- 500+ Experts Online to help you 24x7
- Guaranteed Grade or Get Money Back!
- Rated 4.8/5 Out of 5087 Reviews
Login or Sign Up With Your Email to Complete the Order ProcessGet Additional $5 Cashback on Sign Up
Login or Sign Up With Your Email to Complete the Order ProcessGet Additional $5 Cashback on Sign Up
Get Your Assignments at the Best Prices NOW!!
21403Downloads1 I Published: 29 Jun ,2017
This is a report based on Network Operating System (NOS) which includes storage of data, remote access, connectivity of network devices and network security. In this report, a company named as Cygni is considered to establish its network system in newly set branch office in Manchester, UK. It consists of planning, designing, implementing and controlling the network connection on multiple floor by using a NOS. It shows the utilization of remote desktop sharing for allocating minimum network resources and a file server which can share and store information in database. The security, scaling and availability of network resources with information system are emphasized with respect to future expansion of Cygni's infrastructure.
A operating system is a system software which provides platforms to different application software. Network operating systems are offering stages to information access and storage from a file server and support organizations to manage the network resources for operations management (Avoine, Junod and Oechslin, 2007). The different types of NOS are as follows:
Artisoft's LANtastic: This NOS supports to windows operating systems for computers. It provides interface to many resources to communicate by chatting server. The utility of this NOS is that it offers easy access of file server and network manager.
Banyan VINES: It is virtually integrated network service providing NOS which is patented to protocol system. It offers client and server network system which is essential for print sharing by multiple computers in an organization.
Novell's NetWare: It is designed through Xerox network system architecture which support both the open source and licensed computer operating systems. The LAN, MAN, WAN, and other network topological are supported by this NOS. It also offers print share from computers or mobiles connected in topology.
Microsoft's LAN Manager: It is designed by Microsoft for file and database servers. It provides the platform to DOC and windows operating system. Now most of its features are compiled with Microsoft windows NT file server to support the network access.
For Cygni, Novell Netware NOS is best suitable because it also supports the open source computer operating systems and as per the requirements, it is helpful to establish Local area network with sharing of information and it's file server is accessed in a middle sized organizations.
NOS disaster are the sudden damages to network system and equipment of information technology. These damages are analyzed as information loss, physical damages to equipment like computer, router and switch etc. The damage recovery of these network resources can be done and data can be accomplished by a backup feature or secondary process in NOS (Saltzer, and Kaashoek, 2009). The disaster recovery is a process for managing and controlling the internal or external interrupts in network system. The availability of network means the flawless transfer of information from one place to another. It is assumed that security of network system can be obtained from continuous controlling and monitoring system with rectifiers and filters.
Here, the discussion is done for disaster recovery practices for current NOS. The disaster recovery is managed by database cloud backups and services. The best practice is to identify the threats of disaster and proactive solutions to manage such problems and issues. The attributes of all possible risk needs to be analyzed with respect to the disasters. An action plan should be there to recover or prevent the damages. The possible damage should be classified and evaluated for critical situations. Cloud computing has given ease of storing and recovering the information (Silberschatz, Galvin and Gagne, 2013).
The external threats are like water damage, virus programs, hacking or human cause while internal risks are climate, power cut, deficiency of equipment etc. The phases of damage recovery are planning the process or method with requirement gathering, activation of activities to manage those damages and finally evaluate as well as maintenance of the recovery plan. A documentation of this plan gives proactive solutions to control such issues.
There are four types of NOS used in network establishment and file server services. Here, the comparison of selected NOS, Novel Netware with other types of NOS is cited in reference to Cygni.
The selection of a Network Operating System depends upon requirements of organization and applicability of respective NOS. The Cygni is a IT company which has operational needs to use open source operating systems in its computers and print sharing is accessible by two printers only. The number of computers are around 30 to 40 which are connected by two printers. So, the selected NOS best meet with these requirements of network establishment (Wijngaart, Mattson and Haas, 2011).
Other NOS are providing platform to specific operating systems like windows and Linux but the selected NOS supports all computer operating system. Rest of NOS provides facility of chat server, emailing and continuous monitoring while this NOS emphasis on connection establishment using Local area network and other typologies. The Microsoft LAN Manager provides facility to only Microsoft framework and file server. The Banayan VENIS emphasizes on client server system with printing enabled services while Artisoft LANtastic NOS provides service of file server communications. The Novell Netware is providing combined services at low cost and maintenance.
