Telecommunications Network Management System - Detailed Report

Verified

Added on  2023/06/11

|11
|2598
|441
Report
AI Summary
This report provides a detailed overview of telecommunications network management systems, covering essential functions such as real-time visibility, scalability, compliance, and reporting. It explores network management system configurations for streamlining processes, reducing errors, and enabling change rollbacks. The report discusses fault management techniques, QoS agreements, and the importance of network security and reliability. It also addresses the operational tasks necessary for smooth network operation, including intrusion detection and prevention. Furthermore, the report examines business processes and models for improving network performance and reducing development costs, emphasizing the significance of service level agreements and risk management in ensuring the reliability and survivability of the network. The document concludes by highlighting the importance of accurate information collection, traffic flow management, and the implementation of security measures to protect network resources and maintain data integrity. This resource is available on Desklib, offering students access to valuable study materials including solved assignments and past papers.
Document Page
Running head: TELECOMMUNICATIONS MANAGEMENT NETWORK
Telecommunications management network
Name of the Student:
Name of the University:
Author Note
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
1
TELECOMMUNICATIONS MANAGEMENT NETWORK
Answer to question number 1
The function and the features of the of the architecture of network management
system are:
Real-Time Visibility and Analytics
The feature is very important and the collection and production of the insights to the
real time visibility and usage of the resource of a particular network are very important. For
the visibility the components that are being through of are:
Signal coverage: This allows the users to access the location of the access points on the
network and collect the data of the throughput of the campus or throughout the networking
area.
Device connections: This provides the data to the end users and handle the connections in the
network.
Device locations: This provides the information about the location of the devices and the
should be able to access the API so that the responses from the devices can be recorded in the
networking system.
The Ability to Grow with Needs of the users
The system provides the users with the opportunity to expand immensely with the
network efficiently. The network can reach out to all the peers efficiently and can also
accommodate more systems in the network with the use of the architecture of the network
management system. In case of the remote devices the wireless systems can be used to
connect with the devices.
Compliance and Reporting
Document Page
2
TELECOMMUNICATIONS MANAGEMENT NETWORK
For various type of organization in the industry in the present time the need to
compliance and reporting is very high and hence this feature is very efficient for the network
systems and hence, then health and the process clogs of the system are to management by this
system.
Answer to question number 2
There are various features of the configuration and function of the network management
system:
The networking management system configuration helps in the streamlining the
processing, maintenance and repairing of the network.
The errors of the system are also reduced as part of the change management system.
The changes made to network can also be rollback using the configurations and the
functions of the networking management system. This helps in the situations where
the network system is setup wrongly.
These features are included in the Standard committee international.
Answer to question number 3
a. For the fault management of the system:
For the management of the faults in the system at first the fault in the system has to be
detected.
For the detection of the faults in the system the polling and the interruption techniques
are to be used.
Polling is implemented in the network so that whenever a device is at fault the
transmission is stopped and the interrupted.
After this the fault management technique is applied for the system and the fault in
the system is rectified with it.
Document Page
3
TELECOMMUNICATIONS MANAGEMENT NETWORK
b. For a given situation the given enterprise solution:
The main standards of the network management policies are applied during the fault
management.
After the device is re installed the transmission of the data in the network is done.
Answer to question number 4
a. The features of the QoS Agreement are:
Identification of the service consumer and provide in each party actions.
The fraction of time that the service is available
The secret information is to be stored within the system and not to be leaked out of
the scope of the system.
The urgency of the delivery of service for the client is to be maintained and also value
for the interest of the client is also to be maintained.
The informations served to the clients should also be accurate and the critical
situations are to be tacked efficiently.
b. The range and type of the monitoring facility are:
The VoIP speed test is conducted for the bandwidth and jitter test.
The Round trip times are also to be checked.
