Description
Enterprise Network Optimization Project
For your final project, combine your previous four assignments for this course and create your network optimization strategy plan. For your network optimization strategy, showcase your performance mechanisms that apply for your network, discuss how each mechanism should apply, and describe the relationships within the performance architecture and other components architecture. Use the suggested resources, the Capella library, and the Internet to research project scope and requirements. Before you begin writing the assignment, be sure to complete the required hands-on virtual labs for this unit and apply the relevant concepts within the assignment.
In the beginning of this course, you were asked to identify global concerns that must be addressed while designing a network. Be sure to incorporate this into your final project.
To prepare for this assignment, do the following:
- Complete the required hands-on virtual labs for this week.
- Research the topic of availability and load balancing and include at least three references from articles, books, or Web sites to support your paper.
- Review the feedback that you have received on all of your previous assignments and adjust your work accordingly.
Your completed assignment should include the following:
- Update your network diagram so that it includes the following: Apply basic load-balancing techniques as an effort to ensure network availability.
- Provide an analysis of the technology presented in your diagram (explain hardware placement, hardware device choices, topology choice, and overall infrastructure design decisions).
- Explain techniques and strategies for maintaining high availability on a network.
- Combine all assignment components completed thus far in the course and submit them as part of your final project submission in one document.
- Include the load balancing strategy as a section of the final paper.
- Include a section in your paper that identifies the steps that you took throughout the quarter to ensure that your network will succeed internationally. How do you address globalization in your network design?
Minimum 3 references
Due Date: End of Unit 5.
Percentage of Course Grade: 20%.
Enterprise Network Optimization Project Scoring Guide Grading Rubric
Criteria
Nonperformance
Basic
Lists
Does not
partially
explain
accurate
techniques
techniques
Explain techniques and strategies for maintaining high availability and strategies and
on a network.
for
strategies for
12%
maintaining maintaining
high
high
availability
availability
on a network. on a
network.
Create a load-balancing design that effectively supports network
availability.
12%
Creates a
loadDoes not
balancing
create a loaddesign that
balancing
somewhat
design that
effectively
effectively
supports
supports
network
network
availability,
availability.
or the loadbalancing
Proficient
Distinguished
Explains
Explains
techniques and
techniques
strategies for
and
maintaining
strategies for high
maintaining availability on
high
a network and
availability
provides
on a
supporting
network.
rationale or
examples.
Creates a
loadbalancing
design that
effectively
supports
network
availability.
Creates a
sophisticated
and complex
load-balancing
design that
most
effectively
supports
network
availability for
Enterprise Network Optimization Project Scoring Guide Grading Rubric
Criteria
Explain a network load-balancing design strategy.
12%
Create a network that addresses globalization concerns.
12%
Nonperformance
Does not
explain a
network
loadbalancing
design
strategy.
Basic
Proficient
Distinguished
design is not
complete.
a given
organization.
Lists a
partial
network
loadbalancing
design
strategy, or
the load
balancing
design
strategy is
inaccurate.
Creates a
sophisticated
explanation of
a network
load-balancing
design strategy
that is directly
aligned with
an
organization’s
needs.
Explains a
network
loadbalancing
design
strategy.
Creates a
complex
network that
Does not
Creates a
addresses
Creates a
create a
network that
globalization
network that
network that partially
concerns,
addresses
addresses
addresses
greatly
globalization
globalization globalization
enhancing a
concerns.
concerns.
concerns.
network’s
international
success for an
organization.
Enterprise Network Optimization Project Scoring Guide Grading Rubric
Criteria
Nonperformance
Basic
Proficient
Distinguished
Design a wired infrastructure that meets the needs of an
organization.
13%
Designs a
Does not
complex and
Designs a
Designs a
design a
comprehensive
wired
wired
wired
wired network
infrastructure infrastructure
infrastructure
that represents
that partially that meets
that meets
the best
meets the
the needs of
the needs of
solution to
needs of an an
an
meet an
organization. organization.
organization.
organization’s
needs.
Create a wireless infrastructure that meets the needs of an
organization.
13%
Creates a
complex and
Does not
comprehensive
Creates a
Creates a
create a
wireless
wireless
wireless
wireless
network
infrastructure infrastructure
infrastructure
infrastructure
that partially that meets
that meets
that represents
meets the
the needs of
the needs of
the best
needs of an an
an
solution to
organization. organization.
organization.
meet an
organization’s
needs.
