0% found this document useful (0 votes)
6 views

Cos 293 Network Application

Network applications are software programs that utilize network resources for communication, data sharing, and collaboration across devices. They include various types such as web browsers, email clients, and video conferencing tools, each serving specific functions. Network maintenance is essential for ensuring optimal performance, security, and compliance of these applications and the underlying IT infrastructure.

Uploaded by

oyediranjoshua41
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
6 views

Cos 293 Network Application

Network applications are software programs that utilize network resources for communication, data sharing, and collaboration across devices. They include various types such as web browsers, email clients, and video conferencing tools, each serving specific functions. Network maintenance is essential for ensuring optimal performance, security, and compliance of these applications and the underlying IT infrastructure.

Uploaded by

oyediranjoshua41
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 17

Network Application

A network application is a software program or service that relies on network


resources to perform specific functions, enabling communication, data sharing, and
collaboration among devices connected to a network.

These applications leverage the power of networks, whether local area networks
(LANs), wide area networks (WANs), or the internet, to provide various services and
functionalities. Network applications use network protocols and communication
standards to transmit and receive data, making them integral to modern computing.

Whether you’re browsing the web, sending emails, sharing files, or engaging in video
conferences, you’re likely using network applications that seamlessly bridge the gap
between your device and the broader networked world.

Types of Network Applications

There are several types of network applications, each designed to serve specific
purposes and meet diverse communication and data-sharing needs:

1. Web Browsers:
1. Examples: Google Chrome, Mozilla Firefox, Microsoft Edge
2. Web browsers allow users to access and navigate websites and web-based
applications over the internet. They use network protocols such as HTTP and
HTTPS to retrieve web content.
2. Email Clients:

1. Examples: Microsoft Outlook, Apple Mail, Gmail


2. Email clients facilitate the sending, receiving, and management of email
messages over email servers, typically using protocols like SMTP, IMAP, and
POP3.

3. File Transfer Protocols:

1. Examples: FTP (File Transfer Protocol), SFTP (Secure File Transfer Protocol)
2. These applications enable the transfer of files between devices and servers.
FTP and SFTP ensure secure and efficient file exchange over networks.

4. Messaging Apps:

1. Examples: WhatsApp, Slack, Microsoft Teams


2. Messaging applications allow real-time text, voice, and video communication
between individuals and groups, enhancing collaboration and connectivity.

5. Video Conferencing Tools:

1. Examples: Zoom, Microsoft Teams, Cisco Webex


2. Video conferencing applications enable virtual meetings, webinars, and
remote collaboration through live video and audio communication.
6. Remote Desktop Applications:

1. Examples: TeamViewer, AnyDesk, Remote Desktop Protocol (RDP)


2. These applications allow users to access and control remote computers over a
network, facilitating technical support, troubleshooting, and remote work.

Importance of Network Applications

Network applications play a pivotal role in today’s interconnected world for several
reasons:

1. Enhanced Connectivity: Network applications enable individuals and organizations


to connect and communicate seamlessly, bridging geographical distances and
fostering collaboration.
2. Data Sharing and Accessibility: They facilitate the sharing and access of data and
resources, promoting efficient information exchange and decision-making.
3. Streamlined Workflow: Network applications automate processes, reducing manual
tasks and enhancing productivity across various industries.
4. Improved Communication: These applications offer real-time communication
channels, supporting video conferencing, instant messaging, and email, which are
essential for business operations and personal interactions.
5. Remote Work and Flexibility: Network applications empower remote work by
providing secure access to corporate resources, enabling businesses to adapt to
changing work environments.
6. Scalability and Growth: As businesses expand, network applications can scale to
accommodate increased demands, ensuring they remain effective tools for
communication and collaboration.

Key points to note in Network Applications:

1. Introduction to Network Applications:


 Definition: A network application is a software program that runs on a computer and
uses network protocols to communicate with other applications on different devices
across a network.
 Importance: Network applications enable users to share information, access resources,
collaborate remotely, and perform various tasks across geographically dispersed
locations.

2. Application Layer in the OSI Model:


 Position: The Application Layer is the topmost layer in the OSI model, directly
interacting with user applications.
 Functions:
Provides services to user applications like file transfer, email sending, web browsing.
o Manages data formatting, encryption, and error detection.
o Responsible for establishing, managing, and terminating network connections.