Answer to question number 5
The organization that have the voicer networks should generally own more than
branch for the transfer of data over the network. It requires wiring to each telephone so that
the employees of the organization are able to gain access to the public service telephones and
network. It requires the lines which are outside to be purchased from the local public
telephone company. In addition to this the system also has some hardware and software
requirements, that helps the organization include the line cards that terminate the local wiring
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
4
TELECOMMUNICATIONS MANAGEMENT NETWORK
and a switch that helps in the establishment of the network for the organization. In addition to
this, the software helps in connection of the network and controls the data traffic of the
network and the operation of maintenance and support as well. Private data networks are
conveyed utilizing devices known as switch and router points. Like voice systems,
information arranges additionally require dedicated wiring between the different arrange
components and to each work area. PCs, servers, printers, and scanners are a portion of the
information gadgets that can be associated with the system to convey particular
administrations. Once organized, these gadgets communication with each other, passing
information as data packets
Answer to question number 6
There has been a huge growth of the networking services in the world, however there
is a requirement of handling the growing the network and hence the survivability and
reliability of the network is very important. The network should be able a huge level of data
traffic and also the devices in the network is to be supported by the network. In addition to
this, the reliability of the network is very critical. The security is the most important aspect
regarding the reliability of the network. In addition to this, the survivability of the network is
also an important concept and availability of the devices in the network provides the
survivability of the network.
Answer to question number 7
The policies that are to be includes in the network management system of the
organization are:
The network servers should not be handled by the employees other than the administrator. In
addition to this the employees that handle the network.
The employees should also handle the network efficiently.
Document Page
5
TELECOMMUNICATIONS MANAGEMENT NETWORK
The firewall settings should not be tampered by the members of the organization and also the
network data should not be shared outside the network to maintain the data integrity of the
network.
Answer to Question number 8
There are a wide range of operational task that are needed for smooth running of a
network and with the implementation of the network administration the maintenance of the
network operation should include the intrusion detection, intrusion prevention for increasing
the security of the network. The following are the main tasks that should be included for the
administration of the network such as:
Designing, installation and evaluation the network components
Administration and execution of backups regularly
Technical documentation including the network diagram, network cable plan that can
be used for troubleshooting the network.
Use of precise authentication for having an access of the network resource
Answer to question number 9
It consists of a set of application that is used for the management of the network
component in a bigger network for performing several key functions. The network
management system is used for the identification, configuration, monitoring, updating and
troubleshooting the network devices for both the wired and the wireless network. The data
regarding the performance of the data is collected from the network for allowing the network
engineer to revise the network configuration and align it with the needs of the organization.
Answer to question number 10
Document Page
6
TELECOMMUNICATIONS MANAGEMENT NETWORK
The business process and the business model used in the telecommunication for the
improvement of the performance of the network and reduce the cost of the development of
the network framework. It is used for the management of the changes and new design can be
created for meeting the needs of the telecommunication and increasing the efficiency of the
network framework.
Answer to question number 11
a. The main reason for the development of the service level agreement is to increase the
reliability and responsiveness of the network. The network can be monitored and reported for
meeting the service obligation.
b. For the successful management of the business the usage pattern and the future trend
should be analysed for finding the imperfection and provision in the service that can be added
for the improvement of the current business process.
c. The access of reliability and survivability of the network is important for handling the
different security issues of the network and increase the productivity of the network.
Different protective application should be used for protecting the network resources and
redundant link should be used for connecting the network devices for increasing the network
up time.
Answer to question number 12
a. The information should be recorded in the information system and all the data should
be combined to give an appropriate result of the query generated by the client. The
configuration of the information system according to the needs of the client is important for
the success of the network framework. The network should be configured according to the
security needs of the information system and the client information should be secured such
that it cannot be accessed by any third party agents for the development of the network.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
7
TELECOMMUNICATIONS MANAGEMENT NETWORK
b. Accurate information should be collected regarding the network and simple network
management protocol can be used for sharing information about the current state of the
network. The network channel can be administered for the modification of the pre-defined
values and reducing the complexity of the network.
c. The network management function includes the administration of the traffic flow in
the network and management of the software for maintaining the quality of service in the
network. The technologies are needed to be supported and the device should be managed
with different protocols for the development of the network framework.
