StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Network Management and Systems Administration SLP - Research Paper Example

Cite this document
Summary
And to report back on three of the tutorials on the Application Protocols web page. These are written by students of various leading universities across Israel, under the tutelage of Dr Debby Koren.
POP is…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER94.1% of users find it useful
Network Management and Systems Administration SLP
Read Text Preview

Extract of sample "Network Management and Systems Administration SLP"

Report on RAD ials (First sur no qualifications like Dr. College Position in organisationPlace of authorRAD University Application Protocol Tutorials InvestigatedAbstractThe research is on tutorials supplied by RAD University (2011 RAD). And to report back on three of the tutorials on the Application Protocols web page. These are written by students of various leading universities across Israel, under the tutelage of Dr Debby Koren. 1. The tutorial on the Post Office Protocol (POP) (Ayelet, Guy, no date) is very informative, it is a web page with links to pages on POP1 or POP3.

POP is used for The Post Office Protocol (POP) first issued on October 1984. It was published in RFC 918. The protocol is a simple method for workstations to access mail from a mailbox server. The protocol is dependent upon TCP (Transfer Control Protocol) and assumes that mail is posted by SMTP (the POP deals only with mail retrieval - not with mail posting). This protocol is the de-facto protocol for retrieving mail from a mail server, due to its easy implementation, and simplicity of use, which does not hurt its strength, Ayelet et al (nd).

The writers have given very clear explanations on the protocol from its start to how it works; there is a great demonstration on showing the stages it works through. It’s interesting to be able to learn more on POP in such a great way, the web pages help understanding.2. The secure networking protocols (Koren, 2011), which is very different in its presentation being a written article, it is informative but dull reading. Not such a good way to learn it is important to know about this, as without security on network protocols there is a good chance of hacking the system.

But oh boy, it was boring in its presentation.3. Simple Mail Transfer Protocol (SMTP) tutorial, (Kern, no date) is a series of web pages with written pieces on each page from an introduction to the writers, to in-depth work on SMTP including the animated demonstration. SMTP is very widely used as an e-mail protocol, the exchange of E-Mail using TCP/IP is performed by a message transfer agent (MTA). Users normally dont deal with the MTA. The system administrator is responsible to set up the local MTA.

The SMTP protocol describes how two MTAs communicate with each other using a single TCP connection, Avraham et al (nd). This tutorial is a great way to help understanding.SummaryThe RAD University tutorials are very helpful; I chose the ones I felt I was curious to know more about. And certainly two of the tutorials on POP and SMTP did this. Not so sure about the one on network security by Dr. Koren. It felt old fashioned, I found it difficult to just read it and take in the information. Generally, there are variations in the tutorials some will appeal to certain types of person and not to others, they seem to be good quality and up to date.

So mainly a good experience, and I have bookmarked RAD University for my future studies.CitationsRAD Data Communications, Ltd (2011), Tutorials, Application Protocols. From: http://www.rad.com/12/5266/Ayelet Shemesh, Schrieber Guy. Tel Aviv University. A part of the course “Protocols and Computer Networks”. Post Office Protocol, (POP), (nd).Koren Debby, The Dean. (2011). Secure Networking Protocols. RAD Data Communications Ltd. Tutorials.Kern Avraham, Gokham Michael, Cohen Zahi, Yossef Eyal Mor, Tel Aviv University.

A part of the course “Protocols and Computer Networks”, SMTP. (nd)

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Network Management and Systems Administration SLP Research Paper”, n.d.)
Network Management and Systems Administration SLP Research Paper. Retrieved from https://studentshare.org/miscellaneous/1578538-network-management-and-systems-administration-slp
(Network Management and Systems Administration SLP Research Paper)
Network Management and Systems Administration SLP Research Paper. https://studentshare.org/miscellaneous/1578538-network-management-and-systems-administration-slp.
“Network Management and Systems Administration SLP Research Paper”, n.d. https://studentshare.org/miscellaneous/1578538-network-management-and-systems-administration-slp.
  • Cited: 0 times

