Effective network backbone management includes controlling
configurations, adjusting baseline (threshold) setting to define normal
operation, and monitoring status. The system should also automatically
identify and report inactive backbone nodes and lost physical network
connections, as well as log packet statistics.
Management of the system should include controlling configurations,
adjusting baseline (threshold) settings to define normal operation, and
monitoring status. The system should allow automatic identification and
reporting of inactive PCs, lost physical network connections, and
logging of packet statistics.
- Management and Security:
As the keystone of an organizations network strategy, the network
management strategy should strive to be highly proactive. Frequent
monitoring of availability and performance of all monitored network
components will help to anticipate problems and to resolve them quickly
and efficiently. AIGs professional network team develops networks
with the following three key features:
- Network management from a central point.
This does not mean centralization of all network management processes.
Processes may be distributed to any point on the network. But the well
managed network is able to control all processes from a centralized
location.
- Common network management platform.
The common platform allows centralized network management by using a
variety of third-party products that provide a set of functions to
collect and display information about devices connected to the network.
These functions can be used to directly manage the network, or be used
indirectly through network management applications that run on top of
the management platform.
- Standard-SNMP.
All managed network resources should be able to communicate with the
network management system via SNMP, the de facto network management
standard. Those resources which require monitoring, but are not
SNMP-compatible, must be dealt with on an individual basis.
- Proactive Network Monitoring:
In order to minimize network outages, the successfully managed network
must be monitored to gather traffic trends. By pinpointing areas where
traffic levels are growing dangerously high, corrective actions can be
taken before network performance degrades noticeably. The output of
this monitoring is a series of graphs that show the percentage of
available network bandwidth in use over time. The graphs are then
compared against recommended network bandwidth limits-- 35% for
Ethernet, 65% for serial lines. Appropriate action is taken to rectify
situations where network segments are approaching their recommended
limit.
- Short Response Time:
Uninterrupted access to the information essential to business
processes is the goal of the effectively managed network. Any plan designed to minimize
degradation of network connectivity must include provisions for rapid response to any
level of network emergency.
- Notification of Network Outages:
Network managers have the responsibility to notify appropriate sites
when a network resource fails, when they can expect the resource to be
available again, and when it has been restored to operational status.
To accomplish this, a database should be maintained with contact
information for each network resource. Notification of planned outages
should be made by e-mail to interested or affected parties.
|
Effective network backbone management includes controlling
configurations, adjusting baseline (threshold) setting to define normal
operation, and monitoring status. The system should also automatically
identify and report inactive backbone nodes and lost physical network
connections, as well as log packet statistics.
Management of the system should include controlling configurations,
adjusting baseline (threshold) settings to define normal operation, and
monitoring status. The system should allow automatic identification and
reporting of inactive PCs, lost physical network connections, and
logging of packet statistics.
- Management and Security:
As the keystone of an organizations network strategy, the network
management strategy should strive to be highly proactive. Frequent
monitoring of availability and performance of all monitored network
components will help to anticipate problems and to resolve them quickly
and efficiently. AIGs professional network team develops networks
with the following three key features:
- Network management from a central point.
This does not mean centralization of all network management processes.
Processes may be distributed to any point on the network. But the well
managed network is able to control all processes from a centralized
location.
- Common network management platform.
The common platform allows centralized network management by using a
variety of third-party products that provide a set of functions to
collect and display information about devices connected to the network.
These functions can be used to directly manage the network, or be used
indirectly through network management applications that run on top of
the management platform.
- Standard-SNMP.
All managed network resources should be able to communicate with the
network management system via SNMP, the de facto network management
standard. Those resources which require monitoring, but are not
SNMP-compatible, must be dealt with on an individual basis.
- Proactive Network Monitoring:
In order to minimize network outages, the successfully managed network
must be monitored to gather traffic trends. By pinpointing areas where
traffic levels are growing dangerously high, corrective actions can be
taken before network performance degrades noticeably. The output of
this monitoring is a series of graphs that show the percentage of
available network bandwidth in use over time. The graphs are then
compared against recommended network bandwidth limits-- 35% for
Ethernet, 65% for serial lines. Appropriate action is taken to rectify
situations where network segments are approaching their recommended
limit.
