Free Essay

Network Management

In:

Submitted By jk053
Words 3847
Pages 16
Network Management Template
Group Project

Tech Corp
5/19/2013

* Table of Contents 1. Introduction 2 1.1 Individual Responsibility 2 2. Configuration Management 3 2.1 Inventory Management 3 2.1.1 Management Criteria 3 2.1.2 Design Overview 3 2.1.3 Usage & Rationale behind the Template 4 2.1.4 Value to Management 4 3. Performance Management 5 3.1 Performance Log 5 3.1.1 Management Criteria 5 3.1.2 Design Overview 5 3.1.3 Usage and Rationale Behind the Template 6 4. Fault Management 7 4.1 Device Fault log 7 4.1.1 Management Criteria 7 4.1.2 Design Overview 7 4.1.3 Usage & Rationale behind the Template 8 4.1.4 Value to Management 8 5. Security Management 9 5.1 Software Security 9 5.1.1 Management Criteria 9 5.1.2 Design Overview 9 5.1.3 Usage and Rationale Behind the Template 10 6. Conclusion 11 7. References 12

Introduction

N etwork management is a broader subject of managing the whole network consistently. There are some supportive products like software and hardware to enable the users of network to manage the network properly. It covers a wide area of management such as fault, security, performance, configuration and more. These all aspect of network management has to be accomplished successfully to gain the obvious management of network. To gain these management aspects templates need to be take control as a management tool of network. Each criteria of network has to be handled by templates. So the templates we designed here will support the Tech Corp Company and it will cover most of the aspect of network management.
The templates we have developed here will incorporate with the Tech Corp Company as their main functionalities and acquisition has been identified and implemented in these templates. The template has been designed by considering the issues behind the company management and their business outcomes. Network expansion, increment in devices, performance speed up, security constrains have been take it into account and enhanced templates accordingly.
We have developed user manual for each template in a understandable manner. So the managerial staffs can learn by their selves and can handle them without further help. All templates will generate reports for the future use and management use.

Individual Responsibility

Configuration Management
Inventory Management

Component Number | Device Name | Device Type | Made | Model Number | Network Address(IP) | Location | Work Status | Warranty | History | 42 | Pavilion | Desktop Computer | HP | | | | | | | 43 | | Router | D-Link | | | | | | |
Management Criteria

This template basically developed to improve the collection of devices in the network which acquired by the Tech Corp company. All these attribute of the network components are covered under configuration management which allows enhanced control through the configuration of network devices and improve tracking of inventory throughout the network.
This is an essential aspect for successful management of any network. By using this template report can be generated for the purpose of making strategic decision by the company’s administrative department. These are the proper tools like this template which enhances the work of managerial staff to make their workload easy.

Design Overview

This template is designed to simplify tracking of devices successfully throughout the network. Network devices will be tracked by using physical location and network IP address and status of the network component can be observed by the work status. Basically this template is a tool of monitoring not only the components which Tech Corp Company holds but also their implementation.
This template is valuable when vendors reviewing the contracts as made, model and brand name with respect to the status. Device status can be viewed in three diffident instant such as active or inactive or impaired to make easy to maintain those devices in a way. By the connection of these two templates, user can view devices in the network and order them according to the staff desire.
This template is enclosed with warranty period and the history of device. This information is very important when it comes to the management of devices. These information need to be added to the database to maintain healthy equipment and warranty is more important to ignore the financial losses. It can generate standardized ordered reports also when managerial coordinators needs to check the configuration, maintenance of component and expansion of the network.
Location of the device will allow the managerial inspectors to view and track the device’s physical location. It will serve much time by physically searching a particular device in a large company if problems occurred.
Component number attached to the devices is the key element to identify uniquely each and every device in the network acquired by Tech Corp Company and it will allow user to track device and link one template to another related to the network management. This template will be needful management tool when make link to the device fault template via some programs, thought design is very simple.

