Network Systems Admin

In: Computers and Technology

Submitted By bwalls502
Words 314
Pages 2
1-A ARIN –Provides services related to the technical coordination and management of Internet number resources. Supports the operation of the internet through the management of internet number resources and coordinates the development of policies for the management of IP number resources. They provide services for technical coordination and management of internet number resources in its respective service region. This includes IP address space allocation & ASN allocation, transfer and record maintenance. 1-B IANA – They are responsible for the allocation of globally unique names and numbers that are used in Internet protocols that are published as rfc documents and for coordinating some of the key elements that keep the internet running smoothly. Allocates and maintains unique codes and numbering systems that are used in the technical standards/protocols that drive the internet. This includes Domain names, number resources and Protocol assignments. 1-C APNIC – An organization that manages the assignment of internet number resources within the Asian continent. Provides number resource allocation and registration services that support the global operation of the Internet. 2. Approximately how many Ipv4 addresses are possible? An IPv4 uses 32 bit IP address and with 32 bits the maximum number of IP addresses is approximately four billion IPv4 addresses 3. Approximately how many IPV6 addresses are possible? An IPv6 uses 128 bit IP address and with 128 bits the maximum number of IP addresses is approximately 48 billion 4. Why do you think the world is running out of Ipv4 addresses? The central pool of IPv4 addresses officially ran dry on Tuesday, February 1, 2011. From now on, all new networks and services in the region must implement IPv6. 5. How long do you think it will take before the Ipv4 addresses are completely exhausted? Ipv4 addresses…...

Similar Documents

Network Systems Admin. (in Training)

...Address Class Historical Significance of the address classes: Class A: the first of the address classes, which is responsible for the value ranges of IP from 0-126 and also has 16,177,214 hosts. It also has 256 networks and the most significant bits are 0000. Class B: The second of the address classes, which is responsible for the value ranges of IP from 128-191. It also has 65,534 hosts and 65,536 networks. The most significant bits are 1000 and it is also a common class among most IP addresses. Class C: the third of the address classes, which is responsible for the value ranges of IP from 192-223 the most significant bits are 1100. It only has 254 hosts but it also has 16,177,216 networks since a lot of people have their IP addresses starting with 192.xxx.xxx.xx. Class D: the fourth of the address classes, which is responsible for the value ranges of IP from 224-239. Its most significant bits are 1110, and it does not have any networks or hosts because this class is rarely considered since the start of IP addresses don’t often start with 224 and above. Class E: the fifth of the address classes, which is responsible for the value ranges of IP from 240 and above. The significant bits of this class are 1111 and just as Class D does not have any hosts or networks, the same is with this class since IP addresses do not go above 192 usually. http://www.inetdaemon.com/tutorials/internet/ip/addresses/classful.shtml Address space A: the value range is from 0-126 so that......

Words: 639 - Pages: 3

Multi Network Recharge System

...this as a problem and as a solution we are suggesting a way to recharge all the networks from one card. This will reduce the distribution cost of those companies as well as customers also get benefit from it. Anyone can buy these cards from the various price ranges similarly to normal recharge cards and they can recharge their phone without considering their network. Some shops sell only selected types of cards from networks. Customers have to find their cards of their network here and there. This new system will provide answers for these problems. Project description • Issue a card with a specific PIN available in various price ranges to the customer. • PIN numbers are issued from the created database. • A dongle is connected to computer and customer sending PIN to given number (dongle SIM number). • SMS is checked. If it is valid, message is analyzed and derive network and amount by the server software automatically. • Required amount is sent via a SMS to the customer’s phone number automatically. Objectives • One recharge card for any mobile network. • Provide facility to customers to recharge a SIM of any network from same card. • Reduce distributor cost of mobile companies. Methodology A mobile reload card designed with unique PIN number for different price ranges such as Rs:50,100,500,1000. These PIN numbers are stored in the database of the system. A Java application is designed to handle all the SMS requests from......

