Understanding Network Management Tools And Operations Network Management Systems

Discovering the Network devices

Discovering the Network devices- Network device tools come under the network management tools, infact these tools can be termed as the subset of all the network management tools. These discovery tools are all used to identify all the devices that are available on network. If the network connection gets disrupted then these devices can troubleshoot and find out the root cause behind the failure of the network and the network devices (Deelman et al. 2015). Thus it ca be concluded with the aid of the network discovery tool, all the devices on the network can be assessed. The tools provide valuable information which can be later used to troubleshoot the network.

Save Time On Research and Writing
Hire a Pro to Write You a 100% Plagiarism-Free Paper.
Get My Paper

Network device monitoring- Some network tools are used as the device monitoring tools. All the tools are helpful to monitor the devices on the network at device level. The tools that are used for the monitoring purposes and they can assess the health of particular network components. These tools are all used to analyse the extent to which their performance matches the capacity plans and intra-level agreements. The device monitoring tools can prove to be fruitful at the time of troubleshooting of network. These tools can detect the errors, can detect the packet loss, can detect the CPU usage and also other factors that can access the data loss. Thus these tools can be useful in analysing the network issues.

Network performance analysis- Network performance analysis tools are utilised to analyse the network performance. In case of troubleshooting, the performance analysis tools can help in diagnosing the definite issue that a certain device is struggling from (Sallabi and Shuaib 2016). The performance of the network is assessed by tracking the performance indicators like the Bandwidth utilisation, latency, availability, packet loss and uptime of routers, switches and other simple network management protocol enabled services.

All the information gathered can be matched with all the network parameters and the performance benchmarks can be utilised to perform troubleshoot, assess and rectify all the issues related to the network performance.

Intelligent notifications- Network tools are also capable to offer the intelligent network notifications. The intelligent notifications tools are the network tools that are configurable alerts and they only respond to specific network scenarios or circumstances by calling, texting, paging or calling network administrators (Rajesh and Gnanasekar 2015). Network notification is the reason for conducting the troubleshooting. These tools can be used to assess the issues beforehand if any network disruption occurs.

Save Time On Research and Writing
Hire a Pro to Write You a 100% Plagiarism-Free Paper.
Get My Paper
  1. Briefly review the various business models and business processes used in telecommunications management networks

A business model is organisational as well as the functional structure or can be stated as domain. This domain is used to control the business activities within the enterprise premises. There are several business models and they are all used as part of telecommunications management networks. The business model includes the Management Focus:

What considerations will need to be included when investigating enterprise solutions for a given situation?

Several problem-solving and the investigation procedures have been planned to conduct mitigation of the issues raised. The following considerations are made:

Problems related to database and tem solutions to mitigate all the issues

Network device monitoring

A database of solution is considered as one of the problem solving tool that is used to curb the down the time that can take to locate a fault. The employees store data in the database so that the data can be searched, accessed or processed (Alnaser and Ochoa 2015). The database of solutions provides solutions following which the issues related to database can be mitigated and provides solutions so that the database can be accessed with simplicity and with ease and it will take significantly less time

While problems occur within the network, the database of solutions generally search for the following factors –

  • Faults
  • Actions that ought to be taken
  • Faults Location
  • Symptoms
  • Causes of Faults
  • Solutions

The database of solutions will take preventive measures to safeguard the data of the database (Mijumbi et al. 2016). There are several faults associated with the database and the database of solutions ensure that through proper planning and maintenance the lost data can be restored or can be protected. Again, the integrity of the system can be conducted.

The documenting signs as well as the symptoms faults that are included in the project are used for future system management. It is vital that the clear and detailed instruction is included to make sure that the information will be suitable for the purpose.

What are the different types of operations network management systems you might need to evaluate?

There are several operations network management system and they are-

Hierarchical model- The hierarchical model aids easy flow of communication. The hierarchical model is able to diminish the need of the support staff because of simplicity, because of self-management and the monitoring capabilities of the network layers.

Network model- Network Technologies is one such technology that is used to work as per desired performance levels (Arasu et al. 2016). There are several capabilities of the networking technologies, one of the functionality of the technology is to receive data and transmit data from one host to other depending on the network protocol and the network address items that are communicated.

