Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more
Download
Standard view
Full view
of .
Look up keyword
Like this
2Activity
0 of .
Results for:
No results containing your search query
P. 1
Network Configuration Management

Network Configuration Management

Ratings: (0)|Views: 81|Likes:
Published by Thembo Jimmy
A personal research
A personal research

More info:

Published by: Thembo Jimmy on Oct 23, 2011
Copyright:Attribution Non-commercial

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as PDF, TXT or read online from Scribd
See more
See less

04/14/2012

pdf

text

original

 
KYAMBOGO UNIVERSITY
FACULTY OF SCIENCEDEPARTMENT OF COMPUTER SCIENCE
A TECHNICAL REPORT ON NETWORK CONFIGURATIONMANAGEMENTBY
 THEMBO JIMMYEmail: jkikoma@kyu.ac.ug  jkikoma@yahoo.com 
 
 ii
TABLE OF CONTENTS
LIST OF ABBREVIATIONS ...................................................................................................................... iii
 
ABSTRACT ................................................................................................................................................. iv
 
CHAPTER ONE
......................................................................................................................................... 1
 
Introduction ................................................................................................................................................... 1
 
1.1Background of study ................................................................................................................................ 1
 
1.2 Why Network Configuration Management? ........................................................................................... 3
 
1.3 Traditional Network Configuration Management Practices: .................................................................. 4
 
1.4 The solutions to problems as a result of traditional configuration management practices ..................... 4
 
CHAPTER TWO
........................................................................................................................................ 6
 
2.1 Hardware Configuration Management .................................................................................................... 6
 
2.1.1Router Configuration ............................................................................................................................ 6
 
2.1.2 Network Switch Configuration ............................................................................................................ 8
 
2.2 Software Configuration Management ................................................................................................... 10
 
2.3 Subnetting ............................................................................................................................................. 11
 
2.4 Firewall Configurations ........................................................................................................................ 12
 
CHAPTER THREE
.................................................................................................................................. 13
 
3.0 Predictive maintenance
...................................................................................................................... 13
 
3.1Technologies used in Predictive Maintenance ....................................................................................... 13
 
3.2 Merits of Predictive Maintenance ......................................................................................................... 14
 
3.3 Software Preventive maintenance ......................................................................................................... 15
 
3.4 Advantages of software preventive maintenance .................................................................................. 15
 
CHAPTER FOUR
..................................................................................................................................... 17
 
Discussion, Recommendations And Conclusion ........................................................................................ 17
 
Discussion ................................................................................................................................................... 17
 
Recommendations ....................................................................................................................................... 17
 
Conclusion .................................................................................................................................................. 18
 
References ................................................................................................................................................... 19
 
 
 iii
LIST OF ABBREVIATIONS
 IT Information TechnologyNCM Network Configuration ManagementVLAN Virtual Local Area Network WAN Wide Area Network LAN Local Area Network IP Internet ProtocolCLI Command Line InterfaceNCCM Network Change, Configuration and Compliance ManagementOSI Open System InterconnectionSDRAM Synchronous Dynamic Random Access Memory
 
ISP Internet Service ProviderCLI Command Line InterfaceNVRAM Non-Volatile Random-Access MemoryDRAM Dynamic Random-Access Memory
 
VLAN
 
Virtual Local Area Network SCM Software Configuration ManagementTFTP Trivial File Transfer Protocol
 

You're Reading a Free Preview

Download
scribd
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->