Usage & Rationale behind the Template

The first field going to be explained here is Component Number which will be auto generated with a uniquely identifying number, which will allow the device to be identified through many different management documents. This randomly auto generated number will act as a primary key for each devices added into the database and each additional devices acquired by the Tech Corp will be uniquely added to the directory.
Secondly the device name, device type, made, model number will be recorded. Device name and device type are not only to identify the device in detail but also to organize the device details that will be more considerable when network expands in size. By identifying the made company, queries can be constructed so that reports can be generated providing detail, which type of vendor products are being employed across the network. The model number helps to identify the devices uniquely even with in the same made and same type of devices. This number is unique for all devices come out from the production company. This number will enable managerial personals to verify the specification of a certain device with other relevant details given in template.
Location is one of the important fields when a device needed to be physically located and make easier to find. Location can be described as room, unit, building, office or any other preference made by the company. Network address of a device must be stored as all components are connected via network. This will authorize the company staff to map the network devices and remotely configure and access them if needed.
The status of all devices in the network has to be recorded to the database. This must be done in real time. So the status will indicate the healthiness or current situation of the device. If work status is “Active” that means device working properly and if work status is “inactive” then it’s not currently connected to the network and if work status is “impaired” then some hardware or software problem found.
Warranty period and device history has to be stored to track the condition of devices. Warranty details can be differing according to the warranty type (Full or partial). History record holds the information about the upgrade from past to future.

Value to Management

This template is going to be an important to management of Tech Corp network and it enhance many network management processes with useful tasks like inventory tracking, generate standard report, remote configuration and access, warranty and track upgrades.

Performance Management
Performance Log

Date & Time | ID Number | Computer Type | Temporary? | Latency? | Local Service? | Ability to perform? | Connection Loss? | 12/03 9:00 am | 134 | Windows | Yes | No | Yes | No | No | 14/0312:32 pm | 135 | Mac | | | | | |

Management Criteria

This Performance log is a Network Performance management tool which is used to help determine and prioritise the network performance issues that may occur. The way its done is that identifies the area’s of the network that may be having performance issues which could include temporary issues such as connection loss. Minor issues that may occur are still recorded so that management and network technicians can go through this information to determine why Temporary losses occur, and fix this issue so that the issue doesn’t keep occurring. By the management and technicians teams going through this information they can determine problems before they cause connection loss and faults on the network.

Design Overview

When it comes to organisations people don’t want to be waiting around while performance issue’s occur such as connection loss or issues causing network downtime. The reason TechCorp should have the performance logs is to help Technicians and management determine problems that may affect the network.
These performance report logs are filled out then sent to the Help Desk which they can then determine the problem more accurately and work on them. Without these performance logs being done, management would only be getting fault reports that come from the network, which would not help clarify the problem that the people are having as saying the problem is in the network is to brief and will not tell them what’s wrong. This would be one reason why TechCorp should implement this performance log, as it will help the Network Technician as well as management, as they can determine what’s happening with their network, depending on what user put down in the log, then can address it, for example, such as connection loss due to server overload.
By using these performance logs managers are better able to prioritize their staff and resources as they will be able to determine the problem more accurately and once they determine the problem they can work from where it is to fix it. This will also benefits managers because they can assess the network efficiency by assessing users who are not experiencing acceptable Network Performance.

Usage and Rationale Behind the Template

In the performance log we ask the user to enter their computer type as this will help prepare the support staff to deal with the issue as they will get staff who know about the that specific type of computer and can work on the issue. The temporary column is there to determine if it is just a small issue that is occurring such as a high load on the servers which is causing people a connection loss. Connection loss is used as an indicator to determine if it is a big issue or just a minor issue.
The local service is there to show whether the network is getting clogged or whether its external issue that is causing the issue. We have put the Latency there to show if the connection is still there, to determine whether the issue could still arise because of the slow connection. Also because of this slow connection people would not be able to work with slow speeds, so the manager would see this as an urgent issue and will try fix the problem quickly.
The ID number is the number that is used to link the job to the technician, as each technician has there own skill in which computer type they will use to try and resolve the issue. Finally the “able to perform functions?” was put it to also determine if the network was functionable and is still able to be used. If not the technician and manager would have to prioritize this as a major issue as users can’t do anything.
The technical staff can monitor the performance fault logs and determine if the performance logs are just a one of thing, or if they keep occurring. From this they can also determine if it is a wide variety of user who are experiencing issues or if it is only a minimal amount of people. They can also then determine if the issue is a major issue and has to be fixed right away or an issue that can wait while another more important issue is being resolved. Also by keeping logs of the issues occurring, they can then determine later on when issues occur if they are the same issue, and if they are, they will know how to fix it and can get the issue resolved in no time allowing users access to the network. These things all determine if there is something wrong with the performance of a network and can determine if it is a big problem, and then work out what to do to fix the problem.

