StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Information Technology : NETWORKING Assignment - Essay Example

Cite this document
Summary
Network maintenance, at its essence, is doing whatever is required to keep the network functioning and meeting the business needs of an organization (Claise and Wolter 2007). The subtleties of each network should be considered when constructing a structured network maintenance…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER96% of users find it useful
Information Technology : NETWORKING Assignment
Read Text Preview

Extract of sample "Information Technology : NETWORKING Assignment"

Network Management: Routine Maintenance tasks XXXXX XXXXX XXXXX XXXXX XXXXX Network maintenance, at its essence, is doing whatever is required to keep the network functioning and meeting the business needs of an organization (Claise and Wolter 2007). The subtleties of each network should be considered when constructing a structured network maintenance model. This is considering that the list of tasks required in maintaining one network could be quite different from the list of tasks required to maintain another work.

Network maintenance tasks can be categorized as; structured tasks or interrupt-driven tasks.In structured tasks approach, maintenance is performed as a predefined plan while in interrupt-driven tasks approach the maintenance involves resolving issues as they are reported. Routine network maintenance tasks help administrators in not forgetting important tasks, for example, file servers backup. These routine maintenance tasks also help in the efficient response of the network manager. They are able to respond to problems, ideally before the end user is impacted.

This gives them the element of proactive approach to network maintenance since they are able to monitor all their network data for early warning signs across their entire IT infrastructure.It is important for the manager to provide the Network Operation Center (NOC) with controlled, self-service and real time data access from the network devices (Mani 1999, p. 50). The NOC uses this data in analyzing the performance and utilization of the network. They are able to project the load, peak time and network downtime with charts and graphs.

As a result, the NOC can diagnose problems much faster by searching and analyzing all the network infrastructure data. The manager’s routine tasks will provide him with this and more data to use and therefore tangible results to the NOC.An important part of routine performance tasks for a network manager is checking the network logs. Frequent monitoring of the network logs gives a detailed visibility of the function points and failure point of the network to the manager. Managers are at an advantage using the logs for post-incident analysis; this means that they can deduce what caused a fault or certain failure in the network using the logs.

In essence, this routine gives the manager a well detailed visibility of their network and clear analysis that they need to troubleshoot issues.“There is no dull moment in a network manager’s routine” – this is the description that most managers give about their work. In an enterprise network change is one constant that is unavoidable and with latest innovations it is happening at an alarming rate. For this reason, a manager has to be most informed and have up to date technical know-how.

Safeco can benefit from this by being able to implement new technologies that are more efficient and that could drive its business objectives towards the set goals and standards. An efficient manager in their role has to have the desire to learn. This is coupled by the motivation to go forward in the face of a widening array of technologies to support. This gives the network manager some business acumen to understand the role of IT and be able to explain it to senior managers in a way that makes sense to them.

Safeco will benefit from this by having the valuable input of the manager in streamlining the business process.Resource consumption in problem response is significantly reduced by an efficient network manager. Safeco will benefit from reduced obsolescence of relatively new purchases. This is because the routine and efficiency considers underlying business goals where resources are allocated to complement business drivers. A harmonized role playing, between the head manager and assistants ensures that the IT personnel do their work in more structured way.

Safeco will benefit by utilizing the workers energies in meaningful development for the company.ReferencesClaise, B & Wolter, R 2007, Network Mangement: Accounting and performance strategies, Cisco Press, San Francisco. Clemm, A 2006, Network management fundamentals, Cisco Press, San Francisco. Limoncelli, T, Hogan, J & Chalup, S 2001, The Practice of system and network administration, Addison-Wesley Professional, Boston. Mani, S 1999, Network management: Principles and practice, Addison Wesley, Boston.

Oppenheimer, P 2010, Top-down network design, John Wiley and Sons, New York.

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Information Technology : NETWORKING Assignment Essay”, n.d.)
Information Technology : NETWORKING Assignment Essay. Retrieved from https://studentshare.org/miscellaneous/1582674-information-technology-networking-assignment
(Information Technology : NETWORKING Assignment Essay)
Information Technology : NETWORKING Assignment Essay. https://studentshare.org/miscellaneous/1582674-information-technology-networking-assignment.
“Information Technology : NETWORKING Assignment Essay”, n.d. https://studentshare.org/miscellaneous/1582674-information-technology-networking-assignment.
  • Cited: 0 times

CHECK THESE SAMPLES OF Information Technology : NETWORKING Assignment

Strategies of Social Networking

This assignment "Strategies of Social networking" discusses marketing strategy where a company awards an affiliate some amount of money for any customer that they bring.... With this, the company gets to sell the product while the affiliate makes money.... hellip; There are various ways in which people make money through social media marketing....
7 Pages (1750 words) Assignment

Storage Area Network of Carlson Companies

This paper illustrates that the effective way to implement a SAN requires computing different or all the existing servers by deploying multiple servers thereby allowing them to organize automatically by creating unconnected information islands.... However, in the case of Carlson SAN approach, each of these created islands will be accessible to only one computer; therefore, if computer B needs to use information created by computer A, then computer B needs to copy such information from computer A....
6 Pages (1500 words) Assignment

Use of Technology in Peoples Lives

In this case, people are able to connect through social networking sites such as Facebook and Twitter.... In fact, accessibility to these social networking sites has been facilitated by the internet.... In this case, people are able to connect through social networking sites such as Facebook and Twitter.... In fact, accessibility to these social networking sites has been facilitated by the internet.... The author of this paper focuses on the use of technology in people's lives....
6 Pages (1500 words) Assignment

Proposition 8

The development of information technology and computer science has both positive and negative effects and on the negative side, it has led to different unethical practices.... As an effect, it has been recognised that the names of the married persons along with their addresses and financial contribution towards the campaign has been recorded for the future references through social networking websites.... It can be evidently asserted that the actions undertaken in the Proposition 8 of providing private information publicly through social networking websites have raised problems relating to inconvenience of accessing information and breach of privacy....
1 Pages (250 words) Assignment

Applications of Graph Theory

These sections include networking, programming, data mining, security, and databases.... networking is a major area where graph theory is widely applied.... The two major applications of graph theoretical concepts in networking are Shortest Path Algorithms (SPAs) and the Minimum spanning tree concept.... Computer networking depends heavily on theoretical concepts of graph theory.... Computer network refers to a linkage of one computer to another in order to exchange or interchange information....
4 Pages (1000 words) Assignment

Network and Telecommunications Concepts

A type of plug connection that connects PC to routers and switches etc is Ethernet and is a networking port.... hellip; It is a technology that is frame-based for local area networks.... FDDI, SONET, or Token Ring technology is used to implement a ring network....
5 Pages (1250 words) Assignment

Effects of Social Media

Newspapers, internet, television, or printed matter that provides the public with the news, entertainment, information, together with adverts are some of the examples of media.... edia use is prevalent when particular information needed to reach a certain audience is necessary.... Channelling and broadcasting of mass information take place here....
4 Pages (1000 words) Assignment

Thin Client Computing

… IntroductionThin client computing also referred to as slim or lean is computer technology that heavily depends on other servers and computers to fulfil traditional obligations.... This means that all information that includes software and hardware are IntroductionThin client computing also referred to as slim or lean is computer technology that heavily depends on other servers and computers to fulfil traditional obligations.... Generally, thin client technology protects the data and information, hiding all weak points that can be used to penetrate the security system of the institution (Net Work Computing Lab, 2009)....
6 Pages (1500 words) Assignment
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us