ChapterPDF Available

Assessment of Network Configuration Management (CM) and Data Stewardship in the Indonesian Boarding School

Authors:

Abstract and Figures

In recent years, an increasing understanding of software development as a set of interconnected processes has affected configuration management (CM). The purpose of CM is to understand network behavior by taking an inventory of users and network devices, bandwidth usage and analyzing this data to provide information on current usage patterns. Usage quotas can be set for individual users or groups, whose optimal access points can be reached after several iterations and some fixes, which data stewardship (DS) comes into the picture to maintain high-quality data in a consistent and accessible way. When achieved, the continuous measurement produces information related to the billing process and assessment of the fair and optimal use of resources within the network system should be conducted. Hence, this study wants to explore the issue that has been challenged primarily by the high school in maintaining the configuration process of the network in the laboratory for teaching and learning by assessing the implementation with set of CM and DS criterion.
Content may be subject to copyright.
Assessment of Network Configuration Management and
Data Stewardship in the Indonesian Boarding School
Muharman Lubis*1 [0000-0003-2973-9215], Abdul Azies Muslim1 and Arif Ridho Lubis2 [0000-
0001-8855-1277]
1Telkom University, Jl. Telekomunikasi, 40257, Indonesia
2Politeknik Negeri Medan, Jl. Almamater, 20155, Indonesia
*muharmanlubis@telkomuniversity.ac.id
Abstract. In recent years, an increasing understanding of software development
as a set of interconnected processes has affected configuration management
(CM). The purpose of CM is to understand network behavior by taking an in-
ventory of users and network devices, bandwidth usage and analyzing this data
to provide information on current usage patterns. Usage quotas can be set for
individual users or groups, whose optimal access points can be reached after
several iterations and some fixes, which data stewardship (DS) come into the
picture to maintain high-quality data in a consistent and accessible way. When
achieved, the continuous measurement produces information related to the bill-
ing process and assessment of the fair and optimal use of resources within the
network system should be conducted. Hence, this study wants to explore the is-
sue that has been challenged primarily by the high school in maintaining the
configuration process of the network in the laboratory for teaching and learning
by assessing the implementation with set of CM and DS criterion.
Keywords: Configuration, Stewardship, Assessment, Quality, Strategy.
1 Introduction
A network management system (NMS) refers to a group of applications that allow the
administrator to monitor and control network components. Due to the variety of man-
aged items such as routers, bridges, switches, hubs, etc., and the wide variety of oper-
ating systems and programming interfaces, the management protocol is crucial for the
central to communicate with administration agents for an effective and efficient pro-
cess. In general, it is a service that uses various protocols, tools, applications, and
devices to help network administrators manage appropriate network resources in a
way that can be managed, either hardware or software, to satisfy the network service
needs and objectives. Through the configuration management (CM) function, some
advantages can take remote control of network devices by tracking device configura-
tion information. It will identify the impact of different hardware and software ver-
sions on the available operation everywhere and every time. All CM information is
stored in the database for easy access, such as the operating system, the Ethernet in-
terface type, version, the TCP/IP stack, and the SNMP version. When a problem oc-
curs, CM can search the configuration database for information or clues that can help
solve the problem, such as the operational status of the interface and forwarding in-
formation from the routing table, configured in a specific way. When performance
2
becomes unacceptable, the system reacts by sending a message. Thus, this study
wants to explore the practical issues that arise when specific organizations in this case
higher education to implement CM and DS properly by assessing their business pro-
cess and standard operational.
2 Literature Review
CM is the processes and instruments that enhance network steadiness, track network
changes, and provide current network visibility and documentation [1]. By creating
and maintaining CMs with the best practices, several benefits are expected, such as
better network availability and cheaper costs, including decreased support costs due to
reduced interactive support problems. Reduced network costs due to user, electrical,
and device circuit tracking tools and processes that identify unused network compo-
nents [2-4]. The changes are made on a single host by locally modifying system
configuration files, calling specific commands, and installing or configuring different
applications. By configuring the network devices, it can create detailed
documentation on how to configure a particular service and the more systems to have,
which provide the repeatable and similar steps to guide the technician to update the
software, or rebuild them when they inevitably fail [2]. In addition, the successful
business process can significantly improve an organization's business practices, and
can indeed provide a fundamental increase in business operations [5-10]. However, to
do so, many important success factors need to be considered when conducting CM,
including the status and quality of employees conducting activities, and tools to
monitor and evaluate performance [11-14].