Fault Management
Device Fault log Component Number | Device Name | Occur date & Time | Trigger | Symptoms | Diagnosis | Solution | Checked by | 1 | Router | | | | | | | | | | | | | | |

Management Criteria

This template is developed to identify the faults in devices throughout the network which acquired by the Tech Corp company and find solution for the existing fault to maintain devices perfectly. Essentially this template works as a fault management template.
Fault identification can be done by some ways beginning with information gathering. There is a technique in information gathering, where a query is sent to network devices in pre-determined intervals and the response is received and analysed is called polling network devices. Understanding, monitoring and managing the individual components of a network may not be a problem but if the system increases in size and complexity then there is a need of template as a fault management tool which can enhance these problems. Once the fault has been identified and isolated, it can be solved as soon as possible.

Design Overview

Previous fault management template hold by Tech Corp is insufficient to manage errors in the log, as they acquired new devices and new offices around the country. If a fault management is not completely accomplished in the company, there are lots of possibilities that problem can occur in the network. It decreases the reliability of user; put more work load to their daily business. First step to overcome the network fault is detecting the fault occurrence and this template is directly connected to the network devices so there can be link failure. This template is linked to the device management template as I have stated in my configuration management to make easy to find device which has problem. The identifying fields such as component number and device type will allow the device to be identified uniquely. This template also enclosed with generating report of fault log. So if an error has notified to specific device it will be informed to the staff using some protocols. For that the network should not get failed. Otherwise using report problem will be identified. Once the error identified there is a need of isolate the error which can be done remotely by the managerial staff. Symptom of an error has to be recorded in the template and diagnosis has to be found.

As a final step the solution of the error can be defined in the template that will reflect in another template for upgrade purpose or to experience the errors. The other thing is this template has to be work in real time. Then only using this template report they can easily detect which device has problem to find the solution. Date and time has to be recorded to prioritize the error found and find solution accordingly.

Usage & Rationale behind the Template

The first two fields are used to identify the device uniquely. Component number and device type have been driven from the device management template. As these fields are driven from another base, it allows the network to speed up its process and it’s just for reference for a staff. Next field is occur date & time is used identify the error occurred in the network. Date and time has to be recorded together in real time by the system. This will help to find out the periodical event errors. The trigger is most important field needed to be recorded as this is the root cause of the error. This allows the staff to identify the fundamental mistake for the error and this is basic element of solution. This is filled up manually. Symptom is also allowing the user to identify the fault. By inspecting the device completely this will be recorded. This will be trigger of assuming the correct diagnosis.
The Diagnosis is identified by specialist of devices. This is one of the important parts of this template because the solution will be based on the diagnosis that found by the specialist. So if they identify this correctly, then error can be solved easily. This will be recorded by the factors of triggers and symptoms.
The last step is defining the solution for the problem occurred in the network devices. Even, if the error has been solved or not this field has to be recorded with the current progress. Because, this progress may be the hint to find the solution in future.

Value to Management

Faults cannot be ignored in the network. So this template will replace as a solution to manage the faults in the network devices. This template will help to identify, isolate and resolve the problems found in the devices which are remotely or physically connected. Reports generated by this template will assist staff to solve problems as much as possible, as those reports will act as experience of the network management.

Security Management
Software Security Company Name | IP Address | Anti-Virus Software | Firewall | occurred Date | No. of affected PC | Trojan | Virus | Tech Corp | 192.168.0.0 | AVG | | | | | | | | | | | | | |

Management Criteria

This Software Security template is a network security management tool which is used to help identify the security issues that may occur in the network. The software security management has the following functions: using different types of managerial and technical measures to fix the network system to normal operations. Ensure data integrity, availability and confidentiality of the network. Protect the Network from unauthorized users who try and get into the network. Finally to get rid of any existing threat or potential threat that the software might have in the network system. These functions are the main things to consider when creating this template to ensure the functions listed above.