3. Common Network Application Protocols:


 HTTP (HyperText Transfer Protocol): Used for web browsing, transferring web pages
between web servers and clients.
 SMTP (Simple Mail Transfer Protocol): Enables email sending between mail servers
 FTP (File Transfer Protocol): Used for file transfer between computers
 DNS (Domain Name System): Translates human-readable domain names into IP
addresses
 SSH (Secure Shell): Provides secure remote login and file transfer capabilities

4. Client-Server Architecture:
 Concept: A network model where a client requests services from a dedicated server.
 Client Role: Initiates a connection to the server, sends requests for data or services
 Server Role: Listens for client requests, processes them, and sends back responses

5. Peer-to-Peer Networking:
 Concept: A network architecture where each device acts as both a client and a server,
directly communicating with other peers without a central server
 Example Applications: File sharing applications like BitTorrent

6. Popular Network Applications:


 Email: Sending and receiving electronic messages
 Web Browsing: Accessing websites through a web browser
 Instant Messaging: Real-time text communication between users
 Video Conferencing: Real-time audio and video communication between multiple
participants
 Online Collaboration Tools: Sharing documents and working on projects
simultaneously
 Cloud Computing: Accessing computing resources (storage, applications) over the
internet

7. Network Application Challenges:


 Security: Protecting data from unauthorized access, eavesdropping, and modification
 Performance: Optimizing network traffic to ensure efficient data transfer
 Scalability: Designing applications to handle increasing user load and data
volume

Network Maintenance

At its core, network maintenance constitutes all the tasks and systems in place to
monitor, update and run your organization’s computer network before problems
strike.

That “network” itself involves your entire portfolio of physical IT assets, like
the hardware and servers, and non-physical IT assets, like the software and cloud
access — also known as your IT ecosystem.
Similar to other business functions, a healthy IT ecosystem relies on proactive, daily
activities and strategic foresight rather than reactive adjustments or ad-hoc, spur-of-
the-moment patches. The basic tenets of maintaining your network and the basis of a
successful regular network maintenance plan typically include the following:

 Network cybersecurity: Implementing robust and up-to-date network defense


layers, such as traffic-managing firewalls, virtual private networks, user access
controls, double authentication measures, log inspections for usage
documentation, real-time breach notifications and auto-generated security
reports.
 Network performance: Analyzing top network performance concerns
influencing the speed and reliability of your devices, including bandwidth
usage, traffic patterns, bottlenecks, frequently down or crashed servers,
connection lags, delays and more.
 Network scalability: Ensuring proper software and hardware systems fitting
your current operations, number of network users, endpoint locations and
businesses functions.
 Regular hardware and software updates: Scheduling updates prorated
across network components and interfaces, which in turn bolsters both a
network’s overall performance and security defenses.
 IT infrastructure compliance: Maintaining internal compliance with
company practices as well as external government regulations and industry
policies.

Who Conducts Network Maintenance?

Today, there are three primary approaches to overseeing network maintenance:

. Internal IT staff: In-house IT employees manage top-down network devices,


security defenses, traffic monitoring, data storage and retrieval, hardware
health, user controls, compliance, scalability and more on-site within your
business’ premise, with peripheral assistance from original equipment
manufacturers.
. Original equipment manufacturers (OEM): Pieces of software, as well as
your network’s wider operating system, will often come with a
maintenance contract delivered by the OEM. OEMs are in a prime position to
deliver maintenance tenets, such as system updates, performance audits and
smooth installation and integration, though they may not offer the most robust
or cost-effective total preventative care. Examples of some of today’s top
OEMs for software and hardware include IBM, Cisco, Dell, Arista, Juniper,
Nokia, HPE and more global industry players.
. Third-party maintenance (TPM): Third-party maintenance plans provide an
outsourced alternative to shouldering end-to-end IT systems and
equipment, alleviating several concerns around managing your entire IT
infrastructure on your own while juggling industry changes or disruptions.
They also tend to provide more detailed, personalized maintenance packages
compared to an OEM’s.

There are innate benefits to both internally managed and outsourced IT maintenance.
The scale of your organization, the capabilities of your IT staff and your budget will
be major variables in determining if a traditionally in-house, outsourced or hybrid
approach works best for the health of your IT infrastructure.

