Network Administration and Monitoring
VerifiedAdded on 2022/11/14
|13
|2170
|493
AI Summary
This report discusses the importance of Linux and UNIX shell scripts in creating logs that automatically list the set of output as specified by the script file. It presents a shell script file called mySysMonitor.sh that prints the outputs of different system and networking requirements in a mySysMonitor.log file. The report makes use of several UNIX or Linux based terminal commands along with the respective extensions in order to print the specific results. The report also includes screenshots of opening the files mySysMonitor.sh and mySysMonitor.log through the text editor or through the terminal.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Running head: NETWORK ADMINISTRATION AND MONITORING
Network Administration and Monitoring
Name of the Student
Name of the University
Author Note
Network Administration and Monitoring
Name of the Student
Name of the University
Author Note
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
1NETWORK ADMINISTRATION AND MONITORING
Summary
UNIX or Linux shell commands can be used in order to the check various network as well as
system specific information. Though such information can also be checked through the GUI
interfaces, shell scripts can help creating logs that automatically list the set of output as
specified by the script file and can be accessed manually through the terminal or specified in
the script file to generate periodically. The report studies one such script file called
mySysMonitor.sh. This file prints the outputs of different system and networking
requirements in a mySysMonitor.log file and which can be manually opened by the network
administrator through the terminal whenever the respective details are required by them. To
perform this, the report makes use of several UNIX or Linux based terminal commands along
with the respective extensions in order print the specific results. These commands and
extensions are then explained by the report. After that the report presents the various
screenshots of opening the files mySysMonitor.sh and mySysMonitor.log through the text
editor or through the terminal. These screenshots contain both the contents of the files as well
as output of the commands used. Thereafter the report ends with concluding notes.
Summary
UNIX or Linux shell commands can be used in order to the check various network as well as
system specific information. Though such information can also be checked through the GUI
interfaces, shell scripts can help creating logs that automatically list the set of output as
specified by the script file and can be accessed manually through the terminal or specified in
the script file to generate periodically. The report studies one such script file called
mySysMonitor.sh. This file prints the outputs of different system and networking
requirements in a mySysMonitor.log file and which can be manually opened by the network
administrator through the terminal whenever the respective details are required by them. To
perform this, the report makes use of several UNIX or Linux based terminal commands along
with the respective extensions in order print the specific results. These commands and
extensions are then explained by the report. After that the report presents the various
screenshots of opening the files mySysMonitor.sh and mySysMonitor.log through the text
editor or through the terminal. These screenshots contain both the contents of the files as well
as output of the commands used. Thereafter the report ends with concluding notes.
2NETWORK ADMINISTRATION AND MONITORING
Table of Contents
Introduction................................................................................................................................3
Requirements..............................................................................................................................3
Solution......................................................................................................................................4
Commands used and justification..........................................................................................5
Current processes...............................................................................................................5
5 most CPU and RAM intensive processes........................................................................6
All devices that are plugged in...........................................................................................6
Disk Usage (Overall)..........................................................................................................6
Disk Usage (Home Directory)...........................................................................................6
Disk Usage (Other Directories)..........................................................................................6
Network interfaces and their states....................................................................................6
Other key directories..........................................................................................................7
Screenshots.............................................................................................................................7
Conclusion..................................................................................................................................9
Bibliography.............................................................................................................................10
Table of Contents
Introduction................................................................................................................................3
Requirements..............................................................................................................................3
Solution......................................................................................................................................4
Commands used and justification..........................................................................................5
Current processes...............................................................................................................5
5 most CPU and RAM intensive processes........................................................................6
All devices that are plugged in...........................................................................................6
Disk Usage (Overall)..........................................................................................................6
Disk Usage (Home Directory)...........................................................................................6
Disk Usage (Other Directories)..........................................................................................6
Network interfaces and their states....................................................................................6
Other key directories..........................................................................................................7
Screenshots.............................................................................................................................7
Conclusion..................................................................................................................................9
Bibliography.............................................................................................................................10
3NETWORK ADMINISTRATION AND MONITORING
Introduction
The following report highlights the importance of Linux and UNIX shell which
though can be checked through the GUI interfaces, shell scripts can help creating logs that
automatically list the set of output as specified by the script file. The report begins by
summarizing the requirements followed by designing of one script file called
mySysMonitor.sh. This file prints the outputs of different system and networking
requirements in a mySysMonitor.log file and which can be manually opened by the network
administrator through the terminal whenever the respective details are required by them. To
perform this, the report makes use of several UNIX or Linux based terminal commands along
with the respective extensions in order print the specific results. These commands and
extensions are then explained by the report. After that the report presents the various
screenshots of opening the files mySysMonitor.sh and mySysMonitor.log through the text
editor or through the terminal. These screenshots contain both the contents of the files as well
as output of the commands used. Thereafter the report ends with concluding notes.