Words: 454 - Pages: 2

Network Management System

...Date: 01/22/2014 Network Management System Student: xxxxxxxxxxxxxxx Professor: xxxxxx Course: Network 420 DEVRY UNIVERSITY Brief Introduction Network management systems have to be geared toward the work flow of the organization in which they will be utilized and be careful with remote external attack, as many hackers usually aim there attack at service offered to the public. Which means Network management systems department must provide protection to the business' data, with a smooth operation benefits for employees accessing those data. As we know Network management system is based on Client/Server paradigm normally requires transferring large amount of data between the manager and agents, which will consume large amount of data as bandwidth and cause a processing bottleneck at the manager. It become problem and complicated as the Network grow. According to our textbook, Management interoperability, management function, and management layers capture different technical aspects of network management. However, network management also involves a nontechnical . INTRODUCTION Network management systems have to be geared toward the work flow of the organization in which they will utilized the components of the network such as the ( manager, MIB, RMON and Probe ) to secure their organization data. And not forgetting to be mindful of remote external attack, as many hackers usually aim there attack at service offered to the public. Which means Network management......

Words: 689 - Pages: 3

System Admin

...its progress, hence improving my performance and expanding my knowledge. PROFESSIONAL EXPERIENCE Jaycees Public School, Rudrapur since June’11 L2 Process (IT Administrator) Responsibilities : IP Addressing ♦ Microsoft Outlook ♦ LAN Troubleshooting ♦ modem configuration ♦ server machine configuration ♦ cctv camera and Wireless Camera system control ♦ DVR Machine & IP camera Control ♦ Thin Client Device System ♦ 3D Server System Control ♦Operating System / Software Installation & Maintenance ♦VMC online Networking control . Mahindra & Mahindra Ltd.(Logistics Group) c/o Ashok Leyland Ltd. Pantnagar Rudrapur (U.K.) L1 Process (Desktop Engineer) Supervisor Jan’11- May’11 Gurugram Business School, Faridabad Jan’10 – Nov’10 L1 Process (Desktop Engineer) Responsibilities : IP Addressing ♦ Microsoft Outlook ♦ LAN Troubleshooting ♦ modem configuration ♦ server machine configuration ♦ cctv camera and Wireless Camera system control ♦ DVR Machine & IP camera Control ♦ Thin Client Device System ♦Operating System / Software Installation & Maintenance. KEY SKILLS ▪ Operating System(s) : MS-DOS, Windows [98,2000 Professional, XP Professional] ▪ Tools : Ms-Office (Microsoft word: Table creation, mailings, Macros, margins, setting pages & formatting, Microsoft Excel: merging, formulas, macros, filtering, Knowledge of citrix, printer, LAN, WAN, routers......

Words: 522 - Pages: 3

Network System Admin

...circuit-switching network is the telephone system, which links together wire segments to create a single unbroken line for each telephone call. Packet switching: Refers to protocols in which messages are divided into packets before they are sent. Each packet is then transmitted individually and can even follow different routes to its destination. Leased line: A permanent telephone connection between two points set up by a telecommunications common carrier. Typically, leased lines are used by businesses to connect geographically distant offices. Time-division multiplexing:  a type of multiplexing that combines data streams by assigning each stream a different time slot in a set. TDM repeatedly transmits a fixed sequence of time slots over a single transmission channel. T-carrier system: the name of the combination of different physical line standards(DSO, DSI, DS3 and others), plus circuits switches that use time division multiplexing (TDM) features, that together allowed the phone company to create digital circuits from end to end and create leased line services for customers. DSO: Digital Signal level 0. One of the physical line standards in the T-carrier system, as originally created by the companies of bell system in the united states. DSO runs at 64 Kbps DS1: same as above DS1 runs runs at 1.544 Mbps, with a 193-bit frame, 24 DSO channels, and an 8-Kbps overhead channel. Frame Relay: A packet-switching protocol for connecting devices on a Wide Area Network (WAN).......

