Network Virtualization and Optimization: Best Practices, Report

Verified

Added on  2022/11/17

|3
|386
|62
Report
AI Summary
This report examines the crucial aspects of network virtualization and optimization. It highlights the importance of efficient network management and scalability, emphasizing that without proper optimization, businesses face increased overhead and reduced efficiency. The report details best practices, including prioritizing software applications, implementing software monitoring services, and establishing a layered security system. It also mentions the significance of monitoring network expansion and reporting on packets. References from Santana (2013) and Yasir (2012) are included, providing a basis for the recommendations. The report emphasizes the cost-saving benefits of virtualization in infrastructure expansion and the critical need for robust security measures in networked systems. The report covers the key elements of network virtualization and optimization. Desklib offers access to similar past papers and solved assignments for students.
Document Page
Course Code and Title:
Student Name:
Assessor Name:
Submission Date:
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Network Virtualization and Optimization
Network virtualization and Optimization is an incredibly important component to efficiency and
scalability. Operating without solid network optimization, makes a business enterprise to be confronted
with a quickly building overhead and reduced efficiency. Network virtualization and optimization assists
a business enterprise in the making of most of its technology, improved security and cost reduction.
Below are the best practice recommendations for virtualization and optimization as discussed by Yasir
(Yasir, 2012):
- Prioritize the most important software applications – there exists software applications that are
optional but there are those that are mandatory. The mandatory and the most important
applications on the network require to be prioritized on the basis of system resources. Note that
applications that are not mandatory may still be preferred for organizational operations,
however, since they are not critical, they can still be executed slowly in an event of system
issues.
- Installation of software monitoring services – a system or application monitoring service will be
to tell when a system goes down or it is erratic in its operation. Such kind of systems track in an
effective manner as compared to manual monitoring strategies.
- Come up with a layered security system – security is a critical factor to any networked system.
However, cyber security has rendered it to nearly impossible to have an immune network
system. The solution for our networked system is having a layered security system. Such a
system places a business enterprise’ applications and assets under the strictest level of a
security.
Other recommendations are watching on the expansion, continued monitoring and reporting of packets
and creation of an all in one center as listed by Santana, (Santana, 2013). Furthermore, virtualization will
tremendously lower the cost infrastructure expansion.
Document Page
References
Santana, G. (2013). Handbook of Research on the IoT, Cloud Computing, and Wireless Network.
Pennsylvania: IGI Global.
Yasir, Z. (2012). Future Mobile Communications: LTE Optimization and Mobile Network Virtualization.
Berlin: Springer Science & Business Media.
chevron_up_icon
1 out of 3
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]