Network Maintenance Plan

Your typical network maintenance plan is the detailed package of services you can
expect to receive to keep your systems running. This plan should cover the range of
services your business will need to operate, including running necessary updates,
ensuring proper installations and performing audits to detect potential errors. Often,
your original equipment manufacturer (OEM) will offer management service plans to
try and minimize complications with their products. But there are several reasons
why relying on your OEM alone may not be the best course of action for your
business.

One of these reasons is that you will want your network maintenance plan to be
efficient, cost-effective and strategically flexible, which the expensive, rigid OEM
contract doesn’t always guarantee. Neither can you be sure that your OEM will
complete every task that is necessary for all of your network needs. What a third-party
maintenance (TPM) provider can do is oversee your entire system, even if you use a
variety of manufacturers, and do so at a much friendlier cost.

Additionally, a TPM can create a maintenance plan that’s entirely customized to your
needs and usage habits, making sure not to overdo it on non-essential services, while
also covering all of your network bases. It can be helpful to become more acquainted
with examples of what these typical tasks are so that you can be more aware of
potential needs within your system infrastructure.

What Are Examples of Network Maintenance Tasks?

Many business operators have a basic understanding of what network preventative


maintenance is all about, but there may be some confusion surrounding the specific
measures you can expect your service provider to perform. Here are six of the most
common tasks involved with keeping your servers and devices up to speed.
1. Troubleshooting Network Issues

If warning signs or small troubles go ignored for too long, you may run into problems
that are disruptive and potentially expensive to repair. What you network maintenance
provider can do is use their experience and knowledge to troubleshoot any issues your
network is experiencing, and they’ll be able to recognize if there is a simple fix. If
there isn’t, you can be sure to receive several suggestions on the most viable and cost-
effective solutions.

2. Installing and Configuring Products

Whenever you get new equipment or have software to update, it is very likely that
there will be some form of installation and configuration needed. Similarly, when
inevitable shifts occur in the office or a new user is added, your network settings may
need to be reconfigured to accommodate those changes. If done incorrectly, the
growth of your company could be hindered and valuable time may be taken away
from your employees as they try to navigate improper settings.

For these reasons and more, getting started on the right foot is crucial. Your network
maintenance provider can help with that.

3. Monitoring and Improving Network Performance

Network performance can be a quiet killer of your company’s potential. If the


performance of your network is not up to par with other companies, then your
company will have a much harder time keeping up with your competitors in other
ways.

Network performance can be difficult to judge if you have nothing to compare it to.
But by bringing someone in to troubleshoot and monitor your network, you’ll be able
to see the truth about how it is operating and what can be done to make your system
function more efficiently.

4. Planning for Growth

As a business, you are always looking forward. If you are not maintaining your
network diligently, it may not be able to handle the weight of expansion as your
organization grows. It’s essential that you have a server that is capable of adding more
workstations if you plan on increasing the numbers in your workforce. You’ll need to
be able to add these new users without any difficulty as they enter your network.

Additionally, by creating network documentation and keeping it up to date, the


growth of your business will be obtainable without the risk of slowing down due to a
lagging network. Making sure scalability is structured correctly in your system will
optimize performance and reduce growing pains down the line.
5. Ensuring Compliance

An essential part of maintaining your network is making sure that all of your tools are
compliant with your company’s policies and legal regulations. Compliance should
always be a top priority. Not only do you want to avoid putting yourself and your
business at risk, but it’s also critical to protect your customers. This responsibility
may seem daunting, but with the right network maintenance plan, you won’t have to
worry about regulatory upkeep constantly.

6. Establishing Reliable Network Security

Unfortunately, anyone can be susceptible to network breaches, especially without the


right precautions in place. Considering the vast amount of data on your server, you
don’t want to leave it unguarded. Fortunately, your network maintenance service can
help secure necessary firewalls, VPNs and intrusion prevention tactics, while also
setting up user validation systems that use a dependable authorization, authentication
and accounting (AAA) method.

The security of your network is one of the most important elements to maintain, and
consistent upkeep will help your company remain safe against potential threats. If a
breach still occurs, a properly maintained network will have procedures in place for
logging the event and automated responses to streamline the process of moving
forward.

Which Hardware Devices Are Serviced Most Often Through Network

Maintenance?

It’s good to be familiar with typical network maintenance tasks, but it may also be
beneficial to understand the variety of firmware involved in helping your network run
smoothly. Aside from regular workstations, your network is powered by an arsenal of
other devices, including a cable modem termination system, servers, switches and
routers. Here is a closer look at each of these and how maintenance keeps them at
their best.