Design Overview

There are many benefits that software security management has when looking at network management. With the increase in development of internet technology, computers have to be able to handle the companies’ development in the network. Network information is an important part of the development of a company and its network.
Information is an important decision making tool that is used to help companies such as Tech Corp, make decisions about what type of software security they should put in place. Network information is vulnerable to a variety of human attacks from things such as information theft, data tampering, Trojans and other types of viruses. If a company want’s to protect themselves from these types of attacks they need to improve their network security protection with things such as firewalls. Because Tech Corp is a big company, which has lots of staff, there is a large amount of data which is being exchanged over the network which needs to be properly protected so it doesn’t get taken by attackers.
Firewall is software that keeps dangerous things from the internet away from the network. If there was no firewall everything that is on the network would be exposed to other people who are able to get into your network. Anti-virus software is also used when it comes to getting rid of computer viruses that may affect a computer network. So finally, there are many things that a network must consider when it comes to software security, and it includes, anti-virus, firewalls and other forms of network protection to stop hackers from getting into your network.

Usage and Rationale behind the Template

In The Software Security log we get the user to input the company name so we know who is experiencing the problem. We then get the IP address of the network so that we can identify the network that has the problem. Once we have determined the IP address of the network, we get the antivirus that was used and check it to see what was wrong when the problem occurred.
With Anti-virus we can real time monitor it to make sure everything is okay, so when something does occur they can try and fix the problem before anything bad happens to the network. We then asked for the firewall that was used to make sure that it was properly protecting the network from attackers and viruses.
The date that the problem occurred is also recorded so that Tech Corp can monitor when problems occur and can see if a pattern is occurring, in which they can then act and try and fix their problem. “The Number of computers affected” is also included, so that Tech Corp can determine how big the problem is and can then try and find out what the real problem is determining on how many computers are affected.
The Trojan and Virus were added into the template so that once the problem has occurred, you can determine what virus or Trojan it was, and then in the future, can work on it the same way you did now to get rid of it and fix the network. These things are all used to determine software security issue that may occur in a network, and what occurred during the attack such as what virus got through the network.

Conclusion

This document covers almost four major functional areas which is needed for the Tech Corp Company currently. These templates define the most appropriate management aspects of network management. It allows the user to interact with the template independently. There were some issues we found when process of development and we tried our best to overcome with the issues. We have covered the major functions each and every criteria of management had. These templates have connected to network to perform some task requested by the user. Mainly Security issue, arrangements of devices, network slowly down, network expansion and fault tolerance has been solved diligently.
We have a hope that our templates will assist the Tech Corp company management staffs and higher management personnel. It will allow the future expansion in all area of network management.

References

[1] En.wikipedia.org “FCAPS management categories” viewed at: 16/5/2013
<http://en.wikipedia.org/wiki/FCAPS>

[2] En.wikipedia.org “Network management model” viewed at: 16/5/2013
< http://en.wikipedia.org/wiki/Network_management_model >

[3] oidview.com “Network Management Overview” viewed at: 18/5/2013
< http://www.oidview.com/network_fault_management.html>

[4] Searchnetworking.techtarget.com “What is fault management?” viewed at: 18/5/2013
< http://searchnetworking.techtarget.com/definition/fault-management>

[5] Clemm, A 2007, ‘The Basic Ingredients of Network Management’, Management Network Fundamentals, Edition 1, Cisco Press, Indianapolis, IN 46240 USA

[6] En.wikipedia.org “Network performance management” viewed at: 18/5/2013
< http://en.wikipedia.org/wiki/Network_performance_management>

[7] Configurationtoolkit.com “The Configuration Management Plan and Tool”
Viewed at: 18/5/2013 < http://www.configurationkit.com/>

