Get Similar Answers, Custom Writing & Assignment Help Services

To hire a writer, fill the order form in a few guided steps - with details from your paper's instructions.

Posted: April 6th, 2022

Network management

Network management
W8,Q2 : Describe how SDN facilitates the management of the network. How is it an improvement over the traditional approach? What are the challenges in implementing it?

100-150 word response: (no references)
(Jacob Bennett) Security management is one of the basic network management function. It ensures that access to a network in controlled to eliminate malicious users or content to infect the host. Security management often includes some type of AAA architecture, which stands for authentication, authorization, and accounting. For example, Cisco uses TACACS to control access to devices by using the routers and switches to prompt users for username and password credentials (Cisco, 2019). A user has to be authenticated first in order to determine if they the correct credentials to access the necessary devices. Different forms of authentication include something you have (like an ID card), something you know (like a password), and something you are (biometrics, i.e. retinal scanner). After successful authentication, a user is then authorized to perform certain work functions based on their authenticated credentials. I’ll use the military as an example. Soldiers are usually granted either Secret, Top-Secret, or Confidential security clearances. Users with Secret clearances may be able to access the same network as the user with Top-Secret clearance, but they will not have the authorization to perform the same work functions as the Top-Secret user. Accountability is used for reports and often audits. As a previous network manager for my unit, I was able to determine who was responsible for conducting cross-domain violations while on their computers. Since all Soldiers are given ID cards that give them access to networked computers, I was easily able to identify who the last person to access the computer while the violation occurred. This process mitigated the back and forth of “he says, she says” and implemented non-repudiation, which prevented the user from denying their actions.

References

Cisco. (2019, February 11). Network management system: Best practices white paper. Retrieved April 7, 2020, from https://www.cisco.com/c/en/us/support/docs/availability/high-availability/15114-NMS-bestpractice.html#secmanagement
W8: Q2 RESPONSE
Software-Defined Networking (SDN) is a network architecture approach that allows a network to be controlled centrally and intelligently through software applications (IBM Services, 2019). The whole network behavior is programmed, enabling the administrators to manage the network and its devices efficiently irrespective of the underlying network technology. Traditional networks are highly invested in physical infrastructure to meet user demands. Conversely, SDN is software-based, meaning it can manage traffic flow within the network with much detail, more resources, and higher bandwidths without the need for more physical infrastructure (IBM Services, 2019). The current user demands for untethered access to network infrastructure and the need for flexible networks lead to users choosing SDN over the traditional approach. Nevertheless, the main challenge that comes with SDN is the difficulty in achieving a continuous end to end network visibility (Netscout, 2018). Applications used in the software are continually evolving, which come in with other dependencies making the whole network complex. This compromises the monitoring levels that can be achieved, which is very vital.
Response 2
In security management, both routers and catalysts have their security features. The features incorporate the SNMP security protocol for configuration changes (Cisco, 2019). Configuration in network devices for the prevention of unauthorized access. It is crucial that the community strings follow the standard password rules and should be changed in public and private defaults. The security features in routers include the SNMP Privilege level, SNMP Access control list, SNMP View, SNMP Version 3, and Access Control List on Interfaces (Cisco, 2019). Each of the features has its functions, such as the SNMP Privilege level being the management station while the SBMP Access Control limits information to specific management stations. The security features in Catalyst LAN Switch is the IP Permit List that restricts inbound Telnet and SNMP access to the switch from unauthorized sources (Cisco, 2019). The combination of security features aids in managing the routers and catalyst switches. Nonetheless, a security policy is prudent in terms of management stations that can access the two.

References
Cisco. (2019, February 11). Network management system: Best practices white paper. Retrieved April 7, 2020, from https://www.cisco.com/c/en/us/support/docs/availability/high-availability/15114-NMS-bestpractice.html#secmanagement
IBM Services. (2019, August 9). SDN versus traditional networking explained. Retrieved from https://www.ibm.com/services/network/sdn-versus-traditional-networking
Netscout. (2018). Are you up to the challenge of software-defined networking? Retrieved from https://www.netscout.com/blog/software-defined-networking-challenge

Order | Check Discount

Tags: Best dissertation writing service UK, best essay writing services, best thesis writing services, business report writing services, cheap custom essay writing service

Assignment Help For You!

Special Offer! Get 15-30% Off on Each Order!

Why Seek Our Custom Writing Services

Every Student Wants Quality and That’s What We Deliver

Graduate Essay Writers

Only the most qualified writers are selected to be a part of our research and editorial team, with each possessing specialized knowledge in specific subjects and a background in academic writing.

Affordable Prices

Our prices strike the perfect balance between affordability and quality. We offer student-friendly rates that are competitive within the industry, without compromising on our high writing service standards.

100% Plagiarism-Free

No AI/chatgpt use. We write all our papers from scratch thus 0% similarity index. We scan every final draft before submitting it to a customer.

How it works

When you decide to place an order with Nursing Study Bay, here is what happens:

Fill the Order Form

You will complete our order form, filling in all of the fields and giving us as much guidelines - instruction details as possible.

Assignment of Writer

We assess your order and pair it with a skilled writer who possesses the specific qualifications for that subject. They then start the research/writing from scratch.

Order in Progress and Delivery

You and the assigned expert writer have direct communication throughout the process. Upon receiving the final draft, you can either approve it or request revisions.

Giving us Feedback (and other options)

We seek to understand your experience. You can also review testimonials from other clients, from where you can select your preferred professional writer to assist with your homework assignments.

For Similar Answers, Custom Essay Writing & Assignment Help Services

Find an expert with a few clicks and guided steps, fill an order form for your nursing paper. We write AI-plagiarism free essays and research papers. Anytime!.

Calculate the price of your order

You will get a personal manager and a discount.
We'll send you the first draft for approval by at
Total price:
$0.00