Professional Documents
Culture Documents
ASSIGNMENT ON
How should be Network Architect and Managed in an Enterprise?
Course tittle: Management Information System
Submitted By Submitted To
Name: Shakil Hossain Shovon Md. Rokonuzzaman
ID: 17MGT061 Associate professor
Department of Management Studies
Dept: Management Studies
Banghabandhu Sheikh Mujibur Rahman Science
Banghabandhu Sheikh Mujibur Rahman Science and Technology University, Gopalganj.
and Technology University, Gopalganj.
Date: 07-08-2021
Table of Contents
INTRODUCTION............................................................................................................................................ 4
CONCLUSION................................................................................................................................................ 8
Abstract
This section I have conducted the networking process of an enterprise and how it architect
and managed in an enterprise. An enterprise network helps employees and machines
communicate, share files, access systems, and analyze the performance of an IT environment
that drives business operations. A secure, healthy and optimally functioning network is
critical to the success of any enterprise. But with the proliferation of new device types,
applications, architectures and network styles, managing the complexity of a modern
enterprise network is becoming increasingly challenging.
Introduction
What is enterprise networking?
An enterprise network consists of physical and virtual networks and protocols that serve the
dual purpose of connecting all users and system on a local area network (LAN) to application
in the data center and cloud as well as facilitating access to network data and analytics.
Enterprise networking provides fast and reliable connectivity for end users as well as
applications. Applications are increasingly more distributed in the modern network and
security across wired and wireless infrastructure in a business imperative.
Routers: Routers send data from one network to another, enabling network to
network connections and internet access.
Switches: forward data within a network to individual devices.
Gateways: provides connections between different networks using multiple
protocols at multiple layers of the OSI model.
Firewalls: process all traffic coming into and out of a network to block potential
attacks.
Load Balancer: distribute network traffic among multiple servers in a data center
to ensure no server becomes overloaded.
VPN servers: establish and terminate VPN connections to provide secure access
to the internal network.
Often, connecting to the enterprise network required connecting to a VPN. The VPN
encrypted traffic between the user and the VPN server, at which point the user cloud access
the internal LAN.
Think of a LAN that spans across buildings and disparate geographic locations—even
globally.
WAN connectivity differs from LANs in terms of the protocols and components across the
layers of the OSI model used to transmit data. While LAN technologies are used to transmit
data at higher rates within close proximity, WANs are set up for communication that is:
Long-distance
Energy efficient
Secure
Dependable
WANs can be deployed as a private or public network and are usually set up by the internet
service providers (ISPs).
You can also have a software-defined WAN, or SD-WAN. This is a virtual WAN
architecture controlled by software technologies that create an abstraction of the virtualized
WAN from the underlying infrastructure components. This technology enables secure WAN
operations while decoupling the performance from the underlying components.
Cloud networks
Most enterprise IT services is delivered from data centers and cloud networks. The IT
environment may be a hybrid mix of on-premise servers and off-site cloud networks. The
cloud stack may consist of multiple cloud computing models—private, public, and hybrid
cloud.
The infrastructure components and software technologies enable the connectivity between
data center hardware, applications and services running across these various IT environments.
The cloud resources and the services running on the hardware are accessed and controlled
over the internet, usually through private and secure network channels (unless used for
public-facing applications).
Conceptually, cloud networks can be seen as a WAN (often an SD-WAN) that may comprise
multiple subset of networks shared or distributed privately among customers of cloud
computing services.
Network management services are also worth looking into if your internal IT team doesn’t
have the bandwidth to ensure your network is running securely and efficiently. Delivering
stable network management at consistent service levels is a critical undertaking as complexity
increases and cost-pressured IT departments set sights on high infrastructure performance,
availability, and security with a limited budget. If you have limited IT resources, they should
be focusing on the initiatives that better your bottom line.
Net administration encompasses tracking network resources, including switches, routers, and
servers. It also includes performance monitoring and software updates.
Network Operation
Network operation is focuses on making sure the network function well. Network operation
task include monitoring of activities on the network, as well as proactively and remediating
issues.
Network maintenance
Network maintenance covers upgrades and fixed to network resources. It also consists of
proactive and remediation activities executed by working with network administrators, such
as replacing network gear like routers and switches.
Network Provisioning
Network provisioning involves network resource configuration for the purposes of supporting
any given service, like voice functions or accommodating additional users.
Inventory the enterprise: take an accurate inventory of all the devices and
applications in the network. Use tools that can discover devices automatically to spare
IT the difficulty and tediousness of this task.
Reduce Manual Management: automating network management is considered a
best practice but is far too general a notion to implement wholesale. Automation
should be kept simple, low risk and quickly implementable to start. For instance,
network teams can automate device locators to find out where a device connect to the
network, perform application connectivity checks, verify each network infrastructure
device is properly connected to its neighbor, and find discrepancies between parts of
network configurations and the organization’s configuration templates.
Evaluate the scope and risk of change: Evaluation of the scope should be
accompanied by a risk analysis. After that, network team should put the change
through a peer review, pre-deployment testing and validation, implementation and
testing, and documentation and network management update.
Make processes, including troubleshooting, repeatable through documentation:
Documentation is useful is most areas of network management, especially when
trying to troubleshoot issues with wired and wireless connectivity. For instance, how
IT approaches identifying and resolving wireless network connectivity problems
should be documented and repeatable to save time and avoid misconfigurations.
Conclusion
Today’s network has to effectively support high value solutions that carry data, video, and
voice to and from users, which means maintaining superior network service levels, plus
visibility into infrastructure. As result of many impacts of digitalization, the enterprise
network has become increasingly complex, vexing, and difficult for IT mange. New
innovative digital technologies your business is adopting have to be deployed to maintain a
competitive edge, but at the same time, cyber-attacks have to be prevented at every point. All
of these initiatives must be executed on with precision, in tandem with delivering a high-
quality, consistent user experience. So the right network management system is necessary for
this to happen.