Network management paper

Information technology is a "double-edged sword", which brings people various conveniences.

At the same time, it also brought disaster. Network information system is created by people in the real society.

It represents the extension and expansion of the traditional information exchange and communication methods of human beings. it

There are both connections and differences with the information activities in the real society. So, right?

It is both necessary and possible to implement social control in network information activities.

We should rely on the existing norms in the real society and combine the network information space.

According to its own characteristics, according to the different stages of network development, to develop in line with its development.

Formulate a regular control system to promote the rapid and healthy development of online virtual world.

Exhibition.

1 the connotation of information policy and information law

National information policy, information laws and regulations and information environment in the development of information industry

It plays an important role in regulating environment and controlling information resources. Information policy

Is formulated by state organs or social organizations according to the needs of social development, guidance,

Policies, principles and methods to promote, standardize and manage the development of information industry. it

Is to rely on the state administrative agencies at all levels to implement the control of information behavior and

A means of macro management.

Information laws and regulations have the greatest influence on information workers and information users.

Binding force, which is formulated or recognized by the state and enforced by the state.

Information behavior standard system, for information individuals or collectives who violate the law, the state

The government will impose sanctions and penalties according to law. The main contents of information laws and regulations include: regulations

Defining the basic issues of information society relations; Information Democracy and the Definition of Information Basic Person

Rights issue; The problem of formulating information technology rules; Specified electronic computer software

Use problems; Regulations on information pollution and so on.

Information policy and information laws and regulations are two social norms and two social keynote.

Overall means and social information environment management means both bear their respective functions.

It plays an important role in the sustained, rapid and healthy development of the national information industry.

Role, information policy is the basis of information legislation, information legislation.

The development of information society often lags behind the actual situation, and an information policy has gone through.

Practice has proved that it is correct and effective now and in the future, and it may

It will be fixed in the form of law through legislative procedures. Information policy

It is an administrative means, which can adjust social relations better than information law and law.

Laws and regulations are much broader, and information laws and regulations are legal means, so adjust one.

Generally speaking, it is a social relationship that has a great influence on the country and society in information activities.

Field. Therefore, information laws and regulations are the sublimation of information policy, scientific and reasonable.

Information policy should be bound by information laws and regulations.

2 the status and role of information policies and regulations in network information control

Network information activities are more important than traditional information dissemination and exchange.

Freedom, but this freedom is relative, and absolute freedom does not exist.

Yes Only those who master network technology and have the corresponding educational and cultural level.

People, so that their information behavior conforms to the law of network operation and development, in line with

Social laws, ethics and development requirements can only be obtained on the Internet.

The greatest true freedom. It is impossible for people who are not familiar with network technology to obtain it.

Greater freedom of information, and take advantage of their own information technology, not.

Law activities, the absolute freedom they pursue does not exist.

There are many ways to control network information problems, so we should

Understanding and grasping from multiple levels can be divided into cultural and moral levels.

Surface control, legal control, information organization and management control, and

Information technology level control. Information evaluation is an important part of network information control.

Paragraph, through information evaluation, choose ideological health, scientific content and quality for people.

Reliable and high-quality information provides a guarantee. Technical factors in network information control

Many aspects are feasible, and they are all related to information evaluation and ethics.

Compared with the legal system, it has certain control advantages. Network technology lies in

In the hands of different people, its function is very different. But,

Not all problems can be solved by technical means. The use of information technology

More from the perspective of prevention, its implementation is also related to the network itself.

Only by combining information norms with relevant laws can we achieve the best results. net

Network ethics has a strong binding force on people's information behavior, and it is a network.

Network information control is an organic part, which is the imperfect coordination of network laws and

An important means of insufficient information technology. Compared with the law in the real world, the network

Ethics involves a wider range, and it can bind things that are not bound by legal norms.

A lot of information behaviors that can, can't or can't be involved. Internet work

There are many places where people exchange feelings, publish and spread information.

Several people follow the same code of conduct and have the nature of self-discipline.

Its function and influence can not be ignored. Information ethics tends to legal norms.

