Cos 293 Network Application
Cos 293 Network Application
These applications leverage the power of networks, whether local area networks
(LANs), wide area networks (WANs), or the internet, to provide various services and
functionalities. Network applications use network protocols and communication
standards to transmit and receive data, making them integral to modern computing.
Whether you’re browsing the web, sending emails, sharing files, or engaging in video
conferences, you’re likely using network applications that seamlessly bridge the gap
between your device and the broader networked world.
There are several types of network applications, each designed to serve specific
purposes and meet diverse communication and data-sharing needs:
1. Web Browsers:
1. Examples: Google Chrome, Mozilla Firefox, Microsoft Edge
2. Web browsers allow users to access and navigate websites and web-based
applications over the internet. They use network protocols such as HTTP and
HTTPS to retrieve web content.
2. Email Clients:
1. Examples: FTP (File Transfer Protocol), SFTP (Secure File Transfer Protocol)
2. These applications enable the transfer of files between devices and servers.
FTP and SFTP ensure secure and efficient file exchange over networks.
4. Messaging Apps:
Network applications play a pivotal role in today’s interconnected world for several
reasons:
4. Client-Server Architecture:
Concept: A network model where a client requests services from a dedicated server.
Client Role: Initiates a connection to the server, sends requests for data or services
Server Role: Listens for client requests, processes them, and sends back responses
5. Peer-to-Peer Networking:
Concept: A network architecture where each device acts as both a client and a server,
directly communicating with other peers without a central server
Example Applications: File sharing applications like BitTorrent
Network Maintenance
At its core, network maintenance constitutes all the tasks and systems in place to
monitor, update and run your organization’s computer network before problems
strike.
That “network” itself involves your entire portfolio of physical IT assets, like
the hardware and servers, and non-physical IT assets, like the software and cloud
access — also known as your IT ecosystem.
Similar to other business functions, a healthy IT ecosystem relies on proactive, daily
activities and strategic foresight rather than reactive adjustments or ad-hoc, spur-of-
the-moment patches. The basic tenets of maintaining your network and the basis of a
successful regular network maintenance plan typically include the following:
There are innate benefits to both internally managed and outsourced IT maintenance.
The scale of your organization, the capabilities of your IT staff and your budget will
be major variables in determining if a traditionally in-house, outsourced or hybrid
approach works best for the health of your IT infrastructure.
Your typical network maintenance plan is the detailed package of services you can
expect to receive to keep your systems running. This plan should cover the range of
services your business will need to operate, including running necessary updates,
ensuring proper installations and performing audits to detect potential errors. Often,
your original equipment manufacturer (OEM) will offer management service plans to
try and minimize complications with their products. But there are several reasons
why relying on your OEM alone may not be the best course of action for your
business.
One of these reasons is that you will want your network maintenance plan to be
efficient, cost-effective and strategically flexible, which the expensive, rigid OEM
contract doesn’t always guarantee. Neither can you be sure that your OEM will
complete every task that is necessary for all of your network needs. What a third-party
maintenance (TPM) provider can do is oversee your entire system, even if you use a
variety of manufacturers, and do so at a much friendlier cost.
Additionally, a TPM can create a maintenance plan that’s entirely customized to your
needs and usage habits, making sure not to overdo it on non-essential services, while
also covering all of your network bases. It can be helpful to become more acquainted
with examples of what these typical tasks are so that you can be more aware of
potential needs within your system infrastructure.
If warning signs or small troubles go ignored for too long, you may run into problems
that are disruptive and potentially expensive to repair. What you network maintenance
provider can do is use their experience and knowledge to troubleshoot any issues your
network is experiencing, and they’ll be able to recognize if there is a simple fix. If
there isn’t, you can be sure to receive several suggestions on the most viable and cost-
effective solutions.
Whenever you get new equipment or have software to update, it is very likely that
there will be some form of installation and configuration needed. Similarly, when
inevitable shifts occur in the office or a new user is added, your network settings may
need to be reconfigured to accommodate those changes. If done incorrectly, the
growth of your company could be hindered and valuable time may be taken away
from your employees as they try to navigate improper settings.
For these reasons and more, getting started on the right foot is crucial. Your network
maintenance provider can help with that.
