Management of Enterprise-Wide Networking the Term Paper

Total Length: 3545 words ( 12 double-spaced pages)

Total Sources: 1+

Page 1 of 12

These are contained in the Enterprise Operations Center framework. The center has reach to the group of specialized telecommunication commercial and federally concentrated focused professionals within the CSC. These groups of individuals have thousands of certifications for operating Cisco, Microsoft, Sun, Nortel, Ayaya and many other types of equipment that assists any networking or telecommunication requirements of clients who are working with the Center. (Enterprise Network Managed Services Center of Excellence)

In order to entail the network-wide maintenance at the fingertips, Aglient's Network Troubleshooting Center -- NTC indicates a great leap ahead in the management of enterprise-wide networks. NCT includes a centralized view of network health achieved from various sources, including RMON and SNMP and from the same console, centralized expert troubleshooting of remote problems applying distributed network analysis tools. The primary advantages are increasingly lesser respond and fix times and greatly lessened operational costs from both declined engineer travel to site times and from reduced network segment downtime or bad performance. NTC is adopted as console software on a central server and can conveniently acquire and allow interacting network data from multiple sources, along with standard RMON1/2 and SNMP devices, and also of Agilent's Network Analyzer hardware and software products. An excellent user interface permits the operator to analyze the overall health of the entire network and immediately identify trouble 'hotspots'. (Centralized Troubleshooting of Distributed Networks)

The NTC console operator, after detecting a problem, can zoom in and probe into the causes employing full potentiality of the expert protocol analysis executing within any of Agilent's Network Analyzer products which are being distributed at remote corners of the network. Agilent's Network Analyzer products which are both hardware and software-based is designed so as to deal with the various requirements and economic justification for both backbone and workgroup networks and can deal with multiple LAN and WAN technologies incorporating 10/10 Ethernet, Gigabit Ethernet, ATM, Frame Relay, and Packet over SONET. All make use of identical user interface and the same powerful expert analysis. NTC with help of its Network Analyzer products entail a centralized troubleshooting solution that enhances the problem resolution by entailing aggregated network-wide views of performance across multiple LAN and WAN technologies; provides unprecedented integration between problem isolation and troubleshooting; makes possible rapid progression from problem detection and isolation to dealing with integrated RMON statistics analysis and advanced levels of troubleshooting; Estimates the requirements for skilled engineers/technicians at different locations, thus ensuring a small workforce and reducing the time for travel. (Centralized Troubleshooting of Distributed Networks)

Networking and Internet have entailed the corporations a radical instrument for improving productivity and to enhance profitability, opening up the path for the scope of new businesses by means of e-commerce and extranets. This unbelievable technological improvement has infused speedy progress of employee connectivity and the adoption of TCP/IP as the standard network protocol giving rise to an enhanced growth of IP addresses which are beyond the regulation of IT departments. The management of enterprise-wide network involves automation of your IP addresses; ensures reliable and efficient growth of the network; unifying the process of global network infrastructure; creating a shield against the events of network failure; and implementation of the new breed of the Director Services. Meta IP applies a standards-based implementation of the Dynamic Host Configuration Protocol -- DHCP for automation of the IP address which entails a saving up to 83%. (Control your network: Why You Need IP Address Management)

The benefits accrued out of Meta IP implementation include: enhancement of department efficiency; creation of reliable addressing reducing the risk of duplicate IP addresses, enhance accountability allowing to track your employees to individual IP addresses regardless of the workstations they log on to; it facilitate network variations to desktop. The attribute of distributed and modular architecture of Meta IP has allowed thousands of deployments worldwide spanning from small ISPs to global conglomerates with distributed networks and administration. Such architecture permits organizations to implement an IP address management solution dependably and effectively irrespective of the size of topology. The Meta IP can manage global network services from one central place applying the Meta IP Multi-view Interface.

The Multi-view Interface presents information on all managed DNS and DHCP services from four varied views: services, Networks, Locations and Dynamic. Meta IP makes it possible to generate an overarching IP address and name space schema for the global organization by centralizing all network service information under one interface. Meta IP generates a shield against duplicate IP address with a standards-based implementation of DHCP. The Meta IP of Meta-Info includes multiple levels of fault tolerance to maintain network access up and running.

Stuck Writing Your "Management of Enterprise-Wide Networking The" Term Paper?