Does not
create a
Create a network management strategy that meets the needs of an
network
organization.
management
13%
strategy that
meets the
Creates a
network
management
strategy that
partially
meets the
Creates a
network
management
strategy that
meets the
Creates a
complex and
comprehensive
network
management
strategy that
Enterprise Network Optimization Project Scoring Guide Grading Rubric
Criteria
Nonperformance
Basic
Proficient
Distinguished
needs of an
needs of an needs of an represents the
organization. organization. organization. best solution
to meet an
organization’s
needs.
Follow APA style and formatting guidelines for resources and
citations and create a document that is clearly written and
generally free of grammatical errors.
13%
Does not
follow APA
style and
formatting
guidelines
for resources
and citations
or create a
document
that is clearly
written and
generally
free of
grammatical
errors.
Either
follows the
APA style
and
formatting
guidelines
for resources
and citations
or creates a
document
that is clearly
written or
generally
free of
grammatical
errors.
Follows
APA style
and
formatting
guidelines
for resources
and citations
and creates a
document
that is clearly
written and
generally
free of
grammatical
errors.
Follows APA
style and
formatting
guidelines for
resources and
citations and
creates a
document that
is clearly
written, well
organized, and
completely
free of
grammatical
errors.
1
Pamela Bennett
Network Architecture
Dr. Terrance E. Dillard
Assignment 1
Project Scope
August 19, 2018
2
Project Scope
Organization Selected
Google LLC remains one of the most successful companies in the world today. The
company operates in many countries across the globe. Google offers multiple services and
products to its esteemed customers located globally. Google provides services that relate to the
internet among others. Some of the products that the company offers include advertising on the
various online platforms search engine and also but not limited to cloud computing. Also,
Google offers other products and services such as dedicated hardware and even software to the
various customers across the globe. In the recent past, the company exhibited a desire to expand
to deliver its products and services to the markets located in China among other Asian countries.
Since its establishment in 1998, the company boasts global expansion where it operates from
multiple states across the globe. With the current expansion goals, Google may need to
implement various services and secure infrastructure meant to facilitate the operations between
the headquarters in California, United States, and China.
Project and Goals
Every project needs a set of goals and objectives. Google’s plan revolves around the
development of an adequate infrastructure which will enable it to create a secure connection
between the headquarters and the establishment in China. Therefore, the project that Google
intends to undertake seeks to help the company to develop an upgraded network infrastructure
meant to boost the operations at the headquarters. Secondly, the company plans to create a
foundation that seeks to create a reliable link for communicating between the two locations and
also the others across the globe. With the recent developments in the field of technology, Google
3
intends to upgrade the currently used infrastructure used to communicate with the various
locations. Therefore, the proposed project will help the company to improve its communication
lines used by the multiple locations by upgrading the current ones to meet the desired goals
concerning expansion (Milan & Lin, 2018).
Stakeholders
Implementing the project will require the intervention of various stakeholders in the
company. For instance, the company will need to consult with the senior management, the IT
department and also the essential IT staff members who will perform the proposed tasks. The
senior management will offer the right direction that will help the project teams to perform their
functions effectively. Therefore, the senior management will provide the required assistance
financially and also support in regards to the ultimate direction that the project will follow. The
IT director and department will allow the company to gather all the system and user
requirements to support the creation of the architecture to use between the headquarters and
China facility. The primary IT staff members will help to document all the flaws and challenges
that the current system faces making it easy for the project teams to incorporate the resulting
recommendations. After defining the scope of the project, the following section highlights the
network diagram for the new architecture which considers both the US and China locations
(Russell, 2018).
Network Diagram
The network diagram shown below represents the proposed connection between China
and the parent headquarters in California. The association will help the company to
communicate directly and efficiently with the facility opened in China. Therefore, the
4
motivation behind the implementation of this connection architecture revolves around not only
the desire to offer a mechanism for communication between the two locations but also the need
to boost the security aspect of the corporate networks. The company will exploit various security
components such as Virtual private Networks among others which will help it to guarantee the
core desires and attributes of information security.
Timeline
The completion of the project will follow a defined stage based on the needs of the
company. The implementation process will start with the requirement gathering stage. At this
stage, the project teams will gather all the required information about both the current and the
5
proposed system. Besides, this stage will allow the developers to design and document highlevel system requirement which will form the ultimate direction for the implementation phase.
Secondly, the next step involves the design of the proposed solution. At this phase, the
developers will come together and develop a high-level model of the proposed system making it
easy to craft a foundation for building and implementing the solution. The implementation phase
will include tasks such as the creation of the various workplaces, installing computers, routers,
databases, servers and also firewalls among other security components on the new location.
