Preview

FCAPS

Good Essays
Open Document
Open Document
723 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
FCAPS
FCAPS Network and Enterprise management can be a huge task to take on, and without a plan to move forward you can easily lose control of the network and can end up with many problems. This is where the term FCAPS comes from. FCAPS is an ITU standard model for enterprise network management. It provides a set of guidelines to follow to properly administer a network and keep the network secure and running efficiently. There are 5 main topics that FCAPS covers, including fault-management, configuration, accounting, performance, and security. By following each of these guidelines as they are set out in this method allows the management to streamline the administration of the network. The first topic covered by FCAPS is the F, which stands for fault management. Fault management deals with identifying network problems either before, or after they happen, hopefully before. By finding faults in the network and taking steps to resolve them before they happen can help to drastically reduce downtime and keep the network running at maximum efficiency. There are also sub topics that can be included under fault management such as, fault detection, correction, isolation, network recovery, alarm handling, alarm filtering, alarm generation (FCAPS Standardization, 2004), etc. This goes back to our other discussion on setting alarms with a manager and agent that alerts the administrator to anything that might go wrong in the network, or are already wrong so actions can be taken to resolve any issues. The next topic under FCAPS is C which stands for Configuration. Setting up a network can be a huge undertaking, and keeping it running efficiently and keeping this efficiency level while expanding is important. This is where configuration can help. Under the umbrella of configuration administrators would monitor changes in the network, the addition of new equipment, removing obsolete equipment, and any changes in inventory that occur (FCAPS Standardization, 2004). We

You May Also Find These Documents Helpful

  • Better Essays

    The many complexities of network design are vast, wide and most often tailored to the customer and their uses. In the case of Kudler Fine Foods the network is the backbone of the company compromising the bulk of communications as well as the point of sale network. The design of these networks is a collaborative procedure aimed at ensuring that the services provided meet the needs of the customer. In the search of the ideal plan for network development I will discuss and explain principles of distributed and centralized computer systems. Accomplishing this by describing different network topologies; the standards and protocols that are essential to networking. The responsibilities essential in providing telecommunication services to include security, privacy, reliability and performance. How we distinguish and understand the uses of voice over the internet protocol, Centrex and other forms of telecommunications. With our main goal is to develop a system to utilize in our company that will ensure a proper management of our resources. The timeline for this is to have an implemented plan in place within 30 days of commencement. Our outline of six months to have the plan implemented is not outside the rational. Considering the internal and external resources implemented in the project.…

    • 3954 Words
    • 16 Pages
    Better Essays
  • Powerful Essays

    The network diagram of Global Finance, Inc. (GFI) depicts the layout of the company’s mission critical systems. The company has two servers (Email and the Oracle database) which are used more than any of their other systems. GFI heavily depend on their network to be stable because of their financial systems that are running and any outage would negatively affect their operations and financial situation. Like all other business, customer satisfaction and the security of GFI’s network is crucial. In order to ensure their network and data is secure, GFI has begun to re-evaluate their network infrastructure. GFI has had some service interruptions that has cost them over $100,000 in revenue losses.…

    • 887 Words
    • 4 Pages
    Powerful Essays
  • Better Essays

    Swanson, M. (2006, February). Guide for Developing Security Plans for Federal Information Systems. Retrieved from http://csrc.nist.gov/publications/nistpubs/800-18-Rev1/sp800-18-Rev1-final.pdf…

    • 4134 Words
    • 12 Pages
    Better Essays
  • Powerful Essays

    A Network Management system, or NMS is a collection of software to be used as tools to monitor a network of computers. This software performs multiples tasked specifically designed to help keep a network managed properly and running smoothly. There are many components that can make up a Network management system. With all the options out there a network administrator is able to customize what features to utilize depending on their specific needs. This allows for real-time monitoring as well as report generated analyses. However, there are a few cornerstone components that should be explored. The Manager, Agent, MIB, Probe, SNMP, and RMON are probably the most valued components.…

    • 771 Words
    • 3 Pages
    Powerful Essays
  • Powerful Essays

    Netw420 Week 4 lab report

    • 726 Words
    • 3 Pages

    Many Network Management Systems have a log and event manager that collects data and logs event data from all of the devices on the network and performs real-time correlation. When an event is initiated an agent initiates an interaction by creating an object describing an event. Event messages from the various distributed components are processed based on a predefined policy. Most event alerts can be categorized as an informational alert, a warning alert or a critical alert.…