Development direction is the basis of formulating information laws and regulations.

The information society is also a legal society, and all free information behaviors must be in

Under the protection of law, the Internet can develop healthily and orderly.

Exhibition. At present, the normative function of law is used to prevent and suppress network information.

Problems have become the * * * knowledge in today's world. Legal norms come from the outside and are very mandatory.

Institutional means restrict the information behavior and network morality of network participants.

Standardization mainly restricts people's information behavior from the inside of network members. internet

Is a global civil society, which has its own organizational form.

Value standards and rules can be separated from the government and have greater autonomy.

Because different countries and groups have different values, it is necessary to form a network.

International conferences on the Internet are not easy. Therefore, we can only establish and improve.

International network law enforcement agencies, the establishment of specialized law enforcement teams, information laws in various countries.

When formulating laws and regulations, we should adhere to the principles of regional and international, and the general legislative principles.

And the particularity principle of network society, the reality principle and the development principle of network.

Only by combining the two can we create a good legal atmosphere for the management of cyberspace.

3 differences in information policies and regulations in different countries

The earliest information law was born in Europe in18th century and Sweden in 1776.

Freedom of the press law is the earliest information law in the traditional sense. Modern harmony

Electronic connection information law rose in the 20th century, mainly developed in Europe and America.

The state has formulated it to meet the needs of information activities under the network environment. But,

Different countries have different political systems, legal foundations, cultural backgrounds and educational levels.

Different, the development of information technology, the application and popularization of network technology.

There are differences, which lead to differences in information policies, information laws and regulations and management systems.

It's different.

3 1 Germany

It is the most developed country in information technology in Europe, and its electronic information and communication.

Services have covered all areas of national economy and life. 1June 1997 country

The Law on Information and Communication Services was passed and put into practice in August 1997.

Implementation, this is the world's first legal norm for cyberspace behavior.

Special national legislation has established some of the most basic aspects of electronic cyberspace.

Principles, such as "the principle of free internet access" and "negative classification of communication content"

The principle of responsibility, the principle of protecting citizens' personal data, etc. German government

It is clearly not allowed to spread pornographic content on the internet and promote neo-Nazi ideas.

Location.

3 2 England

In order to protect intellectual property rights and protect children's physical and mental health, Britain has formulated

Many laws and regulations have been promulgated, such as the yellow publishing law and the juvenile protection law.

Law ","Database Protection Law ","Prohibition of extensive use of computers "and so on. , and according to the network

Some laws and regulations have been revised to meet the needs of network development, for example, the adoption system of 1994.

The Criminal Punishment and Public Order Law and the Child Protection Law were promulgated in 1978.

The protection law has been extended to meet the needs of the information age. 1996 September, UK

China promulgated the first network supervision industry regulation 3R safety rules. place

The "3R" of the predicate stands for grading appraisal, reporting and issuing, and taking responsibility respectively.

1999, the British government published the Electronic Communications Act for comments.

Draft. The main purpose of this draft is to promote the development of e-commerce.

Provide legal protection for all sectors of society to establish confidence in e-commerce. Just like this.

At that time, the independent television commission, the competent body of British radio and television, was in accordance with

British Broadcasting Act, which has the right to broadcast TV programs on the Internet, including static programs.

Or advertisements of moving images, but it does not move directly on the Internet.

The right to operate, but to guide and assist the network industry to establish itself.

The mechanism I manage.

3 3 Canada

In order to promote the rapid development of network industry, Canada is a whole country.

To meet the needs of development strategy, the Radio, Film and Television Commission thinks that the network is not in China.

A network produced by a traditional broadcasting company within the jurisdiction of the Broadcasting Law.

Network broadcasting is also outside the bill management, and the development of network industry is the main thing.

We should rely on industry self-discipline, firewall, encryption technology and other information technologies.

And the implementation of national crime regulations.

3.4 USA

In the United States, the rapid development of the Internet has left many original laws behind.

In order to meet the needs of reality, Congress has made and will soon make mutual amendments.

Networking rules 100. In the United States, its electronic media, such as radio.