Similar Documents

Free Essay

Network Management and Security

...(Name) (Instructors’ name) (Course) (Date) Network Management and Security A telecommunication Management Network, commonly known as TMN, is an infrastructure that provides interfaces for connection between several types of operating systems and telecommunications equipment, so as to manage the telecommunication service and network. This is from Glenn Warnock and Nathoo Amin (215). Also, it enables the functioning of the management information, which is exchanged through these interfaces. On the other hand, 5620 SAM is widely used for developing distributed systems, as it provides the infrastructure for interoperability of several object oriented management applications. With this application, the 5620 enables applications of operating systems to interoperate with the service access manager, allowing it to provide connections, isolate and manage network issues across an Alcatel network (225). With this, users can access management information transparently and independent of the hardware and software platform. This therefore enhances the portability of applications, which are developed across the multiple platforms of management. The principles and concepts of the TMN that can be matched with the features and functions of the 5620 platforms include the specification translation and the interaction translation. Redundancy is also an important feature. It is the automatic transfer of data network to stand by, and protects the network against hardware failure, software failure...

Words: 2230 - Pages: 9

Free Essay

Network Management

...flow of network traffic or out of the flow. The differences between these two can be explained by their impact on performance, security, and manageability on a network. An in-band network management has to do with managing devices through common protocols. For example, telnet or SSH and the using of the network itself as a media. This is a way to provide identity based access controls, which will provide a better security. The segregation of management traffic is also a good practice, from production customer traffic. This helps in case your network is congested due to real user traffic. It offers you the ability to login into your devices to address the issue. The con here with in-band management is when your network is down or badly degraded, it will be little help. An out-of-band network management is an alternative means to accessing remote devices. An example in which this is handy to have both networks, would be in the case that the in-band network is down or terribly congested. The out-of-band network management can communicate with devices right through its console, without having the administrator having to go to the data center to correct the in-band network management situation. Each of these, out-of-band and in-band network management, have pros and drawbacks. The in-band management is often referred to as a fitting and a cheap way to obtain your system. The out-of-band management is often thought of as the more expensive way to access your network. But the...

Words: 764 - Pages: 4

Free Essay

Network Management

...based on a control/access given to the station owning the "token." Think of a token as the key to the media: whichever station has the token would be allowed to use the ring to send the data. So there would be no collision, just multiple stations competing for the same token. With not too many stations, the wait-for and claim of the token is very efficient (think of a video game with less players waiting to play it.) But if there are too many stations, most would just sit around and wait for the token, hence the flat-out of its performance. 2) What are the standards used for the various layers in an Ethernet-based network that is managed by the Internet management protocol? Assume that the Ethernet runs on 10 Mbps on an unshielded twisted-pair cable? A) The standards used for the various layers in an Ethernet-based network that is managed by the Internet management...

Words: 923 - Pages: 4

Free Essay

Network Management System

...Network management systems are giving IT professional an advantage on their own networks. This is giving them access to software and hardware at a moment’s notice without leaving the comfort of their desk or home. The NMS consists of a set of software and hardware tools that is integrated into the network. This management system is able to identify devices that are on the network. The NMS can also be used to monitor all devices and rate how the device is performing and if it is matching the device expectations. This system can track the performance of the bandwidth, if there was any packet loss, and the performance of all the routers/switches. The network management system will give the IT department notifications if anything seems to be off with the network. This will give the IT personnel time to isolate or fix before the problem effects the network (Hale, 2013). Cisco is a big company that has a very large network. They manage millions of endpoint devices and with a huge network that require a significant amount of monitoring from the IT department. “Cisco Connected Grid Network Management System is a software platform that helps to enable a clear separation between communications network management and utility operational applications. These include Distribution Management System (DMS), Outage Management System (OMS), and Meter Data Management (MDM)” (Cisco Connected Grid Network Management System, 2014). This management system can monitor multiple networks and all of...

Words: 733 - Pages: 3

Free Essay

Network Management System

...01/22/2014 Network Management System Student: xxxxxxxxxxxxxxx Professor: xxxxxx Course: Network 420 DEVRY UNIVERSITY Brief Introduction Network management systems have to be geared toward the work flow of the organization in which they will be utilized and be careful with remote external attack, as many hackers usually aim there attack at service offered to the public. Which means Network management systems department must provide protection to the business' data, with a smooth operation benefits for employees accessing those data. As we know Network management system is based on Client/Server paradigm normally requires transferring large amount of data between the manager and agents, which will consume large amount of data as bandwidth and cause a processing bottleneck at the manager. It become problem and complicated as the Network grow. According to our textbook, Management interoperability, management function, and management layers capture different technical aspects of network management. However, network management also involves a nontechnical . INTRODUCTION Network management systems have to be geared toward the work flow of the organization in which they will utilized the components of the network such as the ( manager, MIB, RMON and Probe ) to secure their organization data. And not forgetting to be mindful of remote external attack, as many hackers usually aim there attack at service offered to the public. Which means Network management department...

