Network Management Justification Assignment
Network Management Justification Assignment
Learning Outcomes: On successful completion of this module, you will be able to: 1. Justify the need for network management, considering the main network management functions, and discuss the benefits and limitations of each. 2. Interpret current research and development in the field of network management security. 3. Critically review the requirements for the design of a network system from a given scenario and evaluate the aspects of security along with methods of protection.
Assignment case study: HandMade Furniture Ltd. This case study provides background information for both assignment 1 and assignment 2. As a network consultant, your initial examination of the company has discovered the following facts: 1. It is a single site company with a factory and office on site. a. There are 80 employees in total, 60 in the factory and 20 in the office. b. Each office worker has their own PC. There is a mixture of Windows XP, Windows 7, and Windows 8 installed together with various versions of Microsoft Office. c. There are 8 PCs in the factory, all running Windows 7 and Microsoft Office 2010. d. There is no central subscription to anti-virus software. Staff are left to do this themselves. 2. The network is completely wired; they have not yet started to explore Wi-Fi. Staff bring their own devices and must make their own provision for internet access. 3. The network runs on a single Windows Server 2012 server. There is an additional NAS storage device that will store up to 10TB of data. There is no formal backup plan; staff and teams manage their own data, with some teams maintaining their own backups. 4. Internet access is via an ADSL connection with a maximum bandwidth of 4.5 Mbps, which has proven insufficient. The company does not have a website, they share a single company email account, and staff have set up unofficial email addresses for their needs. 5. No single person is responsible for network management; previous personnel had limited IT experience. There have been recent serious incidents, including a virus infection. 6. Printing arrangements are mixed, including shared printers within workgroups, ad hoc purchases, and limited access control.
Paper For Above instruction
The purpose of this report is to justify the implementation of a comprehensive network management plan for HandMade Furniture Ltd., evaluate essential elements of such a plan, and propose support solutions aligned with the company's operational context. The decision to formalize network management stems from the recognition that the current ad hoc approach exposes the organization to security vulnerabilities, operational inefficiencies, and data management risks. This paper discusses the importance of a structured network management plan, details essential components, and evaluates suitable technical support options to ensure the company's future resilience and productivity.
Introduction and Terms of Reference
HandMade Furniture Ltd., a small-scale furniture manufacturing company, operates within a single-site environment comprising a factory and office premises. Recent IT assessments have uncovered critical vulnerabilities, including unmanaged security protocols, inconsistent hardware updates, insufficient bandwidth, and inadequate backup procedures. The core objective of this report is to justify establishing a formal network management plan that enhances operational efficiency, safeguards data, and prepares the organization for scalable growth. The scope encompasses evaluating current infrastructure, proposing management elements, and recommending support mechanisms that align with the company's size, resource constraints, and strategic growth plans.
Justification of the Network Management Plan
Implementing a structured network management plan is crucial for HandMade Furniture Ltd. to mitigate security threats, optimize resource utilization, and ensure business continuity. The absence of central management and consistent security measures exposes the organization to risks such as data breaches, malware infections, and operational downtime. For example, the recent virus incident, which required external intervention, exemplifies the deficiencies in current practices. A formal management plan ensures proactive monitoring, regular updates, and standardized procedures, thereby reducing the likelihood and impact of future incidents. Additionally, scalable network management facilitates better planning for infrastructure upgrades, such as increasing bandwidth and deploying Wi-Fi, necessary to sustain business growth and remote access capabilities. According to Cisco (2021), structured network management enhances security posture and operational agility, which are vital for competitive small enterprises.
Elements of a Network Management Plan
The key elements of an effective network management plan for HandMade Furniture Ltd. include:
- Network Monitoring and Performance Management: Deployment of monitoring tools to track bandwidth utilization, device health, and network traffic, enabling early detection of issues and capacity planning.
- Security Management: Implementation of centralized antivirus solutions, firewall configurations, intrusion detection systems, and regular security audits to protect against malware, hacking, and data loss.
- Configuration Management: Establishment of standard configurations for hardware and software, along with version control, to ensure consistency and simplify troubleshooting.
