Nobody downloaded yet

Advanced Networking - Coursework Example

Comments (0) Cite this document
Summary
XYZ is a European organisation which has a leadership position in the field of payment processing, relationship management, e-services etc. It has a multi-tiered complex Information Technology system …
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER94.5% of users find it useful
Advanced Networking
Read TextPreview

Extract of sample "Advanced Networking"

Download file to see previous pages The huge size of the organisation can be guessed by its year 2007 volume of credit and debit card transactions which grossed to 4 billion.The organisation is looking for evaluation and strategies to improve grey in the fields of Fault management, Configuration Management, Network management, Security Management and Account Management. Finally, the organisation is interested in developing a network Management tool to automate & simplify the areas mentioned before. This paper attempts to provide a strategic solution in all the areas of Fault management, Configuration Management, Network management, Security Management and Account Management.Fault Management is defined as the process of monitoring, identifying, correcting the errors in any system. The Fault management is of two types - Passive and Active. The Passive fault management is also knows the breakdown management as in this case the designated person or system does not work towards correcting the fault until the system has broken down.In case of the active fault management, the complete system is monitored by an automated system which keeps on checking all the network connections and keeps sending the report to an operator. The operator, through a set of parameter values, determines if the values are in "safe" range else the remedial action can be taken before the breakdown of the system happens.
The Fault Management systems are designed to operate in auto modes i.e. the system takes action on its own to correct the problem or else it sends an SMS, automated call to the escalation for any kind of human intervention to correct the problem. The following schematic diagram explains this system more clearly.
Diagram 1: Schematic of the Active Fault Management System
Following techniques are used to repair the faults identified in the network of the IT System -
Remove / neutralize fault, using redundancy
Retry without intervention (time redundancy)
Reconstruct data/state (data redundancy)
Work-around (configuration redundancy)
Substitution (code redundancy)
Tolerate fault: reduce service quality
Reduce speed, reduce precision
Use default, omit faulty parts
Supportive functionality:
Checkpointing
- Dynamic Reconfiguration
Organization of Fault Management at XYZ enterprise
XYZ enterprise would be using all the techniques mentioned in the previous section to efficiently handle the Faults at the enterprise's complex system. The management would be pro-active with the agreed safe parameters along with formal documentation on the escalation procedure.
Configuration Management
Configuration Management is defined as the process of managing the software source code or any "configuration" items in its integrated format. All the changes to the configurable items are version controlled and are stored in software which allows the configurable items to be updated only after a set of processes are followed. Configuration Management helps to identify at any point of time, the current software code version, essential characteristics of the codes and any dependencies amongst the codes, if any. Unless, there is a methodology to manage the software codes, the changes to software can be a minor discomfort to a major issue with a potential to bring down the mission critical business applications.
Another important use of the Configuration Management process is the reduction of development effort in applications by re-using the existing software available in the organisation. The identification of the characteristics of the existing source in the organisat ...Download file to see next pagesRead More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Advanced Networking Coursework Example | Topics and Well Written Essays - 2250 words”, n.d.)
Advanced Networking Coursework Example | Topics and Well Written Essays - 2250 words. Retrieved from https://studentshare.org/miscellaneous/1526361-advanced-networking
(Advanced Networking Coursework Example | Topics and Well Written Essays - 2250 Words)
Advanced Networking Coursework Example | Topics and Well Written Essays - 2250 Words. https://studentshare.org/miscellaneous/1526361-advanced-networking.
“Advanced Networking Coursework Example | Topics and Well Written Essays - 2250 Words”, n.d. https://studentshare.org/miscellaneous/1526361-advanced-networking.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF Advanced Networking

Networking

...? of Institute] of Discipline] ‘Networking’ INTRODUCTION The growing technological advancements have transformed the planet Earth into a fast pace planet I which tasks are getting executed at very rapid rates. The increasing usability of the technologically advanced devices has been the main reason for their popularity and excessive use. Communication was never easier and more timely than today. The current research mentions one of the technologies that have assisted in the ease of communication. The concept is narrated with respect to a specific small scale business environment that would get benefitted by introduction and implementation of the technology. The co-owner of the small scale...
13 Pages(3250 words)Assignment

Networking

...Network’s Tolerance Fault Introduction In the world of today, networking or linking of different computing devices in order for them to share data has become the convenient way to people who want to share their files or send their e-mails from different parts of the country. Most networks are built hand in hand with both the computer hardware and computer software (Cook, 2003, p103). This paper tries to analyze the network’s fault tolerance, the cabling and how to configure the basic router commands and the basic router configuration in a networking environment. Portfolio 2 Activity 1 - Addressing Scheme (The packet tracer) No Subnet First host Last host...
4 Pages(1000 words)Essay

