<<

ICON College of and Management

Faculty of Information Technology and Engineering

BTEC HND in and Development (CSD)

Assignment

Unit 27: Network Operating Systems

Tutor: Mohammed Jaffer Hasan

Submitted by

ID No: 14869

Alexandru Isac

89 Montalt Road

London, London IG8 9TB

Session: Sep 2017

Table of Contents 1 LO1: Evaluation of Network operating Principles ...... 4 1.1 Evaluations of various types of NOS ...... 4 1.1.1 Network services requirements ...... 4 1.1.2 Appropriate network for the case scenario ...... 4 1.1.3 Comparison and evaluation of various NOS ...... 5 1.1.4 Recommendation of NOS ...... 6 1.1.5 Suitable network for the above scenarios (-peer to peer/client ) ...... 6 1.2 Disaster recovery and business continuity ...... 7 1.2.1 Different types of backup ...... 8 1.2.2 Various types of RAID ...... 8 1.2.3 Raid level 0 ...... 10 2 LO2 implementation plan of NOS ...... 12 2.1 Designing of implementation plan ...... 12 2.1.1 Installation ...... 12 2.1.2 Hardware specification ...... 12 2.1.3 addressing ...... 12 2.1.4 Security ...... 12 2.2 Evaluation and justification of plan ...... 13 3 LO3 implementation of NOS [P3.1, M3] ...... 14 3.1 Implementation of NOS including ...... 14 3.1.1 Installation ...... 14 3.2 Configuration and testing ...... 17 3.3 Evaluation ...... 23 4 LO4 Managing of Network ...... 24 4.1 Identification, selection and justification of network monitoring tool ...... 24 4.1.1 HP Open View ...... 24 4.1.2 ZENOS tag">V.5.0 ...... 25 4.1.3 Open NMS ...... 26 4.2 Baseline security report network...... 27 5 References list ...... 32

Introduction is referred to operating system forming integral part of the system. It is designed and developed in order to support system or of the organization by connecting to a known as LAN. Network operating system allows the organization to files and documents and access among numerous computer system connected within a network either on a private network or local area network. Computing and system development helps to establish diverse range of skills in relation to modern computing and networking . The concept of computing and system development helps to give an in- depth knowledge and understanding about different aspects of networking and computing discipline.

The objective of the study is to provide detailed information about computing and system development. Based on given case scenario, requirements of network operating system of the company will be identified and depending on that appropriate network operating system will be recommended. 1 LO1: Evaluation of Network operating System Principles

1.1 Evaluations of various types of NOS

1.1.1 Network services requirements

Based on the case scenario, the company for its new branch in Manchester will be required

● Infrastructure services: it covers the necessities requirements of the company to be present online. It includes VPN configuration, service design and installation, network design and configuration, as well as exchange server configurations (Simsarian, 2018). ● Wireless networks: it enables the company to use internet over a private network or local area network. Robust as well as reliable wireless network servers will be designed. ● Managed support: the support team comprising of IT professional and technician will be developed to provide system support and manage computer systems. ● Backup and disaster recovery: data backup services will be implemented to keep the company data secure. Besides, plan will be designed to eradicate business failure issues in case of worst happen (Huang, 2017).

1.1.2 Appropriate network for the case scenario

After assessing the needs of the company new venture and seeking into its future requirements of computing and networking system, it is critical to develop a virtual environment to support remote computer system, data security, and services as well as print server. Along with that, network management tools, protection for network project, antivirus will be employed to eradicate the threats of system failure and redundancy(Shin et al. 2014). In Figure 1 such principles of operating system have been reflected. However, all of those are not interdependent; but somehow, an efficient networking system should include all of these principles. In the following picture this aspect has been included.

Figure 1: Network operating system principles, (Source: Santamaria, 2016)

In figure 1, In the above picture,anefficient networking system has been reflected. On the other hands, it has also instructed the relationship between each other. It is important to understand the relationship as well as applications of network . Network managementand firewall protection (Santamaria, 2016). There are many vendors available in the market those are engaged to provide a support of a network centric approach. It is the service of the vendors that establish the efficiency of networking in a organization as well as a group of network. Such vendors are discussed below as per availability and features.

Stratum: Stratum provides open advanced while box switches along with advanced technology of SDN interfaces. Switch networking solutions are mainly supported by faster communication and high speed data transfer. On the other hand, it also provides software oriented programming as well as featured aspects of security.

