StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Reverting to Earlier Configuration File in Network Management - Essay Example

Cite this document
Summary
The paper "Reverting to Earlier Configuration File in Network Management" highlights that idea of configuration rollback in network management implies that the changes that were previously made, for example, to the database are discarded and the original version undertaken…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER93.6% of users find it useful
Reverting to Earlier Configuration File in Network Management
Read Text Preview

Extract of sample "Reverting to Earlier Configuration File in Network Management"

The possibility of Reverting to an older version is advantageous because the newer version may fail to live up to the standards set. It also allows the replacement of the startup configuration file in place of the running configuration file without requiring the installation of a router (Meghanathan, Chaki, & Nagamalai, 2012). Installation of a router would require that the system be shut down thus loss of running time, resources, and increase in costs incurred during downtime.

Reverting also allows the user to roll back to any Cisco operating system that is saved in the system. This helps in simplifying and hastening the process of inputting the needed commands to the router as only the commands, which required to be added or removed are affected and the rest are left intact (Meghanathan, Chaki, & Nagamalai, 2012). The disadvantages of Reverting an old system include the system continuing to work under limitations such as inefficiency that initially prompted the change.

Additionally, it is not economically sound to revert to an old system as that means loss of resources initially put into the project while Reverting the configuration change must be approved, which frequently results in delay thus loss of time and resources.

Read More
Tags
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Week 4 Essay Example | Topics and Well Written Essays - 250 words - 1”, n.d.)
Week 4 Essay Example | Topics and Well Written Essays - 250 words - 1. Retrieved from https://studentshare.org/information-technology/1673596-week-4
(Week 4 Essay Example | Topics and Well Written Essays - 250 Words - 1)
Week 4 Essay Example | Topics and Well Written Essays - 250 Words - 1. https://studentshare.org/information-technology/1673596-week-4.
“Week 4 Essay Example | Topics and Well Written Essays - 250 Words - 1”, n.d. https://studentshare.org/information-technology/1673596-week-4.
  • Cited: 0 times

CHECK THESE SAMPLES OF Reverting to Earlier Configuration File in Network Management

Network Security And Management

In'network management,'fault management'is the set of functions that detect, isolate, and correct malfunctions in a telecommunications network, compensate for environmental changes, and include maintaining and examining'error'logs, accepting and acting on error'detection'notifications, tracing and identifying faults, carrying out sequences of diagnostics tests, correcting faults, reporting error conditions, and localizing and tracing faults by examining and manipulating'database'information....
3 Pages (750 words) Article

Evaluating benefits of networks and performing network management responsibilities

Local Area Networks (LAN) can be described in various configurations and layouts referred to as network Topology.... network topology determines the connectivity and communications mode of nodes on a network.... The most popular network topologies are:Bus topology provides the simplest network connection.... A single cable connects all the computers and network peripherals.... Each node communicates with any other node by using the physical address of the network card of the destination node....
7 Pages (1750 words) Essay

Computer Network Mangment

Wireless LAN deployments are often expensive for companies because RF surveys, which help ensure proper network coverage, can cost as much as $1,000 per access point, said Albert Lew, director of product management for Burlington, Mass.... Even this requires considerable effort in assessing the need and building a need for new hiring to upper management.... The management must be versed on the necessary techniques to assess the needs and determine the feasibility of any innovation in the workplace and its impact on staff and the users combined with political savy....
14 Pages (3500 words) Essay

Cyber Criminals and Other Data Security Dangers

The author popularizes the possibilities of ISO 27001 Information Security management Standard which aims to rectify and mitigate those threats.... This paper 'Cyber Criminals and Other Data Security Dangers' gives a detailed overview of data safety odds by discussing true world examples....
16 Pages (4000 words) Term Paper

DNS and XenApp Deployment

One central park is facing the problem of unreliable DNS service due to security and management concerns.... An IP address refers to a 32-bit group of numbers pointing to a particular location of a system in a network.... CP and IP work together to enable full integration between the application softwares such as browsers and network softwares.... he Domain Name System is the internet facility that resolves the IP network addresses to their subsequent physical computer systems....
8 Pages (2000 words) Case Study

Network Security - Information Assurance

The paper "network Security - Information Assurance" highlights that in general, the explosive growth of Information Technology and the amalgamation of IT with telecommunication have brought together the world much closer than any time before in history.... ... ... ... It is important to state that the technology has grown leaps and bounds to provide multiple channels of access to various systems blurring the line between physical and logical systems....
12 Pages (3000 words) Coursework

Advanced Network Management and Design

This coursework "Advanced network management and Design" focuses on an IT service Upgrade Announcement that was made for making the Graystone Industries computer network resilient and compatible with current trends.... c) Obtaining effective risk management for the protection of data.... To manage information security and monitoring back-up techniques, the centralized administrative platform is for better problem solving and management.... Secondly, the management team and 270+ employees will be communicated within these two offices....
9 Pages (2250 words) Coursework

Computer Security Analysis Project

The main challenging situation arises when there is varying platforms in the network since every platform has its own file system design and implementations.... The paper 'Computer Security Analysis Project' states that the core business of the computer being to create, manipulate, store and retrieve data, file system only provides support for the same but taking it to higher levels, file system provides a way of organizing, storing, retrieving and managing information in a computer disk....
13 Pages (3250 words) Case Study
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us