Preview

FCAPS

Good Essays
Open Document
Open Document
723 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
FCAPS
FCAPS Network and Enterprise management can be a huge task to take on, and without a plan to move forward you can easily lose control of the network and can end up with many problems. This is where the term FCAPS comes from. FCAPS is an ITU standard model for enterprise network management. It provides a set of guidelines to follow to properly administer a network and keep the network secure and running efficiently. There are 5 main topics that FCAPS covers, including fault-management, configuration, accounting, performance, and security. By following each of these guidelines as they are set out in this method allows the management to streamline the administration of the network. The first topic covered by FCAPS is the F, which stands for fault management. Fault management deals with identifying network problems either before, or after they happen, hopefully before. By finding faults in the network and taking steps to resolve them before they happen can help to drastically reduce downtime and keep the network running at maximum efficiency. There are also sub topics that can be included under fault management such as, fault detection, correction, isolation, network recovery, alarm handling, alarm filtering, alarm generation (FCAPS Standardization, 2004), etc. This goes back to our other discussion on setting alarms with a manager and agent that alerts the administrator to anything that might go wrong in the network, or are already wrong so actions can be taken to resolve any issues. The next topic under FCAPS is C which stands for Configuration. Setting up a network can be a huge undertaking, and keeping it running efficiently and keeping this efficiency level while expanding is important. This is where configuration can help. Under the umbrella of configuration administrators would monitor changes in the network, the addition of new equipment, removing obsolete equipment, and any changes in inventory that occur (FCAPS Standardization, 2004). We

You May Also Find These Documents Helpful

  • Satisfactory Essays

    * Where does the countermeasure belong in the seven domains of a typical IT infrastructure?…

    • 299 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    The many complexities of network design are vast, wide and most often tailored to the customer and their uses. In the case of Kudler Fine Foods the network is the backbone of the company compromising the bulk of communications as well as the point of sale network. The design of these networks is a collaborative procedure aimed at ensuring that the services provided meet the needs of the customer. In the search of the ideal plan for network development I will discuss and explain principles of distributed and centralized computer systems. Accomplishing this by describing different network topologies; the standards and protocols that are essential to networking. The responsibilities essential in providing telecommunication services to include security, privacy, reliability and performance. How we distinguish and understand the uses of voice over the internet protocol, Centrex and other forms of telecommunications. With our main goal is to develop a system to utilize in our company that will ensure a proper management of our resources. The timeline for this is to have an implemented plan in place within 30 days of commencement. Our outline of six months to have the plan implemented is not outside the rational. Considering the internal and external resources implemented in the project.…

    • 3954 Words
    • 16 Pages
    Better Essays
  • Good Essays

    fssa

    • 1755 Words
    • 6 Pages

    Night doctors kidnapped black people off the street and conducted experiments on them. The term originated from white plantation owners who scared blacks from meeting or escaping.…

    • 1755 Words
    • 6 Pages
    Good Essays
  • Better Essays

    These system security policies, standards, and procedures that have been established for the Corporation Tech System, are intended to comply with the regulations and policies set down by the State of Florida, Corporation Tech, and the Federal Information Security Management Act (FISMA).…

    • 4134 Words
    • 12 Pages
    Better Essays
  • Better Essays

    NT2580 Graded Assignments

    • 5288 Words
    • 22 Pages

    You will learn how to match common risks or threats within the seven domains of a typical IT infrastructure with solutions and preventative actions.…

    • 5288 Words
    • 22 Pages
    Better Essays
  • Satisfactory Essays

    Netw420 Week 5

    • 526 Words
    • 3 Pages

    References: * Clemm, A. Network Management Fundamentals Edition 1 (1st ed). Pearson Learning Solutions. Retrieved from http://devry.vitalsource.com/books/9781256084068/id/ch02lev2sec9…

    • 526 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    The network diagram of Global Finance, Inc. (GFI) depicts the layout of the company’s mission critical systems. The company has two servers (Email and the Oracle database) which are used more than any of their other systems. GFI heavily depend on their network to be stable because of their financial systems that are running and any outage would negatively affect their operations and financial situation. Like all other business, customer satisfaction and the security of GFI’s network is crucial. In order to ensure their network and data is secure, GFI has begun to re-evaluate their network infrastructure. GFI has had some service interruptions that has cost them over $100,000 in revenue losses.…

