Network Operating Systems Tutor
Total Page:16
File Type:pdf, Size:1020Kb
ICON College of Technology and Management Faculty of Information Technology and Engineering BTEC HND in Computing and Systems Development (CSD) Assignment Unit 27: Network Operating Systems Tutor: Mohammed Jaffer Hasan Submitted by ID No: 14869 Alexandru Isac 89 Montalt Road London, London IG8 9TB Session: Sep 2017 Table of Contents 1 LO1: Evaluation of Network operating System Principles .......................................................... 4 1.1 Evaluations of various types of NOS .................................................................................. 4 1.1.1 Network services requirements ................................................................................... 4 1.1.2 Appropriate network for the case scenario .................................................................. 4 1.1.3 Comparison and evaluation of various NOS ................................................................ 5 1.1.4 Recommendation of NOS ........................................................................................... 6 1.1.5 Suitable network for the above scenarios (-peer to peer/client server) .......................... 6 1.2 Disaster recovery and business continuity ........................................................................... 7 1.2.1 Different types of backup ........................................................................................... 8 1.2.2 Various types of RAID ............................................................................................... 8 1.2.3 Raid level 0 .............................................................................................................. 10 2 LO2 implementation plan of NOS ............................................................................................ 12 2.1 Designing of implementation plan .................................................................................... 12 2.1.1 Installation ............................................................................................................... 12 2.1.2 Hardware specification ............................................................................................. 12 2.1.3 addressing ................................................................................................................ 12 2.1.4 Security .................................................................................................................... 12 2.2 Evaluation and justification of plan .................................................................................. 13 3 LO3 implementation of NOS [P3.1, M3] .................................................................................. 14 3.1 Implementation of NOS including .................................................................................... 14 3.1.1 Installation ............................................................................................................... 14 3.2 Configuration and testing ................................................................................................. 17 3.3 Evaluation ........................................................................................................................ 23 4 LO4 Managing of Network Operating System.......................................................................... 24 4.1 Identification, selection and justification of network monitoring tool ................................ 24 4.1.1 HP Open View ......................................................................................................... 24 4.1.2 ZENOS V.5.0 ........................................................................................................... 25 4.1.3 Open NMS ............................................................................................................... 26 4.2 Baseline security report network....................................................................................... 27 5 References list ......................................................................................................................... 32 Introduction Network operating system is referred to operating system forming integral part of the computer system. It is designed and developed in order to support personal computer system or workstation of the organization by connecting to a local area network known as LAN. Network operating system allows the organization to share files and documents and access printer among numerous computer system connected within a network either on a private network or local area network. Computing and system development helps to establish diverse range of skills in relation to modern computing and networking technologies. The concept of computing and system development helps to give an in- depth knowledge and understanding about different aspects of networking and computing discipline. The objective of the study is to provide detailed information about computing and system development. Based on given case scenario, requirements of network operating system of the company will be identified and depending on that appropriate network operating system will be recommended. 1 LO1: Evaluation of Network operating System Principles 1.1 Evaluations of various types of NOS 1.1.1 Network services requirements Based on the case scenario, the company for its new branch in Manchester will be required ● Infrastructure services: it covers the necessities requirements of the company to be present online. It includes VPN configuration, service design and installation, network design and configuration, window as well as exchange server configurations (Simsarian, 2018). ● Wireless networks: it enables the company to use internet over a private network or local area network. Robust as well as reliable wireless network servers will be designed. ● Managed support: the support team comprising of IT professional and technician will be developed to provide system support and help manage computer systems. ● Data Backup and disaster recovery: data backup services will be implemented to keep the company data secure. Besides, data recovery plan will be designed to eradicate business failure issues in case of worst happen (Huang, 2017). 1.1.2 Appropriate network for the case scenario After assessing the needs of the company new venture and seeking into its future requirements of computing and networking system, it is critical to develop a virtual environment to support remote computer system, data security, and print services as well as print server. Along with that, network management tools, firewall protection for network project, antivirus software will be employed to eradicate the threats of system failure and redundancy(Shin et al. 2014). In Figure 1 such principles of operating system have been reflected. However, all of those are not interdependent; but somehow, an efficient networking system should include all of these principles. In the following picture this aspect has been included. Figure 1: Network operating system principles, (Source: Santamaria, 2016) In figure 1, In the above picture,anefficient networking system has been reflected. On the other hands, it has also instructed the relationship between each other. It is important to understand the relationship as well as applications of network communication. Network managementand firewall protection (Santamaria, 2016). There are many vendors available in the market those are engaged to provide a support of a network centric approach. It is the service standard of the vendors that establish the efficiency of networking in a small organization as well as a group of network. Such vendors are discussed below as per availability and features. Stratum: Stratum provides open advanced while box switches along with advanced technology of SDN interfaces. Switch networking solutions are mainly supported by faster communication and high speed data transfer. On the other hand, it also provides software oriented programming as well as featured aspects of security. Cumulus Network: Cumulus networking is an open ended network and it is framed on Linux. Having an open channel networking, the security measure of this vendor is restricted. It connects the ease of OCP following updown 2. Big switch light: Big Switch light is based on open network and having some features of Stratum. It is built on Linux and there are several implications of SDN. The open networking channel establishes faster data center approach having restricted security standards. Linux Network: Having flash memory and bare channels of switching have made this vendor easier to use. On the other hand, Linux establishes opem computing project and open flow centric operations. 1.1.3 Comparison and evaluation of various NOS Technical windows Linux Mac Osx Characteristics Security Window operating system is Linux has less level of Security Vulnerability highly vulnerable to cyber- vulnerability in and threats on Mac attacks. Despite many patches comparison to Window OSx is very less in are available but still OS. It is hampering by comparison to both titsvulnerability liable to high malware and hence can systems. It provides security risks and threats maintain security strong internal as well degree. external security protection for the network server. Software The software of window Linux OS are opens Free Mac OSX availability operating system is easily source and software is software available available in the market and available for free. cost varies depending upon type of OS version purchased. However, licensing