions
- Troubleshoot convergent communications over wireless networks
- Analyse types and effects of attacks, including man-in-the-middle attacks
- Plan ways to counteract denial of service (DoS) and distributed DoS (DDoS) attacks
- Predict the impact of virtual local area network (VLAN) hopping, media access control (MAC) address movements, additions and changes on network
- Test and verify the security access levels
- Analyse types of intrusion detection
- Monitor and evaluate capability and reliability of security systems
- Make system alterations to ensure protection against known and potential threats
- Verify and test that user settings conform to security policies
- Backup, upgrade and scan systems to minimise attacks
- Complete documentation and sign off procedures