Network establishment in the new branch of Cygni requires collection of hardware and software resources. It includes backup tools, IP address allocation and security policies for file server. To plan and implement, following processes needs to be kept in mind:
Planning: The requirement analysis can be done through collection of all relevant resources and concluding the need of designing a network system. It involves information of installation process and the NOS. The server computer should be well equipped with CD-ROM, latest processor and Adequate memory space. The RAM of server computer needs to be appropriate to the system configuration. The installation wizard needs to be completed with marking all essential codex. The another information is of IP addresses and it's category. The printers and computer will required a unique IP address. The Backup process of operating system needs to be performed after completion of installation. The security standards should be analyzed with keeping all possible threats in mind. An adequate protection software needs to be used at server and client computer systems.
Implementation: The designing of planned NOS and networking should be discussed with all the team members and network administrator of Cygni. After that, an implementation process needs to be executed. The network hardware resources needs to be connected to each other to create a Local Area Network system. The planning needs to be implemented for file server management with security policies. Cygni requires to put emphasis on control and monitoring on database systems and file sharing objectives (Selga, Zaballos and Navarro, 2013).
The chatting and email server can be enabled to communicate among the employees of firm. The other services will be enabled like file sharing, modification in databases, downloading and uploading of content in information system. The network monitoring can be accomplished with the help of tracking system. The security issues will be dealt from backup and proactive protection.
The disaster recovery is essential to achieve in Cygni which strives for the healthy operational management. The proposed system is planned for recovery from natural and external factors which are affecting performance of NOS and file server in networking system. The possible threats are analyzed in planning for disaster recovery and maintaining networking system. The information needs to be protected with some validations and verification. Planning consists of designs and process knowledge for dealing with natural and external disasters. It has considered that the business of company will not be affected if disaster occurs. The planning of action plan needs to be done before it occurs. The documentation of problems and their solutions should be performed so it will be utilized in future (Sarkar, 2006).
The implementation of this plan includes threats and solutions to overcome with network disaster. Evaluating all the possible disaster management solutions and analysis for adding these activities into our system will strengthen the network system. The cloud computing can be utilized for storing the backup files and documents. In case of external barriers like viruses, hacking, unauthorized access and missing files, this plan will help to protect and monitor the problem causing issues and mantling the quality of network system for IT operations.
The installation process will follow thee steps mentioned below.
The NOS installed on the computer system enables access and security system of the networking in Cygni. The access configuration follows authentication norms for its user and administrators. These norms are decided by the hierarchical structure of company or access rights for different employees (LAWRENZ, 2013).
The security of the database and file server system is obtained by restricting unauthorized access on network. The filters are there to restrict flimsy registrations to network. The IP address are properly assigned to each node in the network so it can be uniquely identified. The security policies can be modified if the need arise to protect the network from external threats. The system configuration will include firmware and database protection methods and techniques which can reduce the network attacks (CSMA/CD (Carrier Sense Multiple Access/Collision Detection), 2011).
The network access mechanism is consists of authentication policy of Cygni. The senior management will get more access rights then the lower management in file sharing and modification in databases. NOS can be configured with validations and verification of different IP addresses requesting for some information at file server. Authorized IP address will assigned requested file and unauthenticated IP will be either block or refused. The uniqueness of IP address will restrict the internal and external theft if information of database system in network is there (Karsai and et.al., 2011).
This configuration will utilize TCP/IP protocols for networking establishment and it is more protected for access into company database system. It enables NOS to deliver the expected service platform for networking of client computers and devices in Cygni.
A disaster recovery plan is discussed above and according to it, the network system is well protected for Cygni in it's operations management. There are some testing methods which can be used to evaluate the performance of this plan. Here, a brief discussion is done on these methods to understand the effectiveness of disaster recovery plan (Cheng and et.al, 2011).
Checklist testing: Checklist are the measurement points which are designed to evaluate the current and standard policies for disaster management. The activities and objectives are included to measure the plan performance in controlling disasters.
Simulation testing: The limitation or controlling of different resources, methods, policies and techniques attached to disaster recovery systems are attained in this testing. It is evaluated as system check for standards and original process execution.
Parallel testing: This testing method is a simultaneous execution of checklist testing and simulation testing in parallel. It is a continuous monitoring process in which input from the previous test is observed for the next level test (Disaster Recovery Plan Testing: Cycle the Plan, Plan the Cycle, 2013).
Full interruption testing: This testing method includes the overall test of system in a remote condition of network system. The current execution of plan is stopped and a stand alone test is performed so all the activities can be checked properly . The disadvantage of this testing is to restrict the execution of all processes. It is a costly test to be performed which can affect the operations of Cygni.
These are few methods for testing the implemented networking plan in Cygni which includes monitoring and controlling of system. The disaster recovery plans are involved for safety and security of the networking and operating system.