Words: 689 - Pages: 3

Free Essay

Netw420 Cisco Network Management System

...Cisco Network Management System NETW-420 Enterprise Network Mgmt Professor Introduction Cisco uses the International Organization for Standardization network management model which defines five functional areas of Network management. The model consists of Fault Management, Configuration Management, Performance Management, Security Management, and Accounting Management. In this paper we will cover the models five functional areas. Fault Management Fault management detects, logs, notifies users of, and tries to automatically fix network problems to keep the network running effectively. Fault management is perhaps the most widely implemented of the ISO network management elements. The reason is because faults can cause downtime or unacceptable network degradation. Fault Management uses a network management platform deployed in an enterprise infrastructure that consists of multivendor network elements. Network management platforms can be viewed as the main console for network operations in detecting faults in the infrastructure. The platform receives and processes events from network elements in the network. Events from servers and other critical resources can also be forwarded to a management platform. A standard management platform consists of Network discovery, Topology mapping of network elements, Event handler, and Performance data collector and graphed. Configuration Management Configuration management monitors network and system configuration...

Words: 646 - Pages: 3

Premium Essay

The Impact of Cloud Computing on Network Management

...Computing on Network Management. Introduction Network management is a process to maximize the reliability and utilization of network components in order to optimize network availability and responsiveness. We see that this definition includes elements of two other processes: * Availability * Performance and tuning Maximizing reliability through the use of Cloud Computing is another way of emphasizing high availability by ensuring network lines and the various components such as routers, switches, and hubs maintain high levels of uptime. Maximizing utilization implies that performance and tuning activities involving these components are optimizing network response. While availability and performance and tuning are the two processes most closely related to, and affected by, this process, network management actually interacts with six other systems management processes, making it one of the most interrelated of all 12 disciplines. Therefore it could be considered one of the most vital and integral parts of any organization. Network management covers an extensive area, including: * Security: Ensuring that the network is secure from unapproved users. * Performance: Removing bottlenecks in the network. * Reliability: Making sure the network is accessible to users and reacting to hardware and software faults. Key Decisions about Network Management Six key decisions need to be made that influence the strategy, direction, and cost of the Network management process...

Words: 1101 - Pages: 5

Premium Essay

Project Management Networks

...Content Part A1 Network Diagram: AoA or AoN? 1. Introduction …………………………………………………………………….…. 2 2. Comparison Between AoA and AoN …………………………………….……….. 2 3. Network Diagrams with Educational Oriented Discussion …………….…………. 3 4. Conclusion ………………………………………………………………………… 4 Part A2 The machine tool overhaul project Network diagram …………………………………………………………………….. 5 Part B Lean Concept: Value Stream Mapping (VSM) 1. Introduction ……………………………………………………………………..… 5 2. What is Value Stream Mapping ……………...…………………...………………. 5 3. Why Choose VSM and What Are The Benefits ……….…………………...…….. 6 4. Criticism of VSM …………………………………………………………………. 6 5. Conclusion ………………………………………………………………...………. 7 Reference …………………………………………………………………………….. 8 Part A1 Network Diagram: AoA or AoN? 1. Introduction The network diagram provides project managers with information about how the tasks are connected, how long will each task takes and shows all the tasks in the sequential or concurrent way (Taylor, 2008). There are two common methods for constructing network diagrams which are activity-on-arrow (AoA) and activity-on-node (AoN). However, these two methods have some fundamental differences and in practice, the question that which is better, has been asked on many occasions. Hence, this part of essay will analyze the differences between AoA and AoN and carry out some research that why they are different. In addition, these two choices of network diagrams will be illustrated under the academic...

