StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

The major operating system and network you are using on a daily basis - Essay Example

Cite this document
Summary
Based on data from netmarketshare Windows OS has as of March 2014: 90.94% global desktop OS market share. (NetMarketShare - Net Applications, 2014)These desktop computers are connected to Ethernet local area network (LAN) Hybrid Star and Bus topology via two types of connect…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER98.6% of users find it useful
The major operating system and network you are using on a daily basis
Read Text Preview

Extract of sample "The major operating system and network you are using on a daily basis"

Briefly describe the major operating system and network that you are using on a daily basis. Based on the information covered in this seminar do you believe that they adequately perform the tasks they need to perform on a regular basis? What are the advantages and disadvantages of the operating system and network you have chosen to describe? Do the advantages outweigh the disadvantages? What are the security procedures in place, could they be better? If you could modify just one element in the whole system, what would it be? Explain. The major operating system most used on a daily basis on our desktop computers is the Microsoft Windows 8.1 operating system (OS), the latest generation of the Microsoft Windows NT OS series. Microsoft Windows NT OS, would be classed as a major transformational OS running desktop computers. • Based on data from netmarketshare Windows OS has as of March 2014: 90.94% global desktop OS market share. (NetMarketShare - Net Applications, 2014) These desktop computers are connected to Ethernet local area network (LAN) Hybrid Star and Bus topology via two types of connect. First a cable based on CAT6a ( Able Infrastructure Solutions, n.d.) 1 Gbps switched network. The Second is an 802.11n wireless (Wi-Fi) network. Both networks are configured with Transmission Control Protocol (TCP) and the Internet Protocol (IP) (TCP/IP), Internet Protocol Version 4 (IPV4). (Brookshear, et al., 2011) The operating system and network are adequately designed and developed to perform their tasks in our environment. • Windows OS allows for quick develop of wide and varied multithread applications. Ability to support a wide variety of hardware devices through device drivers is important in a hospital setting as is an interactive user experience through use of a GUI interface. • Combining a star and bus network topology creates a scalable network, with the ability to maintain a requirement for low amounts of down time encase of failure of devices. (Brookshear, et al., 2011) The advantages outweigh and disadvantages the Windows OS bring can be summarised as: • The advantages are outweigh such as quicker support for newer hardware, vendors availability of readymade applications and varied devices available that work with Windows vs. other OS’s (MNS Group, 2012) • Ability to be adapted and access to a wide support knowledge base to fix problems or issues A few highlighted disadvantages to the Windows OS are: • Vulnerability to frequent virus or security attacks. Microsoft does offer regular security updates to protect against vulnerabilities. • Closed source single source for procuring creates high acquisition cost for this OS. • Variable hardware implementation compatibilities can create high support workload (RJ Systems, 2010) (Stallings, 2005) The advantage and disadvantages the Star & Bus Hybrid Network brings can be summarised as: • Ability to expand the environment while maintaining availability encase of device failure • Performance of desktop access because client access switch and segregation / segments. • No device is connected to backbone switches, Point to point cabling from localised switches means short cables and requires less cabling back to centralised switches. Disadvantages for the Star & Bus Hybrid Network are: • The environment becomes expensive to install because of the extra backbone switches as well as device connectivity switches. • Configuration is required at the backbone and client access switches making it more expensive to maintain Security procedures are they ever good enough and is there such thing as secure in an IT world. • Our Multi-tiered approach to an IT security model is from perimeter to desktop, multiple vendors, firewalls, Intrusion Protection and Detection (IPD), Antivirus, rigorous patch management and alerting. Simple though don’t trust anything or anyone is implemented. (University of Cambridge, n.d.) • Security in any world can always be better, the weakest link in IT security is humans. IT can implement as much security in environment as possible but it becomes unusable for people. Implementing all this doesn’t stop a human factor, someone clicking on a link or doing something they shouldn’t. (Savitz, 2011). In the whole system we have today the one thing that would be good to change would be the way people interact and understand the use OS and Network, improving this via the correct training would have an effect. • Training everyone in the business on IT OS usage and understanding would make the use of IT more efficiently, effectively and create less resistance to change. (Willen, 2014) • Training people on how to use IT can mean new technologies and methods can be deployed thus keeping the environment more up to date allow for better risk mitigation, minimise security issues and create a more supportable environment. (Stackpole, 2008) References Able Infrastructure Solutions, n.d. Category 6a. [Online] Available at: http://www.ableis.co.uk/services/structured-cabling/cable-categories-explained/category-6a.html [Accessed 19 04 2014]. Brookshear, J. G., Smith, D. T. & Brylow, D., 2011. Chapter 4: Networking and the Internet. In: Computer Science An Overview. 11 ed. s.l.:Prentice Hall, pp. 141-149. Microsoft Corporation, 2014. David Cutler - 2007 Career Achievement. [Online] Available at: http://www.microsoft.com/about/technicalrecognition/david-cutler.aspx [Accessed 19 04 2014]. MNS Group, 2012. Mac, Windows, and Linux: The Pros and Cons of Each Operating System. [Online] Available at: http://www.mnsgroup.com/blog/mac-windows-and-linux-the-pros-and-cons-of-each-operating-system/ [Accessed 04 19 2014]. NetMarketShare - Net Applications, 2014. Desktop Operating System Market Share. [Online] Available at: http://www.netmarketshare.com/operating-system-market-share.aspx?qprid=8&qpcustomd=0 [Accessed 19 04 2014 ]. RJ Systems, 2010. Advantages of using Windows:. [Online] Available at: http://www.rjsystems.nl/en/3200.php [Accessed 19 04 2014]. Rouse, M., 2012. Security information and event management (SIEM). [Online] Available at: http://searchsecurity.techtarget.com/definition/security-information-and-event-management-SIEM [Accessed 19 04 2014]. Savitz, E., 2011. Humans: The Weakest Link In Information Security. [Online] Available at: http://www.forbes.com/sites/ciocentral/2011/11/03/humans-the-weakest-link-in-information-security/ [Accessed 19 04 2014]. Stackpole, B., 2008. Five Mistakes IT Groups Make When Training End-Users. [Online] Available at: http://www.cio.com/article/196451/Five_Mistakes_IT_Groups_Make_When_Training_End_Users?page=2&taxonomyId=3186 [Accessed 19 04 2014]. Stallings, W., 2005. THE WINDOWS OPERATING SYSTEM. In: Operating Systems: Internals and Design Principles, Fifth Edition. 5th ed. s.l.:Prentice Hall. University of Cambridge, n.d. Security Engineering: A Guide to Building Dependable Distributed Systems. [Online] Available at: http://www.cl.cam.ac.uk/~rja14/Papers/SE-07.pdf [Accessed 09 04 2014]. Willen, L., 2014. What do teachers want even more than new technology? Training on how to use. [Online] Available at: http://hechingerreport.org/content/teachers-want-even-new-technology-training-use_15154/ [Accessed 19 04 2014]. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“The major operating system and network you are using on a daily basis Essay”, n.d.)
The major operating system and network you are using on a daily basis Essay. Retrieved from https://studentshare.org/information-technology/1702586-the-major-operating-system-and-network-you-are-using-on-a-daily-basis
(The Major Operating System and Network You Are Using on a Daily Basis Essay)
The Major Operating System and Network You Are Using on a Daily Basis Essay. https://studentshare.org/information-technology/1702586-the-major-operating-system-and-network-you-are-using-on-a-daily-basis.
“The Major Operating System and Network You Are Using on a Daily Basis Essay”, n.d. https://studentshare.org/information-technology/1702586-the-major-operating-system-and-network-you-are-using-on-a-daily-basis.
  • Cited: 0 times