CHECK THESE SAMPLES OF Network Management and Systems Administration SLP

Internet Protocol Private Branch Exchange

df In an IP-PBX, systems could be connected in a shared LAN (local area network) that is usually connected to the IP-PBX.... IP-PBX Name Date Table of Contents Introduction Internet Protocol Private Branch Exchange (IP-PBX) is a telephonic structure that is used for the transportation of data and information such as video, voice, etc on a communication network.... In this scenario, a network router or switch transmits coming data packets to the suitable data communication network....
10 Pages (2500 words) Essay

Internet as the Fastest Rising Technology

protect the integrity of their email and VOIP systems They need to provide access to internal data to staff working off-site.... Requirement for tools and Suggestions in order to optimize network performance Requirements for monitoring the provision of their core services such as the availability and performance of their servers and VoIP system Tools to warn of any significant network changes Monitor any attacks on their systems Providing redundancy and failover Network Topology Star topology is recommended for the wired local area network....
9 Pages (2250 words) Essay

Two Vulnerabilities That Have Been Discovered in the Past Two Years (BlackBerry, Cisco IOS Software)

The vulnerability causes security issue which has been recognized within the ‘BlackBerry administration API component' (Research in Motion Limited, 2012).... Therefore, the vulnerability can be considered into several classes such as, management Console Vulnerabilities, management Server Vulnerabilities, Administrative VM and Guest VM Vulnerabilities along with Hypervisor Vulnerabilities and Hypervisor Escape Vulnerabilities (IBM Corporation, 2010)....
6 Pages (1500 words) Essay

Human Resources Management Strategy and Policies of the Royal Mail over the Period 2005-2010

Absence of efficient HR strategy and administration union within the period of 2002 – 2005 predetermined long-term conflicts with RMG employees in 2006 – 2009 and financial problems.... Thus, administration functions and recruitment procedures were decentralized.... For several centuries Royal Mail had been a government department and monopolized national market of postal services, but after nationalization of 1969 it came… Within this period its infrastructure, range of services provided, methods of customers' servicing, management system and other substantially altered....
10 Pages (2500 words) Essay

Evaluating Network Management Solutions

As the size of the… Remote login is among the oldest means of network management, using remote login to configure or monitor a network device.... However, more sophisticated tools have been made Typically network management software is based on a particular network management protocol.... The capabilities provided with the software are basically based on the functionality support by the network management protocol.... In comparison, Siemon is built for large networks with functionality to automate the critical and most important tasks of network management....
11 Pages (2750 words) Essay

Network Risk Assessment

For physically securing the information systems, there are no physical controls currently.... soft needs a computer network, which will support all the requirements that are analyzed for fluent business operations, as well as abide with the future trends of emerging technologies.... The network devices and computing equipment have to be reliable and extendable, in The network layout of I.... soft requires an expandable and efficient network that will fulfill the requirements of the company....
5 Pages (1250 words) Research Paper

Potential Malicious Attacks in ACME Inc

a straightforward way to begin this method is to maneuver the setting organization that doesn't directly support the operating system desktops which don't need applications that area unit solely supported on OS onto an alternate software package or systems.... Therefore, in case a malicious-code attack strikes, the desktops that run the choice systems will perform and may scale back the scope and period of the attack.... rdquo; the author discusses malicious attacks, which occur when wireless LAN technology is employed in the system network without proper data protection and/or authentication between access points and clients....
4 Pages (1000 words) Assignment

Fundamentals of Simple Network Management Protocol

The purpose of this research "Fundamentals of Simple network management Protocol " is to outline the key features, architecture and different versions of the SMTP protocol.... Simple network management Protocol is the most extensively used protocol in terms of monitoring network and computing devices.... Simple network management protocol ArchitectureAn organization has a network of more than 50 nodes including workstations, bridges, hubs, switches and routers....
9 Pages (2250 words) Research Paper
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us