1. CMTS

A cable modem termination system, or CMTS, is a device that allows for the
exchange of digital signals. It takes incoming traffic on a single channel and routes
them to an ISP. A CMTS can serve different cable modem population sizes, and the
cable modems associated with it do not change in quality dependent on distance.
Network security is helped with a CMTS, as they are capable of some basic filtering
for protecting against attacks and unauthorized users. It is one of the reasons that it’s
essential to perform updates and maintenance on devices like your CMTS,
which prevent the decay of the systems that keep bugs and security threats at bay.

2. Servers

Having a reliable and working server is an integral part of having a secure, robust and
profitable business. It allows you to manage network resources and stay consistent as
a company. Technically, any capable computer, device or program can be a server, as
long as it is a dedicated central repository that helps provide resources, such as the
access to hardware, disc space or other necessary files and information, to any other
computer on that network.

While any computer could work as your server, the functions that the server performs
are going to differ from those of other workstations within the system. Most dedicated
servers have unique features and configurations to boost their performance. A server
might also be connected to separate power supplies, networks and even other
servers. Because of any added high-performance RAM, faster processor, several high-
capacity hard drives and the critical tasks the server performs, server
maintenance on these computers tends to be much more intensive than that of your
average workstation.

3. Switches

A switch receives incoming data and redirects it to the destination on the local area
network. Essentially, a switch creates an electronic tunnel between a source and its
destination where no other traffic can enter. Because of this, there can be
communication with no collisions. However, if something goes wrong with the
switches, your communication will likely be disrupted. Your network needs to be able
to share information, and the proper maintenance can help you ensure that such
connections remain strong.

4. Routers

While a switch creates a tunnel, a router connects networks. Routers are similar to
switches, but they can also forward packets of information between different networks
and are not limited to node-to-node communication on the same network as a switch
is.

With routers, as with any of these devices, the software they run and the firmware
itself are both susceptible to damages without the right regular upkeep. As part of
your network maintenance plan, there should be a component to check over hardware
for warning signs, like clogged fans or overheating. And just as with other computers
in your network, making sure they have the latest updates to their code can help you
avoid unwanted situations.
What Are the Different Approaches for Maintaining a Network?

There are two main philosophies behind maintaining your organization’s network —
with only one fitting a true preventative-plan definition:

. Interrupt-driven: In an interruption-driven model, network testing and


troubleshooting occur after a problem is detected. This method calls for
reduced daily IT oversight, yet courts higher risks of system downtimes, errors
and costly fixes as well as an “all-hands-on-deck” mentality to fix whatever
errors strike that may put other business functions on the back burner.
. Structured: In a structured network-maintenance environment, system
updates and activities are done consistently, on a day-by-day basis. A
structured network philosophy aims to minimize service disruptions by
spotting potential issues or anomalies before they spread across system
environments.

What’s Involved in Regular Preventative Maintenance for Your Network?

While there are many activities fitting the umbrella definition of network maintenance
planning, overseeing the health and safety of your servers, routers, devices and
software involves a few key domains.

Consider these preventative maintenance tenets below. Which does your organization
currently spearhead directly, and which do you leave to your OEMs or a TPM?

24/7 Network Monitoring and Defense

Organizations today manage an increasingly complex array of devices, platforms and


endpoints. With the exponential rise of mobile, cloud and related virtual environments
as well as proliferating work from home or BYOD (bring your own device) policies,
both traditional and wireless infrastructure must be helmed under a synthesized
system able to register and control user access around the clock, then alert you when it
detects strange activity.

Such robust network monitoring also includes defenses such as:

 Advanced breach and threat detection


 Recorded activity data logs
 Antivirus protections
 Robust security software
 Overall “packet” capture tools to track out-of-the-ordinary network or
server behaviors
 Comprehensive and calendar-set data back-ups
Device Maintenance

To properly maintain your physical devices, organizations must first have an accurate
gauge of what and where those devices are, then track their health and activities.

Preventative maintenance plans create the most comprehensive overview of current


devices. They also account for the traffic on those devices, plus offer packet delivery
oversight to identify how data is being requested, transferred and stored across
network devices.

