Introduction To Network Operating System (Nos)
This is a report based on Network Operating System (NOS) which includes storage of data, remote access, connectivity of network devices and network security. In this report, a company named as Cygni is considered to establish its network system in newly set branch office in Manchester, UK. It consists of planning, designing, implementing and controlling the network connection on multiple floor by using a NOS. It shows the utilization of remote desktop sharing for allocating minimum network resources and a file server which can share and store information in database. The security, scaling and availability of network resources with information system are emphasized with respect to future expansion of Cygni's infrastructure.
Selection of NOS for Cygni out of different NOS
A operating system is a system software which provides platforms to different application software. Network operating systems are offering stages to information access and storage from a file server and support organizations to manage the network resources for operations management (Avoine, Junod and Oechslin, 2007). The different types of NOS are as follows:
- Offering the best assignment writing help
- Delivering the orders as fast as possible
- Providing maximum satisfaction at affordable rates
Artisoft's LANtastic: This NOS supports to windows operating systems for computers. It provides interface to many resources to communicate by chatting server. The utility of this NOS is that it offers easy access of file server and network manager.
Banyan VINES: It is virtually integrated network service providing NOS which is patented to protocol system. It offers client and server network system which is essential for print sharing by multiple computers in an organization.
Novell's NetWare: It is designed through Xerox network system architecture which support both the open source and licensed computer operating systems. The LAN, MAN, WAN, and other network topological are supported by this NOS. It also offers print share from computers or mobiles connected in topology.
Microsoft's LAN Manager: It is designed by Microsoft for file and database servers. It provides the platform to DOC and windows operating system. Now most of its features are compiled with Microsoft windows NT file server to support the network access.
For Cygni, Novell Netware NOS is best suitable because it also supports the open source computer operating systems and as per the requirements, it is helpful to establish Local area network with sharing of information and it's file server is accessed in a middle sized organizations.
Discuss the disaster recovery in context to security of NOS
NOS disaster are the sudden damages to network system and equipment of information technology. These damages are analyzed as information loss, physical damages to equipment like computer, router and switch etc. The damage recovery of these network resources can be done and data can be accomplished by a backup feature or secondary process in NOS (Saltzer, and Kaashoek, 2009). The disaster recovery is a process for managing and controlling the internal or external interrupts in network system. The availability of network means the flawless transfer of information from one place to another. It is assumed that security of network system can be obtained from continuous controlling and monitoring system with rectifiers and filters.
Here, the discussion is done for disaster recovery practices for current NOS. The disaster recovery is managed by database cloud backups and services. The best practice is to identify the threats of disaster and proactive solutions to manage such problems and issues. The attributes of all possible risk needs to be analyzed with respect to the disasters. An action plan should be there to recover or prevent the damages. The possible damage should be classified and evaluated for critical situations. Cloud computing has given ease of storing and recovering the information (Silberschatz, Galvin and Gagne, 2013).
The external threats are like water damage, virus programs, hacking or human cause while internal risks are climate, power cut, deficiency of equipment etc. The phases of damage recovery are planning the process or method with requirement gathering, activation of activities to manage those damages and finally evaluate as well as maintenance of the recovery plan. A documentation of this plan gives proactive solutions to control such issues.
Evaluation of selected NOS
There are four types of NOS used in network establishment and file server services. Here, the comparison of selected NOS, Novel Netware with other types of NOS is cited in reference to Cygni.
The selection of a Network Operating System depends upon requirements of organization and applicability of respective NOS. The Cygni is a IT company which has operational needs to use open source operating systems in its computers and print sharing is accessible by two printers only. The number of computers are around 30 to 40 which are connected by two printers. So, the selected NOS best meet with these requirements of network establishment (Wijngaart, Mattson and Haas, 2011).
Other NOS are providing platform to specific operating systems like windows and Linux but the selected NOS supports all computer operating system. Rest of NOS provides facility of chat server, emailing and continuous monitoring while this NOS emphasis on connection establishment using Local area network and other typologies. The Microsoft LAN Manager provides facility to only Microsoft framework and file server. The Banayan VENIS emphasizes on client server system with printing enabled services while Artisoft LANtastic NOS provides service of file server communications. The Novell Netware is providing combined services at low cost and maintenance.
Planning and implementation of NOS in Cygni
Network establishment in the new branch of Cygni requires collection of hardware and software resources. It includes backup tools, IP address allocation and security policies for file server. To plan and implement, following processes needs to be kept in mind:
Planning: The requirement analysis can be done through collection of all relevant resources and concluding the need of designing a network system. It involves information of installation process and the NOS. The server computer should be well equipped with CD-ROM, latest processor and Adequate memory space. The RAM of server computer needs to be appropriate to the system configuration. The installation wizard needs to be completed with marking all essential codex. The another information is of IP addresses and it's category. The printers and computer will required a unique IP address. The Backup process of operating system needs to be performed after completion of installation. The security standards should be analyzed with keeping all possible threats in mind. An adequate protection software needs to be used at server and client computer systems.