TCP/IP- All these protocol stacks are used for the implementation of the protocol suites. All these protocol suites are useful for the network operations. These are the instructions which are transferred between two points in a network.

OSI- OSI is one such model for communicating over the network. It is one of the most popular and widely used network protocol suite, they help the vendors and the developers in creating the software and the hardware products that are interoperated by one another (Sinyagov et al. 2016). The OSI suite is useful in choosing both the software as well as the hardware resources whereas it is not possible in cases of IP/TCP protocols.

What should you do to determine the organisational policies and procedures that relate to management systems?

It is required to assess that the procedures and the policies that the enterprises follows are adhere to the management system or not. The telecommunication management system can be found through the following procedures like –

  1. Mapping impacts and processes associated with telecommunication management network (Mitchell et al. 2015).
  2. Considering the department where the tasks are decided upon to be carried out within.

What types of benefits and changes to the organisation or industry might you identify through conducting an evaluation of the impact of the workplace and industry environment on the use of a telecommunications management system?

Network performance analysis

There are several benefits that have been identified for the project is enhanced compliance better service quality, improved reliability (Nasimifar et al. 2016). The evaluation as well as the workplace and the industry and it help in reducing the resource costs and the support.

Written Activity Checklist

For this assessment, the student must complete the written activity.

The written activity is a stand-alone activity that will allow the student to display the required knowledge and skills that are essential when deciding overall competency.

Student’s name:

Assessor’s name:

 

Has the student satisfactorily completed the written activity?

Yes

No

Did the Student provide evidence of their ability to research the following topics and outline the findings in a report:

What information will you need to consider and include when evaluating administrative network management systems?

£

£

Briefly review the various business models and business processes used in telecommunications management networks

£

£

What considerations will need to be included when investigating enterprise solutions for a given situation?

£

£

What are the different types of operations network management systems you might need to evaluate?

£

£

What should you do to determine the organisational policies and procedures that relate to management systems?

£

£

What types of benefits and changes to the organisation or industry might you identify through conducting an evaluation of the impact of the workplace and industry environment on the use of a telecommunications management system?

£

£

Feedback to Student:

Result   o Satisfactory o Not Yet Satisfactory

Assessor’s Signature:

Date:

The following task must be demonstrated in consistent performance in conditions that are safe and replicate the workplace. Noise levels, production flow, interruptions and time variances must be typical of those experienced in the telecommunications – project management field of work and include access to:

  • A telecommunications operations site with a network management system
  • Networked computers with relevant software

For this task you are to complete the following steps to research, evaluate and report on a telecommunications management network.

  1. Research, and document, the architectural features and functions of the network management systems, in both common carrier and extended models

The network management architecture model defined in the extended models and the common carrier are as follows-

  • Extended network model involves the elements like the satellites (Nafi et al. 2014)
  • Common carrier model architecture that are used in case of the common carrier model architecture transfers data and the communication across WLAN and LAN networks
  1. Research, and document, the major features, configuration and functions of the management systems, including Standards Committee International Telecommunications Union, (ITU-T) TMN architecture and network models

The network segments as well as the network elements must be analysed and then must be evaluated, only then the functionality of the network segments can be assured (Xu et al. 2015).  The functionality of the standards must adhere to the Standards Committee International Telecommunications Union.

  1. Research, and document, the procedures for fault management and accountability, including:
    1. Techniques for collecting management information from network nodes using interrupts and polling

The faults must be analysed from the initial to the end and by using those techniques the following can be considered-

  • Rectification speed
  • Persistent issues
  • Resources that are used for the analysing and rectifying the issues
  • Agreements related to SLA
    1. Enterprise solutions for a given situation
  • The enterprises must conduct the following procedures
  • The enterprises must filter out the events that can prove to be fatal
  • They must check the root cause for the events (Althaher, Mancarella and Mutale 2015)
  • They must identify the issues related to network in details
  • They must make summation of events and the data that can be dangerous
  1. Research, and document, the major features and functions of the QoS agreements, including:
    1. The relevant international standards