Other device maintenance activities in a regular maintenance plan include:

 A thorough network map, including a complete picture of routers, switchers,


servers and other physical devices.
 Interface monitoring and alerts.
 Baseline network device threshold calculations.
 Scheduled device updates, or configurations, plus a notification procedure
ensuring users are aware of upcoming device updates as well as an approval
system for the contents of those updates.

Storage Maintenance

Properly maintaining your servers and storage files is one of the most overlooked
aspects of IT ecosystem management. Practitioners struggle to make post-warranty or
similar legacy equipment work for current storage needs, all while managing the
pressure to purchase the latest glistening storage technology on the market at prices
that may or may not be prudent.

As a core tenet in a revamped maintenance plan, storage systems can be reviewed for
functionality, scale and feasibility, including strategizing:

 Appropriate OEM hardware renewals.


 Up-to-date, accurate storage data and information.
 Next-generation on and off-premise file and server storage ideas.
 Cost analysis of worthy investments in storage systems and total
infrastructure.

Performance Management

Network performance management best practices include deploying systems to track


the connections, speeds and usage habits of devices within your network, then
mapping better interfaces and usage policies to bolster overall performance
improvements.

Using performance data across server speeds, data latency, device performance and
more, organizations can also wield its preventative maintenance plan for quality of
service (QoS) updates to reconfigure interfaces for maximum productivity. The
results are longer lifespans for your equipment, plus speedier pieces of software and
bolstered internet connections for best-possible employee outputs.

Benefits of Network Maintenance Plans

Compared to those that are interrupt-driven, organizations with a network


maintenance plan leverage distinct advantages, including:

1. Reduced System Downtimes

Fully implemented maintenance plans ensure go-to protocols when unanticipated


incidents strike across your devices or software. With an action plan in your back
pocket, you can react quickly and acutely, identifying the source of the issue and
providing precise, informed remedies.

Network downtimes are therefore minimized, as are the costs associated with
escalated issues that went undetected until reaching an expensive breaking point.
From employees to clients, everyone will appreciate the faster approach to solving
network errors or glitches, as well as the reduced headaches during patching.

2. Increased Data Retrieval, Usage and Connectivity

Network maintenance plans with dedicated performance and data storage activities
improve the speeds and safety of how your devices exchange data. This is pivotal in
an age when enterprise data has never been more vital to operations — or more
expensive to reinstate when lost or stolen.

Maintenance plans accomplish this by mapping and overseeing current network logs,
files and folder permissions. They also review hardware space for performance lags or
backlogs, improving the speeds at which data may be retrieved and updated. The
result is an optimized network with more secure data access portals that don’t leave
employees or customers waiting after requesting, inputting or sharing sensitive
information.

3. Greater IT Infrastructure Visibility and Communication

Yet another advantage of implementing a network maintenance plan is the greater


visibility and understanding of your complete network layout.
These layouts, or network topologies, are extensive. Topologies encompass the top-
down anatomy of your network’s hardware and software devices, plus the connection
types keeping them in sync. There are multiple layers to network topologies, each of
which is objectively defined, mapped and improved via a TPM maintenance plan,
namely:

 Network inventory: The complete diagram of devices maintained by your


organization able to connect to the interfaces of each other, as well as your
software products and versions, software vendors, OEMs, licensing
information and individualized tag assess numbers.
 Physical topology layer: All the ways your hardware and devices are
physically connected with one another.
 Wireless topology layer: All the ways your hardware and devices wirelessly
connect and sync with one another.
 IP addresses: The complete list of IP addresses used on your network, as well
as typical access and traffic amounts, plus which interface they are configured
on.
 Configuration history: Documenting the installation and update schedules of
your software, hardware, operating systems and interfaces as well as archiving
previous working versions.

4. More Digital Productivity

The methodical, scheduled philosophy behind network maintenance plans ensures


employee applications don’t suddenly go dark during a reconfiguration. Teams are
better kept in-the-loop on scheduled updates, understand the rationale behind those
updates and experience shorter system downtimes and delays hindering their work.

Plus, since network plans fix performance bugs and streamline data access and
storage systems, those same employees can perform digital tasks and activities
quicker and easier. Their outputs increase, allowing them to work smarter without
working harder.

