Unit 27: Network Operating Systems

Slides:



Advertisements
Similar presentations
Communication and Networking Services Networking Services.
Advertisements

Computer networks Fundamentals of Information Technology Session 6.
Chapter 5: Server Hardware and Availability. Hardware Reliability and LAN The more reliable a component, the more expensive it is. Server hardware is.
Network+ Guide to Networks, Fourth Edition
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
MCTS Guide to Microsoft Windows Server 2008 Network Infrastructure Configuration Chapter 11 Managing and Monitoring a Windows Server 2008 Network.
Computer Networks IGCSE ICT Section 4.
Web Proxy Server Anagh Pathak Jesus Cervantes Henry Tjhen Luis Luna.
Installing and Maintaining ISA Server. Planning an ISA Server Deployment Understand the current network infrastructure Review company security policies.
Virtual Network Servers. What is a Server? 1. A software application that provides a specific one or more services to other computers  Example: Apache.
Maintaining Windows Server 2008 File Services
Module 8 Implementing Backup and Recovery. Module Overview Planning Backup and Recovery Backing Up Exchange Server 2010 Restoring Exchange Server 2010.
NovaBACKUP 10 xSP Technical Training By: Nathan Fouarge
1 Objectives Discuss the Windows Printer Model and how it is implemented in Windows Server 2008 Install the Print Services components of Windows Server.
1 Networks, advantages & types of What is a network? Two or more computers that are interconnected so they can exchange data, information & resources.
Network+ Guide to Networks, Fourth Edition Chapter 1 An Introduction to Networking.
Chapter 7: Using Windows Servers to Share Information.
Module 13: Configuring Availability of Network Resources and Content.
Chapter 9: Novell NetWare
15 Maintaining a Web Site Section 15.1 Identify Webmastering tasks Identify Web server maintenance techniques Describe the importance of backups Section.
Local Area Networks (LAN) are small networks, with a short distance for the cables to run, typically a room, a floor, or a building. - LANs are limited.
Chapter 3.  Help you understand different types of servers commonly found on a network including: ◦ File Server ◦ Application Server ◦ Mail Server ◦
Chapter 8 Implementing Disaster Recovery and High Availability Hands-On Virtual Computing.
Troubleshooting Windows Vista Security Chapter 4.
Royal Latin School. Spec Coverage: a) Explain the advantages of networking stand-alone computers into a local area network e) Describe the differences.
Chapter 13 Users, Groups Profiles and Policies. Learning Objectives Understand Windows XP Professional user accounts Understand the different types of.
Module 9: Preparing to Administer a Server. Overview Introduction to Administering a Server Configuring Remote Desktop to Administer a Server Managing.
1 Administering Shared Folders Understanding Shared Folders Planning Shared Folders Sharing Folders Combining Shared Folder Permissions and NTFS Permissions.
1 Week #10Business Continuity Backing Up Data Configuring Shadow Copies Providing Server and Service Availability.
McLean HIGHER COMPUTER NETWORKING Lesson 15 (a) Disaster Avoidance Description of disaster avoidance: use of anti-virus software use of fault tolerance.
ITGS Networks. ITGS Networks and components –Server computers normally have a higher specification than regular desktop computers because they must deal.
Module 4 Planning for Group Policy. Module Overview Planning Group Policy Application Planning Group Policy Processing Planning the Management of Group.
NETWORKING FUNDAMENTALS. Network+ Guide to Networks, 4e2.
CHAPTER 5 MANAGING USER ACCOUNTS & GROUPS. User Accounts Windows 95, 98 & Me do not need a user account like Windows XP Professional to access computer.
2.2 Interfacing Computers MR JOSEPH TAN CHOO KEE TUESDAY 1330 TO 1530
By the end of this lesson you will be able to: 1. Determine the preventive support measures that are in place at your school.
Network - definition A network is defined as a collection of computers and peripheral devices (such as printers) connected together. A local area network.
Network and Server Basics. Learning Objectives After viewing this presentation, you will be able to: Understand the benefits of a client/server network.
Review of IT General Controls
Chapter 7: Using Windows Servers
Basharat Institute of Higher Education
Securing Network Servers
Configuring File Services
Lab A: Planning an Installation
Module 9: Preparing to Administer a Server
BEST CLOUD COMPUTING PLATFORM Skype : mukesh.k.bansal.
Maintaining Windows Server 2008 File Services
Introduction to Operating Systems
Active Directory Administration
Section 15.1 Section 15.2 Identify Webmastering tasks
Introduction to Networks
Unit 27: Network Operating Systems
LO2: Understand Computer Software
DHCP, DNS, Client Connection, Assignment 1 1.3
Unit 27 – Network Operating System
An Introduction to Computer Networking
Software Introduction
SpiraTest/Plan/Team Deployment Considerations
Unit 11- Computer Networks
Communications & Computer Networks Resource Notes - Introduction
Network+ Guide to Networks, Fourth Edition
Network Operating Systems and introduction to security
AbbottLink™ - IP Address Overview
Unit 27: Network Operating Systems
Module 9: Preparing to Administer a Server
Designing IIS Security (IIS – Internet Information Service)
Objectives Explain the role of computers in client-server and peer-to-peer networks Explain the advantages and disadvantages of client- server and peer-to-peer.
G061 - Network Security.
Presentation transcript:

