CloudCrushers is a global consulting organization that is headquartered in San Francisco, California. The company has other regional offices in different countries including England, Japan and India. Network management is important for this organization as it helps ensure that the organization can satisfy the diverse needs of customers. There are different factors that affect global network architecture at CloudCrusher. This essay will discuss the impacts of performance management, configuration management, accounting management, fault management and security management on decisions related to global network architecture.
Network performance management may be defined as how well the network responds to users’ requests. This is measured end-to-end. This means that performance of the server and the users is important for the network architecture. Performance management is measured using different metrics including bandwidth, error rate, latency, jitter and throughput. If CloudCrusher’s network performance is measured and it is discovered that one of the above parameters is below the required minimum, then the network architecture may be changed to improve network performance. On the other hand, if performance is measured and it is discovered that users are not utilizing the network resources optimally due to over availability of the resources, then network architecture may be changed to ensure optimum use (Surhone & Tenoe, 2010).
Network configuration management is the process of establishing and maintaining information of all the components within the CloudCrusher’s network. Configuration management focuses on the relationship between network nodes and subsystems to help in effective control of the network. Configuration management affects decisions on global network architecture because a standard and universal approach is used to implement any changes within the network architecture. The proposed changes to the network are always evaluated based on the anticipated effects that the changes may have on the network (White & Donohue, 2014).
Network accounting management is the process of measuring utilization of network resources so that the group or individual users are appropriately charged for purposes of accounting. The parameters used for performance management may be used in accounting management. Network accounting management ensures effective distribution of network resources based on individual and group user’s needs. For example, the architecture of a network may be changed to provide more bandwidth to a corporate client (Surhone & Tenoe, 2010).
Network fault management is the process of detecting and isolating errors or faults that may exist within the network. Information about a fault is always sent to the network server. Furthermore, the network may be designed in such a manner that the network administrator automatically detects any faults within a network and take appropriate actions to eliminate the fault. The network architecture can also be made in a manner that ensures easy identification of future problems and automatic processes are taken to ensure that such actions do not occur. The purpose of this is to prevent downtime (Surhone & Tenoe, 2010).
Network security management is the process of controlling network access to ensure that only authorized users are allowed to use network resources. Security management is also concerned with effective analysis of any intelligence or information. In order to boost its security, the organization may change the network architecture and include additional components like intrusion detection systems and firewalls. The importance of security management is that it ensures that data and information within the network is not compromised (White & Donohue, 2014).
Security, performance, accounting and fault management systems are important systems within the network and should not be outsourced to third parties. However, configuration management can be outsourced to third parties. The providers configure the network based on the needs of the company and will closely work with the company in case of any need to reconfigure the network (Surhone & Tenoe, 2010).