Also, the project engineers will need to develop a mechanism for connecting the two regions
using a secure virtual private network. The motivation behind the use of a secured VPN comes
from the fact that it helps to reduce the chances of intrusion from external attackers through
eavesdropping among other mechanisms. The final phase revolves around the testing,
monitoring, and evaluation of the implemented systems. This phase attempts to enable the
project teams to verify that the system performs as per the set objectives. Also, this phase seeks
to identify any possible flaws that may arise in the course of operations, therefore, maintaining
them.
6
Phase
Tasks
Duration
Problem definition
The project team gathers all
Five months.
the required information
about the proposed solution.
The team also documents and
sorts the needs to produce
high-level requirements
document to use in the
development and
implementation phase.
Design phase
This stage allows the project
Eight months.
teams to design the proposed
solution and also actualize it.
Implementation, testing and
Here, the teams install the
maintenance.
necessary components, test
the resulting architecture and
maintain the various flaws
that may arise in the course of
operation.
12 months.
7
Challenges
Global expansion may not always work to the benefit of the various companies. Some of
the problems that companies may face include culture clash. For instance, for Google`s attempt
to re-enter the Chinese market, it may face rejection from the population due to the possible
claims of cultural differences between the company and China. The company`s mission
statement at some point conflicts the underlying cultural values of the Chinese people. This
reason may reduce the effectiveness or success of the company in the new market (Mark mill,
2015).
8
References
Markdmill. (2015). Google’s Problem With Chinese Culture. Markdmill. Retrieved 14 August
2018. From https://markdmill.com/2015/04/20/googles-problem-with-chinese-culture/
Millan, D. M. & Lin, L. (2018). Google Woos Partners for Potential China Expansion. WSJ.
Retrieved 14 August 2018. From https://www.wsj.com/articles/google-woos-partners-forpotential-china-expansion-1534071600
Russell, J. (2018). Google is quietly formulating a new strategy for China. Tech Crunch.
Retrieved 14 August 2018. From https://techcrunch.com/2018/05/30/google-is-quietlyformulating-a-new-strategy-for-china/
1
Pamela Bennett
Network Architecture
Dr. Terrance E. Dillard
Assignment 2
WAN Network Design
August 22, 2018
2
Network Diagram
Analysis of the Diagram
In the diagram above, the network comprises of many devices such as routers, switches
and also but not least workstations that will help the company to meet its goals as explained in
the previous sections. In this case, the administrator/engineer decided to use wireless routers and
switches. This decision came from the fact that the company decided to upgrade its overall
network, therefore, calling for the use of a wireless connection. The WAN will comprise of both
physical infrastructure and also a wireless connection. Based on the needs of the company, the
administrator decided to use a hybrid topology. A hybrid topology enables the company to
incorporate various logical connections of the devices which in the long run result in improved
performance and monitoring of the entire network (Gautam, Kumar & Gupta, 2015).
3
Besides, using a single topology may not help the company to achieve the degree of
performance and quality of the proposed network architecture. Further, based on the fact that the
company intends to upgrade its connection, using fiber distributed data interface otherwise
known as merely FDDI may call for the use of a hybrid topology which in the long run helps to
guarantee multiple users accessing the network simultaneously and also optimal data
transmission throughout the network (Tuck & Singh, 2011). The selection of the hybrid
topology and FDDI comes from the desire to help the company guarantee fault tolerance and
also the high-speed transmission of information from one point to the other. As seen in the
diagram, the proposed extension area network will help the company to not only boost its
performance but also will also guarantee the security of the corporate data. The network will use
various strategies and mechanisms that will help to ensure that the company achieves the best
outcomes with regards to data security. Instead of using a single topology such as a star, this
architecture will comprise a collection of them. The company will, in the end, benefit from the
mentioned advantages such as high-speed data transmission and also security among others.
IP Addressing and Strategies
The network administrator will use classes A and B IP addressing schemes. The
administrator chose these schemes because they offer a wide range of allocations that may help
in the future expansion of the entire network. In the attempt to maintain the desired level of
security within the network, the administrator segments connection as the whole into various
subnets. Each subnet comprises of its own set of IP addresses and hence scheme. The creation
of these subnets makes it easy for the company to enforce the various practices that may
guarantee data security. Only the assigned members of the company can access the multiple
subnets depending on their levels of clearance and also locations. Creating subnets helps to
4
reduce the total number of parties that access each resource within the network based on the
assigned IP addresses.