The proper reward and punishment strategies are critical and important to maintain
the network administrator results based on the organization's goals [15]. It can be
summarized the cycle as the configuration identification, control, accounting, and
reviewed audits through several rules such as the CM must manage information
ownership and control work products in a timely manner [16-18]. The early
identification and control of artifacts and work products are an integral part of the
project and should be simple, consistent with the project culture and requirements,
and supported by the project methods and tools [19-21]. Meanwhile, data centers are
evolving and leveraging available technologies to improve the ability to manage and
access data retention [22]. This is where the serious problem arises. Inadequate data
management can result in loss of critical data, unverifiable results, and wasted money.
Over the next few years, thousands of qualified data hosts will be required to address
these issues [23]. The main challenge is not only the amount of data, but also the
variety of formats and types. Other key challenges are data architecture and data on
the go, such as sending data over a network [24]. Data stewardship includes all
activities to maintain and improve information content, accessibility, and usability of
data and metadata [25]. Therefore, data stewardship practitioners, especially those in
data warehouses, data service centers, or related to data stewardship programs, can
benefit from their knowledge of existing maturity assessment models.
3
By using self-assessment tools, data managers can define a roadmap for future
development and improvement, and some recommended data stewards practices are
necessary to be adopted when comparing data processes with other data providers
[26]. It can also provide best practices and social standards to generate the specific
benefits to be taken by presenting a unified framework for assessing the management
of scientific data. Then, it can creates a stewardship maturity scoreboard for the
dataset to improve stewardship of scientific data and provide users and stakeholders
in supporting decision making with quality information and ease of use of data [27].
Ensuring and improving quality and ease of use is vital part of scientific monitoring
of digital environmental data products, but the role of the person responsible for
managing quality has been evolved over time and is not always well defined [28].
This is an important part of the long-term storage and use or reuse of digital research
data with the reliability of data of products and services must be monitored in regular
manner [29]. Therefore, assessing the maturity status of the current management of
datasets is also important part of ensuring and improving the way datasets are
documented, stored, managed, and distributed to the relevant stakeholders [30].
3 Network Topology
Fig. 1. Network Topology
This research used on-site observation to obtain a whole picture of the network topol-
ogy in the Boarding School area, which became the sample for the case study of CM
and DS. The network devices include ISP routers from Indihome (ISP 1) and Remala
(ISP 2), bandwidth management router, switches, access points, and WiFi-routers. It
4
starts from the central office building, then flows to the school building separated by
three areas with one switch on each side, those switches connected to the end devices
like a personal computer (PC) and access points used by four computer laboratories,
administration office, and teacher offices. ISP 1 router is not connected to the central
office building, but it directly connects the ISP to the Junior and Senior High School
office (SMP and SMA) in the school building. The next building is a TV Studio lo-
cated behind campus. One switch is connected to 7 PCs and 2 ISP wifi-router to sup-
port TV Studio activities. Next to the studio, there is a dormitory office which one
switch and wifi-router located. Fig. 1 below explains the detail of network topology
for the location of network devices for further analysis while Fig. 2 presents the loca-
tion of building.
Further from those buildings before, there are Radio Station and Inn that located
side by side. Switch, 3 PCs, and WiFi-router are located in the radio station while in
the Inn, only WiFi-router directly connected to the central office is located. The net-
work topology is the arrangement of elements (links, nodes, etc.) of a communica-
tions network. Network topology can be used to define or describe the layout of vari-
ous types of communication networks, including radio command and control net-
works, industrial field carriers, and computer networks. Some of the advantages of
implementing a network topology are adequate network performance, higher network
performance, lower operating, implementation, maintenance costs, fault or failure
detection, and efficient use of resources. The Table 1. Provides the list of network
devices while Table 2 present the subnet distribution of each them.