5. Bolstered Security

Strongly maintained networks regularly examine their security features, make


frequent updates to workplace software and applications, patch security holes and
reconfigure antivirus software to remain in peak condition. You have peace of mind
that, across all devices, programs and protocols, your data is safe and network
fortified. When incidents do occur, safeguards are already in place to minimize
damage and keep essential files and systems from being compromised.
Network Maintenance

Network maintenance basically means you have to do what it takes in order to keep a
network up and running and it includes a number of tasks:

 Troubleshooting network problems.


 Hardware and software installation/configuration.
 Monitoring and improving network performance.
 Planning for future network growth.
 Creating network documentation and keeping it up-to-date.
 Ensuring compliance with company policies.
 Ensuring compliance with legal regulations.
 Securing the network against all kind of threats.

Of course this list could be different for each network you work on and perhaps you are only
responsible for a number of these tasks. All these tasks can be performed in the following
way:

1. Structured tasks.
2. Interrupt-driven tasks.

Structured means you have a pre-defined plan for network maintenance that will make sure
that problems are solved before they occur. As a network engineer this will also make your
life a whole lot easier. Interrupt-driven means you just wait for trouble to occur and then
fix it as fast as you can. Interrupt-driven is more like the “fireman” approach…you wait for
trouble to happen and then you try to fix the problem as fast as you can. A structured
approach where you have a network maintenance strategy and plan reduces downtime and
it’s more cost effective.

Of course you can never completely get rid of interrupt-driven tasks because sometimes
things “just go wrong” but with a good plan we can reduce the number of interrupt-driven
tasks for sure.

You don’t have to think of a complete network maintenance model yourself; there are a
number of well-known network maintenance models that we use. It’s best to use one of the
models that is best suited for your organization and adjustments if needed.

Choosing which network maintenance model you will use depends on your network and the
business. You can also use them as a template to create your own network maintenance
model.

To give you an idea what a network maintenance model is about and what it looks like,
here’s an example for FCAPS:

 Fault management: we will configure our network devices (routers, switches,


firewalls, servers, etc.) to capture logging messages and send them to an external
server. Whenever an interface goes down or the CPU goes above 80% we want to
receive an e-mail so we can see what is going on.
 Configuration management: Any changes made to the network have to be logged.
We will use a change management so relevant personnel will be notified of planned
network changes. Changes to network devices have to be reported and
acknowledged before they are implemented.
 Accounting management: We will charge (guest) users for usage of the wireless
network so they’ll pay for each 100MB of data or something. It’s also commonly
used to charge people for long distance VoIP calls.
 Performance management: Network performance will be monitored on all LAN
and WAN links so we know when things go wrong. QoS (Quality of Service) will be
configured on the appropiate interfaces.
 Security management: We will create a security policy and implement it by using
firewalls, VPNs, intrusion prevention systems and use AAA (Authorization,
Authentication and Accounting) servers to validate user credentials. Network
breaches have to be logged and a appropiate response has to be made.

You can see FCAPS is not just a “theoretical” method but it truly describes “what”, “how”
and “when” we will do things.

Applications of Computer Network


There are multiple applications of computer networks including: There are multiple
applications of computer networks including:
 Business applications: Computer networks are often used by businesses to
ensure impact communication, to share resources, and to allow their employees
to access the whole system and applications from remote locations.
 Educational applications: Online networks are widely employed in educational
institutions allowing students to access educational possibilities, share
knowledge, and collaborate with their professors.
 Healthcare applications: The healthcare sector has benefited a lot from the
computer networks, which are used to store and share patient details thus
allowing healthcare providers to provide more personalized treatment.
 Entertainment applications: Besides that with computer networks, you can
entertain yourself with online games, streaming movies and music, or utilization
of social media.
 Military applications: Military networks are often closed and not used for
general communication, which ensures the safety of military information.
 Scientific applications: Scientific research heavily depends on computer
networks because they will help establish collaboration among researchers and
facilitate the sharing of data and information.
 Transportation applications: Computer networks are used to monitor a transit
system in various ways, by managing the traffic, tracking vehicles as well as
even improving efficiency in transportation.
 Banking and finance applications: The banks and finance sector are the
biggest users of computer networks to carry out transactional processing,
information sharing, and the provision of secure access to financial services.

Advantages of Computer Networks


Here are the advantages uses of a computer network: Here are the advantages uses
of a computer network:
 Improved communication and collaboration.
 Resource sharing may play the role of cost-cutting.
 Data quality management and data security.
 Higher automation benefits and remote access possibilities.
 Enhanced productivity and efficiency

Disadvantages of Computer Networks


Here are the disadvantages uses of a computer network:Here are the disadvantages
uses of a computer network:
 Data hacking risks and chances of the data leakage.
 The problem of technicalities and operation troubleshooting.
 The likelihood of the exposure of viruses and malware increased.
 There might be a decrease in privacy because of this.