Topology Standards
A hybrid topology comprises some network connections based on either the logical or
physical layout of the devices (Garcia-Lopez, Sanchez-Silva, Medaglia &Chateauneuf, 2011).
Instead of using one topology, the hybrid uses a number of them connected strategically
depending on the perceived needs of the various areas. The hybrid connection may use either
two or more basic topologies which in the long run enables a network to improve its performance
by boosting transmission speeds and also but not least security. In the case mentioned and
described in the diagram above, the administrator chose to use a combination of topologies to
make the entire hybrid connection. For instance, the administrator exploits the star, ring, bus and
also but not least, mesh topologies. The diagram shows the various topologies depending on the
needs of each area or devices. For instance, the three main routers (ABC) connect in a ring
topology around the FDDI. On the other hand, routers 1 and 2 form a star topology connecting
the resulting subnets. Finally, the workstations from router 2 communicate in a bus topology.
5
References
Tuck, T. W., & Singh, R. (2011). U.S. Patent No. 8,005,981. Washington, DC: U.S. Patent and
Trademark Office.
Garcia-Lopez, N. P., Sanchez-Silva, M., Medaglia, A. L., &Chateauneuf, A. (2011). A hybrid
topology optimization methodology is combining simulated annealing and SIMP.
Computers & Structures, 89(15-16), 1512-1522.
Gautam, S. P., Kumar, L., & Gupta, S. (2015). A hybrid topology of an asymmetrical multilevel
inverter using less number of devices. IET Power Electronics, 8(11), 2125-2135.
1
Pamela Bennett
Network Architecture
Dr. Terrance E. Dillard
Assignment 3
Wireless Network Design
August 27, 2018
2
Wireless Network Designs
Updated WAN diagram
In most companies, the use of wireless network remains minimal which in the long run
reduces the chances of such firms to improve their connections. For instance, a company that
uses the wired networks exclusively may not achieve the associated benefits that arise from the
use of a wireless network. Wireless networks offer a spectrum of interests which range from
easy extendibility to useful and reliable security concepts. With the witnessed growth in
technology today, these firms in most parts of the globe utilize the idea of wireless connection
3
which helps them to achieve the desired goals and objectives in regards to improved
connectivity. However, although a wireless network offers a lot of benefits to a company that
implements it; such a connection may also present numerous threats which in the long run may
threaten the security of the internal resources.
A typical wireless network must contain some subnets which in the end help to promote
security and service delivery to the esteemed users. This network will comprise various subnets
supported by the respective devices which will help to enforce data security among other desired
features. The creation of the wireless network basis its arguments from the fact that it extends a
wired connection. Therefore, this network will comprise devices such as wireless access points
among others. These devices will play a critical role in fostering a better way of delivering the
set services to the target users. Based on the needs of the institution, the IT experts will need to
perform an initial analysis of the proposed network as well as those of the target users. This
analysis will result in the development of high-level requirement proposal which will aid in the
design and implementation of the desired network.
Analysis of the Technology Used
This network will comprise various devices as mentioned above. These devices will
include routers, gateways, modems, DHCP servers and also but not limited to switches. The
primary role of the modem consists of providing a means of connection between the primary
gateway and the public internet. The institution will obtain its web from its desired ISP. The
modem will help the institution to connect to the internet in simple terms. The gateway helps to
create a link between the wireless routers and the modem. At this point, the institution creates
the desired number of subnets based on its arising needs. In this case, the institution selects two
primary subnets which will aid in delivering the required services to the users. Using a switch
4
enabled the firm to create a connection between the end users who use workstations and also the
servers with the internet. The placement of these gadgets depends on the size and location of the
end users. The same case applies to the creation of the resulting subnets. Based on the given
analysis of the various gadgets and also network, it followed that the administrator would find it
easy to manage it and also monitor its performance. The institution will need to consider the
issues of locating the access points in the selected region. Typically, the administrator may opt
to use a tower of about 10 meters which would help to reduce the chances of obstructions to the
network signal. Additionally, the administrator may choose to use powered CAT 5 cables.
Further, the institution will locate the WAC on the routers and also implement the WPA
encryption mechanisms to secure the entire network.
Using a single topology may not help the firm to achieve the desired goals. For instance,
using a bus topology may result in various challenges. The same case applies to the case of
using a single star topology. Therefore, as a recommendation, the administrator, in this case,
suggests and proposes the use of a mesh network topology. A mesh topology may offer a wide
range of benefits as compared to the respective architectures. In a mesh topology, the users may
access their resources easily without any problems.