Fig. 2. Network Topology Buildings
Table 1. List Network Devices
Devices
Brands
Router
Mikrotik RB2011L
Switch
TP-Link TL-SG1024DE
Access Point
UniFi UAP-LR
Table 2. Subnets Distribution
Subnet Name
Host
Prefix
IP Prefix
First IP
Last IP
IP Broadcast
Kampus
150
/24
192.168.1.0
192.168.1.1
192.168.1.254
192.168.1.255
Inn
100
/25
192.168.2.0
192.168.2.1
192.168.2.126
192.168.2.127
Pusat
50
/25
192.168.2.128
192.168.2.129
192.168.2.254
192.168.2.255
Pengasuhan
30
/26
192.168.3.0
192.168.3.1
192.168.3.62
192.168.3.63
StudioTV
20
/26
192.168.3.64
192.168.3.65
192.168.3.126
192.168.3.127
Radio
10
/26
192.168.3.128
192.168.3.129
192.168.3.190
192.168.3.191
5
4 Data Stewardship Maturity Result
Fig. 3. Data Stewardship Maturity Results
The matrix-based data stewardship maturity assessment model serves as a guide to
users regarding the rigor of data stewardship practices, as well as to monitor and im-
prove aspects of an organization's performance in production, management, or service
climate data. It can also be used as a tool, which is usually represented as a two-
dimensional matrix. Based on the assessment using the Data Stewardship Maturity
Matrix against Boarding School, it can be seen that the highest level regarding the
implementation of stewardship data is at the minimum level for preservability and
usability. As for accessibility, production sustainability, data quality assurance, data
quality control/monitoring, data quality assessment, transparency/traceability, and
data integrity at the ad hoc level, indicating the low application of stewardship data
management. In this case, the result show mostly have positioned in the first stage for
every respected criteria, which preservability and usability went higher to second
stages as the technician have documented the activity log as well protect the network
system with authentication system based on user privileges. It is a functional role in
data management and governance and is responsible for ensuring that data policies
and standards are enforced within the administrator. Thus, data hosts help organiza-
tions get the most out of their domain data assets.
5 Configuration Assessment Result
CM should be a single and unique report on the identification, controlled storage,
change control, and status of selected intermediate work products, product compo-
nents, and products over the system's life. All areas actively participate in the man-
agement of metadata settings for placed objects, a database concept that means data
about the data stored in the database. The metadata for a configuration object can
include its name, the person who produced the item, the production date, and other
related configuration items. A configuration item can exist without change control
information, but cannot exist without metadata. Based on the table above, three
practices should improve DHCP ranges, downtime simulation, and standard modular
network solution. Being able to take full advantage of CM requires, unsurprisingly, an
initial learning curve, as well as careful study of how to organize and classify your
data and the maintenance of physical assets. System administrators tend to be very
hands-on and will likely start setting up a new service by installing the required
6
software to evaluate, tune, change, and adapt it to the environment's needs and
thereby terminate the server's functionality. Suppose this type of process has been
documented to allow the replication in the future or perhaps automate it completely.
In that case, it is imperative to keep track of the decisions made along with the phase
by identifying the changes made to the program and its configuration files and record
all of them repeatable.
Table 3. Configuration Process Assessment
Process
Description
Existing Configuration
Imple-
mented
Not Imple-
mented
Software
Version
Control
The practice of implementing consistent software versions on
similar network devices. This improves the possibility of
validation and testing on selected software versions and
significantly reduces the number of software defects and
interoperability problems present on the network.
IP address
management
The process of assigning, recycling, and documenting IP
addresses and subnets on a network. The IP addressing crite-
ria define the subnet size, subnet assignment, network hard-
ware assignments, and dynamic address assignments within
the subnet range.
Naming
Conventions
The practice of implementing naming conventions for net-
work management helps create a consistent access point to
routers for all device-related network management infor-
mation, reducing the possibility of duplicate IP addresses,
creating simple identification of devices, and improves inven-
tory management
DNS/DHCP
Assignments
The practice of identifying DHCP ranges and adding them to
the DNS, including the users' location.
Standard
Configura-
tion
The practice of applying standard configuration to the proto-
col, media configurations, and global configuration com-
mands for each device classification to maintain network
consistency.
Descriptors
The practice of creating a standard format that applies to each
interface. The descriptor includes the interface's purpose and
location, other devices or locations connected to the interface,
and circuit identifiers. This allows faster resolution of prob-
lems related to an interface.