There are several standards for the QoS standrads are Y.1540, Y.1541 and Y.1542

  1. The range and type of possible monitoring parameters for QoS

SLA monitoring results in QoS parameters and NPMs are required to measure network performance. The parameter is the instance of and it is used to demonstrate the quality of the service the customers are provided

  1. Research, and document, the network management techniques, including how accounting records are generated and used for both voice and data networks

The network management techniques can be used for managing the voice network and the data network (Ndiaye, Hancke and Abu-Mahfouz 2017) . The network provides high-quality, reliable and cost-efficient network connectivity for the voice needs and the data needs of the customers. They provide 24/7 technical assistance as well as the operational assistance.

  1. Research and analyse the major features of planning for reliability and survivability. Document the analysis.

Network management tools aid in managing the network for mitigating the faults. Network management also performance using tools and technologies that are required to keep up with the business requirements (Peng et al. 2015). Following the policies, procedures the business analyst can ensure reliability as well as the survivability.

  1. Determine, obtain and review the organisational policies and procedures that relate to management systems. Document this review.

Written documentation is utmost necessary for effective as well as communication within the enterprises. The documentation must consist of the well written policies and the specific procedures and it reflect the current practice as well as the community expectations that aids in accountability (Moss and Marvin 2016). The policies are prepared in accordance to the organisation’s values. The stakeholders by following policies can carry out the project ethically and efficiently.

Using the information determined in your research, complete the following activities:

  1. Evaluate the administrative network management systems. Document this evaluation.

The administrative management system is computerised elements group that processes all the data required to meet the management and the reporting requirements of the respective enterprise.

  1. Evaluate the network management systems. Document this evaluation.

The network applications are growing every day and this advance in the network services asks for flexible and complex network management system Systematic evaluation models must be built to evaluate if the system is meeting the system requirements which does not affect the performance of the network (Sun et al. 2015).

  1. Review the business models and business processes used in the telecommunications management network. Document this review.

The telecommunications management network caters framework for gaining interconnectivity and communication across the operating systems and the telecommunication networks (Han et al. 2014). ITU is an infrastructure which supports management and deployment of dynamic telecommunications services.

  1. Evaluate and plan for reliability and survivability by:
    1. Analysing the reasons for service levels in the telecommunications context. Document this analysis.

Intelligent notifications

The supplier agrees to the service levels and it ensures that they will put all the efforts to meet the minimum service set out in this SLA (Odagiri et al. 2015).

  1. Conducting linear and exponential trend analysis on real or simulated data for single monitoring parameter. Document this analysis.

Linear trend analysis is the information which is elaborated as function of time and the time analysis part. Exponential linear trend analysis is used to analyse the data relationships and they are designed to get access to in a linear fashion (Hashemi and Abdelghany 2016). However, they can be applied to timeline in order to make sure that they can be further assessed. This analysis is known as the exponential trend analysis

  1. Assess the reliability and survivability in telecommunications context with reference to disaster and security management policies and procedures. Document this assessment.

The business failure can lead to disaster, so the enterprises must be careful; if enterprises fail to follow the norms then they will face huge disaster

  1. Analyse the following in relation to the network management techniques:
    1. The process of generating bills from accounting records, configuration and client information. Document this analysis.

The enterprise following the norms ethically can generate bills, can handle records and can manage the client information (Giest and Howlett 2014).

  1. The standards used in the SNMP network management model and in the GSM network. Document this analysis.

SMP is the protocol used for monitoring the network devices’ health. GSM is the standard developed by ETSI and is used to manage the network.

  1. The network management functions over CNET network simulation or similar data network. Document this analysis.

CNET aids development and experimentation of the data-link layer, network layer and the transport layer and other network protocols consists of combination of WLAN, WAN and LAN (Reddy et al. 2014).

  1. Analyse and evaluate the effectiveness of the management processes from beginning to resolution, including automation of fault management. Document this evaluation.

The enterprises must take up certain policies and they must follow those policies from start to the end of the project (Ferdoush and Li 2014). They can take up the project ethically and efficiently, can analyse the faults and according to that they can mitigate the faults.