Requirements
A shell script called mySysMonitor.sh needs to be created which is to regularly write
to the log file - mySysMonitor.log automatically.
This log file is to contain the detailed information along with time stamps based on
the changes to currently running processes, 5 most CPU and RAM intensive applications,
every device currently plugged in, disk usage of overall system, home directory as well as
other directories, information regarding network interfaces and other relevant information.
The shell script file needs to be created in GNU nano, the text editor, for operating
systems similar to UNIX and an appropriate heading is to be given.
Introduction
The following report highlights the importance of Linux and UNIX shell which
though can be checked through the GUI interfaces, shell scripts can help creating logs that
automatically list the set of output as specified by the script file. The report begins by
summarizing the requirements followed by designing of one script file called
mySysMonitor.sh. This file prints the outputs of different system and networking
requirements in a mySysMonitor.log file and which can be manually opened by the network
administrator through the terminal whenever the respective details are required by them. To
perform this, the report makes use of several UNIX or Linux based terminal commands along
with the respective extensions in order print the specific results. These commands and
extensions are then explained by the report. After that the report presents the various
screenshots of opening the files mySysMonitor.sh and mySysMonitor.log through the text
editor or through the terminal. These screenshots contain both the contents of the files as well
as output of the commands used. Thereafter the report ends with concluding notes.
Requirements
A shell script called mySysMonitor.sh needs to be created which is to regularly write
to the log file - mySysMonitor.log automatically.
This log file is to contain the detailed information along with time stamps based on
the changes to currently running processes, 5 most CPU and RAM intensive applications,
every device currently plugged in, disk usage of overall system, home directory as well as
other directories, information regarding network interfaces and other relevant information.
The shell script file needs to be created in GNU nano, the text editor, for operating
systems similar to UNIX and an appropriate heading is to be given.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
4NETWORK ADMINISTRATION AND MONITORING
The network administrator should be able to open the program using the cat
commands in the CLI terminal of Linux (Ubuntu) operating systems.
Solution
The proposed solution is about a shell script file to print several details regarding
network administration and monitoring of performance of system components to a file named
mySysMonitor.log. This is to help determine whether the systems are running as per
expectations as well as whether any suspicious activity can be noticed among the network
interfaces and their current states. These monitoring details include the following information
about the system:
The currently running processes
The top five CPU and RAM consuming processes
All the devices that are plugged in
Disk usage: The overall disk usage of the system
Disk usage: Disk usage of home directory
Disk usage: Other key directories
Available network interfaces and their states
Other relevant information
These information get printed on a log file name my/sysMonitor.log. The contents of both the
shell script file as well as this log file can be opened with text editors. The shell script file
mySysMonitor.sh is given by:
#!/bin/bash
# My System Information
#redirect stdout/stderr to a file
The network administrator should be able to open the program using the cat
commands in the CLI terminal of Linux (Ubuntu) operating systems.