Configura-
tion Upgrade
Procedures
The practice of ensuring that software and hardware upgrades
occur smoothly with minimal downtime. Upgrade procedures
include vendor verification, vendor installation references
such as release notes, upgrade methodologies or steps, con-
figuration guidelines, and testing requirements.
Solution
Templates
The practice of defining standard modular network solutions
helps ensure that similar deployments can be carried out in
the same way.
The aspects of CM has high correlation to the human resource such as skill, train-
ing, communication, motivation and appreciation systems, which organization also
need to consider before changes occurred in the whole work pattern. The idea related
to the adaptation processes interconnected with the interrelated activities in generating
the competitive and added value to the customers. Many steps can improve CM, such
as avoiding configuration errors by analyzing configuration changes before applying
them. They are, verifying the configurations against company policies and external
standards such as PCI, HIPAA, and ITIL. Reduce the room for manual errors by
7
standardizing and standardizing multi-vendor device management to simplify the
deployment of standard configurations across multiple devices, after the change
approval process and the implementation of user roles to restrict access to make
configuration changes. Establish and maintain instrument baselines in the critical
hardware network. Finally, find out what devices are running on your network and
remove any unused devices.
6 Conclusion
Implementing configuration management based on best practices can significantly
impact a network's quality, such as better network availability and cheaper costs, in-
cluding decreased support costs due to reduced interactive support problems. Using
configuration management best practices released by Cisco network management, a
network configuration management assessment was carried out on the Boarding
School in Indonesia as a study case. This research was conducted through on-site
observations to obtain a whole picture of the network topology and then carried out an
assessment using the best practice. This assessment shows that three practices have
not been implemented, i.e., DNS / DHCP Assignments, Configuration Upgrade Pro-
cedures, and Solution Templates. Based on this assessment results, it is hoped that
Boarding School can improve the implementation of its network management so that
it has a positive impact on the overall condition of the network.
References
[1] Farahani, E.: Comprehensive Configuration Management Model for Software Product
Line. Int. J. of Control Theory and Application 9(25), 2016.
[2] Widjajarto, A., Lubis, M. and Yunan, U. Architecture Model of Information Technology
Infrastructure based on Service Quality at Government Institution. Procedia Computer
Science 13(2), 2019.
[3] Lubis, M., Fauzi, R., Lubis, A.R. and Fauzi, R.: A Case Study of Universities Dormitory
Residence Management (DRMS) in Indonesia. Proc. IEEE CITSM 2018.
[4] Lubis, F and Lubis, M. Network Fault Effectiveness and Implementation at Service
Industry in Indonesia. J. of Physics: Conf. Series 1566(1), 012080 (2020).
[5] Lubis, F and Lubis M. Internet Provider Service Value Delivery Index Problem: Case
Study of the NetHost. J. of Physics: Conf. Series 1566(1), 012080 (2020).
[6] Shahrani, T.M., Ramdhania, A.N., Lubis, M. and Almaarif, A. Implementation of Building
Construction and Environmental Control for Data Center based on ANSI/TIA-942 in
Networking Content Company. J. of Physics: Conf. Series 1361(1), 012074 (2019).
[7] Brown, N. Little Book of Configuration Management. Comp & Concepts Associates.
1998.
[8] Lubis, M., Kartiwi, M. and Zulhuda, S.: Election Fraud and Privacy Related Issues:
Addressing Electoral Integrity. Proceedings of the IEEE ICIC (2016).
[9] Stancu, S.N., Shevrikuko, A. and Rueda, D.G.: Evolving CERN’s Network Configuration
Management System. The European Physical Journal Conferences 214:08015 (2019).
[10] Ismail, H., Hamza, H. and Mohamed, S.M.: Semantic Enhancement for Network
Configuration Management. IEEE Global Conference on Internet of Things 2018.
8
[11] Meer, S.V.D., Keeney, J., Fallon, L., Feghhi, S. and de Buitleir, A.: Large-scale
Experimentation with Network Abstraction for Network Configuration Management. 22nd
Conf. on Innovation in Clouds, Internet and Networks and Workshop 2019.
[12] Fallon, L., Keeney, J. and Meer, S.V.D.: Distributed Management Information Models,
IEEE Int. Symposium on Integrated Network Management 2017.
[13] Deca, R., Cherkaoui, O. and Puche, D.: Configuration Model for Network Management.