Cumulus Network: Cumulus networking is an open ended network and it is framed on . Having an open channel networking, the security measure of this vendor is restricted. It connects the ease of OCP following updown 2.

Big switch : Big Switch light is based on open network and having some features of Stratum. It is built on Linux and there are several implications of SDN. The open networking channel establishes faster approach having restricted security standards.

Linux Network: Having flash memory and bare channels of switching have made this vendor easier to use. On the other hand, Linux establishes opem computing project and open centric operations.

1.1.3 Comparison and evaluation of various NOS

Technical windows Linux Mac Osx Characteristics Security Window operating system is Linux has level of Security Vulnerability highly vulnerable to cyber- vulnerability in and threats on Mac attacks. Despite many patches comparison to Window OSx is very less in are available but still OS. It is hampering by comparison to both titsvulnerability liable to high and hence can systems. It provides security risks and threats maintain security strong internal as well degree. external security protection for the network server. Software The software of window Linux OS are opens Free Mac OSX availability operating system is easily source and software is software available available in the market and available for free. cost varies depending upon of OS version purchased. However, licensing policy are very complicated Maintainability This operating system Maintenance is easy Very easy in requirespatches in order to comparison to both regulate it Scalability Upgrading as well as OS has scalability but MAC OSX offer client- patching required enough from the end of server based scalability and possess high risk to sides. options prone to corruption or infection. Scalability is available all level. Technical Excellent technical support There is no scope of Support is available on Support direct support instead website and forum, but on company forum no direct support.

1.1.4 Recommendation of NOS

Window operating system is connected with several security issues and risks in comparison Linux and Mac. That is reason why window is found to constantly release with new security essentials as well as bug fixes. On other hand, Mac and Linux operating system offer great security solutions and options. However, the major challenges while dealing with the operating system when it come to technical support. These two operating system do not offer direct support like window OS. Window offer excellent technical support mechanism from installation to implementation of operating system on the computer system. Therefore, window has been number one in term of helping businesses in running their OS application (Santamaria, 2016). Based on the comparison and evaluation of different OS, Window operating system platform will be suitable based on the company requirements for computing and system development.

1.1.5 Suitable network for the above scenarios (-peer to peer/client server)

The peer to peer network is the network where at least two have to share files to each other and access devices and they can do this without the need for a separate server computer or program (software). In the peer to peer network none of the providers are responsible for such thing as for being the server, every single computer must stock information and action as a server. The Peer to Peer Network is ideal to share the information but we have to take in calculation that this type of network can’ have than 10 computers. The Peer to Peer Network is also the simplest type of Network but this also comes with a risk because Peer to Peer network can be very easy discovered and accessed by unauthorized .

Advantages and disadvantages of Peer to Peer Network: Advantages Disadvantages Is very easy to get done a configuration for a We can use maximum of 10 computers peer to peer network They are easy to maintain They are not very secured They have a low cost

Client server is the relation between two computers where the customer can have a request from the server and the server has to fulfil the client’s request.

The customers or the clients can easily take the form as desktops, or . A network that is using a server to allow the clients to share information, data and devices is client service network. In this network we can say that the client rely on server for recourse sharing and processing. In case of a Client Server Network, any of the computers can be either a client or either a server, it cannot be the both at the same time, is it not impossible but it is uncommon.

The client – server relationship can be made with the help of the routers or switches and this is happening because those devices are covered in details.

If we want our computer to be function as a server than we need to be running a Network Operating System.

A network Operating System is a special kind of software that have plenty characteristics such as managing data or resources for a number of customers, does have the control of the type of the that the want’s to open or , has the capability to supply the applications to the clients , restrict from where and when the customers and users can access the network and many others .

Advantages and disadvantages of Client Server Network Advantages Disadvantages All documents are memorised in a focal area The client server network is very expensive Network are controlled centrally It requires a permanent staff to it , someone as a network manager Data is all backed up on the main server Clients are dependent on the server Capability to grow Difficult to set up

1.2 Disaster recovery and business continuity

Definition of term disaster recovery and business continuity

Business continuity forms a part of business strategy is devise to ensure that all the important data and information regarding the business should be available and accessible anytime on real time basis. It is developed based on identification of security threats as well as risks to be faced by the company to sure that data and assets are secure and protected.

Disaster recovery is referred to field of security planning used by the company to protect itself from the adverse impact of negative events or incidents such as power failure or black out (Lamantiaet al. 2015).