Additionally, the administrator or manager may find it easy to allocate and monitor
bandwidth usage in the network. In the case presented previously, the institution already
operates under an established and reliable LAN connection. With this conclusion, the institution
will, therefore, need to implement just a single subnet for the final WAN. In calculating the
network as well as broadcast addresses, the administrator will need to convert the subnet masks
as well as the IP addresses into binary form. In this case, the administrator may opt to use the
10.113.0.0/16 address for the network. Therefore, the WAN subnet addresses will range from
5
10.117.0.1 and 10.117.255.254. As for recommendations, the administrator should implement
many configurations in the WAN. Additionally, the design should include a secure quality of
service, SST, and collations and also but not limited to a bandwidth that does not go below 1
Mbps (Bhadra, Ren & Goel, 2012).
IP Address Strategy
There exist some IP addressing strategies that the institution can adopt. In this case, the
institution in designing and implementing the proposed WAN network will use IPv4. The ipv6
approach offers a wide range of advantages which range from the concepts of security to
reliability among many others. However, not many firms across the globe use IPv4 strategies.
Additionally, IPv6 offers a larger address space as compared to the IPv4 strategy
(Florwick, Whiteaker, Amrod& Woodhams, 2013). However, regardless of these benefits, the
institution opts to use IPv4. If the institution intends to scale further, it will still use IPv4
strategy which will offer it a large number of benefits ranging from reliability and efficiency
although it contains few address spaces.
Wireless Standards Used
Among the available wireless network, measures include the 801.11a, 802.11b and also
802.11n among others. All these standards offer a large number of advantages which in the end
would help the institution to deliver its services and resources effectively. The institution will,
however, select the 801.11g standard. The selection of this standard comes from the fact that it
offers benefits such as speeds of 54 Mbps (Banchs, De Oliva, Eznarriaga, Kowalski& Serrano,
2014). This bandwidth and momentum play a critical role in forming a foundation for scalability
6
in the future. Additionally, this standard offers a better operational platform for delivering
quality services even when the institution includes more devices.
7
References
Florwick, J., Whiteaker, J., Amrod, A. C., & Woodhams, J. (2013). Wireless LAN design guide
for high-density client environments in higher education. Design Guide, Cisco.
Banchs, A., De Oliva, A., Eznarriaga, L., Kowalski, D. R., & Serrano, P. (2014). Performance
analysis and algorithm selection for reliable multicast in IEEE 802.11 AA wireless LAN.
IEEE Transactions on Vehicular Technology, 63(8), 3875-3891.
Bhadra, S., Ren, J. F., & Goel, M. (2012). U.S. Patent Application No. 13/278,296.
1
Pamela Bennett
Network Architecture
Dr. Terrance E. Dillard
Assignment 4
Network Management Strategy
August 29, 2018
2
Role of Network Management
When it comes to the control of a network, a company must ensure that it implements the
right mechanisms. Failing to adopt the recommended strategies would result in a situation that
places the affected firm at a disadvantage in regards to responding to any arising cases of attacks
and threats. While considering the concept of network management, a company must look at all
the tasks, parties and also but not least the required resources which would supplement the
processes thereby achieving the desired goals. Therefore, the functions of managing a network
may present a firm with numerous challenges in that many companies may fail to understand the
underlying tasks that the selected teams should perform. This paper, therefore, highlights the
concepts of network management and finally describing the desired strategy to use in supporting
the said goal.
Network management refers to all those tasks performed in the attempt to ensure that a
given connection operates as per the set goals. A network manager performs numerous functions
that revolve around providing that the underlying connection does not face any challenges such
as external or internal threats that in the long run may reduce the abilities of the firm to achieve
the desired goals. In case the network manager fails to implement the right strategies and tools,
such a situation may place the entire company at risk of suffering from attacks. Some of the
primary tasks performed include installing the relevant network components, training the
underlying staff members and also but not limited to provide any technical support that the firm
may need depending on the arising cases and demands. Besides, network management teams
may perform high-level tasks away from the ordinary PC maintenance. Some of these tasks may
include measuring the performance of the underlying network and implementing strategies
critical to guaranteeing its security. Therefore, through functions such as administration,
3
operation, provisioning and also maintenance, network management helps to keep the entire
connection secure and to perform according to the set standards.