- Data Backup and Disaster Recovery: Development of a formal backup schedule, covering on-site and off-site storage, including cloud backups, to prevent data loss and expedite recovery from incidents.
- User Management and Access Control: Creation of policies for user authentication, role-based access controls, and account management to prevent unauthorized access and enhance accountability.
- Patch Management: Regular software updates and patching to protect systems from vulnerabilities, especially critical for Windows-based infrastructure.
- Asset Management: Maintaining an inventory of hardware and software assets to streamline maintenance, upgrades, and compliance tracking.
- Incident Response and Support Procedures: Defined protocols for addressing security breaches, hardware failures, and other operational issues, including escalation paths.
Integrating these elements ensures the network supports operational demands, minimizes downtime, and enhances security posture, fostering sustainable growth.
Support Solutions
Given the organization's size and resource constraints, support options must balance cost-efficiency with efficacy. The following solutions are recommended:
- In-House Technical Support: Hiring or training dedicated internal IT staff allows for rapid response, personalized support, and tailored management aligned with the organization's evolving needs. An internal team can oversee routine maintenance, security patches, user support, and network monitoring. The initial cost includes recruitment, training, and ongoing salaries, but it offers long-term control and flexibility (FitzGerald & Dennis, 2020).
- External Managed Service Provider (MSP): Outsourcing network management to a reputable MSP offers access to advanced security tools, monitoring services, and expertise without the overhead of maintaining internal staff. This approach ensures 24/7 support, cost predictability, and access to the latest technological innovations. Engaging an MSP involves contractual agreements with defined SLAs, and costs vary depending on scope but generally include monthly support fees (Dulaney, 2019).
Costing Implications
The transition to structured network management entails upfront investments and ongoing operational costs. For in-house support, costs include hiring, training, and hardware/software procurement. The initial setup might involve purchasing monitoring and security tools estimated at around £10,000, with annual support staffing costs of approximately £30,000. Alternatively, engaging an MSP might cost between £15,000 and £25,000 annually, depending on service scope. Formal backup solutions, including cloud storage subscriptions and off-site backups, may further add £5,000 annually. While these costs are significant, they are justified by reductions in downtime, improved security, and long-term operational stability (Smith & Chen, 2020).
Conclusion and Recommendations
This analysis underscores the necessity for HandMade Furniture Ltd. to adopt a comprehensive network management plan tailored to its operational context. Key recommendations include implementing centralized security controls, routine performance monitoring, formal data backup procedures, and adopting a support model aligning with financial and technical capacities. Given the recent security incidents and growing operational needs, outsourcing support to a managed service provider initially may offer a cost-effective, scalable solution, with a transition to an internal support team considered as the company expands and stabilizes. Ultimately, a structured network management framework will safeguard assets, enhance productivity, and facilitate sustainable growth, ensuring the company remains competitive in a digital-driven marketplace.
References
- Cisco. (2021). Small Business Network Management Best Practices. Cisco Systems, Inc.
- Dulaney, J. (2019). Managed Service Providers: Strategies and Best Practices. Cybersecurity Journal, 15(4), 45-58.
- FitzGerald, J., & Dennis, A. (2020). Business Data Communications and Networks. McGraw-Hill Education.
- Smith, R., & Chen, L. (2020). Cost-Benefit Analysis of IT Infrastructure Investments in SMEs. Journal of Small Business Management, 58(2), 320-340.
- TechTarget. (2022). Understanding Network Monitoring and Management Tools. Retrieved from https://www.techtarget.com
- ISO/IEC 27001. (2013). Information Security Management Systems Standard. International Organization for Standardization.
- Gordon, L. A., & Loeb, M. P. (2021). Information Security and Privacy Management. Wiley.
- Williams, P. (2020). Implementing Effective Data Backup Strategies. Data Protection Magazine.
- National Cyber Security Centre (NCSC). (2022). Guidelines for Small Business Cyber Security.
- O'Brien, J. A., & Marakas, G. M. (2018). Management Information Systems. McGraw-Hill Higher Education.