Figure 2: Recovery system of a networking system, (Source: Thottan, 2018, p.147)

In case of , it is important to have back up options that data should be recovered even having disasters. The application of back up and network security has been measured in the above picture. In this concern a specific networking system should engage an additional secondary storage and followed by the same the implementation of a better transportation of data to secondary back up is possible (Thottan, 2018).

Advantages of disaster recovery strategy Cost savings

Disaster recovery plan help to recognize the various areas where cost and expenses can be saved by the company. Besides, it helps to analyze the computing and networking environment to help minimize expenditure.

Asset and inventory management

Through documentation, it allows the company to manage its assets and data effectively and also provide understanding of it equipment inventory.

Network management

Besides, it help to manage the network and computing issues by developing mitigation strategies to prevent effect of catastrophic or disaster (Thottan, 2018).

Ability to It provides the opportunity to test disaster management planning beforehand.

1.2.1 Different types of backup

Full backups: it is fundamental backup plan where all data and information are transfer to another location. Incremental backups: in this type of backup, only that information is back up which have been changed previously. Differential backup: in this type, all data that has been changed are back up every time, the system is run (Todd et al. 2016).

1.2.2 Various types of RAID

RAID from redundant array of inexpensive disk is a way of memorizing the same files in different places on a multiple hard disk in order to protect our data and our content in case of a drive failure.

There are many different types of RAID and these are:

-RAID 0 -RAID 1 -RAID 5 -RAID 0+1 -RAID 1+0 RAID 0 RAID 5 RAID 1 Minimum 2 3 2 of disk Fault None 1 disk 1 disk tolerance Read speed fast Slow fast Hardware Cheap High High cost Performance HIGH HIGH Low redudancy LOW HIGH HIGH

Raid 0 is using a method that is called stripping and the reason for that is because is taking a little piece of data and is transferring to more drivers.

Raid 1 is providing data through a called mirror.

This Raid is working basically with 2 hard drives, in case one drive fails then all the data could be read from the other one.

The above picture represents the RAID 1 1.2.3 Raid level 0

We are only going to use this kind of Raid in case we want the performance but the data is not that important for us. In this RAID the data is separated into blocks and then those blocks are written to the disk. Raid 0 doesn’t provide any fault tolerance at all so in case one drive fails they are all going to fail.

The above picture represents RAID 0

We can use a recovery software but in case one drive fails then all our data is lost.

Raid level 5 is writing data blocks to all the disk and is very similar to raid 0.However, one additional parity block is written in each row. This additional parity, derived from all the data blocks in the row, provides redundancy. If one of the drives fails and thus one block in the row is unreadable, the contents of this block can be reconstructed using parity data together with all the remaining data blocks.

If all drives are OK, read requests are distributed evenly across drives, providing read speed similar to that of RAID0. For N disks in the array, RAID0 provides N times faster reads and RAID5 provides (N-1) times faster reads. If one of the drives has failed, the read speed degrades to that of a single drive, because all blocks in a row are required to serve the request.

Write speed of a RAID5 is limited by the parity updates. For each written block, its corresponding parity block has to be read, updated, and then written back. Thus, there is no significant speed improvement on RAID5, if any at all.

The capacity of one-member drive is used to maintain fault tolerance. E.g. if you have 10 drives 1TB each, the resulting RAID5 capacity would be 9TB.

If RAID5 controller fails, you can still data from the array with RAID 5 software. Unlike RAID0, RAID5 is redundant and it can survive one member disk failure

The above picture represents RAID 5

2 LO2 implementation plan of NOS

2.1 Designing of implementation plan

2.1.1 Installation

2.1.2 Hardware specification

Processor: 1.6 Ghz CPU (Minimum) And 2X 1.6 GHz CPU (maximum) RAM: 1.75 GB (Minimum) and 3.5 GB (maximum) HDD: 1X 40 GB of free space

2.1.3 addressing

LAN: 10.10.10.0/24 Workstation: 10.10.10.1 File server: 10.10.10.2 Printer: 10.10.10.3 Remote support: 10.10.10.4 : 10.10.10.5

2.1.4 Security

Security policy: security policy of the organization will be in lieu with all its business assets comprising of both physical and virtual assets. This will help the company to manage its business easily. Company need to devise security plan by identify security risks and threats and depending upon that designing mitigation strategies (Tofighbakhsh, 2017). Every employee need to adhere as well as comply with company security in order to protect company assets and data.