Unit 27: Network Operating Systems Theory leading to Assignment 1

Network Operating Systems(NOS) Designed to support networks Networks are a collection of many computers and devices that are connected together By installing a NOS onto a computer it becomes what is know as a Server. Servers can provide many different functions. NOS installed on a server and configured to distribute files.

NOS/Server types: Standalone Not dependent to others but is independent to itself Do not usually provide network logon services Are independent of domain controllers on the network.  An example use of a standalone server is for the distribution of files or documents in a small office setting. Documents on the server is set to share mode and read-only mode so user can access files but not modify. Another example could be having a standalone print or Intranet server

NOS/Server types: Infrastructure based A NOS/Server configured to support a network of hardware and software resources belonging to an entire network Enables network connectivity, communication, operations and management of an network. Provides the communication path and services between users, processes, applications, services and external networks/the Internet. A typical network infrastructure includes: Networking Hardware: Routers Switches LAN cards Wireless routers Cables Networking Software: Network operations and management Operating systems Firewall Network security applications Network Services: T-1 Line DSL Satellite Wireless protocols IP addressing

NOS/Server types: Cluster based A group of servers that work together and act like a single system Enables high availability, if a server in the cluster fails the remaining servers take up the strain. Enables load balancing Enables parallel processing

NOS services: File: Allows resources to be shared between clients on the network. System admin can regulate who has access to what. Web: Server configured to store, process and deliver web pages to clients. Print: Manages the print queue, usage and potentially user credit. Print queue could be shared between multiple printers. Remote access: Using software such as Virtual Machine Manager the server can be remotely managed. Using VPN connection to the remote server, clients can access their files and folders after logging in. Firewall/Proxy: A proxy firewall acts as an intermediary between in-house clients and servers on the network. Proxy firewalls are considered to be the most secure type of firewall because they prevent direct network contact with other systems. A proxy firewall has its own IP address so an outside network connection will never receive packets from the sending network directly.

NOS services continued: Terminal services: With remote access configured a user or admin can take full control of a computer or virtual machine desktop on the network. Access control: Allows the server admin to authorize users, groups, and computers to access or restrict access to objects on the network or computer. Infrastructure management: Allows you to connect and manage the objects on the network. Ecommerce: Website hosting, secure (SSL) certificate installed and email management can be set up. Remote Desktop Protocol (RDP) for Windows. Remote access and Terminal Services software.

Unit 27 – Network Operating Systems Assignment 1 – Task 1.1 You are required to evaluate types of NOS and NOS services of a selection of Network Operating Systems such as standalone, infrastructure based and cluster based systems. NOS: types eg standalone, infrastructure based, cluster based NOS services: types eg file, web, print, remote access, proxy, terminal services, firewall, access control, infrastructure management, ecommerce Use Harvard referencing and examples whenever possible.

Disaster recovery: Backup Mythology Full Backups Stores a copy of all files and typically occurs automatically according to a pre-set schedule. Files are usually compressed to save space, however, even when compressed full backups may consume a lot of storage. Image reference: https://www.cloudberrylab.com/incremental-backup-vs-differential-backup.aspx

Disaster recovery: Backup Mythology Full Backups Disadvantages include causing heavy access to the backup disk, which shorten disk life and consume network bandwidth. More robust than many businesses require. Only a small percentage of files change from one backup to another. Will yield multiple identical copies of files and consume valuable storage space on the backup medium. An advantage is the ease of restoration. Restoring a file requires only the file name, location, and date from which to restore the data.