Words: 335 - Pages: 2

Network Admin

...Juan J. Morales Network Infrastructure Professor Lambert DB – 2 1 - Explain the concept of a server role in detail. List some of the available server roles, and demonstrate how to configure them. Follow this by a demonstration of adding Windows Server 2008 features how do these features benefit and administrator? A server role is a software program included in a server software that performs a specific function, some of this server roles are as follows. * DNS Server – Provide the IP name resolution to a network * DHCP Server - Provides an Internet Protocol (IP) host with its IP address and other related and configuration information such as the subnet mask and default gateway. Just to name a few. From server manager in the left-hand pane, double-click the Roles node. In the right-hand pane, click add role, and click next to bypass the welcome screen. The add roles wizard windows appears, select the role and click next follow the prompts for the selected role to be install. It makes the management of the server more manageable and integrity of the network.  2 - The installation of Windows Server 2008 can be done in many different methods, list and explain each method in detail. Follow this by stepping through the actual process of this installation of those methods? Minimum Requirement for Installing Windows 2008 Processor 1.4GB – 64 – Bit Rams Minimum 512 MB, Maximum 32 GB Hard disk Requirement Minimum: 32 GB 1. Insert a bootable Windows......

Words: 457 - Pages: 2

Network Systems

...Mike Stigall Lab 1.1: Gui vs. Console Programming Unit 1. Assignment 1. Homework 1. Why is the CPU the most important component in a computer? The CPU stands for Central Processing Unit. It does all the processing for the entire system. Without it, your computer can't do anything. It has nothing to process information. It's just dead without it. 2. What number does a bit that is turned on represent? What number does a bit that is turned off represent? When a bit is turned on, it represents a "1". When it is turned off, it represents a "0". The exact value depends on where the bit is within the byte it is part of. In the binary number 0000 0001, the last bit is set to 1 and represents the number 1. 3. What would you call a device that works with binary data? Digital Data is data that is stored in binary, and a Digital Device is any device that works with binary data 4. What are the words that make up a high-level programming language called? The words that make up a high-level programming language are known as key words or reserved words. 5. What are the short words that are used in assembly language called? Mnemonic 6. What is the difference between a complier and an interpreter? A compiler translates code from a source language (e.g. C, C++, and Java) to a target language, which can then be executed by a (virtual or physical) machine. An interpreter reads code in an interpreted language (e.g. PHP, Perl, and Java Script) and......

Words: 463 - Pages: 2

Principles of Network and System Administration

...Chapter (Self-test Objective) Question # 1: What kinds of issues does system administration cover? Answer: As we discussed in class, a Network System Administrator has to be knowledgeable, has to have customer service skills to be stay calm & collected when a complaint occurs, and must be able to rectify the problem. As the course text book “Principles of Network and System Administration”, by author Mark Burgess mentions in chapter #1 section 1.6 The challenges of system administration : “System administration is not just about installing operating systems. It is about planning and designing an efficient community of computers so that real users will be able to get their jobs done. That means: • Designing a network which is logical and efficient. • Deploying large numbers of machines which can be easily upgraded later. • Deciding what services are needed. • Planning and implementing adequate security. • Providing a comfortable environment for users. • Developing ways of fixing errors and problems which occur. • Keeping track of and understanding how to use the enormous amount of knowledge which increases every year.” The author also mentions that some of the Network System Administrators are responsible for both the hardware of the network and the computers which it connects, i.e. the cables as well as the computers and some are only responsible for the computers. Most importantly a System Administrator must have an understanding of how data flows from......

Words: 337 - Pages: 2

System Admin

...System administration By: MANUEL Y.R.C What entails to be a system administrator? * A system administrator (SA) is responsible for managing and maintaining a multiuser computing environment. * He /she looks after computers, networks, and the people who use them. * May look after hardware, operating systems, software, configurations, applications, or security. * A system administrator influences how effectively other people can or do use their computers and networks. SA responsibilities include: * Installing, maintaining and troubleshooting workstations, servers, OSs, software applications and other computing systems * Creating user accounts and assigning user permissions * Executing anti-virus mechanisms * Creating backup * Creating file systems * Monitoring network communication * Updating systems upon release of new OSs or software * Implementing computer, network and security policies for system and network users. * Light programming or scripting * User training and management * Hardware and software system security, such as protection against hardware theft and abuse, malware/spyware and unauthorized use of systems and components, including firewall and intrusion detection system maintenance (http://www.techopedia.com/definition/4815/system-administrator-sa Book:the practice of system and network administration second adition by:Tomas A,limoncile) Consequences of not doing your work as system......

