Monday, February 10, 2020
NETWORK ADMINISTRATION AND SECURITY Essay Example | Topics and Well Written Essays - 1750 words
NETWORK ADMINISTRATION AND SECURITY - Essay Example 2002). UNIX back end server support the automatic generation of enterprise java beans facilitated the development teams to develop the J2EE application more efficiently. By the UNIX fast XML proxy support, web services are developed in no time on a distributed system as compared to the previous server architecture. IBM 32 way UNIX servers were also launched in year 2001 with the code name Ã¢â¬Å"RegattaÃ¢â¬ . The microprocessor architecture comprises of 1 GHz 64 Bit Power 4. This UNIX server is capable of self-healing technology and to decrease system failures. The system is capable to divide into 16 virtual servers which enable the businesses to unite several machines in to one (Popovich 2001). The Client-server model of UNIX was the core components for the growth of Internet and reshaping of the distributed systems networks. Inter process communication in the UNIX operating system involves the connection between the system components logically and physically. It supports real tim e network applications which allow the user to exchange messages in an interactive session. UNIX is known as a command line interface due to nonexistence of a GUI environment Today UNIX is equipped with a GUI along with dynamic communication functionalities. Some of the registered UNIX products are HP-UX, IBM AIX, SCO UnixWare, SGI IRIX, Sun Solaris etc. 2 UNIX Administration UNIX system administrator is responsible for installing software, patches, administer file system, analyze and constantly monitor the performance. If any issue occurs, system administrator troubleshoots the issue with the help of available tools and commands. Hardware and software configuration management, liaison with data center, software and hardware migration also add to the responsibilities of a UNIX system administrator. The UNIX administration is divided in to two separate groups. System Administration Network Administration 2.1 System Administration To administer Linux / UNIX, there are many commands an d tools available. To perform useful tasks, following commands are illustrated below with screen shots where possible. 2.1.1 Ã¢â¬Å"MANÃ¢â¬ Command Ã¢â¬ËMANÃ¢â¬â¢ command Ã¢â¬Å"displays the online documentation for almost any command or program in UNIX. An incredible amount of information is stored in man pages, but you must know the name of the command you are looking for to be able to searchÃ¢â¬ (, UNIX man command). This command extracts the title from the online reference manuals. As in the below mentioned snapshot, there is no manual installed. 2.1.2 Ã¢â¬Å"suÃ¢â¬ Command Ã¢â¬ËSuÃ¢â¬â¢ is used to create a shell with a specific used id. It is used for switching between accounts as compared to Windows Ã¢â¬Å"switch userÃ¢â¬ option. See the snapshot for example 2.1.3 Ã¢â¬ËWhoÃ¢â¬â¢ Command This command displays the information regarding the users who is logged in, from how long, and how many users are logged in. As the below mentioned snapshot shows the us ername, time, date and how many users are logged in. Common switches are activity, state, line, time and name. 2.2 Network Administration Network administrator utilized ICMP Ã¢â¬Å"