Network performance can be difficult to judge if you have nothing to compare it to.
But by bringing someone in to troubleshoot and monitor your network, you’ll be able
to see the truth about how it is operating and what can be done to make your system
function more efficiently.
As a business, you are always looking forward. If you are not maintaining your
network diligently, it may not be able to handle the weight of expansion as your
organization grows. It’s essential that you have a server that is capable of adding more
workstations if you plan on increasing the numbers in your workforce. You’ll need to
be able to add these new users without any difficulty as they enter your network.
An essential part of maintaining your network is making sure that all of your tools are
compliant with your company’s policies and legal regulations. Compliance should
always be a top priority. Not only do you want to avoid putting yourself and your
business at risk, but it’s also critical to protect your customers. This responsibility
may seem daunting, but with the right network maintenance plan, you won’t have to
worry about regulatory upkeep constantly.
The security of your network is one of the most important elements to maintain, and
consistent upkeep will help your company remain safe against potential threats. If a
breach still occurs, a properly maintained network will have procedures in place for
logging the event and automated responses to streamline the process of moving
forward.
Maintenance?
It’s good to be familiar with typical network maintenance tasks, but it may also be
beneficial to understand the variety of firmware involved in helping your network run
smoothly. Aside from regular workstations, your network is powered by an arsenal of
other devices, including a cable modem termination system, servers, switches and
routers. Here is a closer look at each of these and how maintenance keeps them at
their best.
1. CMTS
A cable modem termination system, or CMTS, is a device that allows for the
exchange of digital signals. It takes incoming traffic on a single channel and routes
them to an ISP. A CMTS can serve different cable modem population sizes, and the
cable modems associated with it do not change in quality dependent on distance.
Network security is helped with a CMTS, as they are capable of some basic filtering
for protecting against attacks and unauthorized users. It is one of the reasons that it’s
essential to perform updates and maintenance on devices like your CMTS,
which prevent the decay of the systems that keep bugs and security threats at bay.
2. Servers
Having a reliable and working server is an integral part of having a secure, robust and
profitable business. It allows you to manage network resources and stay consistent as
a company. Technically, any capable computer, device or program can be a server, as
long as it is a dedicated central repository that helps provide resources, such as the
access to hardware, disc space or other necessary files and information, to any other
computer on that network.
While any computer could work as your server, the functions that the server performs
are going to differ from those of other workstations within the system. Most dedicated
servers have unique features and configurations to boost their performance. A server
might also be connected to separate power supplies, networks and even other
servers. Because of any added high-performance RAM, faster processor, several high-
capacity hard drives and the critical tasks the server performs, server
maintenance on these computers tends to be much more intensive than that of your
average workstation.
3. Switches
A switch receives incoming data and redirects it to the destination on the local area
network. Essentially, a switch creates an electronic tunnel between a source and its
destination where no other traffic can enter. Because of this, there can be
communication with no collisions. However, if something goes wrong with the
switches, your communication will likely be disrupted. Your network needs to be able
to share information, and the proper maintenance can help you ensure that such
connections remain strong.
4. Routers
While a switch creates a tunnel, a router connects networks. Routers are similar to
switches, but they can also forward packets of information between different networks
and are not limited to node-to-node communication on the same network as a switch
is.
With routers, as with any of these devices, the software they run and the firmware
itself are both susceptible to damages without the right regular upkeep. As part of
your network maintenance plan, there should be a component to check over hardware
for warning signs, like clogged fans or overheating. And just as with other computers
in your network, making sure they have the latest updates to their code can help you
avoid unwanted situations.
What Are the Different Approaches for Maintaining a Network?
There are two main philosophies behind maintaining your organization’s network —
with only one fitting a true preventative-plan definition:
While there are many activities fitting the umbrella definition of network maintenance
planning, overseeing the health and safety of your servers, routers, devices and
software involves a few key domains.
Consider these preventative maintenance tenets below. Which does your organization
currently spearhead directly, and which do you leave to your OEMs or a TPM?
To properly maintain your physical devices, organizations must first have an accurate
gauge of what and where those devices are, then track their health and activities.