Formulation of performance standards: The standards are the defined set of parameters which are used as objectives and guiding principles for the network operating system. The policies of these standard is designed by considering networking principles and business objectives. The planning for designing these principle is obtained from setting the principles and allocating resources to different processes. The performance measures are considered as cost, quality, time, reliability and speed of system executions. These factors are analyzed in respect of networking operating system and plan is implemented with some set of documents and policies. These norms are considering all relevant aspects of business and operating system. It mainly includes the behavior of NOS in operating environment (Bruck, Cleron and Fisher, 2012).
Evaluation of performance standards: This formulated plan can be evaluated by observing the current performance of network operating system. The information of current performance is collected from different sources and respective action is taken to minimize or remove differences in existing and standards of performance. The NOS is observed here for the execution of it's services and performance measures. The outcomes are found positive for effective operation management. The reactive actions are taken to manage the defecting processes and executions. The continuous monitoring will give strength to NOS in supporting file server as well as networking.
A monitoring report is consists of indicators for performance evaluation of existing NOS. The comparison of standard and current performance is done to understand the review of evaluation testing methods. It is conducted by analysis of current inputs and output of NOS with per-decided policies. The monitoring process includes the execution review of service of implemented NOS. The serviceability is measured with computer system and its networking efficiency. The monitoring report includes the process of evaluation and proof for outcomes. The safety policies and disaster recovery system are checked if they are implemented properly or not. The planning is mentioned if the results are not as expected before. The network administrator notices these outcomes and practice the changes required to control the operational performance (Functions of networking devices, 2013).
The modification of existing processes and functions of NOS needs to be monitored so the reflexes can be controlled simultaneously. The database systems and file server should be observed daily to detect the unwanted access in the network. Testing should be quality assured so the action plan can manage the required improvement with operating system.
If your dream is to get top grades, get a rewarding assignment service from us.Brilliant Assignment Services
This monitoring report is considering the evaluation techniques, service standards and current performance of NOS in networking of computer systems and mobile users. It practices the performance monitoring tools and reactive action plans for negative threats. The monitoring involves the documentation of standard, current problems and the action taken against these problems.
The monitoring and evaluation of network can be measured in terms of following points:
Acknowledgment from sender to receiver in communication system.
Based on these information, a modification plan can be proposed which will consist of improvements for changes in NOS and networking system. The systematic evaluation of the system includes operational efficiency of Cygny business. The information technology has significantly played role of adequate platform for business organization. The networking, internet and computer system are the ease of IT for operation management of a company.
The modification can be performed by upgrading the networking system with advancement of NOS and file server. The changes are done to improve the performance of existing system and requirements of business operations.
Cygni is a medium sized IT company which is effectively operational with network and information system. This report concludes network operating system and file server services that are accessed in Cygni to manage resources at its new branch office in Manchester. In this report, planning of disaster management and network security is understood including backup plans and operation control systems. The outcomes of NOS plan and implementation sounds optimize in context to network management and information access for employees as well as mobile salesman. The positive outcome of planning and evaluation are adequate resource utilization by remote desktop sharing. On the whole, this report is reflecting the significance of NOS and file server services in operations management of Cygni.
Type: Assignment I
Published: 08 May ,2020 I
INTRODUCTION On the basis of the job descriptions and advertisements of the structural engineering, it has been analysed that there are a variety of skills that are need for achieving all the targets and goals in structural engineering. A variety of factors include time management, leadership...ReadMoreView or Download
Type: Assignment I
Published: 08 May ,2020 I
INTRODUCTION Business environment plays a vital role in context of running business so that positive results can be gained in an appropriate manner. In modern era which is full of diversity, it has became really very important for every single firm to better understand about both external and...ReadMoreView or Download
Type: Assignment I
Published: 29 Jan ,2020 I
Introduction Construction technology denotes the various tools, equipment’s, alterations, software etc. that are taken in use while carrying out the construction activities. With the application of such techniques and other automated and semi - automated applications better and advanced...ReadMoreView or Download
Type: Assignment I
Published: 25 Jan ,2020 I
Introduction Overview of the research Photovoltaic are one of the most effective means of creating the electronic energy. It does the usage of cells which are made of solar through which the sunlight is converted into flow of electrons and hence creates the photovoltaic effect. This is very...ReadMoreView or Download
Type: Assignment I
Published: 21 Aug ,2018 I
What Is ICT? Information and communication technology may include personal computers, internet, mobile phone etc. but it is using by all people so that there are too much inequalities in access of ICT. There is excessively much gap between those people who are not using automation compare to those...ReadMoreView or Download
If the samples impressed you and you want to place an order with us just submit your queries with us and place your order.Chat With Expert