Another aspect of the security management area of a network management system is the development of policy-based auditing and alerts by role in the organization
(Merilainen, Lemmetyinen, 2011). This is one of the areas of knowledge-enabled security management, specifically in the area of role-based access and advanced auditing and reporting.
Fault management is also an area that no single suite of network management systems can completely meet per the ISO standards today. This requires the CIO and network managers to define specific goals in this area including the extent of fail-over support and use of advanced fault tolerance technologies (Netak, Kiwelekar, 2006). Accounting management baseline performance includes the ability to generate logs of performance and also define benchmarks for performance. This is the minimal level of functionality a CIO and network manager need to consider when selecting a network management system. Configuration management systems requirements range from the relatively simplistic definition of parameters and options for hardware optimization to advanced policy-based configuration and support. The recent advances in policy-based configuration based on constraint-based algorithms continue to accelerate as enterprises look to optimize performance by task (Merilainen, Lemmetyinen, 2011). Performance monitoring and optimization is where constraint-based algorithms have become the most valuable to enterprises, providing insights into how their individual network configurations can be fine-tuned for high performance. For the CIO and network manager looking to create a highly effective network management...
Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.
Get Started Now