Videos and movies are more restricted by law, especially immoral and indecent.

The content of culture is absolutely illegal and will be punished by relevant laws; Two tones

Print media such as newspapers and magazines are protected by freedom of speech.

Now, whether electronic newspapers should be defined as print media or electronic media,

There is no unanimous opinion in the legal profession. Will "freedom of speech" and "the first amendment to the constitution"

The United States, which regards positive cases as supreme, regards radio waves as public property.

They can only carry limited channels, but face a large audience, so the government

Have the right to manage this limited resource.

1996 on February 8th, US President Bill Clinton signed "1996 Telecom".

Law ",the fifth part of the communication purification law (Communication De-

Cency Act) is specially formulated for the protection of underage children. This bill

It has been welcomed by parents and teachers. But most scholars and network practitioners

Lawmakers believe that the bill violates the right to freedom of speech guaranteed by the First Amendment to the Constitution.

Restrictions, so to the Philadelphia court. 1996 65438+ February, laws of Philadelphia

The federal judge in the hospital vetoed the communication purification bill. At the same time, the US House of Representatives split.

The Law Committee requires that pornographic emails be marked so that users can't open them.

Delete directly. 1998 children's online protection law was approved by the national assembly.

And became law after Clinton signed it. Operators of commercial websites are required by law.

Before allowing Internet users to browse content harmful to minors, make

Use electronic age verification system to identify the age of Internet users. But,

This law has never been formally implemented. Once promulgated, it was resisted by the United States.

The civil rights league and 17 organizations and enterprises include magazine publishers and booksellers.

Strong opposition from the industry. Many commercial network companies are noncommittal about this bill.

They believe that Internet companies should keep and delete obscenity, hatred and any risks.

The right to sexual content. However, NBC and Wall Street

Some mainstream American news media, such as Daily and CNN, have expressed their willingness to pick up the plane.

Graded by content.

In American libraries, Internet information filtering software is installed to make users

Can safely use network information resources, especially to protect children's health.

Mental health is a controversial issue. Because Internet information filtering involves

And the dual pressures of eliminating harmful information and protecting freedom of speech. A point of view

Point out: "... in order to protect the rights of our families and taxpayers, we

Pornographic information should not be allowed to enter government-funded libraries through electronic back doors.

Medium. Contrary to this view, the Internet enjoys the highest level of constitutional protection.

In fact, installing filtering software in schools or libraries is a kind of censorship.

It violates the freedom of speech protected by the constitution. Relevant surveys show that in the United States

16.8% of state-owned libraries have installed filtering software, while 83.2% have not.

Filtering software is installed. At present, the power to oppose the installation of filtering software in libraries

Has gathered into a powerful torrent, they launched a variety of work attempts.

Figure cancel the library's internet filtering policy.

3.5 Singapore

In July, 1996, Singapore Broadcasting Bureau issued relevant regulations.

And announced the implementation of classified licensing management system for the Internet, requiring interconnection.

Network service companies supervise the content of information entering the network to prevent color

Love and information dissemination can easily lead to religious and political turmoil. The purpose is to encourage people.

Children use the Internet correctly, promote the healthy development of the Internet, and ensure teenagers.

Our growth is not disturbed by bad information.

3.6 China

Although China's informatization started late, the traditional information law is about

Since the 1970s and 1990s, the Patent Law and Shang Dynasty have been promulgated successively.

Standard law, copyright law, etc. However, the legal management of the Internet in China has entered.

The exhibition is good, and a series of corresponding laws and regulations have been issued, such as 1994.

People's Republic of China (PRC) Computer Information System Security Law was promulgated on February 6, 2008 at 5438+08.

Protection regulations, promulgated in February 1, 1996, May 20 1997.

Interim Measures for the Administration of International Networking of Computer Information Networks in People's Republic of China (PRC)

Regulations ",in August 2002, 1 promulgated the Internet domain name management in China.

Management methods, etc. Published in People's Republic of China (PRC) and Guodian on September 20th, 2000.

