logo image

Network Management Process Essay

For an organization to succeed in this computer age it direly needs computers and proper network management mechanisms put in place. A “healthy” network system will directly translate into good production as limited time is wasted trying to get into the network. But really, what exactly entails a “healthy” network management process? That is what shall be discussed in this research paper. In setting up a network, one needs to ask the following questions. To begin with, who will access that network, what they will access within the network, where they will access the network from, how they will access it, and when they will access it.

This essay will be based on management of configurations, fault & fault finding, accounting, performance and security and disabling nonessential network process. With the increase in knowledge of computers around the world, comes an increased sense of security for the data being transmitted in the network systems. Hacking has become the order of the day as most people venture into individual as well as corporate and even others into the government networks without permission.

Network configuration and its management are required to ensure that unauthorized personnel do not access rather “classified” information. There needs to

Need essay sample on "Network Management Process"? We will write a custom essay sample specifically for you for only $ 13.90/page

be good configuration management to ensure that the configuration settings are not tampered with and incase they are then as an administrator, there has to be a good tracking system in place to monitor the changes and a backup of the settings be made for the network incase of the computers decide to crash. Configuration changes are effected / come about when updating, upgrading or when a new device is installed (Adobe).

To reduce the menace of system being changed by anyone at their will, set up a monitoring process that will enable monitoring system configuration information and any changes that take place be it by automatic update or crashing of hardware. A properly configured management strategy can track all the changes and upgrades made, be it in hardware or software. Investing in configuration software like Cisco Works 2000 can go a long way in helping yield the desired results (Olatunde). It is important to disable anonymous access as it is not required.

In fault management, detecting faults is paramount as well as log-in information and this helps to fix the problems within the network. Here one looks at the problem whether it is transient (due to overload or temporary resource shortage) or permanent (in the case of equipment failure or link down). All these problems should be sent to the network administrator and this can only be effective if the problems are detected in time. This is possible by having monitoring programs in place and/or customer complaints.

Ticketing systems help to track events (planned or failure) (Byeong-Yun Chang, et al). In this docket also comes delegation of who is to handle the problem and incase no one is available, that may be delegated. This helps to eliminate the hassle of the administrator addressing all the problems. One can also apply the services of ticketing software like Trac and RT softwares. When it comes to accounting for data usage, the network manager tracks the utilization information for individuals, departments and business units so as to run the correct billing or charges.

This is best especially for large organizations and it is done in the IT cost centers that are established to monitor and workout the billing information as required within the given time frame. It enables the scrutiny of usage and data flow and helps the network manager to control traffic within the network domain. The performance of a network is paramount to the running of systems within the organization. Some systems are connected in such a way one cannot be able to do anything if there is no network connection.

Indeed the performance goes a long way in production and work output. Network management ensures that the network performance is at acceptable levels. This is used to monitor network response time, packet loss rate, link utilization via SNMP (Simple Network Management Protocol) which alert admin when performance move above / below predefined threshold (APRICOT, 2010). Monitoring the network performance actively helps identify the problem early enough. This can be achieved by Pinging, Traceroute or MTR which combine ping and traceroute.

It can also be monitored by passive processes like log monitoring and SNMP trap receivers. Lastly, in security management it is important to secure the network environment. Here security information analysis, authentication, authorization and auditing is done so that internal and external network users can only access what they are required to access and nothing more. This can be achieved by configuring the network firewall, setting up intrusion detection systems and security policy verifications for example having some access lists.

Within the network system, there may be some processes that are nonessential but they consume a lot of space, time and memory. One of this is the application management service commonly known as Svchost. exe which offers service to the OS and in most cases consumes a big chunk of the memory and renders the network busy while doing a lot of nothing to the good of the network. This can be disabled by going to Start button click on control panel, double click on administrative tools then double click on services icon.

Right click on AppMgmt services and click on disable. Other processes that require disabling are JMX console, DefaultServlet, weblogic. xml can comfortably be set to false also ibm-web-ext. xml set at false, all EJB services can be set at disable. All anonymous access services should be disabled while setting up the network as they just clog the network with less important tasks. In conclusion, a good network management process must address these three things. To begin with, data Integrity where by it ensures that data is not tampered with by viruses.

Secondly, data Confidentiality in that confidential and customer information is not illegally opened or accessed by hacking intrusion noosing softwares and the like. Lastly, data Availability such that whenever customer or a user needs to access information, it is readily available and does not have to wait for long hours or even days for the network to respond. This is made even more possible by disabling nonessential network management processes that jam the network system.

Reference: Olatunde Abiona, Bandwidth Monitoring & Measurement, Obafemi Awolowo University, Ile-Ife, NIGERIA Byeong-Yun Chang, Daniel W. Hong, & Byung-Deok Chung. Analysis of Network Operations Management Processes. Available at: http://dpnm. postech. ac. kr/knom/knom-review/v11n1/1. pdf APRICOT 2010, Kuala Lumpur, Malaysia, Introduction to Networking Monitoring and Management. Adobe. Available at: http://help. adobe. com/en_US/livecycle/9. 0/securityHardening. pdf

Can’t wait to take that assignment burden offyour shoulders?

Let us know what it is and we will show you how it can be done!
×
Sorry, but copying text is forbidden on this website. If you need this or any other sample, please register

Already on Businessays? Login here

No, thanks. I prefer suffering on my own
Sorry, but copying text is forbidden on this website. If you need this or any other sample register now and get a free access to all papers, carefully proofread and edited by our experts.
Sign in / Sign up
No, thanks. I prefer suffering on my own
Not quite the topic you need?
We would be happy to write it
Join and witness the magic
Service Open At All Times
|
Complete Buyer Protection
|
Plagiarism-Free Writing

Emily from Businessays

Hi there, would you like to get such a paper? How about receiving a customized one? Check it out https://goo.gl/chNgQy

We use cookies to give you the best experience possible. By continuing we’ll assume you’re on board with our cookie policy