Answer to question number 13
The risk associated with the development of the network framework should be
evaluated following the risk analysis plan. The external objects affecting the productivity of
the network and changes in the activity for the analysis of the opportunity for enhancing the
performance of the network. The capability and the risk management practice for the
management of the network is evaluated for increasing the efficiency of the management
process.
Answer to question number 14
The management system is used for the establishment and maintenance of the
consistency of the products. The changes in the needs of the organization should be managed
for reducing the complexity of the project. The cost, reliability, flexibility and maintainability
for avoiding the failure points should be created for the development of the network
framework. The system management lifecycle should be created for the management of the
functionality.
Answer to question number 15
Document Page
8
TELECOMMUNICATIONS MANAGEMENT NETWORK
Fault management and the potential issues should be considered for the prevention of
the fault and minimizing the network downtime. The different operation should be monitored
and the programming and the changes in the hardware should be included for the
modification of the existing system and the obsolete programs should be removed for the
coordination of the program. The management level of the accounting should be analysed for
the distribution of the resources and minimizing the operation cost.
Answer to question number 16
The quality of service for the management of the data traffic in the network should be
maintained for the reduction of the jitter, packet loss and latency of the network. The controls
should be enforced for the management of the network resources and the priorities should be
set for the specification of the data types of the network. Predictable measurable service
should be used for meeting the requirement of the traffic flow and prevention of the quality
degradation.
Answer to question number 17
The management of network is important for the success of the network and different
techniques are used for the management of the quality of service. The analysis of the network
should be done for the management off the information and management of the application
service.
Answer to question number 18
The workplace and the industry environment should be evaluated for the management
of the telecommunication management system. The breach of the security can compromise
the records of the customer and incur a huge loss for the organization.
Answer to question number 19
Document Page
9
TELECOMMUNICATIONS MANAGEMENT NETWORK
A disaster recovery plan should be created for the management of the network
resources and minimizing the effects of the incidents and establishment of the recovery plan.
An impact analysis should be done and a recovery point should be created for maintaining
continuity in the current business process of the organization.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
10
TELECOMMUNICATIONS MANAGEMENT NETWORK
Bibliography
Kreutz, D., Ramos, F. M., Verissimo, P. E., Rothenberg, C. E., Azodolmolky, S., & Uhlig, S.
(2015). Software-defined networking: A comprehensive survey. Proceedings of the
IEEE, 103(1), 14-76.
Nunes, B. A. A., Mendonca, M., Nguyen, X. N., Obraczka, K., & Turletti, T. (2014). A
survey of software-defined networking: Past, present, and future of programmable
networks. IEEE Communications Surveys & Tutorials, 16(3), 1617-1634.
Zhang, L., Afanasyev, A., Burke, J., Jacobson, V., Crowley, P., Papadopoulos, C., ... &
Zhang, B. (2014). Named data networking. ACM SIGCOMM Computer
Communication Review, 44(3), 66-73.
Xylomenos, G., Ververidis, C. N., Siris, V. A., Fotiou, N., Tsilopoulos, C., Vasilakos, X., ...
& Polyzos, G. C. (2014). A survey of information-centric networking research. IEEE
Communications Surveys & Tutorials, 16(2), 1024-1049.
Xia, W., Wen, Y., Foh, C. H., Niyato, D., & Xie, H. (2015). A survey on software-defined
networking. IEEE Communications Surveys & Tutorials, 17(1), 27-51.
Fox, J., & Rooney, M. C. (2015). The Dark Triad and trait self-objectification as predictors of
men’s use and self-presentation behaviors on social networking sites. Personality and
Individual Differences, 76, 161-165.
chevron_up_icon
1 out of 11
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]