Article 57 of Chapter 5 of the Letter Regulations stipulates that no organization or individual may benefit from it.

Making, copying, publishing and disseminating information containing the following contents through telecommunication networks:

(1) Oppose the basic principles stipulated in the Constitution; (2) endangering national security,

Revealing state secrets, subverting state power and undermining national unity; (3) Loss

Damaging the honor and interests of the state; (4) Inciting national hatred and discrimination, violating

National unity is not good; (5) sabotaging the state's religious policy and promoting cults and feudalism.

Superstition; (six) spreading rumors, disrupting social order and undermining social stability;

(7) spreading obscenity, pornography, gambling, violence, murder, terror or instigation.

Criminal; (8) Insulting or slandering others and infringing upon their legitimate rights and interests;

(9) Other contents prohibited by laws and administrative regulations. 2000 1 1

On July 7, China issued the Interim Measures for the Administration of Internet Websites Engaged in Press Release.

Line regulation ". Article 14 of the "Regulations" states: Internet sites are linked to news networks outside the mirror.

News released by stations, overseas news media and Internet sites must be published separately.

Report to the State Council Press Office for approval. This shows the differentiation of Internet information.

Class management is both necessary and strict in China.

It can be seen that due to the different political and cultural backgrounds of different countries,

There are differences in understanding the social control of network information, and there are also differences in specific management.

There are also great differences in policies and regulations, but most countries have realized this.

The importance, necessity and possibility of effective management of the Internet have been

Recognize the harm caused by bad information on the internet to the growth of teenagers, and no longer

Think of cyberspace as a special uncontrollable field, in real life.

Many laws are also applicable to the online world as long as they are revised and improved.

Facing the challenge of information economy, enterprises should speed up the development of e-commerce and network management and promote the process of enterprise informatization. Without enterprise informatization, there will be no sustainable development of enterprises. Now, more and more domestic enterprises build their business on the management information system based on computer network, and more and more core business processes need to be carried out on the network, such as cash register system, supermarket inventory system, bank credit card system and so on. When the importance of the network becomes more and more prominent, it is very important whether the network has continuous availability and excellent performance. The quality of business system depends not only on the quality of business personnel, but also on the links of network, system, database and application. Unstable network is fatal to POS and other business systems in shopping malls: a customer who refuses to pay because the network is blocked first sees the service quality of shopping malls, not the network quality. So we can't treat the network in isolation, we must regard it as a part of the enterprise. For an information-based enterprise, network is business, and people must look at network management from the perspective of business. Efficient network management means is the guarantee of business growth.

First, network management problems and countermeasures

Some enterprises have various network management problems:

1. Pay more attention to construction investment than management and maintenance. In the construction of enterprise information system, some enterprises have misunderstandings. They are willing to spend money on computer rooms, computers, network communication equipment and other hardware, and sometimes even refuse to buy unknown brands and foreign brands, but they often pay insufficient attention to network management and system maintenance. It is almost a common problem in MIS (Management Information System) construction to "emphasize construction over management". In the neat and bright computer room of a supermarket enterprise, servers, workstations, switches, routers and hubs are arranged in an orderly manner, but when it comes to network management, technical directors are troubled: in the past, only a few computers were engaged in front-end and back-end management such as procurement, sales, warehousing, personnel and wages. With the development of enterprises, local area networks (LANs) have been built, and more and more computers are connected to the network, which carries more and more business and the probability of failure is increasing. In view of the above situation, we think it is necessary to increase the investment in software and introduce efficient network management means.

2. Deep thinking on network management. As the name implies, network management is to manage the network well and ensure the smooth flow of the network. However, what we are facing now is that the high informatization of enterprises makes most of the business processes of enterprises, such as EDI, ERP, CRM and so on. , conducted online. This puts forward higher requirements for the network management department, not only to ensure the connectivity of the network, but also to provide high value-added network application services with a global perspective, including improving the network's "fast service provision ability", "service quality assurance ability" and "low cost operation ability of operation and maintenance management" to adapt to and meet the business development. A network administrator once introduced me to his work: ensuring reliable network communication, responding to network failures in time, solving problems and installing some server-side software. It can be seen from what he said that while attaching importance to technical services, there is a lack of communication with business and supervision of business processes. The goal of modern network management is to embody business rules.