Using your research, evaluations and analyses, develop a report on your findings, including accurately documenting all of the following in the report:

  1. The major features, configuration and functions of management systems

The enterprises must configure the management system; they must take up procedures to mitigate the fault management and accountability (Xu et al. 2016). They must take up the network management techniques.

  1. Procedures for fault management and accountability  

In case of network management, fault management is one set of functions that is used to identify, isolate and rectify the malfunctions in the telecommunications network. All the environmental changes are compensated for all the environmental changes (Al-Radaideh et al.  2015). The fault management also involves the error logs, acceptance and errors detection notifications. It also includes tracing and identification of faults and takes appropriate measures to mitigate those faults.

  1. The major features and functions of the QoS agreements

The major features and the functions associated with the QoS agreements. It is important to assess the traffic transport along with special requirement (Gabriele et al. 2015). The coders use the Voice over IP technology to make the computer networks useful like the telephone networks for the audio conversations

  1. Network management techniques

There are several networking management techniques and they are fault management, configuration management, performance management, security management and the accounting management.

  1. The impact of the workplace and industry environment on the use of a telecommunications management system

Due to the advent of the telecommunication, the people can communicate long distance by voice (Missaoui et al. 2014). The telephone service is provided by the public switched telephone network (PSTN).

  1. A disaster recovery plan

Disaster recovery plan is form of the documented process that is used by the enterprises to recover and protect the IT infrastructure at the time of project failure or any event of disaster (Gabriele et al. 2015).

References

Alnaser, S.W. and Ochoa, L.F., 2015. Advanced network management systems: A risk-based AC OPF approach. IEEE Transactions on Power Systems, 30(1), pp.409-418.

Al-Radaideh, A., Al-Ali, A.R., Bheiry, S. and Alawnah, S., 2015, March. A wireless sensor network monitoring system for highway bridges. In Electrical and Information Technologies (ICEIT), 2015 International Conference on (pp. 119-124). IEEE.

Althaher, S., Mancarella, P. and Mutale, J., 2015. Automated demand response from home energy management system under dynamic pricing and power and comfort constraints. IEEE Transactions on Smart Grid, 6(4), pp.1874-1883.

Arasu, A., Babcock, B., Babu, S., Cieslewicz, J., Datar, M., Ito, K., Motwani, R., Srivastava, U. and Widom, J., 2016. Stream: The stanford data stream management system. In Data Stream Management (pp. 317-336). Springer, Berlin, Heidelberg.

Benamar, N., Jara, A., Ladid, L. and El Ouadghiri, D., 2014, July. Challenges of the internet of things: IPv6 and network management. In Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS), 2014 Eighth International Conference on (pp. 328-333). IEEE.

Biswas, S., Bicket, J., Wong, E., Musaloiu-e, R., Bhartia, A. and Aguayo, D., 2015, August. Large-scale measurements of wireless network behavior. In ACM SIGCOMM Computer Communication Review (Vol. 45, No. 4, pp. 153-165). ACM.

Deelman, E., Vahi, K., Juve, G., Rynge, M., Callaghan, S., Maechling, P.J., Mayani, R., Chen, W., da Silva, R.F., Livny, M. and Wenger, K., 2015. Pegasus, a workflow management system for science automation. Future Generation Computer Systems, 46, pp.17-35.

Ferdoush, S. and Li, X., 2014. Wireless sensor network system design using Raspberry Pi and Arduino for environmental monitoring applications. Procedia Computer Science, 34, pp.103-110.

Gabriele, T., Pantoli, L., Stornelli, V., Chiulli, D. and Muttillo, M., 2015, February. Smart power management system for home appliances and wellness based on wireless sensors network and mobile technology. In AISEM Annual Conference, 2015 XVIII (pp. 1-4). IEEE.

Giest, S. and Howlett, M., 2014. Understanding the pre-conditions of commons governance: The role of network management. Environmental Science & Policy, 36, pp.37-47.

Han, J., Choi, C.S., Park, W.K., Lee, I. and Kim, S.H., 2014. Smart home energy management system including renewable energy based on ZigBee and PLC. IEEE Transactions on Consumer Electronics, 60(2), pp.198-202.