Understand the relation between the network management functions.
Topic of Discussion
Some network management functions can be related together like the security management, the fault management and the performance management.
Give an example of problems that can be managed by considering the relation between these management functions.
ANSWER:
FCAPS(fault, configuration, accounting, performance, security) categorizes by working of network management into five different levels. The levels are: security level, the configuration level, the accounting level, the performance level and the fault-management .
1)Security Management:
At this level, the network is protected from hackers or unauthorized users. The confidentiality of user information is maintained where warranted. Security Management system also take note on the all activities happening with in the system and also allow network to control what individual user can or cannot do with the system.
2)Fault Management:
At this management level, Fault Security Management check the network and problems and help to solve the problems. The problems that could be occur in future are checked and managed to not happen in future. Using fault management, the network stays operational, and downtime is minimized.
3)Performance Management:
Performance Management System is used to Manage the the overall Network System. It also maximize how many units of information a system can process in a given amount of time , The area where data flow is stopped is avoided, Many other problems are also identified. A major part of the effort is to identify which improvements will yield the greatest overall performance enhancement.
IF YOU HAVE ANY QUERY PLEASE COMMENT BELOW.
PLEASE GIVE A THUMBS UP.
Understand the relation between the network management functions. Topic of Discussion Some network management functions can...
Pick a topic: NM – Network Management CF – Configuration Management CP – Capacity Planning SE – Security BC – Business Continuity FM – Facilities Management AV – Availability Management PT - Performance/Tuning PA – Production Acceptance CM – Change Management PM – Problem Management SM – Storage Management. Find a related case study, a good example at your work, or at another company. Here are some SAMPLE questions: Did Company X have a formal change management process? Did something...
In your company’s management development program, there was a heated discussion between some people who claimed, “theory is impractical and thus no good,” and others who claimed, “Good theory is the most practical approach to problems. “What position would you take and why?
in your company management development program, there was a heated discussion between some people who claimed, Theory is impractical and thus no good and other who claimed Good theory is the most practical approach to problems. What position would you take and why?
Could someone help answer the following for a discussion post: 1) Bones serve, among other functions, to protect organs. For example, the thoracic cavity encloses and protects internal organs like the heart, lungs, trachea, esophagus, etc. There are cases of individuals who have elective surgery to remove ribs in order to create a smaller waist. What are the risks related to this surgery related to protection of internal organs? Can you think of other types of cosmetic surgery that place...
Hello
these are midterm study guide questions for my
C++ class. I need some clarification on how to
understand and write these functions.
Can someone write out examples and use definitions on how to go
about the stuff listed below?
again this is for an introductory C++ computer science class
Functions Predefined Functions Know basic predefined functions covered from <cmath> Know how to use the rand) function from <stdlib.h> Be prepared to convert arithmetic expressions to function calls. Programmer Defined...
Managing Technology Projects The focus of chapter 14 is on the topic of Project Management as it relates to information technology projects. The key to any successful project is effective project management. The lack of good project management will likely lead to a series of setbacks such as cost overruns, time slippage, or poor technical performance among many other possibilities. Additionally, as the level of project complexity increases, the associated risk also becomes greater. Large enterprise projects are often complex...
Please answer the following questions: 1) Describe the main functions of a computer network (12 marks) 2) In your own words, compare the three types of files: directories, ordinary files, and special files. Explain what would happen if a user modified a directory file (10 marks) 3)What are the advantages of having a Windows system using the menu-driven interface, instead of typing commands. Give at least one example where having menus is an advantage (6 marks) 4) Identify at least...
Managerial Compensation is a highly controversial topic in our society today. Some believe that CEO compensation is warranted while others believe that there should be a cap on the level of compensation managers can earn. After reading the section in Chapter 1 on "The Agency Problem and Control of the Corporation," please weigh in on this debate. Be sure to consider important factors such as agency problems and the concept of maximizing shareholder value. Do these views differ in reference...
Hi, I'm intake the managament? course now so there are some
questions about topic leader and leadership that I don't quite
understand clearly. And here is the question that I want to ask.
Can you describe these traits, and the behaviours linked to each?
Can you explain why they are needed for effective leadership? And
if possible, can you give me the example for each trait which show
that these trait are linked to behaviour? Thank you!
Figure 11.1 Traits...
1. Data management, device management and network management of IoT is crucial to data integrity and transmission. T F 2. An IoT application is a set of wireless devices that act together to perform some sensing and control function. Most applications also provide a user interface, such as a mobile app or cloud-based service. In general, each application is deployed independently of any other applications that may be operating in the area and forms its own separate, cryptographically isolated network....