CHECK THESE SAMPLES OF The major operating system and network you are using on a daily basis

AMPACK Computer Company Computer Platform Upgrade

If you are using Windows 2000/XP, no additional software is required to benefit from basic network functions such as shared use of directories, drives, or printers and the hardware costs are minimal.... Choosing the right operating system for AMPACK office infrastructure is easily managed since there are current systems involved.... Preferring to use this operating system would minimize cost for an over-all adjustment if a new operating system will be used....
5 Pages (1250 words) Essay

The Internet and the World Wide Web

Each resource such as a web page, imagine or video clip is identified using a web address known as a URI or URL.... These URIs can be referenced on a page using hyperlinks.... The web page is itself formatted using HTML.... nbsp;The Web is the content network that can be seen as an encyclopedia with numerous cross-references or hyperlinks which are graphically interconnected to allow the user to move from one entry or node to another on the network....
7 Pages (1750 words) Essay

IS/ICT in the Strategy Process

Despite the market network of the company, SF&D is still facing a very competitive market because of the 47 other furniture manufacturing companies.... Internal factor includes stakeholders view on the project while the external factors will… The system lowers the prices of SF&D furniture.... Since the entire system will be computerized, It is recommended that SF&D should invest in a real-time integrated database on Sales and Marketing (Orders taken through the SF&D Official Website) including the Flow of Operations in the entire Production department....
16 Pages (4000 words) Essay

Analysis of important issues to consider when choosing a technology to use

If staffs are going to make the database their daily operation area where recording of their key relationship is made, then an ideal Software-Defined Storage technology must be quick to open and use.... Performance is an indication of the responsiveness of a system to execute specific actions in a given time interval.... Factors affecting system...
5 Pages (1250 words) Article

Sysytems and Operations

The government is overwhelmed by the performance of this system as it has been providing services to people in medical sector that people are benefitting from it.... This system is also helping them in banking, parking lots, paying bills, education facilities that there has been a boom in these sectors.... Due to this the government is now having goals to export the medical system to different countries to gain from this system....
12 Pages (3000 words) Essay

Digital business snapchat

As the new thing in the market, more people were using it evidenced by the company's records whereby, as at May 2014, Snapchat application users were sending 700 million photos and videos on a daily basis.... In addition, viewers of Snapchat content users towered over 500 million times on a daily basis.... A comprehensive SWOT analysis entails evaluating four major options in the business environment of the company....
5 Pages (1250 words) Research Paper

Elliott Solutions Inc Active Directory Exercise

It should be noted that this DC may require a hardware upgrade in ordered to handle the increased data load and network traffic.... nbsp; This will be implemented in detail to allow for the growth in Elliott's consolidated network traffic requirements.... nbsp; The existing Elliott Solutions Domain Controller (DC) will be designated as the DC for the consolidated network.... he Restructure will commence with the use of the AD 'dcpromo' utility to turn the DCs of the absorbed competitors into Member Servers of the consolidated network....
10 Pages (2500 words) Case Study

Information Security - the Difficulty in Estimating the Probability of a Threat or Attack Occurring

It becomes more complex to understand the basis to which a threat can occur especially when the countermeasures to information security are properly implemented.... With more information being produced in an organization, the rise to threats also rises due to the diversity of this information that brings about business development daily....
6 Pages (1500 words) Assignment
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us