Int. Conf. on Network Control and Engineering for QoS, Security and Moblity 2004.
[14] Julham, Lubis, M. and Lubis, A.R.: Automatic Switch Prototype without Touch Assitance
Wireless Fidelity (Wi-Fi) Signal. Int. Con. on Electrical, Telecommunication and Com.
Engineering 2020.
[15] Bhuvaneswari, T., Hossen, J., Asyiqin, N., Velrajkumar, P. and Jack, O.H.: Internet of
Things (IoT) based Smart Garbage Monitoring System. IJEECS vol. 20(2), 736-743, 2020.
[16] Kim, H. And Feamster, N.: Improving Network Management with Software Defined
Networking. IEEE Communications Magazine, February 2013.
[17] Klijn, E.H. and Koppenjan, J.: Public Management and Policy Networks: Foundations of
a Network Approach to Governance. Public Management 2(2): 135-158, June 2000.
[18] NSA.: Performing Out-of-Band Network Management. White Paper, PP-20-0807, Sep
2020.
[19] ETSI.: Network Transformation; (Orchestation, Network and Servie Management
Framework). White Paper no. #32, Oct 2019.
[20] McGillicuddy, S.: Network Management Tool Consolidation is Essential to Effective IT
Operations. EMA White Paper, August 2017.
[21] DISA.: Network Management Security Guidance at-a-Glance. Unclassified, Version 9,
Release 1, August 2017.
[22] Downs, R.R., Duerr, R.E., Hills, D.J., Ramapriyan, H.K.: Data Stewardship in the Earth
Sciences. D-Lib Magazine 21(7/8), 2015.
[23] Suchanek, M., Pergl, R.: Data Stewardship Wizard for Open Science. Data a znalosti &
WIKT 2018.
[24] Albani, M., Maggio, I.: Long time data series and data stewardship reference model. Big
Earh Data 4(4), 2020.
[25] Peng, G.: The state of assessing data stewardship maturity an overview: Data Science
Journal 17(4), 2018.
[26] Dunn, R.J.H., Lief, C., Peng, G., Wright, W., Baddour, O., Donat, M., Dubuisson, B.,
Legeais, J-F., Siegmund, P., Silveira, R., Wang, X.L., Ziese, M.: Stewardship Maturity
Assessment Tools for Modernization of Climate Data Management. Data Science Journal
20(1), 2021.
[27] Peng, G., Privette, J.L., Kearns, E., Ritchey, N., Ansari, S.: A Unified Framework for
Measuring Stewardship Practices Applied to Digital Environmental Datasets. Data Sci-
ence Journal 13, 231-253, 2015.
[28] Peng, G., Ritchey, N., Casey, K.S., Kearns, E., Prevette, J.L., Saunders, D., Jones, J.,
Maycock, T., Ansari, S.: Scientific Stewardship in the Open Data and Big Data Era: Roles
and Responsibilities of Stewards and Other Major Product Stakeholders. D-Lib Magazine
22(5/6), 2016.
[29] Peng, G., Privette, J.L., Tilmes, C., Bristol, S., Maycock, T., Bates, J.J., Hausman, S.,
Brown, O., Kearns, E.: A Conceptual Enterprise Framework for Managing Scientific Data
Stewardship. Data Science Journal 17(15), 2018.
[30] Ritchey, N., Peng, G., Jones, P., Milan, A., Casey, K.: Practical Application of the Data
Stewardship Maturity Model for NOAA’s OneStop Project. Data Science Journal 18(41),
2019.
ResearchGate has not been able to resolve any citations for this publication.
Article
Full-text available
High quality and well-managed climate data are the cornerstone of all climate services. Consistently assessing how well the data are managed is one way to establish or demonstrate the trustworthiness of the data. This paper presents the World Meteorological Organization’s (WMO) Stewardship Maturity Matrix for Climate Data (SMM-CD) and the subsidiary SMM-CD for National and Regional Purposes (SMM-CD_NRP). Both these matrices have been developed with the support of the WMO and its High-Quality Global Data Management Framework for Climate (HQ-GDMFC). These self-assessment tools enable data managers to discover WMO recommended data stewardship practices, determine a roadmap for future development and improvement, as well as compare their process against other data providers. Datasets which have been maturity assessed are included in the WMO Climate Data Catalogue, where users can include the results of these maturity assessments into their decision-making process. The SMM-CD contains four categories (data access, usability and usage, quality management, and data management) each of which has a number of aspects, with scores assigned to one of five levels. A smaller number of categories in the SMM-CD_NRP are assigned to four levels appropriate for operationally produced datasets which are national or regional in scope. We explore a number of case studies where these matrices have been applied, as well as supply links to where the Guidance Documents and Assessment Templates (which may be updated) can be found.