    • 726 Words
    • 3 Pages
    Powerful Essays
  • Powerful Essays

    IS3550 Final Project

    • 4998 Words
    • 19 Pages

    The Federal Acquisition Regulation (FAR), issued by the Department of Defense, guides the content of military contracts. Federal government organizations other than the military and intelligence agencies must follow the Federal Information Security Management Act of 2002. Federal Information Processing Standards (FIPS) 200, "Minimum Security Requirements for Federal Information and Information Systems," defines the minimum security requirements that information systems must meet. While the military does not have to follow FISMA, they do enact the security policies contained in the act. The military also implements the security controls found in National Institute of Standards and Technology (NIST) Special Publication (SP) 800-37, Guide for Applying the Risk Management Framework to Federal Information Systems; and NIST SP 800-53, Recommended Security Controls for Federal Information Systems and Organizations. NIST SP 800-53, Appendix F, contains the Security Control Catalog. There is currently no specific law directing the information security policy content for defense contractors. However, Congress is proposing to make the policies in FISMA and the security controls in NIST SP 800-53 applicable to contractors that are awarded military contracts. Information Assurance Implementation, DoD Instruction 8500.2, states the computer network security controls required to be implemented in military computer networks (Enclosure 4, Attachments 1 thru 5). The other references noted in this paper give broad…

    • 4998 Words
    • 19 Pages
    Powerful Essays
  • Better Essays

    CMGT 445 Week 2 IA

    • 814 Words
    • 3 Pages

    Each organization should implement their set of technical standards for configuration management and control. There are established guideline templates for different sets of configuration management already on the market. One such set of industry standards…

    • 814 Words
    • 3 Pages
    Better Essays
  • Satisfactory Essays

    Netw420 Week 5

    • 526 Words
    • 3 Pages

    References: * Clemm, A. Network Management Fundamentals Edition 1 (1st ed). Pearson Learning Solutions. Retrieved from http://devry.vitalsource.com/books/9781256084068/id/ch02lev2sec9…

    • 526 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    unit 7 security threats

    • 449 Words
    • 2 Pages

    Cisco Works is a bundle of applications that can be used to configure LAN networks easily and efficiently, it includes error management software, Resource management software and a resource monitoring software. For example it provides real-time detailed detection, analysis, and reporting of device faults; often identifies problems before users realize they exist.…

    • 449 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Networking is everywhere one of the main benefits is that we can share devices such as printers, scanners, CD-ROM drives and many more. Also, we can connect to networks as Meyers (2003, p3) said “one network can be connected to another network and become a more powerful tool because of the great resources”.…

    • 442 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Apply network management and security techniques using the FCAPS process. IS3120 Network Communications Infrastructure © ITT Educational Services, Inc. All rights reserved. Page 2 Key Concepts  Fault management—SNMP alarms  Configuration management—change control board and procedures  Administration management—asset and inventory management  Performance management—WAN bandwidth and capacity planning  Security management—network infrastructure C-I-A IS3120…

    • 599 Words
    • 9 Pages
    Satisfactory Essays
  • Powerful Essays

    Technical Paper 502

    • 1305 Words
    • 5 Pages

    Above is the Global Finance, Inc. (GFI) network diagram. GFI has grown rapidly this past year and acquired many network devices as displayed in the diagram. The company invested in the network and designed it to be fault tolerant and resilient from any network failures. However, although the company’s financial status has matured and its network has expanded at a rapid pace, its network security has not kept up with the company growth.…

    • 1305 Words
    • 5 Pages
    Powerful Essays
  • Satisfactory Essays

    Is 305 Lab 1

    • 538 Words
    • 3 Pages

    * Align risks, threats, and vulnerabilities to one of the seven domains of a typical IT infrastructure…

    • 538 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Managerial Issues

    • 729 Words
    • 3 Pages

    When it comes to an organization’s information technology, the infrastructure management is part of the essential operations along with processes, equipment, policies, human resources, data, and external contracts. The goals of infrastructure management is to reduce duplication effort, enhance the flow of information throughout an information system, ensure an adherence to standards, promote adaptability necessary for a changeable environment, maintain effective change management policies, and ensure interoperability among organizational and external entities. (1)…

    • 729 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    An initial task in a security assessment will focus on the basic hardware, software, and network of the system, also known as the infrastructure. Identifying types of hardware and software will dictate a large part of the requirements necessary to protect the environment. Also, a thorough analysis of the hardware will help in identifying what exists where. This information can be used for planning for replacement (Chapter, 2003).…

    • 1453 Words
    • 6 Pages
    Powerful Essays

Related Topics