Disaster recovery: Backup Mythology Incremental Backups Backup only the files that have been created or changed since the last backup. Usually backup strategies include a combination of full backups and incremental backups. Running a full backup once per week—on weekends when network and computing resource demands are lower—and scheduling incremental backups on weekdays. Backing up files with this combination enables a restoration that does not require looking through or merging more than a week’s worth of iterations. Image reference: https://www.cloudberrylab.com/incremental-backup-vs-differential-backup.aspx

Disaster recovery: Backup Mythology Incremental Backups An advantage is that the volume of data backed up at each iteration is much smaller, which in turn saves space on the backup medium and uses less network bandwidth. Disadvantages include backups increasing computing overhead, each source file must be compared with the last full backup as well as the incremental iterations to determine whether data is new or changed. More complex to locate a specific file to restore as it may require searching several iterations. To completely restore all files requires merging all iterations while taking care to keep only the most recent version of each file.

Disaster recovery: Backup Mythology Differential Backups Differential backups are similar to incremental backups, except that each backup operation stores the new and updated files since the last full backup. For example, if a full backup was performed on Sunday and a file changed on Monday, that file will be part of every differential backup until the next full backup is run. Image reference: https://www.cloudberrylab.com/incremental-backup-vs-differential-backup.aspx

Disaster recovery: Backup Mythology Differential Backups Using differential backups simplifies recovery because only the last full backup and the last differential backup is needed to create a complete restoration. As with incremental backups, differential backups need to compare current and already-backed-up files to identify any changes. However, differential backups require more space and network bandwidth compared with incremental backups.

Disaster recovery: Data Recovery: If data has been backed up it can be recovered by simply installing the backup. If not, through the use of specialised software deleted or corrupted data can be recovered. Mirrored Systems: A second backup server has an exact copy of another server. If one goes down the other takes over meaning no downtime to the network. Virtualisation: One physical server split into multiple isolated virtual environments. Reduces physical space and cost. UPS (Uninterruptible Power Supply)/Backup Power supply: Battery devices that connect to a physical server to give it power when the primary source of power fails.

Disaster recovery: Off site management: Off site backup allows copied server data stored physically away from the main site. Should the server and data be damaged at one site through fire or flooding for example there is a backup still available. High availability: How operational the server is. By having regular backups, UPS’s set up and offsite management available your server should be 99% available and therefore considered to have high availability. Fault tolerance: By having two separate machines that are mirrored.  In the event that the main system has a hardware failure, the secondary system takes over and there is zero downtime.

Unit 27 – Network Operating Systems Assignment 1 - Task 1.2 Add a section to your report that discusses the benefits of disaster recovery. Cover the following points; backup methodology, data recovery, mirrored systems, virtualisation, UPS (Uninterruptible Power Supply), backup-power supply, off site management, high availability and fault tolerance. Use Harvard referencing and examples whenever possible.

NOS security: Management of updates/patches: Keeping your server software uptodate will eliminate potential holes in security. Anti-virus protection: Essential on a server. Microsoft Endpoint as an example that protects servers and devices on the network. Alerts can be set to notify the Admin but usual kills viruses automatically. Physical access policies: Who can access your server? Key coded or locked servers rooms are essential. Access should be restricted only to admin. Service access policies: Examples include e-mail, file, web and printing. Policy's should ensure that only users who need services have access to them.

NOS security: User access policies: Who has access to the network? Users should have username and passwords setup and only access to data essential to their role. Policy management: Through group policy management network admins can restrict user access and control what they can add and change. User and group audits: Maintaining a log and monitoring users network usage to maintain security. Can be set in Group policy. Firewalls and filters could restrict access to undesirable websites. Continual vetting of access: Consistent consideration of who should have access to what. Based on job role and audits.

NOS security: Authentication policies and practice: Methods put in place to safeguard access to network services including internet. Password or fingerprint scanners could be considers as ways to authenticate access. Password policy: Passwords could be set to change every 90 days or have a minimum of 8 characters with numbers, uppercase and lowercase lettering.

Unit 27 – Network Operating Systems Assignment 1 - Task 1.2 Now as part of 1.2 discuss the benefits of NOS security. Cover the following points: management of updates/patches, anti-virus protection, physical access policies, service access policies, user access policies, policy management, user audits, group audits, continual vetting of access, authentication policies and practice, password policy Use Harvard referencing and examples whenever possible.

Unit 27 – Network Operating Systems Assignment 1 - Task 1.3 Discuss and critically compare a selection NOS. These could be: Open source Proprietary General purpose Task specific Software include: Windows Server Linux MacOS Server Solaris FreeBSD Use Harvard referencing and examples whenever possible.