Solution
The proposed solution is about a shell script file to print several details regarding
network administration and monitoring of performance of system components to a file named
mySysMonitor.log. This is to help determine whether the systems are running as per
expectations as well as whether any suspicious activity can be noticed among the network
interfaces and their current states. These monitoring details include the following information
about the system:
The currently running processes
The top five CPU and RAM consuming processes
All the devices that are plugged in
Disk usage: The overall disk usage of the system
Disk usage: Disk usage of home directory
Disk usage: Other key directories
Available network interfaces and their states
Other relevant information
These information get printed on a log file name my/sysMonitor.log. The contents of both the
shell script file as well as this log file can be opened with text editors. The shell script file
mySysMonitor.sh is given by:
#!/bin/bash
# My System Information
#redirect stdout/stderr to a file
5NETWORK ADMINISTRATION AND MONITORING
exec &> mySysMonitor.log
echo "Current processes - ";
ps
echo "Top 5 CPU and RAM utilizing processes - ";
ps aux | sort -rk 3,3 | head -n 6
echo "Devices plugged in - ";
lsusb
echo "Disk Usage - ";
echo "Overall Disk Usage - ";
df -h /dev/sda1
echo "The user's home directory - ";
df -hT /home
echo "Other key directories - ";
df -h
echo "Network interfaces and their states - ";
ip link show
echo "Other relevant information - Operating system";
uname –a
exec &> mySysMonitor.log
echo "Current processes - ";
ps
echo "Top 5 CPU and RAM utilizing processes - ";
ps aux | sort -rk 3,3 | head -n 6
echo "Devices plugged in - ";
lsusb
echo "Disk Usage - ";
echo "Overall Disk Usage - ";
df -h /dev/sda1
echo "The user's home directory - ";
df -hT /home
echo "Other key directories - ";
df -h
echo "Network interfaces and their states - ";
ip link show
echo "Other relevant information - Operating system";
uname –a
6NETWORK ADMINISTRATION AND MONITORING
As can be found from the above sh script, it addresses all the five criteria out of which the
criteria for disk usage contains a set of three sub criteria which are overall disk usage, home
directory disk usage and other key directories disk usage.
The file mySysMonitor.log according to the shell script file shows the echo message followed
by the corresponding results
Commands used and justification
Current processes
‘ps’ – The ps command in linux serves as a utility command which stands for ‘process
status’. The ps command is responsible for viewing details regarding the processes that are
currently running on the system. It lists all the currently running processes along with their
PIDs.
5 most CPU and RAM intensive processes
‘ps aux | sort -rk 3,3 | head -n 6’ – The aux in ‘ps aux | sort -rk 3,3 | head -n 6’ are used for
performing different set of tasks. These can be a – showing all processes of all users, u –
displaying the user or owner of the processes, x – showing processes not present in the
terminal. Next several filters can be placed by using the separators or ‘|’s. These filters can be
sort by specifying the ‘r’ and ‘k’. More filters can be added by adding another separator, this
time to list contents of file after certain number of lines by increasing the head value.
All devices that are plugged in
lsusb - lsusb refers to the utility command used for displaying details about all the USB bus
slots present in that system as well as all devices that are connected to it.
As can be found from the above sh script, it addresses all the five criteria out of which the
criteria for disk usage contains a set of three sub criteria which are overall disk usage, home
directory disk usage and other key directories disk usage.
The file mySysMonitor.log according to the shell script file shows the echo message followed
by the corresponding results
Commands used and justification
Current processes
‘ps’ – The ps command in linux serves as a utility command which stands for ‘process
status’. The ps command is responsible for viewing details regarding the processes that are
currently running on the system. It lists all the currently running processes along with their
PIDs.
