Nobody downloaded yet

NETWORK ADMINISTRATION AND SECURITY - Essay Example

Comments (0) Cite this document
Summary
1 UNIX Overview It is possible for an operating system to be matured as well as state of the art simultaneously? If it is UNIX, then the answer would be “Yes.” UNIX has contributed in the Information technology sector for the last 25 years. Millions of installations conducted on various platforms and UNIX has proved to be organized and scalable…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER94.3% of users find it useful
NETWORK ADMINISTRATION AND SECURITY
Read TextPreview

Extract of sample "NETWORK ADMINISTRATION AND SECURITY"

Download file to see previous pages 2002). UNIX back end server support the automatic generation of enterprise java beans facilitated the development teams to develop the J2EE application more efficiently. By the UNIX fast XML proxy support, web services are developed in no time on a distributed system as compared to the previous server architecture. IBM 32 way UNIX servers were also launched in year 2001 with the code name “Regatta”. The microprocessor architecture comprises of 1 GHz 64 Bit Power 4. This UNIX server is capable of self-healing technology and to decrease system failures. The system is capable to divide into 16 virtual servers which enable the businesses to unite several machines in to one (Popovich 2001). The Client-server model of UNIX was the core components for the growth of Internet and reshaping of the distributed systems networks. Inter process communication in the UNIX operating system involves the connection between the system components logically and physically. It supports real time network applications which allow the user to exchange messages in an interactive session. UNIX is known as a command line interface due to nonexistence of a GUI environment Today UNIX is equipped with a GUI along with dynamic communication functionalities. Some of the registered UNIX products are HP-UX, IBM AIX, SCO UnixWare, SGI IRIX, Sun Solaris etc. 2 UNIX Administration UNIX system administrator is responsible for installing software, patches, administer file system, analyze and constantly monitor the performance. If any issue occurs, system administrator troubleshoots the issue with the help of available tools and commands. Hardware and software configuration management, liaison with data center, software and hardware migration also add to the responsibilities of a UNIX system administrator. The UNIX administration is divided in to two separate groups. System Administration Network Administration 2.1 System Administration To administer Linux / UNIX, there are many commands and tools available. To perform useful tasks, following commands are illustrated below with screen shots where possible. 2.1.1 “MAN” Command ‘MAN’ command “displays the online documentation for almost any command or program in UNIX. An incredible amount of information is stored in man pages, but you must know the name of the command you are looking for to be able to search” (, UNIX man command). This command extracts the title from the online reference manuals. As in the below mentioned snapshot, there is no manual installed. 2.1.2 “su” Command ‘Su’ is used to create a shell with a specific used id. It is used for switching between accounts as compared to Windows “switch user” option. See the snapshot for example 2.1.3 ‘Who’ Command This command displays the information regarding the users who is logged in, from how long, and how many users are logged in. As the below mentioned snapshot shows the username, time, date and how many users are logged in. Common switches are activity, state, line, time and name. 2.2 Network Administration Network administrator utilized ICMP “ ...Download file to see next pagesRead More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“NETWORK ADMINISTRATION AND SECURITY Essay Example | Topics and Well Written Essays - 1750 words”, n.d.)
Retrieved from https://studentshare.org/environmental-studies/1405123-network-administration-and-security
(NETWORK ADMINISTRATION AND SECURITY Essay Example | Topics and Well Written Essays - 1750 Words)
https://studentshare.org/environmental-studies/1405123-network-administration-and-security.
“NETWORK ADMINISTRATION AND SECURITY Essay Example | Topics and Well Written Essays - 1750 Words”, n.d. https://studentshare.org/environmental-studies/1405123-network-administration-and-security.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF NETWORK ADMINISTRATION AND SECURITY

Network Security

...?Introduction Although there are batch of definition available on the Internet related to security. The definition available on ‘www.businessdictionary.com’ covers the basics and states it as: “Prevention of and protection against assault, damage, fire, fraud, invasion of privacy, theft, unlawful entry, and other such occurrences caused by deliberate action”. In the context of network security definition, it consists of concerns linked to network communication privacy, confidentiality of data over the network, accessing unauthorised classified data, access to prohibited network domains and utilising Internet for concealed communication (Network Security. 2007). It is the twentieth century where improved communication technologies... ...
24 Pages(6000 words)Essay

Network Security

...ID # Network Security Introduction During the last few decades several technologies have been emerged throughout the whole globe and networking technology is certainly the most amazing achievement in this era. Additionally, the innovations in computer and networking fields have open new ways for the businesses to boost their performance. New systems are being developed to effectively handle and administer corporate working and activities. However, security has become a complex assignment for current network administration. Normally, attackers enter into a network by making use of different tools and...
13 Pages(3250 words)Research Paper