Words: 507 - Pages: 3

Network System Admin

...mobile phone. The original iPhone had a 3.5 inch screen at 320 X480 and 163ppi, a quad-band 2G edge data radio, 802.1b.g Wi-Fi, Bluetooth 2.0 EDR, and a 2 megapixel camera. the iPhone was powered by an ARM-based Samsung 1176 Z-S processor and power VR MBX lite 3D graphics, 128 megabytes of random access memory(RAM), as well as four or eight gigabytes of NAND flash storage, and also could sync to iTunes. The iPhone software was very impressive, Apple used a full version of Safari, based on the exact same web kit HTML rendering engine that powered the desktop version on the Mac. Apple also created the best mobile YouTube and maps implementation ever seen on mobile. Unfortunately the original iPhone didn’t have CDMA and EVDO rev A network compatibility. That meant it couldn’t work on two of the U.S. big four carriers, Verizon and Sprint. This actually didn’t matter; because the original iPhone was exclusive to AT&T. In addition to no hardware keyboard or stylus, the iPhone also didn’t have a removable user replaceable battery, which didn’t please existing power users of the time. By 2012 Apple had released five more iPhones, 3G, 3GS, 4, 4S, and the 5. All these models offered a lot of upgrades from the first iPhone, bigger screen, more memory, better resolution, offered a white model instead of the normal black that everyone was accustomed to, not only did the phone have a camera it also had a camera on the front of the phone which no other smart phone was......

Words: 821 - Pages: 4

Network Systems

...Network Attached Storage Network Attached Storage (NAS) is a dedicated hard drive which is set up with its own network address and provides file-level data storage services to other devices on the network. It allows both programming and files to be served faster because they are not competing for processor resources. NAS usually configured with a web browser and do not require a keyboard, mouse or monitor. Unlike other external hard drives, NAS has a processor. Some NAS devices will run using standard operating system like MS Windows, many other NAS devices use their own proprietary operating system. A NAS can store any data that appears in form of files, including email boxes, Web content, remote system backups, etc… Overall the use of a NAS parallels those traditional file servers. NAS devices come in many varieties depending on you build it or purchase it from a vendor. The speed is usually 1GB Ethernet connection but it can be changed to multiple GB to 10GB, fiber optic by adding PCI-e network cards. The capacity range also can be varied. If you have a port replication and add-on hardware drive controller cards, there really isn’t a limit on size. For example: if you have a board with 6 SATA ports which can be replicated (1 to 5 port) allowing 30 drives to be attached. Then if 3TB drives were used in RAID 50 that would be 72TB of storage capacity. As far as fault tolerance, RAID 50 can be quite stable if it’s set-up correctly. While RAID 10 is one of the best set-ups...

Words: 497 - Pages: 2

Network Admin

...1. What three numbering systems are used in computing? Decimal, Binary and Hexadecimal 2. What is the BASE of Decimal? How many characters? 10 is the base of Decimal and its 10 characters. 3. What is the base of Binary? How many characters? 2 is the base of Decimal and its 2 characters 4. What number system is used for everyday math? Decimal 5. What number system is used to store data by computers? Binary 0 and 1 6. List the decimal to binary conversion methods. Binary conversion charts methods and Division by 2 methods 7. Practice Decimal to Binary conversion. 47÷ 2 = 23 with a reminder of 1 23 ÷2 = 11 with a reminder of 1 11 ÷ 2 = 5 with a reminder of 1 5 ÷ 2 = 2 with a reminder of 1 2 ÷ 2 = 2 with a reminder of 0 1 ÷ 2 = 1 with a reminder of 1 the Binary will be 101111 8. State the powers of 2 from exponent 0 through 7. 27 26 25 24 23 22 21 20 9. What method can be used for Binary to Decimal conversion? The conversion charts methods. 10. Practice Binary to Decimal conversion. 10011 24 23 22 21 20 16 8 4 2 1 1 0 0 1 1 16 0 0 2 1 16 + 2 + 1 = 19 11. State the basic units of measurements for......