Implementation: The designing of planned NOS and networking should be discussed with all the team members and network administrator of Cygni. After that, an implementation process needs to be executed. The network hardware resources needs to be connected to each other to create a Local Area Network system. The planning needs to be implemented for file server management with security policies. Cygni requires to put emphasis on control and monitoring on database systems and file sharing objectives (Selga, Zaballos and Navarro, 2013).
The chatting and email server can be enabled to communicate among the employees of firm. The other services will be enabled like file sharing, modification in databases, downloading and uploading of content in information system. The network monitoring can be accomplished with the help of tracking system. The security issues will be dealt from backup and proactive protection.
Plan and evaluate a disaster recovery of the network system
The disaster recovery is essential to achieve in Cygni which strives for the healthy operational management. The proposed system is planned for recovery from natural and external factors which are affecting performance of NOS and file server in networking system. The possible threats are analyzed in planning for disaster recovery and maintaining networking system. The information needs to be protected with some validations and verification. Planning consists of designs and process knowledge for dealing with natural and external disasters. It has considered that the business of company will not be affected if disaster occurs. The planning of action plan needs to be done before it occurs. The documentation of problems and their solutions should be performed so it will be utilized in future (Sarkar, 2006).
The implementation of this plan includes threats and solutions to overcome with network disaster. Evaluating all the possible disaster management solutions and analysis for adding these activities into our system will strengthen the network system. The cloud computing can be utilized for storing the backup files and documents. In case of external barriers like viruses, hacking, unauthorized access and missing files, this plan will help to protect and monitor the problem causing issues and mantling the quality of network system for IT operations.
Installation of NOS services based on NOS plan
The installation process will follow thee steps mentioned below.
- Requirement analysis: The required hardware and software for installation is collected and integrated. It requires a server computer system with enabled file server and database systems. The hardware equipment are connected to each other as per requirements of operations of the Cygni. The software needed are codex and drivers for the integrated hardware on the server computer system.
- Installation wizard is run on the computer system by rebooting computer and downloaded NOS file. After completion of this wizard, we check the successful installation and its action to network.
- Creation of backup and storing this file on the cloud space or online files storage system. The NOS is copied into an image which can be extracted in case of system failure or disaster management. The documentation of safety policy and process standards needs to be attached with operating system (Meisel, Pappas and Zhang, 2010).
- IP address should be allocated to all the client and server computers, printers and mobile devices. An appropriate allocation methods needs to be performed so networking can be secured and accurate.
- Installation of security tools like anti-virus, monitoring tools and service software on the server computer. The system update option should be enabled to provide scope of expansion (Rosen, 2014).
- The service maintenance requires controlling mechanism like speed optimizer tools and reboot software which can help in protecting the system failure with immediate recovery actions.
Configuration of NOS for security and access
The NOS installed on the computer system enables access and security system of the networking in Cygni. The access configuration follows authentication norms for its user and administrators. These norms are decided by the hierarchical structure of company or access rights for different employees (LAWRENZ, 2013).
The security of the database and file server system is obtained by restricting unauthorized access on network. The filters are there to restrict flimsy registrations to network. The IP address are properly assigned to each node in the network so it can be uniquely identified. The security policies can be modified if the need arise to protect the network from external threats. The system configuration will include firmware and database protection methods and techniques which can reduce the network attacks (CSMA/CD (Carrier Sense Multiple Access/Collision Detection), 2011).
The network access mechanism is consists of authentication policy of Cygni. The senior management will get more access rights then the lower management in file sharing and modification in databases. NOS can be configured with validations and verification of different IP addresses requesting for some information at file server. Authorized IP address will assigned requested file and unauthenticated IP will be either block or refused. The uniqueness of IP address will restrict the internal and external theft if information of database system in network is there (Karsai and et.al., 2011).
This configuration will utilize TCP/IP protocols for networking establishment and it is more protected for access into company database system. It enables NOS to deliver the expected service platform for networking of client computers and devices in Cygni.
Evaluation of disaster recovery plan using testing method
A disaster recovery plan is discussed above and according to it, the network system is well protected for Cygni in it's operations management. There are some testing methods which can be used to evaluate the performance of this plan. Here, a brief discussion is done on these methods to understand the effectiveness of disaster recovery plan (Cheng and et.al, 2011).
Checklist testing: Checklist are the measurement points which are designed to evaluate the current and standard policies for disaster management. The activities and objectives are included to measure the plan performance in controlling disasters.
Simulation testing: The limitation or controlling of different resources, methods, policies and techniques attached to disaster recovery systems are attained in this testing. It is evaluated as system check for standards and original process execution.
