Principles Of Network Management Information Technology Essay

Agreeing and prioritising the requirements helps define which requested services and features are must haves, which are desirable and which are not necessary but worth noting as future developments.

Assessing requirements is necessary to assess all the requirements so that they can be converted into deliverables such as: commissioning costs, project management fees, hardware costs, software costs, ongoing support costs and training costs.

Constraints need to be examined. Obvious limiting factors are time and money but there may be other physical constraints such as cable installation or wireless networking and issues of placement of new equipment and servers.

Capacity must be planned and anticipated as this has a big impact on the network design and implementation. Good planning will account for capacity load which will maximise resources and provide a reliable service to both the internal users (employees) and external users (customers). Capacity planning will look at users needs, application behaviour, network requirements and performance constraints. Special tools can be used to do this when a live network is not in place to do tests.

Designing the network solution covers the plans of: All servers and workstation, tools and applications, placement of network devices, user groups and needs, capacity needs, cabling infrastructure, internet connection, security, contingency plans and a gantt chart of deployment. All of these will be documented.

Last of all the network performance must be reviewed. The variables that will be looked at are: User satisfaction, network data throughput, network collisions and congestion, user response times and line utilisation. Network monitoring tools can be used to do this.

Once the network has been implemented I would expect the Network Manager to be carrying out the following tasks:

Fault Management – Identifying and dealing with errors to ensure a good quality network

Account Management – Managing users and their privileges on the network

Configuration – Setting up the network and keeping it organised

Performance – Check the performance of the network and ensure it is meeting user requirements

Read also  Aims Of Ethics In The It Industry Information Technology Essay

Security – Ensuring the network is secure and protected from potential threats

Reporting – Compiling information that will assist managers or to inform users

Task 2: Describe with examples, what considerations need to be taken into account when designing a network [P2]

When designing a network the following considerations need to be taken into account:

Cost

What will be the final design cost?

What will be the cost for implementation of network media, devices and servers, software, installation, ongoing maintenance, upgrading, leasing of external lines?

How much will the disruption of installation cost the organisation?

How much will upgrades and maintenance cost?

Functionality

What types of functions will the network need to support?

Does the network functionality meet the needs identified by the users?

Will the network be able to grow?

Usability

Will the network be quick and easy to use?

Does the network make it worthwhile for a user to take up their time using it?

Speed

How much bandwidth will be required?

What kind of media will need to be implemented to support this speed?

How expensive is media for this purpose?

What kind of data will need to be transmitted across the network?

What kind of response times should the user expect?

What is the slowest response time that will be tolerated by the users?

Flexibility

Will the network be able to change to suit organisational needs?

How will it alter the network configuration physically (wiring and hardware) and logically (software and security requirements)

Expertise Availability

Is there anyone in the organisation with expertise to design the network?

Is there anyone in the organisation with expertise to implement the network design?

Is there anyone in the organisation with expertise to maintain and manager the implemented network?

If there isn’t enough expertise can the company afford to employ someone new or hire contractors?

Security Requirements

Implement a communication policy which determines user rights

What will each person need right to do? E.g. software installation, use of removable media

Read also  Impact Of Illegal File Sharing On Music Information Technology Essay

What network security is required? Firewalls, antivirus software, network traffic logs, locked server rooms, CCTV, Uninterruptable power supplies, use of subnets, wireless security.

Internet Access

Is an internet connection needed? If so what type of service?

What services or content will be restricted?

Who will have internet access?

Task 3: Describe and give examples of emerging networking management technologies [P4]

Emerging technologies are new ideas, products and services that have not yet been standerdised or integrated but are likely to give significant impact to an industry.

The rate of change for the IT industry is very quick, if a business was to implement an emerging technology into their organisation it could give them a business advantage over other competitors. Below are some examples of emerging technologies:

Remote Monitoring (RMON)

Remote monitoring’s management base consists of nine groups. This technology works when a device runs an SNMP-compliant agent that reports back to a workstation which is running a monitoring application (console manager) when it encounters odd behaviour.

The nine groups are:

Statistics – This provides network traffic statistics about a network device

History – This creates a sample of historic network data over a period of time, this can be used for future analysis

Alarm – This compares monitored values with an allowed threshold and raises an event if this value is exceeded

Host – This contains information about each network device that is discovered on the network

HostTopN – This is a prepared table of top hosts based on recorded statistics

Matrix – This can track conversation between two devices based on selected addresses

Filters – This allows traffic to be selected for future processing based on given criteria

Packet Capture – This captures network traffic

Events – This controls logging, handling and raising alarms

Mobile Networking

Since WIFI and Bluetooth technologies have been released mobile networking has become more popular. Mobile devices remove the need for network devices to be in a fixed location.

Read also  History Of The World Wide Web Information Technology Essay

Web Interfacing

Many network devices used to be controlled and configured using specific applications for an operating system during installation of the device. This meant that different versions had to be designed to run on different operating systems. Web interfacing has removed the need for this. Most network devices now run a simple HTTP service that can be accessed using any browser. An advantage of this is that devices on a network can now be accessed, maintained and remotely monitored throughout the organisation, improving productivity and taking up less time for the network manager. Problems could be fixed by the network manager from home rather than them having to go back to work and physically access the device.

Voice Over Internet Protocol (VoIP)

This is a very popular emerging technology; it is used to transmit phone calls over an organisations private intranet or over the public internet.

Task 4: Explain using examples the goals of fault management [M1]

Task 5: Describe the potential impact on network systems of emerging technologies [M2]

SEE PRESENTATION

Task 6: Justify the inclusion of routine performance management activities within a network managers role [D1]

Task 7: Explain the need for a proactive network manager to be proactive in their role, giving examples of how such an attitude might be of value [D2]

Create a report/presentation for the network manager, showing your views on the following topics. These three activities must be accompanied by examples of how the theory is to be put into practise or can be used to enhance the productivity of the network:

Explain how the company could manage faults and suggest the best methods for dealing with fault management

Provide reasons why the company should perform routine performance management activities. What sort of information would be required to be collected for comparison at a later date?

Explain why a modern day network manager needs to have a proactive role rather than a reactive management style.

Order Now

Order Now

Type of Paper
Subject
Deadline
Number of Pages
(275 words)