LO1 NETWORK OPERATING SYSTEMS PRINCIPLES . 3 Lo1.1 TYPES OPERATING SYSTEMS ..3 LO1.2 Disaster recovery .11 LO2 IMPLEMENTATION OF NETWORK OPERATING SYSTEM PLAN . 20 2.1 IMPLEMENTATION PLAN 20 LO2.2 FEEDBACK ..23 LO3 IMPLEMENTATION OF NETWORK OPERATING SYSTEM .24 3.1 IMPLEMENTATION ..24 LO3.2 SECURITY POLICY ..34 LO4 NETWORK OPERATING SYSTEM MANAGE 39 LO4.1 NETWORK MONITORING .. .39 LO4.2 SECURITY REPORT ..40 Bibliography .44
Lo1.1 TYPES OPERATING SYSTEMS The tremendous development of the computer and communications industry over the last few years has made most computers connect to a network today. Practically, it is not enough to analyse the operation of a self-contained computer, but we need to consider an approach from the perspective of the computer network to which it is connected. The definition unanimously accepted by all (even if there are several definitions for the term computer network) is that a computer network is a collection of two or more computers connected to each other. The immediate benefit of connecting to a network is obvious: users can share files and peripherals (printers, modems, backup drives, CD-ROM drives, etc.). If networks from multiple locations are interconnected with the services offered by Internet service providers (telephone lines, cable, antennas), users can use highly popular applications such as e-mail, chat, video chat, video conference with other users connected to the network and located anywhere in the world. The immediate benefit of connecting to a network is obvious: users can share files and peripherals (printers, modems, CD-ROM drives, etc.). If networks in multiple locations are interconnected with the services of Internet service providers (telephone lines, cable, antennas), users can use today's most popular applications such as e-mail, chat, video chat, video conference with other network-connected users located anywhere in the world. -Components of a computer- A computer network typically includes the following components: -The server is the basic computer, considered host with which helps manage the entire network, also concentrating most of the resources; -Workstations are heterogeneous computing equipment connected to the server and between them, with the ability to transmit and receive information -Physical supports provide physical transmission of electrical, radio or optical signals between network nodes; -Adaptation equipment ensures compatibility between network workstations and physical carriers; -Communications control equipment, provides protection of network information while optimizing information flows between network components; -The operating system is the application or group of applications installed on the Server, ensuring the coordination of the basic computer functions and the accounting of the applications installed on the workstations. Classification FROM GEOGRAPHICAL POSITION Local Area Networks (LANs) that implement an enterprise or enterprise's computer system, operating at short distances of tens or hundreds of meters; - Metropolitan Area Networks (MAN), which interconnects subsidiaries or work points of the same entity; -Wide Area Networks (WAN), which interconnect national or international computer centres. AFTER TOPOLOGY One of the first notions presented when talking about a computer network is the notion of topology, which in fact means the structure of the network. Topology can be both physical and logical. A physical topology is the way in which network components are stacked in space, while the logical topology refers to how to access the networked devices. 1 Physical topologies The most common physical topologies are: - Topology of bus (bus) This topology uses only one main connection cable and the devices on the network are all connected to this connection (bus) Topology of bus and ring - Ring topology - Unlike a regular operating system (SO), network operating systems (NOS) provide network features, network services, multiuser capability, multitasking, security, resource sharing, and centralized network management. A network operating system has the following features: - Allows access for multiple users - Executing multi-user applications - It's robust and redundant - Offers increased security when compared to desktop operating systems NOS must have a robust kernel to avoid errors and interruptions. It is especially important that the NOS kernel can handle multiple processes, thus preventing other parts of the system from being blocked. NOS uses file systems to store information quickly and securely. The most common NOSs are Windows and Linux; operating systems that offer customers and users the ability to make a clear comparison and choice. The Windows system was first marketed as a desktop operating system with a user-friendly graphical user interface (GUI), later evolving as a network operating system. Linux was originally designed as a network operating system, distributed free of charge (under the GNU / GPL license), using a command line interface (CLI) to manage. Later, when he became more familiar, he began to migrate to desktop systems, accompanied by a friendly graphical user interface (GUI). We mention that there are distributions or versions of commercial Linux, but great majority is distributed free of charge, including source code (http://carment.ase.ro/rc/sem/nos.html, 2017)
http://study.com/academy/lesson/network-operating-systems-nos-windows-novell-net-ware.(2017) http://carment.ase.ro/rc/sem/nos.html http://dokumen.tips/documents/tipuri-de-back-up.html(2017) http://nicugane.ro/articole/biblioteca/Retele.pdf. (2017). Retrieved from http://nicugane.ro. http://web.info.uvt.ro/~cristiana.dragoescu/ANUl%20II/Curs12_13_RC.pdf. (2017). Retrieved from http://web.info.uvt.ro. http://www.dell.com. (2017). Retrieved from http://www.dell.com. http://www.dell.com/en-uk/work/shop/desktop-and-all-in-one-pcs/xps-8930. (2017). Retrieved from http://www.dell.com. http://www.networksecurity.ro/business_continuity.htm. (2017). Retrieved from http://www.networksecurity.ro. http://www.recoverydata.ro/. (2017). Retrieved from http://www.recoverydata.ro/. http://www.securitatea-informatiilor.ro/stiri-de-ultima-ora. (2017). Retrieved from http://www.securitatea-informatiilor.ro. https://classit.ro/blog/ro/tag/tipuri-de-backup/. (2017). Retrieved from https://classit.ro. https://cursuri-online.wikispaces.com/file/view/Clase_de_adrese_IP.pdf. (2017). Retrieved from https://cursuri-online.wikispaces.com. https://www.juridice.ro/wp-content/uploads/2017/11/rezumat_teza_doctorat.pdf. (2017). Retrieved from https://www.juridice.ro. internetworkmaterials.blogspot.com. (2017). Retrieved from internetworkmaterials.blogspot.com. https://www.mygarage.ro/ghiduri-si-tutoriale/134275-ghid-securitate-sistemelor-informatice-utilizatorilor-si-retelelor.html. (n.d.). https://www.mygarage.ro. Retrieved from 2017.
Plătește în siguranță cu cardul și beneficiezi de garanția 200% din partea Proiecte.ro.
Simplu și rapid în doar 2 pași: completezi datele tale și plătești.