Words: 2148 - Pages: 9

Premium Essay

Network Management Summary

...Network: any interconnected group or system, it comprises nodes and links. Networks are long-term, relationships between interdependent economic actors which are seeking for competitive advantage by forming the cooperation. More complex than alliances; bilateral relationship doesn’t qualify as network. From left to right: Market: “buy”. Network: jv, licensing, outsourcing, equity share, contractual cooperation, joint R&D. Hierarchy: “make” From left to right: Market: “buy”. Network: jv, licensing, outsourcing, equity share, contractual cooperation, joint R&D. Hierarchy: “make” Types of Networks: X & Y: X: Alliances between partners with complementary skills/strengths “closing the gap”. Y: Alliances between partners with mutually reinforcing resources/skills/competences “critical mass alliance”; by joining forces you reach a critical mass. Horizontal, vertical & lateral cooperation: Horizontal: Companies within the same position of the value chain cooperate (e.g. alliance between airlines) Vertical: companies from different positions within the value chain cooperate (eg. Buyer supplier relationships along the supply chain) Lateral: across industries, different players from different industries. Stable & Dinamic: Stable: platform for cooperation. Dinamic: project-based. Virtual factory: dynamic, order processing. Competition: Networks compete to each other; network is the compeititive ...

Words: 4712 - Pages: 19

Free Essay

Ntc/411 Network Management Paper

...Network Management (Your Name) NTC/411 (Current Date) (Instructor’s Name) Network Management Network management is an integral part of any IT system. Managing a network can be a tough task at times and managers have to decide on the best approaches for their network management. In this paper we’ll discuss out-of-band vs. in-band network management. We’ll also provide some examples of some of the protocols that perform in both types of network management and how enterprise systems are affected by the network management techniques along with business intelligence systems. In general, in-band and out-of-band refer to whether the solution or technique sits in the flow of the network traffic or out of the flow. Some IT professionals say that in-band network management provides better security than an out-of-band approach. Before we get into too much detail we need to discuss what an out-of-band and an in-band network management approach are. In-band approaches require devices or hardware to sit in the flow of live network traffic, often where endpoints access the network so that all client traffic has to pass through them. When a network manager decides to deploy an in-band device then they will be able to provide pre-connect and post-connect security. Network adapters are the most common type of in-band remote management hardware devices (Nevis Networks, 2007). In a Windows environment you can use remote access connections to manage servers...

Words: 1099 - Pages: 5

Premium Essay

Juniper Network Quality Management

...Nida Shehzad nidas88@gmail.com BSOP588 Managing Quality Juniper Network Quality Management Richard Sheng October 18, 2014 Juniper Networks, Inc. is an American manufacturer of networking equipment founded in 1996 by Pradeep Sindhu. It is headquartered in Sunnyvale, California, USA. Juniper Networks is in the business of network innovation. Our mission is to connect everything and empower everyone. The service providers, the biggest and busiest wireline and wireless carriers, cable and satellite operators, content and Internet services providers, and cloud and data center providers run on Juniper Networks. Juniper Networks went public on June 25, 1999. It was one of the most successful initial public offerings in history. It continues to grow and innovate, releasing new product, developing new technologies based on customer’s needs, and remaining at the forefront of high-performance networking. Juniper Networks is in the business of network innovation. From devices to data centers, from consumers to cloud providers, Juniper Networks delivers the software, silicon and systems that Transform the experience and economics of networking. The company serves customers and Partners worldwide. Juniper Networks believe the network can create a connected planet that unleashes a great wealth of possibility, innovation, and discovery that cannot be measured. Juniper Networks has developed and productized some of the industry’s most groundbreaking, disruptive innovations...

Words: 2046 - Pages: 9

Premium Essay

Nt1310 Unit 3 Network Management Research Paper

...Network management strategies require you to ensure your network is setup to be able to function properly together. To ensure the network is setup to function correctly, the user rights control, mail server control, network setup are established to secure a network. Control of user rights will enabled the control of information and access across the network. User rights across the network will be controlled by group policies provided by Windows 7 Enterprise. Group policy will control how user access resource on shared drives and allow tunneling access through vpn when on a business trip. Group policy will allow ease of propagation of user rights across the network. It is important to control access on a mail server as spear phishing and other methods could allow access into your network. The control of mail...