Password management: security policy should incorporate management to keep the data and information secure and safe. For this, the company needs to develop appropriate password policy to be followed by the staffs while working on the company network servers. The password policy should include provision to use alphanumeric combination mentioning minimum length of password to be used (Huang et al. 2017).

Patch management: patching of network operating system as well as hardware is critical to keep the business assets at particular degree in order to run application. This will help to enhance the efficiency and performance along with characteristics of installed software and applications. Window OS release its patches frequently which can be updated into the system. The server administrator needs to perform test and set up the patches on network server to solve the requirements of the computing system (Moon et al. 2016). Besides, server administrator in management should monitor and scan vulnerability of the system if it requires any kind of patching.

2.2 Evaluation and justification of plan

The plan devised has the ability to meet the requirements of the company as mentioned in the given case scenario. The plan incorporates security policy, password and patch management. The plan effectively identifies the system and network requirements of the company. Along with that, the plan provides understanding about the installations and security measures that can be implemented by the company. The plan also proposed suitable network operating system that fit in all future and present needs of the company. Besides, it incorporates basic security and risk mitigation strategies to protect and secure. The initial justification of implementing such strategic security concern is that the organization engages many professional heads tend to make data and capital transfer. Therefore, it is not possible to make a check or monitor all of the operations. Besides that, manual operations may not manage extensive resources available in the . All these aspects have justified launching a new security measure apart from conventional efforts. If it is not possible to manage all of the security policies, there is a possibility of data loss or theft. On the other hand, it is also important that of the patch management and security policies are dynamic as per availability market scenario as well as possible thefts available in the organization. In that concern a, well improved security system can assure the protection of digital assets. All these possibilities have established the value of the security plan managed for the company as per the case. The above specification of hardware and software has been suggested based on the available operations as well as height of security that the respective firm tend to implement. For example, smaller capacity of RAM or web server may bring constraints for making faster operations.

3 LO3 implementation of NOS [P3.1, M3]

3.1 Implementation of NOS including

3.1.1 Installation

Installation steps are as follows:

Step 1: Need to install windows 2018 edition in to the compatible hardware system for ADFC of the controller which is the root domain of the hardware.

Step 2: In order to prepare forest level permission need to run the Command on ROOT-COMPANY base on the ADC for forest in Company.com.

Caption: ROOT Command 1 (Above)

Caption: ROOT Command 2 (Above)

Caption: ROOT Command 3 (Below)

Caption: ROOT Command 4 (Above)

Caption: up of the installation (Above) Caption: Choosing of configuration (Below)

Then the step is to configure the language we want for the OS, the time and currency we want and also the keyboard language. Then we can press INSTALL. Caption: Selection of location (Above) The next step is to accept the terms and conditions.

The above picture shows that we agree with terms and conditions

Caption: Choosing of configuration (Below)

Caption: Finalization of installation process (Above)

3.2 Configuration and testing

According to Power et al. (2015), In order to identify the threats which is aligned with the installation procedure a high-end security is need to be taken and must be using IPS and IDS between both inside as well as outside networks. On the other hand, the administration of the networks must also be using system in order to prevent from any kind of data loss and further protect data and information as well as deploy a strong group of policies relating to security of data and information. In the view of (Azar and Vaidyanathan, 2015), moreover, the password policy need to be installed in the entire computer so that users may have a certain length, size, and text to ensure that their data are being protected by a particular format of password. On the other hand, to improve management security procedure can be made by detectingcommon security relating to miss-configuration as well as missing the updates which are related with the security of the computer (Frisco et al. 2014). Therefore, it is necessary for the company to monitor all the specific changes relating to the network security and procedure of their system and ensure that all their data and information are being kept in a secured manner.

Configuration of windows server Once we login the windows will open for us the Server Manager which is going to look like :

The above picture represents the Server Manager Now we are ready to to the next step which is configuration of the server Manager.

This is how our configuration is going to look like:

The above picture represents the first of configuration

We must open the server manager and click add roles and features. The next step is to reach the server roles :

The above picture shows the Server Roles tab

Then you have to press next till you reach the next step .

The above picture shows the Installation Type

Then we have to establish the server selection:

The above picture represents Server Selection

Then we are required to select the web server.

The above picture represents the selection of web server

Then we click next till the Role services and then we select again :

The above picture represents the role services] Then we need to confirm the installation of the services.

The above picture represents Confirmation of installation

Then we are finally close to the end of installation.

The above picture shows the Installation Progress Our server is now ready for configuration.

The above picture represents the configuration

The above picture represents the internet information

We are ready to insert a website.