Article
Full-text available
The need for accessing historical Earth Observation (EO) data series strongly increased in the last ten years, particularly for long-term science and environmental monitoring applications. This trend is likely to increase even more in the future, in particular regarding the growing interest on global change monitoring which is driving users to request time-series of data spanning 20 years and more, and also due to the need to support the United Nations Framework Convention on Climate Change (UNFCCC). While much of the satellite observations are accessible from different data centers, the solution for analyzing measurements collected from various instruments for time series analysis is both difficult and critical. Climate research is a big data problem that involves high data volume of measurements, methods for on-the-fly extraction and reduction to keep up with the speed and data volume, and the ability to address uncertainties from data collections, processing, and analysis. The content of EO data archives is extending from a few years to decades and therefore, their value as a scientific time-series is continuously increasing. Hence there is a strong need to preserve the EO space data without time constraints and to keep them accessible and exploitable. The preservation of EO space data can also be considered as responsibility of the Space Agencies or data owners as they constitute a humankind asset. This publication aims at describing the activities supported by the European Space Agency relating to the Long Time Series generation with all relevant best practices and models needed to organise and measure the preservation and stewardship processes. The Data Stewardship Reference Model has been defined to give an overview and a way to help the data owners and space agencies in order to preserve and curate the space datasets to be ready for long time data series composition and analysis.
Conference Paper
Full-text available
802.11 WLAN Standard is a wireless local area network signal, known as Wireless Fidelity (WiFi). One of the parameters contained in the WiFi signal is SSID. SSID or Service Set Identifier is the name used to identify a WiFi network. In this study utilizing SSID to control electrical devices, namely lights. The way this works is that the receiver will turn on the light if it detects an SSID polmed. The receiver unit is consists of Arduino Board, Relay and ESP8266. transmitter unit is an SSID-generating device, like a smart phone with has the hotspot feature activated and is the same as the SSID name with the receiving unit. Furthermore, the sensitivity of the receiver unit is set to find out at distance the lamp starts to turn on. The transmitter unit is shifted according to the experiment and the receiver unit stays in place. From the experimental results it was found that if sensitivity 1: RSL> -90 dBm, the lamp starts to light at a distance of 20 m, if sensitivity 2: RSL> -75 dBm then the lamp starts to light at a distance of 15 m, if sensitivity 3: RSL> -55 dBm then the lamp starts to light at a distance of 10 m.
Article
Full-text available
p>Garbage waste monitoring, collection and management is one of the primary concerns of the present era due to its detrimental effects on environment. The traditional way of manually monitoring and collecting the garbage is a cumbersome process as it requires considerable human effort and time leading to higher cost. In this paper, an IoT based garbage monitoring system using Thingspeak, an open IoT platform is presented. The system consists of an Arduino microcontroller, an ultrasonic sensor, a load cell and a Wi-Fi module. The Arduino microcontroller receives data from the ultrasonic sensor and load cell. The depth of the garbage in the bin is measured using ultrasonic sensor and the weight of the bin with garbage is measured from the load cell. The LCD screen is used to display the data. The Wi-Fi module transmits the above data to the internet. An open IoT platform Thingspeak is used to monitor the garbage system. With this system, the administrator can monitor and schedule garbage collection more efficiently. A prototype has been developed and tested. It has been found to work satisfactorily. The details are presented in this paper.</p
Article
Full-text available
The efficiency of network administrators have been decreased concurrently due to complexity and heterogeneous of network built in certain environment of company. Actually, large heterogeneous network has created a crisis and conflict for many organizations. Available network tools and solutions are not only expensive but also difficult to install, configure, manage and maintain. This paper discusses the implementation of network fault in the service industry to match with the expectations of stakeholders to be able to achieve the higher efficiency and to carry out proactive processes although the practical truth is often the opposite way.
