Network Attributes, Roles And Protocols Essay

1339 words - 5 pages


Part A

1) Describe the attributes of a multi-user and a network operating system.

Multi-user system

        A multi-user Operating System is an operating system that has to provide support for at least two users at a time.

        The three main features of a multi-user Operating System are resource sharing, multitasking and background processing.

Resource Sharing - Sharing of the resources within the computer system. The operating system must manage the resources in such a way that all processes run some of the time and that they get the resources they need to finish their tasks.

Multi-tasking - Multi-tasking is one of the main features of a multi-user Operating System. When more than one tasks are being run at the same time the processor has to share it's time between applications, this leads to the system becoming slow.

Background Processing - When a user does not want to run a particular process at a specific time then he or she can run it in the background while running something else. This is knows as Background Processing.

Network Operating System

        A Network Operating System is a computer Operating System that is designed primarily to support workstations, personal computers and in some instances, older terminals that are connected to LAN's

        There are 2 main types of networks; Workgroup and Domain.

        Workgroups can support up to 10 machines and have a low security arrangement. Domains on the other hand can have an unlimited number of machines and have a high security arrangement.

        In a Workgroup network, each person has to administer his or her own computer whereas on a Domain network the administration is centralised to the Domain Controller.

        In it's early forms, Windows did not support networking, so Novell Netware became the first popular network Operating System for the personal computer.

         Describe the role, privileges and access of a network system administrator

The network system administrator is the person responsible for providing maintenance duties to a company's networked computer system.

        Typical tasks include:

Password reset
Printer queue trouble shooting
UserID add/modify/delete
Troubleshooting and answering questions
Performing backup and restoring operations of files

Because the Network Administrator has to manager every part of the network it is sensible that they should have full-control permissions of the whole network. This includes Read, Write, Read and Execute and Modify permissions.

3) Describe and compare two different network operating systems e.g. Windows NT and Linux.


        Some of the common differences between Windows NT and Linux lie in the interface and the way the user inputs commands. With Linux there is much more freedom for the user as you can opt to run the operating system with...

Find Another Essay On Network Attributes, Roles and Protocols

Executive Summary for Network Design Essay

4852 words - 19 pages such as one's home or hotel room if the employee is traveling.The network protocols that will be used in ChekMate's network design include internet protocols, layer two tunneling protocols and layer three tunneling protocols. Internet protocols will be used when information is being transmitted through the LAN and WAN. Layer two protocols are used when both ends of the tunnel must agree to a communication session and all other configuration such

Understanding TCP/IP Essay

1732 words - 7 pages , gradually became known as the Internet. The TCP/IP protocols played an important role in the development of the Internet by becoming the standard protocols for ARPANET.Due to the history of the TCP/IP protocol, it is often referred to as the DoD protocol suite or the Internet protocol suite.4 Process/application layer consists of applications and processes that use the network.3 Host-to-host transport layer provides end-to-end data delivery

Virtual Private Networks

4352 words - 18 pages -protocol access to a corporate network. Network layer protocols, such as IPX and NetBEUI, are encapsulated by the PPTP protocol for transport. PPTP supports authentication, encryption, and packet filtering and uses PPP-based protocols like EAP, CHAP, and PAP.PPTP is a Layer 2 protocol that encapsulates PPP frames in IP datagram's for transmission over an IP network and PPP frames can be encrypted and/or compressed. PPTP used for remote access and

Mobile Ad Hoc Network Temporarily Forms a Network without Support

1538 words - 7 pages does have very limited physical security, and thus increasing security is a major concern. 4. Limited Bandwidth & Limited Power: The bandwidth available is limited than that of wired networks.The power is limited and the computation should be energy efficient. 5.Security: The wireless links lack defence against treats. CLASSIFICATION OF ROUTING PROTOCOLS Mobile Ad hoc network routing protocols are classified into three types: 1.Proactive

Design a Network Infrastructure Because Networks are Configured in Many Ways, Network Systems and Data Communications Analysts are Needed to Design, Test, and Evaluate Systems Such as Local Area...