Words: 528 - Pages: 3

Premium Essay

Strategic Innovation Management in Global Industry Networks

...Asian Journal of Business Management 2(4): 110-120, 2010 ISSN: 2041-8752 © M axwell Scientific Organization, 2010 Submitted date: August 30, 2010 Accepted date: October 09, 2010 Published date: December 10, 2010 Strategic Innovation Management in Global Industry Networks: The TFT LCD Industry Guenter Boehm and 2 L.J. Fredericks Strategic Marketing, Samsung Electronics Co. Ltd., Yongin-449-711, South Korea 2 The Center of Poverty and Development Studies, Faculty of Economics and Administration, University of M alaya, Kuala Lumpur-5060 3, M alaysia 1 1 Abs tract: This study examines the strategic innovation management of the business creation process across the technology industry value chain in the global thin-film-transistor (TFT) liquid-crystal-display (LCD) industry based on an anonymous online survey of employees in the industry value chain and outside exp erts (universities, consultants, etc.). The study confirms that technology strategy formulation and a strategic center position are key industry concerns. It also affirms the utility of the industry value chain framework to manage technological innovations transcending that of a single company, and that strategic innov ation m anag eme nt in global high technology industries incorporates a shared business creation process structure involving as many industry value chain partners as possible. Key words: Global high technology industry networks, strategic innovation manageme nt, TFT L CD industry INTRODUCTION Globalization...

Words: 7166 - Pages: 29

Premium Essay

Introduction to Network Management

...Section 1: Target Organization 3 My Organization: 3 Section 2: Network Architecture 5 Section 3: Network Model 8 Section 4: Network Protocols 9 Section 5: Network Security 10 Section 6: Network Management 11 Section 7: Network+ Prep Toolkit 12 IP 2 Section 2 16 References: 17 Section 1: Target Organization My Organization: “The organization I am choosing is entirely made up. I’m going to call it Kritical Komputer Repair. (KKR) This isn’t just a small little computer repair shop we are talking about this is Kritical. Kritical has somewhere close to 100 employees; each one of these employee has to have a desktop that is capable of dual booting Linux and Windows 7 Enterprise. The company will have an in house server for file sharing and system maintenance. This company will have an outbound server as well that can speak with the in house server(s) in order to complete orders, and keep track of customer information. Both of these servers run Linux as well. I made this choice for a few different reasons it’s creative, it gives me a chance to learn by creating something new, and it gives me the flexibility that I need to succeed in this course. Kritical Computer was founded in 1991. Kritical Computer specializes in, computerization projects, security policies, consultation and selection of solutions, delivery of hardware and operating systems, installation and commissioning of computer networks, systems integration, implementation, training and technical assistance...

Words: 5964 - Pages: 24

Premium Essay

It245 Intro to Network Management

...IT245 IP5 Introduction to Network Management Individual Project Carol McClellan February 10, 2014 Contents Identifying the Network 4 The Company Considered 4 The Networks Considered 4 Servers Applied 4 Roles of Network managers 4 Diagramming the Network 5 Legend for the Diagram 5 Diagram 6 Network Models 7 The Seven Layers of the OSI Model 7 Physical Layer 7 Data Link Layer 7 Network Layer 7 Transport Layer 7 Session Layer 8 Presentation Layer 8 Application Layer 8 FCAPS 9 Fault Management 9 Configuration Management 9 Accounting 10 Performance 10 Security 10 Protocols and Agents 12 Transport Layer 12 Application Layer 12 Presentation Layer 13 Session Layer 13 Network Layer 13 Data Link Layer 14 Physical Layer 14 Network Security 15 Network Management2 16 FOOTNOTES 18 Identifying the Network The Company Considered I have decided to use Walmart for my individual project. It is an international company with 11,137 retail units in twenty-seven countries on five continents. It employs over two million people around the world. The Networks Considered There are numerous networks that would be needed for an international company such as this. In addition to the ones used nationally, there would be others in relation to language and monetary differences and shipping differences. There would also be a more extensive requirement as far as tariffs and taxes. Some of the national ones would be taking...

Words: 5551 - Pages: 23