This website uses cookies to ensure you have the best experience. Learn more

Network Management Essay

1528 words - 6 pages

In the following report I will discuss the role of network management and how the network manager contributes to the network security of an organisation. Network security will be discussed in full to inform on how big of an impact network attacks can have on an organisation. Once the impact of network security has been covered I will go through all possible threats that can harm an organisation and the steps network managers should go through to secure a network to the best of their ability. The importance of network tools will be introduced last along with benefits they can provide.
Network management
Network managers are responsible for ensuring efficiency through a network, this includes a number of jobs such as monitoring the network for problems and fixing them before they affect the network users, making sure network security is fully updated and capable of protecting the network from all threats, restricting employee access to files they do not require, updating networks with different routing protocols and making sure two networks are compatible in the event of a business merger or expansion and resource keeping. Resource keeping refers to keeping track of the resources on a network and making sure that users who need it have access. Network managers can be responsible for other jobs, which vary depending on their place of work, such as planning and developing new networks.
In relation to the network that has been designed the network manager should ensure that all routers are compatible with each other, regarding router protocols such as EIGRP where a process ID must match if you want the routers to become adjacent, and are addressed correctly to make sure data can be sent to its destination from anywhere on the network, to test this a ping command could be used. Another high priority job would be to ensure a backup in case the network goes down, this backup needs to be ready at all times, implemented as soon as a network goes down and ideally not interfere with users if this can be avoided.
When configuring the new network the network manager needs to make sure all the hardware is correct, such as the right cables are been used between two devices. For example if the chosen routing protocol was EIGRP then the equipment would have to be Cisco equipment since EIGRP is a Cisco only protocol. Also in the designs we have a switch to switch scenario which requires a cross-over cable unlike the other connections that are either using straight through or serial, when a router to router connection is made.
Network Security
Network security is a job the network manager must put a lot of time and effort into once the network has been set up and correctly configured as mentioned above. Networks are constantly under threat in organisations from a number of threats such as hackers and even employees angry at the organisation. People can have a wide variety of motives for purposely harming the organisation, by gaining access to their network, from...

Find Another Essay On Network Management

Organizing Function of Management Paper: PPL Network Marketing

1271 words - 5 pages The organizing function of management can be defined as creating a structured plan in order to set the direction of an organization, human resources, knowledge, technology and so forth in a strategic manner toward achieving set goals (Bateman T., and Snell S., 2007). Managers in network marketing organizations are responsible for setting the standard in creating a working structure for organizing human resources and knowledge to create a

Network Design Essay

1566 words - 6 pages covers the network portion of the address and the second part covers the host portion of the address. The host portion can be further partitioned (optionally) into a subnet and host address. A subnet address allows a network address to be divided into smaller networks”(Basic Network Design). When it comes to IP address, IP address management is essential. According to the book basic network design, it states that IP address

Network Security

1286 words - 5 pages , inventory management, etc. (Network 1) In a world considered perfect, companies would be able to combine all of their computer systems together both new and old (Network 1). Expenses make it difficult to totally replace old systems with new ones. Beyond the purely financial costs involved, doing so often requires retraining thousands of employees and making changes to long-established systems and processes. The bad thing about many legacy systems

Network Security

1567 words - 6 pages network is directly proportional to its complexity Law #9: Security isn't about risk avoidance, it's about risk management Law #10: Technology is not a panacea. 3. Security Technologies Some ways to protect yourself and your property is to implement some of today's latest network technologies. One thing to keep in mind is that you cannot protect yourself using only one of these devices. It requires a full army to keep all intrusions at

network processor

724 words - 3 pages read any of the information going through it. It can be active or passive however. An active hub will strengthen and regenerate incoming signals before transmitting data to the next point in the network, while passive hubs do nothing with the signal. There are intelligent hubs that exist and the will offer different operational management capabilities. While a regular hub operates at Physical Layer 1 of the OSI model, an Ethernet hub will

network administration

1394 words - 6 pages a. It is advisable to use Link State Routing protocol when dealing with a big network of fifty (50) routers or more. Link state offers numerous advantages over its counterpart routing protocol as it has been modelled to overcome the shortcomings of the Distance-vector protocol. JUSTIFICATION • One of the modifications is that link-state multicasts routing updates to the network. By so doing, only routers that are affected by the change in the

network security

667 words - 3 pages Unauthorized Network and system access – An attacker needs access before being able to perform any attacks. An attacker can be a disgruntled employee, an employee that has become a victim if social engineering or a competitor. Access can be achieved by gaining control of resources or by connecting equipment to the network. The risks posed by unauthorized network access are: unauthorized join or network expansion, VLAN join, VLAN tagging or

Dish Network

1362 words - 5 pages The rate of success in managing an organization can be either productive or non-productive. With management the key to success is to have a manager who uses the four functions of management to their advantage. Planning, organizing, leading, and controlling are the functions; the keys to successful management. We look at Dish Network and emphasize the external and internal impacts on globalization, technology, innovation, diversity, and ethics

network configeration

2000 words - 8 pages given time is 100: 33 regular users in the State Office, 30 regular users in the North District Office, 30 regular users in the South District Office, and seven otherwise unanticipated users.Three priority levels will be supported: management (top priority), user (medium priority), and background (low priority). Note that these designations do not correspond to administrative levels in the public education system; rather, they are network

opportunistic network

1608 words - 7 pages theories was introduced by researchers to overcome the constraints. There is Epidemic Routing Approach by flooding the network to exploit the best possible delivery delay brought by mobility. This scheme achieves the optimal delay with unlimited relay buffers. However, such a multiple-copy scheme generally incurs significant overhead on storage constraint. Another theory from other researcher is a buffer-management strategy, RRFS-with-RandomDrop, to

Network Threats

949 words - 4 pages Touro University International ITM501 - Management Information Systems and Business Strategy Module 3 Case Assignment: Network Threats 21 June 2010 Interconnection of work and home computing Employees may bring computer viruses to work from their home computers, just as they bring germs to the office from their home. In both cases, the only necessity for infection is contact with an infected source, to a

Similar Essays

Corporate Network Management Essay

2150 words - 9 pages Corporate Networks in organisations can be complex structures that “requires a great deal of attention” (Clemm 2007). Even small companies can have quite complex networks that are a considerable investment to the business. The notion that corporate network management is a cost to a business rather than a continual beneficial investment is a naive assumption that requires further investigation to the benefits that network management brings. Clemm

Computer Network Management Essay

1391 words - 6 pages The Basics of Network Management In the computer world, networks are the primary means of inter-computer communications. The building and maintenance of a network is the responsibility of the network manager. The network manager must have the expertise to design and implement an appropriate network for his client. The proper design of a network is based on more than a few principles. However, the job of the network manager encompasses

Cmip Vs. Snmp Network Management Protocols

2247 words - 9 pages 2shows a modern day WAN. Last year, a survey of Fortune 500 companies showed that15% of their total computer budget, 1.6 Million dollars, was spent on networkmanagement (Rose, 115). Because of this, much attention has focused on two familiesof network management protocols: The Simple Network Management Protocol(SNMP), which comes from a de facto standards based background of TCP/IPcommunication, and the Common Management Information Protocol

Social Media's Role In Network Management In Big Data

844 words - 4 pages Network Management in Big Data In day today world social media and social networking has received much attention from every people, like almost everyone has a Facebook account. This is where huge amount of data is being processed every day, in fact every second where Social networks accounts for large amount of consumer "big data". The average global Internet user spends two and a half hours daily on social media, in this scenario just consider