Networking

...any need to wait for responses. The use of HTTP pipelining allows the reduction of lag time since the client can send multiple requests at the same time and can then wait for their corresponding responses (W3, 2004 b). The use of this technique allows drastic improvements in the internet connection speed since HTML pages and other content tends to load faster. The typical TCP packet is constructed such that it houses multiple HTTP requests due to HTTP pipelining. Consequently, HTTP pipelining aids in sending a lower number of TCP packets on the network to perform the same tasks which allows a reduction in the overall network load and congestion. What is meant by a cache? Web cache? What is the relevance...
4 Pages(1000 words)Assignment

Networking

.... Bandwidth can be shared or committed information rate (CIR). Moreover, bursting is also supported up to 1.5 Mbps o CIR. Organizations spent massive funds to purchase advanced security appliances and hire security professionals, only to ensure the protection of the network. As over the last two decades, network security has gained significant importance due to increase in a number of threats and vulnerabilities. There is a requirement of monitoring the network on a continuous basis for possible threats and vulnerabilities. In order to establish a secure and robust WAN architecture, three factors need consideration. The second factor is the WAN architecture. If we...
11 Pages(2750 words)Statistics Project

Networking

...? Domain System Security Extension (DNSSEC) Technology Domain System Security Extension (DNSSEC) technology Introduction The world has experienced rapid technological advancements over the last few decades. Rogers (2003) observed that the technological advancement has resulted in the emergence of the Internet, which has changed the way people interact both at the private and business levels. The Internet’s several application and communication services have become exceedingly crucial in the present world. Statistics show that the Internet usage has more than doubled over the last five years. However, research indicates that a majority of Internet users tend to assume that the transfer of data on the Internet is safe, reliable... and provide...
11 Pages(2750 words)Term Paper

Networking

...?NETWORKING Networking Affiliation Describe the features of telecommunications networks, including key networking technologies. Cover the Open Systems Interconnection (OSI) model, including each logical layer. Telecommunication networks provide the mechanism to support the electronic transmission of data over geographically dispersed locations. Additionally, these networks can be used to transfer any kind of data such as voice telephone calls, text, videos or images. A telecommunication network consists of a variety of components and features that collectively work to support this communication process. Some of the major...
3 Pages(750 words)Essay

Networking

...NETW-204 Assignment #3 Week 5 Refering to figure below: You are the network administrator for the network depicted in the diagram. You have beenassigned the address space 10.1.16.0/21 to create the LANs you need, and the 172.16.1.0/28 space for your WAN links. LAN: 10.1.16.0/21 WAN: 172.16.1.0/28 Assign addresses LAN Subnets Begin by creating and assigning the LAN subnets you will use. In order to make the most efficient use of your address space you should start by creating the subnet needed for the LAN with the most hosts and then work you down to the smallest LAN. Using the address space 10.1.16.0/21, create subnets for the LANs shown in the diagram and fill in the table 1 below. Notice that the...
2 Pages(500 words)Assignment

Networking

...The internet connection speed in South Korea is considered as the fastest in the world (Smith According to a recent research, Korea has an intention of connecting every home in the country to an internet speed of one gigabit per second. Some of the other countries that are ranked in the top list in internet speeds include Bulgaria, Latvia, Japan, Romania and Lithuania. In this study, the United States is ranked 26th in the list. This paper will analyze the internet speed between South Korea and the United States. This study was conducted based on 27 million downloads using 20 million in 2011 from January till June. This study also encompassed the fastest net providers in every country. In the United States, Verizon and the FiOS...
1 Pages(250 words)Essay

Networking

...Networking Table of Contents Introduction 3 Discussion 3 In computer networking, there are two important protocols that include Internet Protocol (IP) and Transmission Control Protocol (TCP). Contextually, computer networking is also recognized as TCP/IP. The layered communication protocols of networking are discussed hereunder. 3 Protocol Stack 3 Layers and Related Concepts 4 Application layer 5 Presentation Layer 6 Session Layer 6 Transport Layer 8 Network Layer 8 Data Link Layer 9 Physical Layer 10 Ethernet Concept 10 Domain Naming System (DNS) 11 Address Resolution Protocol (ARP) and Media Access Control (MAC) 12 Conclusion 12 Introduction The concept of networking is a significant achievement in the field of information... and...
9 Pages(2250 words)Essay

Networking

...Introduction Border Gateway Protocol (BGP) is the routing protocol that necessitates the Internet to operate. This comes into existence as the address provision in the Internet is not in comparison as hierarchical to telephone dialing strategy, a number of the routers contained in the service provider main networks partake in exchanging of information around a number of IP prefixes. BGP is a procedure for exchanging routing information amid gateways hosts (Beijnum, 2002). The hosts should have its peculiar router in a network of automatic functioning systems. BGP is frequently the protocol but into consideration between gateway hosts contained in the Internet. The routing board comprises of a list of...
2 Pages(500 words)Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Coursework on topic Advanced Networking for FREE!

Contact Us