    • 887 Words
    • 4 Pages
    Powerful Essays
  • Better Essays

    capstone example

    • 1267 Words
    • 4 Pages

    To build and roll out a top level enterprise-wide telecommunications network for the ABC Company. As ABC’s Technical contractors meeting the ABC Company’s technical needs by meeting the requirements for each of their separate office locations in San Francisco, Detroit, Washington, Indianapolis, Tampa, Paris, Liverpool, Tokyo, and Sao Paulo. With local LANs that are in each office that connect to a WAN to share data files and multimedia. There are many different pieces of equipment needed when setting up and maintain a large business network. Each piece of equipment has many different choices in brands and even capabilities that set them apart from each other. Each piece of equipment can be detrimental to the flow and success of the network at hand. Now that we have discussed the importance of equipment on the network let us move on to discussing each piece of equipment needed to running a successful network.…

    • 1267 Words
    • 4 Pages
    Better Essays
  • Best Essays

    References: Limoncell, T. A., Hogan, C. J., & Chalup, S. R. (2007). The Practice of System and Network Administration, Second Edition. Addison-Wesley Professional.…

    • 968 Words
    • 5 Pages
    Best Essays
  • Powerful Essays

    Technical Paper 502

    • 1305 Words
    • 5 Pages

    Above is the Global Finance, Inc. (GFI) network diagram. GFI has grown rapidly this past year and acquired many network devices as displayed in the diagram. The company invested in the network and designed it to be fault tolerant and resilient from any network failures. However, although the company’s financial status has matured and its network has expanded at a rapid pace, its network security has not kept up with the company growth.…

    • 1305 Words
    • 5 Pages
    Powerful Essays
  • Satisfactory Essays

    Managerial Issues

    • 729 Words
    • 3 Pages

    When it comes to an organization’s information technology, the infrastructure management is part of the essential operations along with processes, equipment, policies, human resources, data, and external contracts. The goals of infrastructure management is to reduce duplication effort, enhance the flow of information throughout an information system, ensure an adherence to standards, promote adaptability necessary for a changeable environment, maintain effective change management policies, and ensure interoperability among organizational and external entities. (1)…

    • 729 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    The core of a coaxial cable carries the electronic signals that make up the data. This wire core can be either solid or stranded. If the core is solid, it is usually copper.…

    • 4489 Words
    • 18 Pages
    Powerful Essays
  • Satisfactory Essays

    For businesses to keep pace with the latest technology, threats and to remain in compliance with current and future regulations or policies need to have effective management of information security in their organization. Information Security Management Frameworks are based on existing accepted standards, guidelines, and collections of practices that should be implemented in an IT department. I will discuss some frameworks of information security management, their pros and cons, some major perspectives to consider in information security management and the benefits of information security management frameworks.…

    • 721 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    An initial task in a security assessment will focus on the basic hardware, software, and network of the system, also known as the infrastructure. Identifying types of hardware and software will dictate a large part of the requirements necessary to protect the environment. Also, a thorough analysis of the hardware will help in identifying what exists where. This information can be used for planning for replacement (Chapter, 2003).…

    • 1453 Words
    • 6 Pages
    Powerful Essays
  • Satisfactory Essays

    Acfta

    • 395 Words
    • 2 Pages

    Australia and Chile signed the Australia-Chile Free Trade Agreement (AC-FTA) on 30 July 2008. This agreement is signed since the Closer Economic Relations Trade Agreement with New Zealand in 1983 which will liberalize trade and investment between Australia and Chile. The liberalization will be in respect of goods, services and investment, including commitments well beyond both countries’ commitments under the World Trade Organization (WTO) agreement. AC-FTA was signed to eliminate tariffs on most goods immediately, with the remainder to be abolished by 2015. The agreement is expected to enter into force in January 2009.…

    • 395 Words
    • 2 Pages
    Satisfactory Essays

Related Topics