Waiting for answer This question has not been answered yet. You can hire a professional tutor to get the answer.
Create a 9 page essay paper that discusses Critical evaluation of Emerging NMS and Analysis.Fault Management is the first element of FACPS. In order to manage faults, it is essential to detect it, log
Create a 9 page essay paper that discusses Critical evaluation of Emerging NMS and Analysis.
Fault Management is the first element of FACPS. In order to manage faults, it is essential to detect it, log it and notify the concerned users. It is also necessary that the best possible ways are used to automatically fix the network faults in such a way that the network continues to run effectively.
Network faults degrade network and cause downtime and therefore it is an important element that is implemented most widely in all networks (Network dictionary, n.d.)
Configuration Management is the second element of FCAPS. It is the act of monitoring configuration information of the network and system. The aim of this is to track and manage effects of network operations on different hardware and software versions (Network dictionary n.d.)
Accounting Management is the third element of FCAPS. It is the act of measuring the extent of network utilization by individuals and groups. All the activities of network users are measured on the basis of individuals and groups. The aim of this is to regulate the usage of network and bill the users according to their usage (Network dictionary n.d.)
Performance Management is the fourth element of FCAPS. It is the act of measuring performance of network based on various aspects such as consistency, rates of faults and utilization. It also requires collection and analysis of network performance data such as throughput, latency, delay and jitter. The aim of this is to optimize the network performance. that is to keep the network effective and efficient (Network dictionary n.d.)
Security Management is the fifth element of FCAPS. It is the act of controlling access and usage of network resources through the process of authentication, verification and assignments of rights based on privileges, positions and needs of the users. The aim is to prevent any sabotage or unauthorised access of private and sensitive information