Network Storage
Network storage refers to a system where data is stored on a dedicated device
accessible by multiple computers on a network, allowing for centralized data access
and sharing across different devices; the two primary types of network storage are
Network Attached Storage (NAS) and Storage Area Network (SAN), each with
distinct characteristics and use cases.

Network storage enables multiple users to access data from a centralized location
over a network. Provides flexibility in data management, backup, and
redundancy. Typically accessed using standard file system protocols like NFS
(Network File System) or CIFS (Common Internet File System).

Types of Network Storage:


1. Network Attached Storage (NAS):
Dedicated file-level storage device accessible through a standard network interface like
Ethernet. Easy to set up and manage, often used for file sharing between multiple users on a
LAN. Example: Home NAS device for storing family photos and videos.
2. Storage Area Network (SAN):
High-performance storage network that directly connects storage devices to multiple
servers, allowing them to access data as if it were a local disk.
Primarily used for critical applications like database management and large data processing.
Requires specialized protocols like Fibre Channel or iSCSI.

Components of a NAS System:


 Hardware: Dedicated server with storage disks, processor, and RAM.
 Operating System: Specialized NAS operating system with file management
features.
 Network Interface: Ethernet card to connect to the network.
 File System: A standardized file system like NFS or CIFS for data access.
Advantages of Network Storage:
 Centralized Data Access: Multiple users can access data from a single location.
 Data Sharing: Enables easy collaboration by sharing files across different devices.
 Scalability: Storage capacity can be expanded by adding more storage devices.
 Backup and Disaster Recovery: Simplified data backup and recovery strategies.

Disadvantages of Network Storage:


 Potential Performance Bottlenecks: Network congestion can affect access
speed.
 Security Concerns: Requires proper access controls to protect sensitive data.
 Cost: Initial investment for hardware and software may be significant.

Key Considerations when Choosing a Network Storage Solution:


 Data Access Requirements: How many users need to access the data
simultaneously?
 Performance Needs: Data transfer speed required for applications.
 Storage Capacity: How much data needs to be stored.
 Budget: Cost of the hardware, software, and maintenance.

Key IT Team Roles in Network Maintenance

To properly execute maintenance, certain team members play specialized roles based
on their expertise:

 Network Technicians – Handle most routine daily upkeep like inspecting


cabling, installing operating system and hardware firmware patches, replacing
faulty parts, and troubleshooting performance issues based on service desk
tickets. They ensure basic operations.
 Network Engineers – Conduct more complex performance optimization, map
out configurations to support future infrastructure scalability and growth,
implement security protocol and topology changes, and develop maintenance
workflows. They focus on enhancements.
 Network Administrators – Take on big-picture responsibilities like
managing third-party vendor contracts, overseeing maintenance processes end-
to-end, confirming job tickets and tasks are completed, and reporting on
compliance. They connect strategic priorities to on-the-ground execution.

Conclusion

Like a high-performance sports car, today’s network infrastructures require expert-


level care and maintenance to deliver smooth, uninterrupted performance at their peak
capabilities.

Network maintenance encompasses the comprehensive range of ongoing tasks


required to sustain infrastructure integrity and availability while also keeping assets
covered under vendor support warranties via timely firmware and software updates.
By diligently conducting essential maintenance procedures like vulnerability scans,
redundancy checks, documentation, upgrades, and monitoring, IT teams can optimize
network health and performance for the long haul while also avoiding the major
expense of unexpected failures.

While network maintenance is often less glamorous than deploying new tech,
mastering these indispensable fundamentals enables organizations to keep even
exponentially complex networks running like clockwork. IT leaders must recognize
and resource maintenance as a top priority.

The strategies and principles covered in this guide provide a blueprint for optimizing
network operations through robust maintenance. But boards and executives also have
a key role to play by funding maintenance efforts sufficiently.

Ultimately, only vigilant care and feeding yields the network resilience and security
required in today’s always-on digital business environment. By championing
maintenance excellence company-wide, IT and business leaders can align to
maximize infrastructure availability and integrity for the long run.

You might also like