3. Network management should be changed from passive to active. The passive working mode of "problem-driven" and "problem-solved after it happens" can hardly meet the requirements of some enterprises that need to respond to business in time. Market competition requires that the work of network departments should be changed from passive maintenance to active service for business departments and markets, and the quality of network services should be changed from internal evaluation to real user experience. Network departments should focus on the company's business decision-making and business development, strengthen network operation analysis, carry out network extension services, and provide effective support for the formulation and adjustment of market strategies. Focusing on the needs of business departments, this paper analyzes the problems existing in network services, determines the focus of network optimization, and adopts a series of measures to improve network services. With the rapid development of business, the operating environment of the system has also changed accordingly, and new problems will appear constantly. Therefore, it is necessary to introduce intelligent management tools in time, such as Cabletron spectrum, which can manage all network devices based on SNMP, realize network analysis and intelligent fault early warning, and solve these new problems in service work at the network level. Network management should also monitor and analyze the network information flow, grasp the effect of the new business strategy adopted by the company in time, and provide support for the company to adjust its strategy. It can be said that exploring new business opportunities for enterprises through network management is the requirement for enterprises to carry out e-commerce in the information economy era.

4. Network island phenomenon caused by incompatibility. First of all, for commercial reasons, hardware equipment manufacturers shield the private parts of network management information, which makes the equipment management tools and network management platforms they provide generally weak in the equipment management capabilities of competitors. If we choose products from different hardware equipment manufacturers, we have to configure multiple independent network management systems, which inevitably leads to the island phenomenon between network management systems.

In addition, the network structure of each enterprise is different in reality. They may be Xiaolan; Rarely telecommuting; Perhaps it is a mixed structure with FDDI (or ATM) as the backbone, Ethernet, token ring, wireless network, remote access and even a website; Perhaps it is a distributed environment, where many client/server applications run on various platforms, even a mixed environment combining centralized and distributed. Key business processes carried out by enterprises, such as EDI (Electronic Data Interchange), require that the networks of upstream and downstream manufacturers in the supply chain must be interconnected. However, due to the incompatibility between hardware equipment and network environment, there may be islanding effect, which seriously affects the ability of network system to support business, causes the business processing, management control and strategic management of enterprises to be unable to communicate well with the outside world, and also causes the waste of investment in MIS. Realizing network management is a gradual process, which requires a lot of money. At present, the best way to solve the management island is to introduce NMS integrated network management system to implement end-to-end reliable management of all resources that constitute the enterprise IT environment. In short, it is to use LAN management system and enterprise management system at the same time for the complex heterogeneous environment centered on existing enterprise IT resources.

Second, the service-oriented integrated network management system.

NMS NMS is the unified management of typical functions provided by network devices, which can be divided into three categories according to their respective object-oriented and management performance: the first category is simple systems. These systems are targeted solutions to specific problems, including some relatively simple products, such as pcAnywhere, or some systems that manage user-specific assets, such as Oracle database. As far as a single system is concerned, they are very valuable, can completely solve specific problems and have low cost.

The second category is LAN management system. These systems provide a wide range of functions, including network management system and system management system. The products of this kind of management system include HP's OpenView, Novell's ManageWise and Microsoft's System Management Suite (SMS). In most aspects of LAN management required by small network companies, especially in integration, scalability, problem management and automatic detection, HP's OpenView surpasses SMS and Novell's Managewise.

The third category is the enterprise management system. Typical representatives of this kind of system are NetView of IBM and Spectrum of Cabletron. These management systems can manage the network, operating system, database and other aspects including enterprise application management on a unified management platform.

In today's enterprise informatization, the network is an important part of the enterprise, and it can be said that the network is the business. How to make the network better serve the business is also a new challenge for people. A comprehensive network management scheme can help enterprises ensure the availability of networks and services, reduce the cost of network maintenance and operation, increase new business opportunities, enhance the competitiveness of enterprises, and make the network truly a full-service network.