Network Security

...transport architectures, and all devices have a specific transport mode that it associates with. Ultimately blackberry security is best when linked up with the blackberry enterprise server, which is designed specifically cooperate and commercial use. This server allows the smartphone to run on a remote platform with all the essential functionalities stored separate from the device. In essence, the blackberry can successfully be used for corporate business functions, and for personal use without any compromise on data integrity. Wi-Fi transport architecture provides internet connection to mobile devices, of a link to private networks. Through least cost routing, a wireless connection can be configured to...
7 Pages(1750 words)Essay

Network Security

...to safeguard the flow of information to and from the said device on a given network whether public or private or from a trusted to non-trusted source. The problem with locking down a network tightly is the administrative overhead it creates. The more secure the network becomes the greater the need is for a team to administrate this. There has to be a fine balance between the two whilst still safeguarding the network and the information it contains. Attackers generally have motives or goals—for example, to disrupt normal business operations or steal information. To achieve these motives or goals, they use various methods,...
3 Pages(750 words)Case Study

Network Administration

...Network Administration Guidelines Given: a) Propose a suitable LAN for the company, which includes a: Network specification Schedule for implementation Security policy. b) Explain how your specification meets the requirements of the users c) Evaluate the resources, roll-out procedures and requirements for setting-up and testing the new LAN. Basically I need the following underneath reworded and re-styled so it looks different. It's the work of a previous student to the college however I require this piece to be reworded in such a way, that it cant be considered the same piece of work. It must look different aswell as have words changed around, sentences reworded etc. Basically you should be able to look at the 2 at the end... . The main...
37 Pages(9250 words)Essay

Network Technology and Network Administration

...--------------------------- --------------------------- --------------------------- --------------------------- Network Technology and Network Administration Introduction Computers and the Internet are a wonderful addition to our lives. In today's computer world almost every person is connected to computer and internet in a way or other. A person spends a large portion of his life, interacting and collaborating with people all over the world, through the use of and Internet. But that does not mean that every user know every thing about computer and internet. It can be generalized that about 80% of the knowledge is concentrated in about 20% of the people, while the other 80% of the people...
5 Pages(1250 words)Essay

Network security

...with the operating systems. The HCL may be centrally controlled and user driven. An official HCL should be available on the website of the operating system. The Linux operating system provides the best HCLs (http://www.linuxquestions.org/hcl). Microsoft windows provide the HCL access to average users also due to their market dominance (http://www.microsoft.com/whdc/hcl/) Service packs update However network security policies aim at the protection of network and related accessible resources from unauthorized users. The administrators ensure the continuous monitoring and effective implementation of the security...
6 Pages(1500 words)Essay

Report discussing from an administration and security perspective, the role and function of SAMBA within a UNIX network

...include ISDN, DSL, PPP, and Fast Ethernet. The network administrator can eliminate this factor and put restrictions as per their network requirements by the following command: Interfaces = eth* lo Bind interfaces only = yes The “interface” is telling samba to accept which interface. In the above command, only eth interface is allowed. The name of the interfaces may differ for different Operating Systems. Linux Ethernet interface names are used in these commands. 2.6.4 Samba Firewall Firewall is a popular technique for securing the inbound network. Samba has a built in firewall for inbound network protection. For configuring the firewall...
8 Pages(2000 words)Essay

Network security

...Network security s of Learning Discuss the term confidentiality as it applies to data. How can data confidentiality be assured on a network? Data confidentiality entails allowing authorized users to access particular data, while preventing unauthorized access of data by intruders. When access eavesdrops into particular data, the principle of confidentiality will not hold. In networks, encryption is the principle techniques of maintain data confidentiality. This process is achieved using encryption algorithms that are used to generate keys for encrypting and decrypting data. 2. Explain the concept of technical security controls. What are some the major components that make up technical control? Technical security controls are used... to...
2 Pages(500 words)Essay

Network security

...TASK III a) Network security implementation considerations A WAN solution that optimizes application use is an integral part of application delivery network. The following are the considerations for WAN security implementation. Network transparency – A WAN optimization solution with a transparent architecture fully integrates existing networks while preserving their services. Network transparency will protect organizations investment in networks, security features and operational expenses. Some of the services that need to be highly transparent include access control lists, firewall...
3 Pages(750 words)Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Essay on topic NETWORK ADMINISTRATION AND SECURITY for FREE!

Contact Us