Tools for Network Management
A network manager may use many tools in performing the underlying tasks. These tools
in most cases offer a useful platform for handling any arising issues such as threats and also
performance problems. With the help of these tools, the network managers may, in the end,
manage to perform the underlying tasks with ease. These tools, besides, offer an automated way
of handling the arising issues as mentioned in the four core tasks in network management.
Manage Engine OpManager stands out as one of the most commonly used network management
tools. This tool offers various services and capabilities that in the end help to guarantee smooth
operations in the workplace. This tool allows the network managers to automatically control
various components and aspects of the network such as the servers, configuration and also traffic
analysis. Thus, this tool acts as a network manager and even a performance analyzer. The
contained monitoring and analysis features play a critical role in ensuring that the network
delivers its goals as per the set guidelines and expectations.
From another perspective, a tool like WhatsUp Gold otherwise abbreviated as WUG
offers a spectrum of services that range from the regular network monitoring to high-level
analysis which in the long run results into the realization of better results. This tool allows the
network managers to use the user-friendly user interfaces to control the underlying assets
regardless of the platform. This conclusion means that this tool enables the users to analyze the
network from multiple areas such as the physical or cloud platforms which in the results in
reduced costs of purchasing other platform-dependent solutions. However, this tool only works
within the Windows Operating Systems which acts as its ultimate limiting factor. Nagio XI
4
offers similar services as the tools mentioned above. However, Nagios XI primarily focuses on
the monitoring perspective of a given network. Therefore, the network managers may use this
tool to identify any faults and vulnerabilities which may help in documenting the right
mechanisms to use in stopping them.
Tools for Monitoring Network Performance
SolarWinds acts as one of the most preferred tools in network management. The primary
reason that makes this tool the most preferred today comes from the fact that it serves as both a
network monitor and analyze and also as a management solution. Performing these two large
tasks at the same time with the same level of effectiveness increases its overall recognition in the
market. SolarWinds helps in the detection of any arising faults within a network while at the
same time providing a solution towards the issues. Through continuous monitoring, the tool
enables the network managers to perceive the underlying challenges with ease. GFI LanGuard
also acts as a network monitoring tool that helps in the analysis of a given connection while
highlighting the possible vulnerabilities (Tabona, 2010). The device offers centralized
monitoring of a network making it easy to control and identify the possible faulty areas reducing
the performance of the connection. Microsoft message analyzer also provides similar services
with the addition of packet capturing and analysis among others. This tool, in the end, allows
network managers to not only manage but also implement measures that would help to improve
the performance of the connections using a simple to use user interface and a robust command
shell.
5
Role of Remote Access
Sometimes, remote access plays a critical role in monitoring a network. A network
manager may opt to use remote access services through a VPN to troubleshoot a given
connection regardless of the geographical location. Remote access, therefore, enables the IT
engineers to analyze the issues affecting a given network from a different position. Remote
access allows the experts to monitor the operations of each office in real time (Jackson, 2016).
Additionally, remote access allows the network managers to implement the right access levels
easily based on the arising needs to guarantee a secure network.
Strategy for Managing a Corporate Network
There exist some strategies that a company can adopt in controlling the underlying
systems. Establishing security standards in regards to the network acts as one of the most
preferred policies. This strategy seeks to exploit the available network management and
monitoring tools which in the long run highlight the various flaws within a network (Miles,
2018). These tools may help the company to perceive the email, devices and also but not limited
to web usage by the staff members who may assist to make recommendations in regards to
access control implementation. Supporting these tasks with the right training would help to
increase the security levels of the network. Training includes sensitizing the employees among
other staff members on the needs to enforce and uphold the implemented policies in regards to
network security. The network managers who use this strategy musty consider analyzing it from
time to time to seal any possible flaws that may arise and result in breaches among other
challenges.
6
References
Miles, B. (2018). 3 Network Management Strategies for SMBs. Network Management Software.
Retrieved 23 August 2018. From https://www.networkmanagementsoftware.com/3network-management-strategies-smbs/
Tabona, A. (2018). The top 20 free Network Monitoring and Analysis Tools for sysadmins.
TechTalk. Retrieved 23 August 2018. From https://techtalk.gfi.com/the-top-20-freenetwork-monitoring-and-analysis-tools-for-sys-admins/
Jackson, K. (2016). The Top 5 Benefits of Remote Network Monitoring. Help Systems.
Retrieved 23 August 2018. From https://www.helpsystems.com/resources/articles/top-5benefits-remote-network-monitoring
Purchase answer to see full
attachment
