BDC5eChapter19 - Chapter 19: Network Management Business...

Info iconThis preview shows pages 1–6. Sign up to view the full content.

View Full Document Right Arrow Icon
Chapter 19: Network Management Business Data Communications, 5e
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Business Data Communications, 5e 2 Fault Management A fault is an abnormal condition that requires management attention (or action) to repair Fault is usually indicated by failure to operate correctly or by excessive errors Users expect quick and reliable resolution
Background image of page 2
Business Data Communications, 5e 3 Responding to Faults When faults occur, it is critical to quickly: Determine exactly where the fault is Isolate the rest of the network from the failure so that it can continue to function without interference Reconfigure or modify the network to minimize the effect of removing the failed component(s) Repair or replace the failed components to restore the network to its initial state
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Business Data Communications, 5e 4 User Requirements for Fault Management Tolerant of occasional outages, but expect speedy resolution Requires rapid and reliable fault detection and diagnostic management functions Impact and duration of faults can be minimized with redundancy Good communication with users about outages and faults is critical
Background image of page 4
5 Accounting Management Reasons for accounting management: Internal chargebacks on network use User(s) may be abusing access privileges and burdening the network at the expense of other users Users may be making inefficient use of the network Network manager can plan better for network growth if user activity is known in sufficient detail. Accounting reports should be generated under network manager control. Facility must provide verification of users' authorization
Background image of page 5

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Image of page 6
This is the end of the preview. Sign up to access the rest of the document.

This note was uploaded on 04/27/2010 for the course BAMU BSC taught by Professor Kmm during the Spring '10 term at University of New York in Prague.

Page1 / 22

BDC5eChapter19 - Chapter 19: Network Management Business...

This preview shows document pages 1 - 6. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online