Storage Maintenance
Properly maintaining your servers and storage files is one of the most overlooked
aspects of IT ecosystem management. Practitioners struggle to make post-warranty or
similar legacy equipment work for current storage needs, all while managing the
pressure to purchase the latest glistening storage technology on the market at prices
that may or may not be prudent.
As a core tenet in a revamped maintenance plan, storage systems can be reviewed for
functionality, scale and feasibility, including strategizing:
Performance Management
Using performance data across server speeds, data latency, device performance and
more, organizations can also wield its preventative maintenance plan for quality of
service (QoS) updates to reconfigure interfaces for maximum productivity. The
results are longer lifespans for your equipment, plus speedier pieces of software and
bolstered internet connections for best-possible employee outputs.
Network downtimes are therefore minimized, as are the costs associated with
escalated issues that went undetected until reaching an expensive breaking point.
From employees to clients, everyone will appreciate the faster approach to solving
network errors or glitches, as well as the reduced headaches during patching.
Network maintenance plans with dedicated performance and data storage activities
improve the speeds and safety of how your devices exchange data. This is pivotal in
an age when enterprise data has never been more vital to operations — or more
expensive to reinstate when lost or stolen.
Maintenance plans accomplish this by mapping and overseeing current network logs,
files and folder permissions. They also review hardware space for performance lags or
backlogs, improving the speeds at which data may be retrieved and updated. The
result is an optimized network with more secure data access portals that don’t leave
employees or customers waiting after requesting, inputting or sharing sensitive
information.
Plus, since network plans fix performance bugs and streamline data access and
storage systems, those same employees can perform digital tasks and activities
quicker and easier. Their outputs increase, allowing them to work smarter without
working harder.
5. Bolstered Security
Network maintenance basically means you have to do what it takes in order to keep a
network up and running and it includes a number of tasks:
Of course this list could be different for each network you work on and perhaps you are only
responsible for a number of these tasks. All these tasks can be performed in the following
way:
1. Structured tasks.
2. Interrupt-driven tasks.
Structured means you have a pre-defined plan for network maintenance that will make sure
that problems are solved before they occur. As a network engineer this will also make your
life a whole lot easier. Interrupt-driven means you just wait for trouble to occur and then
fix it as fast as you can. Interrupt-driven is more like the “fireman” approach…you wait for
trouble to happen and then you try to fix the problem as fast as you can. A structured
approach where you have a network maintenance strategy and plan reduces downtime and
it’s more cost effective.
Of course you can never completely get rid of interrupt-driven tasks because sometimes
things “just go wrong” but with a good plan we can reduce the number of interrupt-driven
tasks for sure.
You don’t have to think of a complete network maintenance model yourself; there are a
number of well-known network maintenance models that we use. It’s best to use one of the
models that is best suited for your organization and adjustments if needed.
Choosing which network maintenance model you will use depends on your network and the
business. You can also use them as a template to create your own network maintenance
model.
To give you an idea what a network maintenance model is about and what it looks like,
here’s an example for FCAPS:
You can see FCAPS is not just a “theoretical” method but it truly describes “what”, “how”
and “when” we will do things.
Network Storage
Network storage refers to a system where data is stored on a dedicated device
accessible by multiple computers on a network, allowing for centralized data access
and sharing across different devices; the two primary types of network storage are
Network Attached Storage (NAS) and Storage Area Network (SAN), each with
distinct characteristics and use cases.
Network storage enables multiple users to access data from a centralized location
over a network. Provides flexibility in data management, backup, and
redundancy. Typically accessed using standard file system protocols like NFS
(Network File System) or CIFS (Common Internet File System).
To properly execute maintenance, certain team members play specialized roles based
on their expertise:
Conclusion
While network maintenance is often less glamorous than deploying new tech,
mastering these indispensable fundamentals enables organizations to keep even
exponentially complex networks running like clockwork. IT leaders must recognize
and resource maintenance as a top priority.
The strategies and principles covered in this guide provide a blueprint for optimizing
network operations through robust maintenance. But boards and executives also have
a key role to play by funding maintenance efforts sufficiently.
Ultimately, only vigilant care and feeding yields the network resilience and security
required in today’s always-on digital business environment. By championing
maintenance excellence company-wide, IT and business leaders can align to
maximize infrastructure availability and integrity for the long run.