The above picture show us how and where to insert our website.

3.3 Evaluation

As I managed to install our and to configure I can say that is working perfectly and there are not any issues, all the computers have been setup properly by myself so there are no errors.

Testing is not completed

4 LO4 Managing of Network Operating System

4.1 Identification, selection and justification of network monitoring tool

There are various kinds of monitoring tools which are found in the market that would be effective in monitoring the data and security policies relating to the organization. According to Kamenskih and Tyurin (2015), the most acceptable monitoring tool which are being used by most of the companies in the market are HP Open Viewer, Solar wind and much more. However, for this company the it is therefore recommended to adopt the HP Open Viewer tool as it is build with more accurate features that would further help the company in monitoring their change and manage their more preferable manner. Even, by the use of this tool the user would be able to gather information relating to change or update through SMS or M2M enable or by Email formulated in the system. As mentioned by Arthursson and Bristav (2016), the other most appropriate form of monitoring tool is ZENSOS V.5.0 is open network monitoring source tool which deliberately has the capability to manage the overall and secure the network server at the bit level and further helps in monitoring the overall network origin, moreover, by the adaptation of this tool the organization would be able to gather information relating to any kind of warning through email or SMS. Moreover, by the adaptation of these tools the organization would be able to maintain their position and secure their data more beneficial and also ensure that they have a better and enhancing control over the domain of the overall network system (Shin et al. 2014).

So I will present three examples of monitoring tool software :

4.1.1 HP Open View

HP Open View is the former name for a Hewlett-Packard product family that consisted of network and systems management products. In 2007, HP Open View was rebranded as HP BTO (Business Technology Optimization) Software when it became part of the HP Software Division. The products are now available as various HP products, marketed through the HP Software Division

The above picture represents HP open View operations

4.1.2 ZENOS V.5.0

Zenos Core is one of the best and very powerful source IT monitoring platform that have as scope to monitories applications, servers, storage, networking and to provide availability and performance . It also has a high-performance handling system and an advanced notification system.

The above picture represents Zenos

Once you login to Zenos Core Web UI for the first time, you are presented with a two-step wizard that asks you to create user accounts and add your first few devices / hosts to monitor. You are then taken directly to the Dashboard tab. Use the Dashboard, Events, Infrastructure, Reports and Advanced tabs to configure Zenos Core and review reports and events that need attention.

4.1.3 OpenNMS

OpenNMS is an open source grade network management application that offers automated discovery, event and notification management, performance measurement, and service assurance features. OpenNMS includes a client app for the iPhone, iPad or iPod for on-the-go access, giving you the ability to view outages, nodes, alarms and add an interface to monitor

The above picture represents OPEN NMS

Once you successfully login to the Open NMS web UI, use the to get a quick ‘snapshot view’ of any outages, alarms or notifications. You can drill down and get more information about any of these sections from the Status drop down menu. The Reports section allows you to generate reports to send by - or download as a PDF.

4.2 Baseline security report network

Microsoft Baseline Security Analyser (MBSA) is considered to be the most appropriate and easy to use tool that helps most of the users of the to determine that the state of security of the computer on the basis of the recommendation formulated by Security. According to Silberschatzet al. (2014), the Microsoft Baseline Security Analyzer (MBSA) tool is appropriate as it scans the various files which are being stored in the computer and after scanning the files it provides a specific form of suggestion or recommendation to the user relating to security and privacy as well as provide detailed specification about the corrupted file if found during the scanning procedure. In to Vasilakiset al. (205), therefore, based on reports that would be gathered by the administrator in order to make their data and other information relating to the company more secure and well organization so that they are further being able to mitigate and kind of uncertainty occurring within their organization. Hence, monitoring tools need to be implemented within the computer system that would be effective in securing more valuable data and ensure that the company is being provided with time to time alerts relating to updating of the tool.

