Question  Methods of Ensuring Business Continuity and Disaster Recovery Section 2: Using FTP/tftp, SNMP and QoS Write a minimum 1-page paper on how best to use FTP/TFTP, SNMP, and QoS to improve business continuity and disaster recovery, including tools, personnel, training needed, etc.


Methods of Ensuring Business Continuity and Disaster Recovery

Methods of Ensuring Business Continuity and Disaster Recovery

Section 2: Using FTP/tftp, SNMP and QoS

Write a minimum 1-page paper on how best to use FTP/TFTP, SNMP, and QoS to improve business continuity and disaster recovery, including tools, personnel, training needed, etc.

">

Question  Methods of Ensuring Business Continuity and Disaster Recovery Section 2: Using FTP/tftp, SNMP and QoS Write a minimum 1-page paper on how best to use FTP/TFTP, SNMP, and QoS to improve business continuity and disaster recovery, including tools, personnel, training needed, etc.

Methods of Ensuring Business Continuity and Disaster Recovery

Business continuity and recovery in case of a disaster or catastrophic event is vital in managing a modern enterprise. Some of the tools a company can use to achieve this end include FTP. TFTP, SNMP, and quality of service. FTP or file transfer protocol can be used to download data from a remote server if a local computer is destroyed or an employee is working away from the office (Al-Harbi et al., 2021). On the other hand, TFTP allows users to upload their data after every manipulation of data or addition of new data to a remote location. This characteristic will enable users to have a backup of their data available at a remote destination; in the event that the office is moved or destroyed, the company can continue from exactly where it was without losing data or incurring enormous amounts of money. The downside is that the protocols above have low levels of security and can expose a network to unauthorized access.

Further, a simple network management protocol (SNMP) is a network protocol that allows managers to monitor and manage a network remotely and can be used by enterprises to ensure their systems are functioning at optimum levels. The network protocol can also be used to observe the signs of an upcoming network failure or disruption and preparations made before the incident occurs. Quality of Service can be used as a count of the overall performance of a network. The service can also be used in the prioritization of resource allocation, ensuring the most vital operations are prioritized. However, for the information technology solutions to be used, all employees must receive training on how to use the technology and the measures to be used to reduce the risk of a cyber security attack (Fani & Subriadi, 2019). In order to implement the solutions, all that is required is an internet connection, host computers, and technical know-how.

References

Al-Harbi, A., Bahnasse, A., Louhab, F. E., & Talea, M. (2021). Towards an Efficient Resource Allocation based on Software-Defined Networking approach. Computers & Electrical Engineering, 92, 107066.

Fani, S. V., & Subriadi, A. P. (2019). Business continuity plan: examining the multi-usable framework. Procedia Computer Science, 161, 275-282.

 

 

Order a similar paper

Get the results you need