Nobody downloaded yet

Introduction to Network Management - Essay Example

Comments (0) Cite this document
Summary
Manu educational institutions have adopted campus area network for communicating other campuses as well as supporting online and distant learning capabilities for the students. The campus area network interconnects two or more local area networks incorporating online libraries,…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER94.9% of users find it useful
Introduction to Network Management
Read TextPreview

Extract of sample "Introduction to Network Management"

Download file to see previous pages Building A incorporates the administrative staff, Building B incorporates Academic Staff and Building C incorporates student’s network
Building ‘A’ houses administration staff. Amongst their responsibilities is the provision for storing and updating student information - such as personal details and course-related details. They are currently working on an ancient 4Mbps Token ring network. They often complain about speed of the network. The Token Ring networks in each building are stand-alone – i.e. staff in each of the buildings cannot intercommunicate. There are approximately 15 members of admin staff in each building. Each Admin PC has a 4Mbps NIC installed. NIC “provides a hardware interface between a computer and a network. The term NIC most commonly refers to network adapter hardware in the form factor of an add-in card. These devices plug into the system bus of the PC and include jacks for network cables. NICs are usually Ethernet adapters, but some NICs support alternate physical layer protocols like ATM” (Network interface card.2007). The student database is held on a central server and is accessed via telnet, this is extremely slow and the software interface is dated. Staff has indicated that the method of access and interface needs to be updated.
The Academic Staff network is similar to the administration network in that it is again a token ring network that is not connected to the administrational network - or to staff networks of other buildings. There are approximately 30 members of academic staff in each building. Each member of the academic team has a 4Mbps Token Ring card installed. Staff has no requirements to access student information directly; this is normally done via the administration staff. They do however need to send documents to admin staff and also require access to common areas of storage with both admin staff and students.
Academic members of staff need to be able to publish course documentation on the World ...Download file to see next pagesRead More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Introduction to Network Management Essay Example | Topics and Well Written Essays - 750 words - 1”, n.d.)
Introduction to Network Management Essay Example | Topics and Well Written Essays - 750 words - 1. Retrieved from https://studentshare.org/miscellaneous/1602361-introduction-to-network-management
(Introduction to Network Management Essay Example | Topics and Well Written Essays - 750 Words - 1)
Introduction to Network Management Essay Example | Topics and Well Written Essays - 750 Words - 1. https://studentshare.org/miscellaneous/1602361-introduction-to-network-management.
“Introduction to Network Management Essay Example | Topics and Well Written Essays - 750 Words - 1”, n.d. https://studentshare.org/miscellaneous/1602361-introduction-to-network-management.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF Introduction to Network Management

Cloud Network Management

...? Contents Section Introduction 2 1The Project 2 1.1Project Key Words 2 1.2Freeform Gameplay 2 1.3Project Goal 2 1.4Project Context 3 1.5Project Objectives 3 1.1.6Techniques for Realization 3 1.1.7Report Structure 3 Section 2: The Contextual Review 4 2.1 Market Research 4 2.1.1 Categorization of Gameplay Elements 4 2.1.2 Game Comparisons 4 2.1.3 Comparison Analysis 4 2.2 Market Surveys 5 2.2.1 Target Audience 5 2.2.2 Survey Approach 5 2.2.3 Questionnaire 5 2.2.4 Survey Results 5 Section 3: Project Planning 6 3.1 Design Blueprints 6 3.1.1 Design Approach 6 3.1.2 Design Document 6 3.1.3 Production Planning 7 3.1.4 Testing Plan 7 3.1.5 Evaluation Plan 7 Section 4: Conclusion 8 Section 5: Reference 9 CLOUD NETWORK MANAGEMENT Section 1... :...
10 Pages(2500 words)Literature review

Network Management System

...?Running head: NETWORK MANAGEMENT SYSTEM Network Management System Affiliation Network management is not a simple job it requires carrying out a variety of tasks where IT managers use various system applications, tools and devices to check as well as uphold computer networks. Additionally, different people have different views about network management. In addition, to run a business effectively it is necessary for the IT managers to make sure that the corporate IT arrangement (composed of locations, departments as well as services) is carrying out tasks effectively. Moreover, a network administrator is responsible for managing and organizing the essentials that comprise this high-level analysis. In other words, network management... is the...
2 Pages(500 words)Essay