Third, the business value in enterprise network management

Generally speaking, an enterprise's investment in network management will bring many returns to the enterprise, including high availability of the network, return on investment (ROI) and cost of ownership (TCO) of IT, and high added value of the enterprise. This is the value of network management.

1, high availability of the network. Network availability refers to the ability of the network to run continuously. High availability may mean continuous operation 24 hours a day, 7 days a week. On the one hand, the network equipment itself is required to have high reliability (measured by mean time between failures), on the other hand, it is necessary to start with network management to realize a highly available network. The high availability of network (including the availability of applications and services) has a very important impact on the business of enterprises. Enterprises that need to respond to business in time must ensure the high availability of the network. Business losses caused by network unavailability will be different in different enterprises. Generally speaking, the more effective and critical the system, the greater the loss caused by downtime, such as supermarket front desk cashier, background management system, bank ATM system, securities e-commerce system, passenger booking system and so on. To evaluate the impact of network availability on business, a simple formula can be used to calculate: the loss caused by network unavailability = (annual network abnormal time/annual enterprise operation time) × annual enterprise income. For example, a company with an annual business income of 30 million yuan, its network availability rate is 98%, that is, abnormal time accounts for 2% of the annual business time, so the annual loss caused by network unavailability is about 2% × 30 million yuan = 600,000 yuan.

2. Return on investment and total cost of IT ownership. In the process of informatization in China, many enterprises need to learn from others' experience and understand the advanced management ideas of informatization. Most enterprises already know that the network can bring profits to enterprises, but how much does it cost to maintain an IT system suitable for enterprises? What are the best IT products on the market? Is the selected IT system easy to use? What is a full-featured IT system? How to consider the price? They have no idea, and they need an easy-to-use and affordable IT system. In the final analysis, they want to control IT investment reasonably and economically, especially the total cost of ownership. The key to solve this problem is to establish an economic evaluation mechanism to evaluate the return on investment (ROI) and total cost of ownership of various storage methods.

The vast majority of enterprises spend money on information systems in this way: the initial demand for informatization is not enterprise level, and most companies start from departments, such as financial computerization and warehouse management, so the initial demand is functional. But this kind of start will naturally produce information islands. What do we do? Develop interfaces. As a result, the cost of cross-departmental business has increased, and the result seems to be that after using the information system, it has not saved money but spent more money. This is the result of not seriously considering the total cost of ownership.

How should enterprises invest? Where should the money for purchasing information systems be spent? Many people think that when buying an information system, most of the money should be spent on hardware platform, software, consulting, implementation and services. According to the concept of total cost of ownership, the investment in purchasing software, hardware and consulting services only accounts for 32% of the total investment, while more expenses are invested in network management, technical support and training of the system. The enterprise-level information system constructed according to the above viewpoint can get the maximum return on investment at a good total cost of ownership.

In addition, the return on IT investment is also related to the work efficiency of network managers. An efficient network management system can improve the work efficiency of network managers, reduce the time they spend on "fire fighting" and give them more time to do other things.

3. Network management brings high added value to enterprises. The so-called high added value refers to the value-added part brought to enterprises through comprehensive network management, which is different from reducing the losses caused by network failures and reducing the cost of ownership.

Through the comprehensive network management of enterprise IT system, it can bring more business value to enterprises, and the space provided in this respect is very attractive. For example, by analyzing users' access to enterprise WWW servers, enterprises can know which products, services and technologies visitors are more interested in, and find potential customers and markets. Provide new services (such as e-commerce) on the Internet, expand the business space of enterprises, and make the network a sharp weapon for enterprises to compete; Ensure the service level of the network and the service quality of the business system, so as to improve the customer's satisfaction with the enterprise.

The "high added value" brought by integrated network management to enterprises is difficult to be measured by simple mathematical model, and this value varies with different enterprises, different business types and different network management strategies. But what is certain is that the value of this part will be far greater than the two links discussed above.