The first level of fault tolerance incorporates redundant service architecture. When a service interrupts, the secondary can immediately take over the role of the primary. In case of the Meta IP DHCP service, this becomes a real time, 100% redundant service, instead of the conventional method of distributing such lease pools making sure of the complete availability of all IP addresses. (Control your network: Why You Need IP Address Management)

Conventionally the organizations depend on policies and communications of high level instructions from the management. Issue of such documents once developed at one time in the organization's evolution to capture the current environment. One of the major confrontations for an organization in this area is the persistent growth and adaptation of the policies to mirror the transformation within the organization. The rapid area of growth and change within an organization is Information Systems. With the rapid growth and inclination towards new technologies, organizations discover themselves striving to maintain present technical environments with the traditional policies. Moreover, the emergence of new technology strategies like Intranets and Extranets, security and the protection of informational assets has become significant. (Defining an enterprise-wide Security Framework)

The enterprise-wide Information Systems Security Policy is considered to be the first step and it is required to be consistently implemented even as business requirements vary. However, most of the companies seen to have only a small bits and pieces of security found dispersed throughout the organization. Such policies are seen to be only a consolation for the departments or individual to feel safer but they have little effect to safeguard the enterprise as a whole. In order to effectively deal with such requirements, PricewaterhouseCoopers has devised a security knowledge management system under the heads of the Enterprise Security Architecture System -- ESAS. The basic idea is to assist an organization in entailing a key security infrastructure tool. Normally, ESAS is built on PPT methodology involving People, Policy and Technology. The PPT methodology regards the security process as a mixture of these three elements and predicts the control environment to be greatly enhanced when such three elements work in combination. (Defining an enterprise-wide Security Framework)

It has been increasingly challenging for the vendors providing security capabilities to enterprises. Many players from carriers to traditional firewall companies and software vendors and presently wireless vendors are peeping into the arena. Aruba wireless stated to address the classical enterprise-wide security incorporating endpoint security with an extension to its grid architecture that permits access points to be plugged into prevailing Ethernet ports and leverage the present cabling infrastructure. While those mobile tools interact to the corporate network through a WLAN or by plugging into a wired Ethernet port, they normally circumvent the firewalls and the intrusion safeguard systems in the corporate data center guarding the Internet perimeter. The grid points are designed to eliminate the necessity to replicate very expensive security systems in all the wiring closets throughout the enterprise. Instead the inexpensive grid points acquire and tunnel wired user traffic to the controllers in the data center for policy implementation. (Aruba tackles enterprise-wide security)

In the traditional models, it is considered easier to regulate the external flow of traffic into and outside of the hub offices, and the spoke offices would return to the hub offices for accessing the Internet. The meticulous IT managers would involve time to deploy measures between hubs and spoke offices to make it certain that if one site is found to be vulnerable it could be easily isolated and would not be made the rest of the offices in the enterprise network vulnerable. But, the fully meshed network entailing Internet access to every office over the VPN and remote workers accessing the offices over the Internet shows an exciting security concern. (Enterprise wide security on the Internet)

The offshore technical support services are considered to become a fact of life for many technology vendors and their customers. Amidst the growing tendency towards atomization it has become obligatory to execute the applications that streamline the varied business processes. In the field of software development outsourcing services the vendors entail various outsourcing services with regards to the existing business problems. They have been skilled to implement the new technologies and techniques. Their expertise and skilled services along with cost effectiveness led the offshore outsourcing service providers so significant.….....

Show More ⇣


     Open the full completed essay and source list


OR

     Order a one-of-a-kind custom essay on this topic


sample essay writing service

Cite This Resource:

Latest APA Format (6th edition)

Copy Reference
"Management Of Enterprise-Wide Networking The" (2005, August 30) Retrieved May 2, 2024, from
https://www.aceyourpaper.com/essays/management-enterprise-wide-networking-67338

Latest MLA Format (8th edition)

Copy Reference
"Management Of Enterprise-Wide Networking The" 30 August 2005. Web.2 May. 2024. <
https://www.aceyourpaper.com/essays/management-enterprise-wide-networking-67338>

Latest Chicago Format (16th edition)

Copy Reference
"Management Of Enterprise-Wide Networking The", 30 August 2005, Accessed.2 May. 2024,
https://www.aceyourpaper.com/essays/management-enterprise-wide-networking-67338