Words: 576 - Pages: 3

Huffman Trucking Network Systems

...Telephone and Data Networks The corporate main office is in Ohio. The office at this location uses Avaya Digital Phone System and is connected to a Cisco 10 MB Hub. All equipments in this location get access to the Avaya Digital Phone System through the 10 MB Hub. The plant at the Ohio location has set up different workstations; each workstation has a wireless bar code, scanner, shipper, and telephone. The office in California is currently using Private Branch eXchange System PBX system as communication system, routing incoming calls to the appropriate extension in the office. The California office uses The Plain Old Telephone Service POTS, with and intercom. The current POTS does not have caller ID nor does Voice Mail. All the connection phones in California’s office are connected to the PBX. The plant in California uses a different phone system than the California office. The California Plant uses the Nortel Digital Phone System. The phone system is Voice-over-IP, which is VOIP; basically this phone system is connected to an Ethernet connection. The office in Missouri is currently using Avaya Digital Phone System; this system is connected to a Cisco 10MB Hub. The Avaya Digital Phone System connects all the phones and faxes in the location. The plant at the Missouri location has set up different workstations. Each workstation has a wireless bar code scanner, printer, shipper, and a telephone. All the workstations are connected to the Cisco 10 MB Hub. The office......

Words: 744 - Pages: 3

Network Attached Storage System

...35%-50%/year decreases in the cost per byte. In recent years, the amount of storage sold almost doubled each year and is expected to sustain annual growth of at least 60%. Secondary storage has a healthy place in future computer systems. While many storage products are directly attached to personal computers, most disk array products (65% and rising) are deployed in local area network file servers. This centralization of storage resources enables effective sharing, better administrative control and less redundancy. However, it also increases dependence on network and file server performance. With the emergence of high-performance cluster systems based on commodity personal computers and scalable network switching, rapidly increasing demands on storage performance are anticipated. Specifically, storage performance must cost-effectively scale with customer investments in client processors, network links and storage capacity. Unfortunately, current distributed file system architectures severely limit scalable storage. In current distributed file systems, all storage bytes are copied through file server machines between peripheral buses (typically SCSI) and client LANs. In essence, these file server machines act as application-level inter-network routers, converting namespaces (disk block versus file range) and protocol layers (SCSI versus RPC/UDP/IP). This is a critical limitation for cost-effective scalable storage. Specifically, the......

Words: 1229 - Pages: 5

Network Systems

...Networking operating system It is the software that runs on a server and enables the server to manage data, users, groups, security, applications, and other networking functions.[2] The network operating system is designed to allow shared file and printer access among multiple computers in a network, typically a local area network (LAN), a private network or to other networks. The most popular network operating systems are Microsoft Windows Server 2003, Microsoft Windows Server 2008, UNIX, Linux, Mac OS X, and Novell NetWare. Multiuser File Sharing A network operating system manages concurrent requests from clients and provides the security necessary in a multiuser environment. A file sharing component is installed in each client machine that interacts with the server to share files and applications as well as devices on the network such as printers, faxes and modems. Peer-to-Peer In a Peer-to-peer network operating system users are allowed to share resources and files located on their computers and access shared resources from others. A peer-to-peer network sets all connected computers equal; they all share the same abilities to utilize resources available on the network. Client/Server Client/server network operating systems allow the network to centralize functions and applications in one or more dedicated file servers. The server is the center of the system, allowing access to resources and instituting security. The network operating system provides the......

Words: 1924 - Pages: 8

The Last Empress Episode 13 14 | Meow Motors | Ionic Vision - Heresy