.

Sunday, July 28, 2019

Network Environment Management Essay Example | Topics and Well Written Essays - 5000 words

Network Environment Management - Essay Example For instance, finance data must be protected and only be accessible to the finance staff. For this purpose, an authentication mechanism i.e. Microsoft Active Directory is implemented. Microsoft Active directory will enable West Products to centralize data in one location and facilitate in audit functions. Moreover, for protecting unauthorized access, audit trails, user account logs are generated. For security aspect, active directory restricts the user from windows components, data sources, and the Internet. To add extra layer for protecting unauthorized access by the internal as well as external employees, Virtual LAN is implemented. The VLAN will divide the departments logically by separate addresses. For instance, Finance department data will not be intermixed with Sales data. For redundant Internet connections, Service Level Agreement (SLA) is established with Internet Service Provider. 2 Introduction The computer networks involved thousands of elements, a variety of devices and protocols, including interactions and relationships between components therefore enhanced network management for large scale systems has developed. In addition, the network has to fully informative and must contain effective management tools in order to make sure efficient and trouble free operations. Now days, non-integrated tools are used for the usual enterprise wide network management. These tools provides incomplete and limited outlook of the network and the management necessities. For this reason, significant problems arise that effect the management techniques. There is a requirement for a Network Management, Analysis and Testing Environment for achieving unified and inclusive software environment that helps to supervise and orchestrate the operations of the devices and protocols within the network management systems. The network management environment management represents the tools that provide knowledge regarding the management techniques. Moreover, effective deployment of the model resolves various network difficulties. The functional behavior of the network objects are confined and distributed equally. For instance, the distribution process and maintenance of data structures via multiple switches and network controls are involved in a virtual-circuit X.25 network. These distributed objects are significantly examined by the individual devices. Therefore, essential data must be handled by this model facility. Likewise, in a multi layered protocol, the behaviors of the network objects and the behavior of an individual layer are extremely correlated. For instance, a telnet session highly depends on the transport-layer (TCP) and network-layer (IP) functions in TCP/IP protocol suite. As a result, the network level connections failure may lead to the failure in the upper layers. This is represented by the network model as the interpretation of correlated behaviors. On the contrary, the statically configurations do not capture all the correlated behavior c hanges as, much correlation are the result of the vibrant interactions between the objects. 3 Proposed Solution for West Products The proposed solution for West products requires a synchronized active directory services along with all the 3 branches including the head office. As shown in fig 1.1, the branches are equipped with an active directory site that is synchronized with all the other sites and the domain

No comments:

Post a Comment