Network Management

...base. In addition to that he wants to invest in staff to bring them to the required IT level with appropriate training. Major problems in general Despite the fact that the company has been using computer-based systems for over 20 years it still faces the problems mentioned below: There does not appear to be a comprehensive IT strategy in place with emphasis on driving the business forward and creating a positive impact on the bottom line. This is reflected in the current network architecture, which is somewhat piecemeal reflecting a 'fire-fighting' approach in its design. The management has often been rather slow in developing an IT Strategy for training staff, preferring to 'buy-in' packaged...
10 Pages(2500 words)Assignment

Network Management and Protocols

...Network Management and Protocols We also involve our users as much as we can. If the users can be somewhat independent in their own network management functions, the whole system is more effective. If the user can determine whether the LAN segment, the entire network, or the ISP is down, then the number of calls to the technicians can be decreased. The users are also very good at keeping track of consistent problems. They can help determine patterns that result in low response times or complete outages. The fundamental service for network management is SNMP, which stands for "simple network management protocol." It is a component of TCP/IP, which is itself the foundation of the Internet. SNMP is used to provide information about... the...
2 Pages(500 words)Essay

Project Management Network diagram

...completion time is 28 hours with two Type 1 staff are working. i) Currently there are 2 staff (type 1) are working and the minimum duration of the project is 28 hours. It is indicated that 4 staff type 1 can be brought in for the project. Hence, it will be possible to complete the project within the minimum time indicated by the network. ii) If 2 staff (type 1) are working the total time duration of the activities is 55 hours, but when the management is providing 4 staff (type 1), then the total time of the activities will be reduced to 27.5 hours. The expected completion time of the project by the management is 5% above the project critical path time, i.e., 28.9 hours. The project can...
6 Pages(1500 words)Essay

Network Management & Security

...Network Management and Security Assignment Setting up the WAN: With the move of their head office with several multi-story buildings, each housing several hundred networked computers will be now designed to accommodate WAN technologies as follows: The following was drawn using SmartDraw to explain how the network should be set up. By using the an Ethernet switch it will be possible to handle the load that will accompany the relocation of their head office with the multitude of computers they have and will add to their network. This type of network will satisfy their future needs appropriately as they can add in other offices and...
10 Pages(2500 words)Essay

Simple Network Management Protocol

For instance, network operating on SNMP will be associated with three components i.e. managed devices, agents and network management system (NMS). A managed device can be any node configured with SNMP within the network. The primary task of these managed devices is to perform information management in order to publish the information on the NMS (Protocols guide: TCP/IP protocols: Application layer protocols: SNMP: Simple network management protocol. 2007). Example of managed devices includes routers, hubs, switches etc. Moreover, an agent is considered as an application that is installed in a managed device. In addition, an agent also translates information that will be compatible with SNMP. Furthermore, NMS publish information re...
2 Pages(500 words)Essay

Introduction the Playstation Network being hacked

...Introduction In the midst of overarching technological evolution, computer crimes have become overwhelming. Whereas internet based business are working round the clock to invent new ways of making their networks safe, hackers are increasingly becoming wittier. Computer crime entails unauthorized use of computer based technology to access, view, manipulate, share, or steal information from unsuspecting owners. Computer crime is more often common with hackers who spend considerable time learning about flaws in computer based systems especially the ones dependent on network. Most worrying about hackers is that once they hack into sensitive information, they compromise the functionality of...
1 Pages(250 words)Essay

Network Management: Lab 3

...Network management Number: Lecturer: This paper discusses the lessons learned from the ial on firewall ial. The ial discusses firewall tutorial for Cisco 3725. Two routers running simultaneously are used to demonstrate firewalls configurations. There are two terms that are succinctly defined in Cisco routers. Inbound refers to traffic into the router while outbound refers to traffic out of the router. For example application of ACL on inbound traffic at the internal router on fa/00 implies that traffic going into the client network is affected. On the other hand application of ACL on outbound traffic means those that are into the router and not into the client’s...
1 Pages(250 words)Assignment

The Network Management Systems

...The Network Management Systems 1. Introduction The value and strength that an IT network lend to a business cannot be taken for granted and businesses have to carefully design, implement and maintain IT networks. A robust network has become an ultimate business need in corporate world today. These networks play a pivotal role in the growth and expansion of businesses and Network Management Systems (NMSs) have proved quite useful in managing large scale corporate networks. The selection of a correct NMS is vitally important and can lead to a highly...
11 Pages(2750 words)Research Paper
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Essay on topic Introduction to Network Management for FREE!

Contact Us