Close
  • Latest News
  • Cybersecurity
  • Big Data and Analytics
  • Cloud
  • Mobile
  • Networking
  • Storage
  • Applications
  • IT Management
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Menu
Search
  • Latest News
  • Cybersecurity
  • Big Data and Analytics
  • Cloud
  • Mobile
  • Networking
  • Storage
  • Applications
  • IT Management
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home Applications
    • Applications
    • Cybersecurity
    • Networking

    How to Use Network Automation to Save Time and Money

    By
    Huy Nguyen
    -
    September 27, 2010
    Share
    Facebook
    Twitter
    Linkedin

      Today, more than ever, IT administrators running the network are at the intersection of justifying their time and costs while still providing increasing levels of high-bandwidth services, either over wired or wireless connections.

      Users are expanding what “plugs in” to the enterprise LAN, in the form of rugged mobile devices, iPads, netbooks, wireless access points (WAPs) and, of course, mainstay laptops and PCs that most employees use every day. Additionally, there are high expectations and requirements for plug and play connectivity for devices, reliable connectivity for communications, and secure network connectivity for employees and user communities.

      However, the fact is, both the time and money available for IT to address these everyday tasks is shrinking in many cases. Budgets and staffs have either been downsized or remained flat, making it difficult to keep up with the demands and proliferation of on-demand applications and devices that run on the network.

      What typically eats away the time of a network administrator? Monotonous tasks such as moving an IP phone from one location to another, isolating a device connecting to the network that needs authenticating, moving someone’s work space to a new cubicle or providing power to network ports for phones. In addition, resources are spent reacting to help desk calls or network troubleshooting.

      All of these tasks have something in common: they strain costs and personnel resources. All of these moves and changes add up quickly. It typically costs more than $100 for each move, add or change and more than $200 for performing fault isolation. This is why emerging software and network intelligence at every point in the network has become necessary. A “smart network” helps rein in expenses through advanced management and automation features.

      Five Benefits of Network Automation

      Five benefits of network automation

      Network automation delivers multiple benefits today. With network automation, IT administrators can:

      1. Discover, identify and provision services to devices that attach to the network such as mobile phones, PCs, gaming consoles or any IP-based devices,

      2. Identify users whose devices-either by username or log-in credentials-are on the “preapproved” guest list sitting on a server behind the scenes, while segmenting or deauthenticating those that are not permitted,

      3. Provide dynamic power management using power over Ethernet (POE) to provide electricity to edge-connected devices,

      4. Provision key network services and applications instantaneously. This can be levels of quality of service (QOS) to promote responsive IP communications (including voice and video) or to send virtual LAN (VLAN) parameters and dynamic, role-based policies to keep individual network access “departmentalized” or on a need-to-know basis,

      5. Provide location-based tracking, monitoring and automated event response to help simplify troubleshooting and repetitive tasks. The network can automatically respond to events without requiring manual intervention to deliver higher levels of service assurance.

      Network Automation Helps Secure the Network

      Network automation helps secure the network

      A smart network puts control into the IT administrator’s hands-all at the push of a button. Just as importantly, network automation is also used to secure the network.

      For example, in a hotel, hospital or school where visitors might be tempted to unhook a voice over IP (VOIP) phone and connect their laptop to the network, the automated features prevents these users from gaining unauthorized access. They do this by identifying that it’s no longer a VOIP phone attached and that the applications that run on the network port are no longer voice traffic.

      The network automatically reenables the port after a few minutes to see if further change has occurred (such as the user reattaching the VOIP phone). The software continues to keep the port deactivated or quarantined if a laptop is still connected. This is yet another example of how automation erases the long-lasting headaches of a static network.

      Whether it is the configuration and monitoring of phones, access points or users, these simple tasks add up quickly. By streamlining network tasks through automation, the network edge is automatic, accurate and simple-leaving the network staff to focus more proactively on critical endeavors of the business.

      Huy Nguyen is Director of Product Management at Extreme Networks. In this role, Huy drives strategy and direction for the company’s products and partner alliances. He can be reached at [email protected].

      Avatar
      Huy Nguyen
      Huy Nguyen is Director of Product Management at Extreme Networks. In this role, Huy drives strategy and direction for the company's products and partner alliances. He can be reached at [email protected]

      MOST POPULAR ARTICLES

      Android

      Samsung Galaxy XCover Pro: Durability for Tough...

      Chris Preimesberger - December 5, 2020 0
      Have you ever dropped your phone, winced and felt the pain as it hit the sidewalk? Either the screen splintered like a windshield being...
      Read more
      Cloud

      Why Data Security Will Face Even Harsher...

      Chris Preimesberger - December 1, 2020 0
      Who would know more about details of the hacking process than an actual former career hacker? And who wants to understand all they can...
      Read more
      Cybersecurity

      How Veritas Is Shining a Light Into...

      eWEEK EDITORS - September 25, 2020 0
      Protecting data has always been one of the most important tasks in all of IT, yet as more companies become data companies at the...
      Read more
      Big Data and Analytics

      How NVIDIA A100 Station Brings Data Center...

      Zeus Kerravala - November 18, 2020 0
      There’s little debate that graphics processor unit manufacturer NVIDIA is the de facto standard when it comes to providing silicon to power machine learning...
      Read more
      Apple

      Why iPhone 12 Pro Makes Sense for...

      Wayne Rash - November 26, 2020 0
      If you’ve been watching the Apple commercials for the past three weeks, you already know what the company thinks will happen if you buy...
      Read more
      eWeek


      Contact Us | About | Sitemap

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Property of TechnologyAdvice.
      Terms of Service | Privacy Notice | Advertise | California - Do Not Sell My Information

      © 2021 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×