8965 words - 36 pages Network. The protocols used by X.25 operate in close relation to the Data Link and Physical Layer protocols defined in the OSI Model.Frame RelayFrame relay operates at the Data Link Layer of the OSI Model. One way to look upon Frame Relay is that it was originally developed as a "poor man's" version of the X.25 technology. It is often sold by Telecommunications companies to businesses looking for a cheaper alternative than leased lines. Frame

Mutual-Authentication Mechanism for RFID Systems

3703 words - 15 pages detailed model should be used that not only follows a standard modeling procedure and set of laws but also measure Authentication, security attributes, network model, physical security, risk, vulnerability, threat, attack, consequence, reliability, recovery and also integrates all these parameters. 6. FUTURE WORK A detailed standard educated guess model should be proposed that has the over discussed qualities, which is demonstrated and validated

INDP Part 2

1214 words - 5 pages There can be an assortment of devices on a network depending on the size. These devices need an effective method of communication between themselves in order to relay the information to the correct destination. The communication protocols are a set of standards that tell different hardware and software how to transfer data elements between them. When working with the OSI model, the protocols will govern communication between entities on the same

iso/osi protocols

2330 words - 10 pages OSI/ISO Protocols OSI protocol is a network of guidelines for swapping information. Each of these principles of OSI protocols were developed and innovated by the International Organization of Standardization (ISO) which started in the late 1940s. “Since that time ISO has circulated over more than 19,500 international guidelines covering nearly all features of technology and industries across the world in which stated members from ISO” (ISO story

Riordan Manufacturing

1036 words - 5 pages Communication protocols are the force by which network devices can communicate with one another. The main protocols used by applications are TCP, UDP, IP protocols, ICMP, IGMP, SCTP and DCCP, ARP, and routing protocols. Each protocol serves its own unique purpose, for example HTTP uses TCP port 80. TCP or Transmission Control Protocol uses a handshake method to make sure that data makes it to a location in full, and in the correct order. This

Implementing a New Wide Secure Wireless Network at Brigham Young University Hawaii

2628 words - 11 pages NAME: RAKESH REDDY.B ID.NO: MIT130269 Fundamentals of 802.1 x: To understand 802.1 x, let us define some fundamental terminology. Client (supplicant) : According to the IEEE terminology, the supplicant refers to the client software that supports the 802.1x and EAP protocols. The term client also refers to the actual client which requesting access to the network. (“Overview of 802.1 x

Substation Automation

1190 words - 5 pages channels. The connection of any two logical nodes can be indirect or a combination of any TCP, UDP or direct Ethernet connections. Logical nodes are modeled as data objects for data exchange which can contain many data objects. Data object has a common data class type and is an instance of the data class. The concept of objects in mostly like object-oriented programming languages, a data object consists of several data attributes, which are

Similar Essays

Shedding The Light On The Network, Transport And Application Layer Protocols Of Osi Model

2406 words - 10 pages Executive Summary This report is a response to an individual assignment to partially fulfill the requirements of (TN6384 Computer Network) module. It aims to shed the light on the Network, transport, and application-layer protocols of OSI Model. The report begins with presenting a relevant background to the topic, presenting the historical perspective of OSI protocols. In addition, it explains the purpose and importance of these protocols

Network Design Essay

1566 words - 6 pages , Networks media, and Connectors. Switches and Routers are also part of network components. When designing a network, couples of items are a must to have such fundamental goals, a drawing or diagram, The Hierarchical Network Design, IP addresses, routing protocols, Servers, and switches. Good Network does not happen on its own. Accordance to SCTE website, “The network diagram uses common symbols to capture information related to the

Problem Based Learning As An Effective Tool For Teaching

967 words - 4 pages Problem Based Learning. Maidenhead, U.K. open univ. Press2004 Importance of Coherence Protocols with Network Applications on Multicore Processors Overview: The rapid changes in internet and information technology leads to importance of fast packet processing in computer networks. This in turn leads to in network speed and complexity of network requirements .Here we mainly focus on cache coherence protocols

History Of The Internet Essay

632 words - 3 pages host level protocols, which would enable the transfer of information over a computer network. The first message sent over this network occurred in 1969, between researchers at the University of California Los Angeles (UCLA), and the Stanford Research Institute (SRI) (Kleinrock, L, 1969). For the next twelve years, researchers continued to work on the idea of a computer network that would allow the easy sharing of resources and information. A