An impressive growth can be expected in the use of the communication network taking into consideration few years down the lane. In order, to optimize and initiate the operation of this network, a good management the network facility should be incorporated and adopted. Network management as a term can have many definition depending upon whose operation function is at the questions end. Taking into consideration any organization the concept of the network management system has to be very much geared up taking into account the workflow of the organization in which the concept would be implemented and utilized [1].
The main aim of the report is to put direct focus on the concept of the network management taking into consideration various important area linked with the aspect such as security details, reliability and many more.
The concept of the network management have come along a long way over the past few decades. Taking into consideration recent times the users and the vendors have all the freedom related to choose of the network management system (NMS) or a combination of the systems. These choose was made according to the requirement and which concept suits the best in the environment in which it would be deployed. On the other hand it can be stated that it was not so easy and simple, if few committed open network evangelist vision was not applied into the concept of networking even today the users would be have been stuck with the vendors –proprietary network management system (NMS) solutions.
Network management can be considered as an act of monitoring, initializing and modifying the operations of the primary functions of the network[2].
Primary network functions can be related to those functions that support directly the requirement of the user. They directly allow the user to access the network and they take care of the data, which is being exchanged in the process. As accepted globally that any management process involves planning, organizing, monitoring, accounting and controlling of the resources and the activity [3]. This can also be applied when taking into consideration the management of the network. The OSI and the internet network management structure are directly focused principally on the concept of monitoring, control network management, accounting. The other two aspects, which can be applied to the concept of network management, which are planning and organizing, are not involved in to the model.
Business organization have no value if the management of that organization is not up to the mark, it can be applied to the concept of networking. If the networks were not managed properly, it would be of no value. The communication between different machines such as switches, computer and private branch would have been very much difficult of the architecture of such machines were different from each other. The level of difficult would be increasing in the future due to increase in the complexity of innovation and technology so reduce the difficultly issue networks add more functions, components and more users into the concept. The internet activity can be considered one of the most thrust into the concept of the network management. These initial efforts were first initiated through AARPAnet research project that originated in the United States[4].
The concept of network management security directly reduce the human error and the manual task by simplifying the administration with the security policy and the workflow tools through a centralized management interface. The network management security can reduce the risk across the network and protect the data by means of leveraging the information on threats, vulnerability of the network and their criticality, evaluating the potential options to block an attack and providing the intelligence for the decision support. The concept of policy administration is improved by unified common policy tasks, which are within a single interface, automating policy change workflow, which may include compliance audits and the concept of the management of the multiple firewall vendors.
The software, which controls the signaling system and the switching machine, can be considered as a major source of network vulnerability. Computer programs are written and designed by human being, which may include some error, which can sometimes be very much catastrophic taking into consideration its effect on the network and may even propagate through the network via the signaling system [5]. Automatic technique in order to verify the computer program does only the intended job only and is free of error is one of the major research area but are not yet foolproof. Meanwhile the only real solution that can be implemented in the area is to expect less errors and their effect through appropriate testing and safeguard [6].
Each user wants a best possible network at the lowest possible price. The best way to reach such a position is by spreading the cost of the design over a large number of users. This mainly require that the design should not be tailored to a specific requirement of a single user group but on the other hand general enough to accommodate the requirement of more than one user. The design should be thus a multipurpose design, which directly mean that it should be possible to use mass production technique. These implementations would directly reduce the overall cost related to the management of the network [7].
Advantage
Disadvantage
Conclusion
It can be concluded from the report that the network management plays a very important role and would be playing a huge part in the communication process in the near future. It can be stated that if the networking is not organized and planned properly the amount of effort, which would be applied, to the aspects of accounting, monitoring and controlling would become futile.
References
Chowdhury, Shihabur Rahman, et al. “Payless: A low cost network monitoring framework for software defined networks.” Network Operations and Management Symposium (NOMS), 2014 IEEE. IEEE, 2014.
Das, Anupam, et al. “Transparent and Flexible Network Management for Big Data Processing in the Cloud.” HotCloud. 2013.
De Gante, Alejandro, Mohamed Aslan, and Ashraf Matrawy. “Smart wireless sensor network management based on software-defined networking.” Communications (QBSC), 2014 27th Biennial Symposium on. IEEE, 2014.
Kim, Hyojoon, and Nick Feamster. “Improving network management with software defined networking.” IEEE Communications Magazine 51.2 (2013): 114-119.
Mijumbi, Rashid, et al. “Management and orchestration challenges in network functions virtualization.” IEEE Communications Magazine 54.1 (2016): 98-105.
Palizban, Omid, Kimmo Kauhaniemi, and Josep M. Guerrero. “Microgrids in active network management–part II: System operation, power quality and protection.” Renewable and Sustainable Energy Reviews 36 (2014): 440-451.
Sandström, Annica, Örjan Bodin, and Beatrice Crona. “Network Governance from the top–The case of ecosystem-based coastal and marine management.” Marine Policy 55 (2015): 57-63.
Seppänen, Janne, Martín Varela, and Aggeliki Sgora. “An autonomous QoE-driven network management framework.” Journal of Visual Communication and Image Representation25.3 (2014): 565-577.
Van Meerkerk, Ingmar, Jurian Edelenbos, and Erik-Hans Klijn. “Connective management and governance network performance: the mediating role of throughput legitimacy. Findings from survey research on complex water projects in the Netherlands.” Environment and Planning C: government and Policy 33.4 (2015): 746-764.
Essay Writing Service Features
Our Experience
No matter how complex your assignment is, we can find the right professional for your specific task. Contact Essay is an essay writing company that hires only the smartest minds to help you with your projects. Our expertise allows us to provide students with high-quality academic writing, editing & proofreading services.Free Features
Free revision policy
$10Free bibliography & reference
$8Free title page
$8Free formatting
$8How Our Essay Writing Service Works
First, you will need to complete an order form. It's not difficult but, in case there is anything you find not to be clear, you may always call us so that we can guide you through it. On the order form, you will need to include some basic information concerning your order: subject, topic, number of pages, etc. We also encourage our clients to upload any relevant information or sources that will help.
Complete the order formOnce we have all the information and instructions that we need, we select the most suitable writer for your assignment. While everything seems to be clear, the writer, who has complete knowledge of the subject, may need clarification from you. It is at that point that you would receive a call or email from us.
Writer’s assignmentAs soon as the writer has finished, it will be delivered both to the website and to your email address so that you will not miss it. If your deadline is close at hand, we will place a call to you to make sure that you receive the paper on time.
Completing the order and download