Parallel testing: This testing method is a simultaneous execution of checklist testing and simulation testing in parallel. It is a continuous monitoring process in which input from the previous test is observed for the next level test (Disaster Recovery Plan Testing: Cycle the Plan, Plan the Cycle, 2013).
Full interruption testing: This testing method includes the overall test of system in a remote condition of network system. The current execution of plan is stopped and a stand alone test is performed so all the activities can be checked properly . The disadvantage of this testing is to restrict the execution of all processes. It is a costly test to be performed which can affect the operations of Cygni.
These are few methods for testing the implemented networking plan in Cygni which includes monitoring and controlling of system. The disaster recovery plans are involved for safety and security of the networking and operating system.
Creation and evaluation of performance standards of NOS
Formulation of performance standards: The standards are the defined set of parameters which are used as objectives and guiding principles for the network operating system. The policies of these standard is designed by considering networking principles and business objectives. The planning for designing these principle is obtained from setting the principles and allocating resources to different processes. The performance measures are considered as cost, quality, time, reliability and speed of system executions. These factors are analyzed in respect of networking operating system and plan is implemented with some set of documents and policies. These norms are considering all relevant aspects of business and operating system. It mainly includes the behavior of NOS in operating environment (Bruck, Cleron and Fisher, 2012).
Evaluation of performance standards: This formulated plan can be evaluated by observing the current performance of network operating system. The information of current performance is collected from different sources and respective action is taken to minimize or remove differences in existing and standards of performance. The NOS is observed here for the execution of it's services and performance measures. The outcomes are found positive for effective operation management. The reactive actions are taken to manage the defecting processes and executions. The continuous monitoring will give strength to NOS in supporting file server as well as networking.
The monitoring report of NOS against performance standards
A monitoring report is consists of indicators for performance evaluation of existing NOS. The comparison of standard and current performance is done to understand the review of evaluation testing methods. It is conducted by analysis of current inputs and output of NOS with per-decided policies. The monitoring process includes the execution review of service of implemented NOS. The serviceability is measured with computer system and its networking efficiency. The monitoring report includes the process of evaluation and proof for outcomes. The safety policies and disaster recovery system are checked if they are implemented properly or not. The planning is mentioned if the results are not as expected before. The network administrator notices these outcomes and practice the changes required to control the operational performance (Functions of networking devices, 2013).
The modification of existing processes and functions of NOS needs to be monitored so the reflexes can be controlled simultaneously. The database systems and file server should be observed daily to detect the unwanted access in the network. Testing should be quality assured so the action plan can manage the required improvement with operating system.
If your dream is to get top grades, get a rewarding assignment service from us.Brilliant Assignment Services
Toll Free: +61 363 612 email@example.com
This monitoring report is considering the evaluation techniques, service standards and current performance of NOS in networking of computer systems and mobile users. It practices the performance monitoring tools and reactive action plans for negative threats. The monitoring involves the documentation of standard, current problems and the action taken against these problems.
The evaluation and modification report of network performance
The monitoring and evaluation of network can be measured in terms of following points:
Acknowledgment from sender to receiver in communication system.
- The authentication check for users in network.
- Testing principles for evaluating the standard performance of NOS.
- The reaction of software and hardware components in network system.
- Monitoring and control over different aspects of networking and operations of business.
- Checking and evaluating services, upgrade requirements and updating of changes to existing system (Hart, 2013).
Based on these information, a modification plan can be proposed which will consist of improvements for changes in NOS and networking system. The systematic evaluation of the system includes operational efficiency of Cygny business. The information technology has significantly played role of adequate platform for business organization. The networking, internet and computer system are the ease of IT for operation management of a company.
The modification can be performed by upgrading the networking system with advancement of NOS and file server. The changes are done to improve the performance of existing system and requirements of business operations.
Cygni is a medium sized IT company which is effectively operational with network and information system. This report concludes network operating system and file server services that are accessed in Cygni to manage resources at its new branch office in Manchester. In this report, planning of disaster management and network security is understood including backup plans and operation control systems. The outcomes of NOS plan and implementation sounds optimize in context to network management and information access for employees as well as mobile salesman. The positive outcome of planning and evaluation are adequate resource utilization by remote desktop sharing. On the whole, this report is reflecting the significance of NOS and file server services in operations management of Cygni.
- Bruck, T., Cleron, M. A. and Fisher, S. 2012. Patent and Trademark Office. UNAN publishes.
- Cheng, X., and et.al, 2011. Virtual network embedding through topology-aware node ranking. ACM SIGCOMM Computer Communication Review.
- Hart, C. 2013. Graph Theory Topics in Computer Networking. Sage publishes.
- Karsai and et.al, 2011. Small but slow world: How network topology and burstiness slow down spreading. Physical Review E.
- LAWRENZ, W., 2013. CAN system engineering. Springer. Vob publishes.