WOW !! MUCH LOVE ! SO WORLD PEACE !
Fond bitcoin pour l'amélioration du site: 1memzGeKS7CB3ECNkzSn2qHwxU6NZoJ8o
  Dogecoin (tips/pourboires): DCLoo9Dd4qECqpMLurdgGnaoqbftj16Nvp


Home | Publier un mémoire | Une page au hasard

 > 

Design , implementation and management of secured lan

( Télécharger le fichier original )
par Eliud Ir. Eliud Aganze
Jomokenyatta university of agriculture and technology - B.sc information technology 2014
  

précédent sommaire suivant

Bitcoin is a swarm of cyber hornets serving the goddess of wisdom, feeding on the fire of truth, exponentially growing ever smarter, faster, and stronger behind a wall of encrypted energy

Benefits of the Lifecycle Approach to Network Design

The network lifecycle approach provides many benefits, including the following:

lowering the total cost of network ownership:

1. Identifying and validating technology requirements

2. Planning for infrastructure changes and resource requirements

3. Developing a sound network design aligned with technical requirements and business goals

4. Accelerating successful implementation

5. Improving the efficiency of the network and of the staff supporting it

6. Reducing operating expenses by improving the efficiency of operation processesand tools

Increasing network availability:

1. Assessing the state of the network's security and its ability to support the proposed design

2. Specifying the correct set of hardware and software releases and keeping them operational and current

3. Producing a sound operational design and validating network operation

4. Staging and testing the proposed system before deployment

5. Improving staff skills

6. Proactively monitoring the system and assessing availability trends and alerts

7. Proactively identifying security breaches and defining remediation plans

improving business agility:

1. Establishing business requirements and technology strategies

2. Readying sites to support the system to be implemented

3. Integrating technical requirements and business goals into a detailed design and

4. demonstrating that the network is functioning as specified

5. Expertly installing, configuring, and integrating system components

6. Continually enhancing performance

Accelerating access to applications and services:

1. Assessing and improving operational preparedness to support current and plannednetwork technologies and services

2. Improving service-delivery efficiency and effectiveness by increasing availability,resource capacity, and performance

3. Improving the availability, reliability, stability of the network and the applications running on it

4. Managing and resolving problems affecting the system and keeping softwareapplications current

For this project we have decided to go with System Development Life Cycle approach Methodology

Because it is efficient.

précédent sommaire suivant






Bitcoin is a swarm of cyber hornets serving the goddess of wisdom, feeding on the fire of truth, exponentially growing ever smarter, faster, and stronger behind a wall of encrypted energy








"En amour, en art, en politique, il faut nous arranger pour que notre légèreté pèse lourd dans la balance."   Sacha Guitry