- Short Response Time:
Uninterrupted access to the information essential to business
processes is the goal of the effectively managed network. Any plan designed to minimize
degradation of network connectivity must include provisions for rapid response to any
level of network emergency.
- Notification of Network Outages:
Network managers have the responsibility to notify appropriate sites
when a network resource fails, when they can expect the resource to be
available again, and when it has been restored to operational status.
To accomplish this, a database should be maintained with contact
information for each network resource. Notification of planned outages
should be made by e-mail to interested or affected parties.
WAN Management
LAN Management
Itemized List of All E-Business Components
E-Advertising
E-Advertising/Ad-bots
E-Advertising/Banner-Ads
E-Advertising/Billboards
E-Advertising/Catalogs
E-Advertising/Daily-Newspaper
E-Advertising/Direct-Mail
E-Advertising/Directories
E-Advertising/E-Mail
E-Advertising/Inserts
E-Advertising/Links-and-Link-Exchanges
E-Advertising/Local-Magazines
E-Advertising/News-Releases
E-Advertising/Programs-and-Newsletters
E-Advertising/Radio
E-Advertising/Search-Engines
E-Advertising/Seasonal-Campaigns
E-Advertising/Shoppers
E-Advertising/Television
E-Advertising/Trade-and-Business-Publications
E-Advertising/Transit
E-Advertising/Weekly-Newspaper
E-Advertising/Yellow-Pages
E-Commerce
E-Commerce/E-Tailing
E-Commerce/E-Tailing/Back-Office
E-Commerce/E-Tailing/Credit-Card-Authorization
E-Commerce/E-Tailing/Point-of-Sale-(POS)
E-Commerce/E-Tailing/Product-Delivery
E-Commerce/E-Tailing/Shopping
E-Commerce/E-Tailing/Shopping-Cart
E-Commerce/E-Tailing/Store
E-Commerce/E-Tailing/Store-Hosting
E-Commerce/On-Line-Catalog
E-Commerce/On-Line-Ordering
E-Commerce/Order-Management-(Customers)
E-Commerce/Order-Management-(Suppliers)
E-Financials
E-Financials/Accounting
E-Financials/Assets
E-Financials/Depreciation-Schedules
E-Financials/Federal-Taxes
E-Financials/General-Ledger
E-Financials/International-Taxes
E-Financials/InterState-Taxes
E-Financials/Liabilities
E-Financials/Local-Taxes
E-Financials/Payroll
E-Financials/State-Taxes
E-Marketing
E-Marketing/Customer-Relations
E-Marketing/Custom-Marketing-Strategies
E-Marketing/Data-Mining
E-Marketing/Demographics
E-Marketing/E-Coupons
E-Marketing/Frequent-Shopper
E-Marketing/Market-Identification
E-Services
E-Services/Data-Mining
E-Services/Data-Warehouse
E-Services/E-Management
E-Services/E-Management/Asset-Management
E-Services/E-Management/Change-Management
E-Services/E-Management/Fault-Management
E-Services/E-Management/Network-Management
E-Services/E-Management/Network-Management/LAN-Management
E-Services/E-Management/Network-Management/WAN-Management
E-Services/E-Management/Operations-Management
E-Services/E-Management/Performance-and-Capacity-Management
E-Services/E-Management/Resource-Management
E-Services/E-Management/Security-Management
E-Services/E-Management/Systems-Management
E-Services/E-Management/Systems-Management/Application-Management
E-Services/E-Management/Systems-Management/Electronic-Software-Distribution
E-Services/E-Management/Systems-Management/License-Management
E-Services/E-Management/Systems-Management/Virus-Protection
E-Services/Help-Desk
E-Services/Help-Desk/WorkOrder-Management
E-Transportation
E-Transportation/Dock-Scheduling
E-Transportation/Loading-and-Unloading
E-Transportation/Rail-Scheduling
E-Transportation/Truck-Routing
|
|
|