Article
Full-text available
The efficiency of network administrators from network management decreases because networks become more complex and heterogeneous. Large heterogeneous network management has created a crisis for many organizations. Available network management tools and solutions are not only expensive but also difficult to install, configure, manage and maintain. This paper discusses the implementation of network management in the service industry, although expectations of stakeholders are able to achieve higher efficiency and are able to carry out proactive processes, but the truth is the opposite.
Article
Full-text available
Public service activities in several government institutions are currently using information technology services so that information technology services must also have criteria in accordance with the government’s vision and mission. One fundamental problem is providing quality and reliable information services that provide infrastructure support that has the capability and capacity. The provision of this infrastructure can be approached with accurate and complete planning and design. The purpose of this research is to produce infrastructure architecture planning and design that forms infrastructure services. As a service, infrastructure architecture has the duty to provide quality and reliable services for end users. Applications and data which are business processes of government institutions require infrastructure parameters that are presented from the service side perception. One way to present infrastructure services for information services in business processes is by planning right before the implementation and deployment phase. At present, the discussion of infrastructure architecture that is widely used is based on the core functions of infrastructure architecture which are limited to the main development and use. These core functions usually focus on availability and modularity (scalability). Availability is usually discussed in the criticality of services that require infrastructure backup. Whereas modularity is related to an increase in the number of users or services. In this study a collaborative role was added, namely an open contribution to the service delivery cycle from the infrastructure section. This open collaborative method is a strategy to "develop synergies" between infrastructure service providers and service users (end-users).
Article
Full-text available
The data centre room is different with other networking or IT type of room, which its space are necessarily required certain stringent requirements to achieve borderline of safety and stability in the prevention of interference or disturbance either physically or digitally. Therefore, it should also take note of the ease and access of the user to the data by considering the aspect of necessities and maintenance. Data center also transport energy upstream and greenhouse gas emissions due to processes, the resources and capital equipment used to extract and build, which should be considered carefully to avoid worst case scenario. This study explore the implementation issues in specific networking content company in Indonesia to manage building construction and environment control based on criteria derived from ANSI/TIA-942.
Article
Full-text available
CERN’s networks comprise several thousands network devices from multiple vendors and from different generations, fulfilling various purposes (campus network, data centre network, and dedicated networks for the LHC accelerator and experiments control). To ensure the reliability of the networks, the IT Communication Systems group has developed an in-house, Perl-based software called “cfmgr”, capable of deriving and enforcing the appropriate configuration on all these network devices, based on information from a central network database. Due to the decrease in popularity of the technologies it relies upon, maintaining and expanding the current network configuration management system has become increasingly challenging. Hence, we have evaluated the functionality of various open-source network configuration tools, in view of leveraging them for evolving the cfmgr platform. We will present the result of this evaluation, as well as the plan for evolving CERN’s network configuration management system by decoupling the configuration generation (CERN specific) from the configuration enforcement (generic problem, partially addressed by vendor or community Python based libraries).
Article
Full-text available
Assessing the stewardship maturity of individual datasets is an essential part of ensuring and improving the way datasets are documented, preserved, and disseminated to users. It is a critical step towards meeting U.S. federal regulations, organizational requirements, and user needs. However, it is challenging to do so consistently and quantifiably. The Data Stewardship Maturity Matrix (DSMM), developed jointly by NOAA’s National Centers for Environmental Information (NCEI) and the Cooperative Institute for Climate and Satellites–North Carolina (CICS-NC), provides a uniform framework for consistently rating stewardship maturity of individual datasets in nine key components: preservability, accessibility, usability, production sustainability, data quality assurance, data quality control/monitoring, data quality assessment, transparency/traceability, and data integrity. So far, the DSMM has been applied to over 800 individual datasets that are archived and/or managed by NCEI, in support of the NOAA’s 'OneStop' Data Discovery and Access Framework Project. As a part of the 'OneStop'-ready process, tools, implementation guidance, workflows, and best practices are developed to assist the application of the DSMM and described in this paper. The DSMM ratings are also consistently captured in the ISO standard-based dataset-level quality metadata and citable quality descriptive information documents, which serve as interoperable quality information to both machine and human end-users. These DSMM implementation and integration workflows and best practices could be adopted by other data management and stewardship projects or adapted for applications of other maturity assessment models.