The above picture represents MBSA check for misconfiguration

The above picture shows us which computer we are choosing to scan by IP address

The above picture represents the Process of Scanning

The above picture represents the result of the scanning

The above picture represents the Report of MBSA

4.2.1.1.1.1.1 Conclusion

The overall assignment deals with specification and installation procedure of a strong network that would be effective for the organization in order to produce an accurate and more enhancing report. Moreover, based on the assignment it has been found that the company needs to be more specific in securing their data and file which is being used by the organization while operating their services. On the other hand, the assignment holds a scientific discussion relating to identification of the network and evaluation of the principles associated with the network system. Even, the procedures which are associated with the implementation plan of NOS 675 have also been explained more accurately. Moreover, configuration and testing process are also being discussed in the assignment relating to the implementation procedure of the network system into the business. However, with the explanation of the installation procedure managing of Network Monitoring tool are also being identified and justified accordingly. 5 References list

Arthursson, . and Bristav, M., Xcerion AB, 2016. Network operating system. U.S. Patent Application 14/754,512. Azar, A.T. and Vaidyanathan, S. eds., 2015. Computational intelligence applications in modeling and control. Springer International Publishing. Considine, ., Crowley, S., Gardner, G., Shannon, C., Kwinn, M.., Henderson, S.J. and Santamaria, P., 2016, April. Architecting a development and testing plan for the Army's common : Applying agile systems of systems development to army network acquisition. In Systems Conference (SysCon), 2016 Annual IEEE (pp. 1-6). IEEE. Frisco, P., Gheorghe, M. and Pérez-Jiménez, M.J. eds., 2014. Applications of Membrane Computing in Systems and Synthetic Biology. Heidelberg: Springer. Huang, Y., Geng, J., Lin, D., Wang, ., Li, J., Ling, . and Li, D., 2017, August. LOS: A High Performance and Compatible User-level Network Operating System. In Proceedings of the First Asia-Pacific Workshop on Networking (pp. 50-56). ACM. Kamenskih, A.N. and Tyurin, S.F., 2015, February. Advanced approach to development of energy-aware and naturally reliable computing systems. In Young Researchers in Electrical and Electronic Engineering Conference (EIConRusNW), 2015 IEEE NW Russia (pp. 75-77). IEEE. Lamantia, T., Fournier, D., Schendelman, R., Haroldsen, ., Batson, A., Lieu, P., Merritt, J., Mongwa, K., Norling-Christensen, D. and Reiner, E., INTRINSIC TECHNOLOGIES LLC, 2015. Method of automated operating system deployment for a network of multiple data processors. U.S. Patent 8,990,796. Moon, S., Ryu, H.Y. and Shim, J.C., Electronics and Telecommunications Research Institute, 2016. Method and apparatus for controlling life-cycle of process for network operating system. U.S. Patent Application 14/997,696. Power, D.J., Sharda, R. and Burstein, F., 2015. Decision support systems. John Wiley & Sons, Ltd.. Raman, G., Wighe, C., Balraj, S., Shenoy, S.M., Rajarathinam, S. and Kamatala, S.R., Juniper Networks Inc, 2018. Managed of a network operating system. U.S. Patent 9,940,160. Shin, S., Song, Y., Lee, T., Lee, S., Chung, J., Porras, P., Yegneswaran, V., Noh, J. and Kang, B.B., 2014, November. Rosemary: A robust, secure, and high-performance network operating system. In Proceedings of the 2014 ACM SIGSAC conference on computer and security (pp. 78-89). ACM. Silberschatz, A., Galvin, P.B. and Gagne, G., 2014. Operating system concepts essentials. John Wiley & Sons, Inc.. Simsarian, J.E., Kim, Y.J., Choi, N., Di Martino, C., Mohanasamy, N.N., Winzer, P.J. and Thottan, M., 2018. Error awareness in a multi-layer transport network operating system. Journal of Optical Communications and Networking, 10(3), pp.152-161. Todd, M., Koster, S.R. and Wong, P.C.M., Hewlett-Packard Enterprise Development LP, 2016. System and method for securing a network from zero-day vulnerability exploits. U.S. Patent 9,264,441. Tofighbakhsh, M. and Wolter, D.R., AT&T Intellectual Property I LP, 2017. Network operating system client architecture for mobile user equipment. U.S. Patent Application 15/423,547. Tofighbakhsh, M. and Wolter, D.R., AT&T Intellectual Property I LP, 2017. Network operating system client architecture for mobile user equipment. U.S. Patent 9,565,576. Tripathi, S., Drost, R.J. and Yang, C.K.K., Pluribus Networks Inc, 2015. Servers, switches, and systems with switching module implementing a distributed network operating system. U.S. Patent 9,160,668. Tripathi, S., Drost, R.J. and Yang, C.K.K., Pluribus Networks Inc, 2017. Integrated server with switching capabilities and network operating system. U.S. Patent 9,742,697. Vasilakis, N., Karel, B. and Smith, J.M., 2015, May. From Lone Dwarfs to Giant Superclusters: Rethinking Operating System for the . In HotOS.