5 most CPU and RAM intensive processes
‘ps aux | sort -rk 3,3 | head -n 6’ – The aux in ‘ps aux | sort -rk 3,3 | head -n 6’ are used for
performing different set of tasks. These can be a – showing all processes of all users, u –
displaying the user or owner of the processes, x – showing processes not present in the
terminal. Next several filters can be placed by using the separators or ‘|’s. These filters can be
sort by specifying the ‘r’ and ‘k’. More filters can be added by adding another separator, this
time to list contents of file after certain number of lines by increasing the head value.
All devices that are plugged in
lsusb - lsusb refers to the utility command used for displaying details about all the USB bus
slots present in that system as well as all devices that are connected to it.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
7NETWORK ADMINISTRATION AND MONITORING
Disk Usage (Overall)
df -h /dev/sda1 – The df-h is used to show the disk usage of several directories of the system.
The extension used ‘/dev/sda1’ provides the overall disk usage of the system specifically the
directory where the operating system is installed.
Disk Usage (Home Directory)
df - hT /home – The extension hT /home is used for showing the disk usages of the home
directory in particular.
Disk Usage (Other Directories)
df – h – This command as discussed above prints the disk usage of different directories of the
system. Unlike the other two extensions which provide specific results, disk usage of other
directories in general are given.
Network interfaces and their states
ip link show – This is the shell command used for printing the details regarding the network
interfaces as well as the present state of these network interfaces.
Other key directories
uname –a – This linux command is used to show in the terminal the details regarding the
operating system currently installed in the system.
Screenshots
The following screenshots validate that the files mySysMonitor.sh and
mySysMonitor.log have been created and generated as per the requirements. The screenshots
of mySysMonitor.log contain the outputs of the commands specified in the script file. These
outputs ensure that the required diagnostic information is shown which is frequently
requested by the network administrators and what is required from the script file.
Disk Usage (Overall)
df -h /dev/sda1 – The df-h is used to show the disk usage of several directories of the system.
The extension used ‘/dev/sda1’ provides the overall disk usage of the system specifically the
directory where the operating system is installed.
Disk Usage (Home Directory)
df - hT /home – The extension hT /home is used for showing the disk usages of the home
directory in particular.
Disk Usage (Other Directories)
df – h – This command as discussed above prints the disk usage of different directories of the
system. Unlike the other two extensions which provide specific results, disk usage of other
directories in general are given.
Network interfaces and their states
ip link show – This is the shell command used for printing the details regarding the network
interfaces as well as the present state of these network interfaces.
Other key directories
uname –a – This linux command is used to show in the terminal the details regarding the
operating system currently installed in the system.
Screenshots
The following screenshots validate that the files mySysMonitor.sh and
mySysMonitor.log have been created and generated as per the requirements. The screenshots
of mySysMonitor.log contain the outputs of the commands specified in the script file. These
outputs ensure that the required diagnostic information is shown which is frequently
requested by the network administrators and what is required from the script file.
8NETWORK ADMINISTRATION AND MONITORING
mySysMonitor.sh in text editor
mySysMonitor.sh through the terminal
mySysMonitor.log in text editor
mySysMonitor.sh in text editor
mySysMonitor.sh through the terminal
mySysMonitor.log in text editor
9NETWORK ADMINISTRATION AND MONITORING
mySysMonitor.sh through terminal
The screenshots clearly indicate that all the desired diagnostic information can be
obtained from the five different set of criteria. Additionally it is found that the operating
system details are being provided for the criteria “Other relevant information”.
mySysMonitor.sh through terminal
The screenshots clearly indicate that all the desired diagnostic information can be
obtained from the five different set of criteria. Additionally it is found that the operating
system details are being provided for the criteria “Other relevant information”.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
10NETWORK ADMINISTRATION AND MONITORING
Conclusion
In conclusion, the above report succeeds in highlighting the importance of Linux and
UNIX shell which though can be checked through the GUI interfaces, shell scripts can help
creating logs that automatically list the set of output as specified by the script file. The report
is observed to summarize the requirements followed by designing of one script file called
mySysMonitor.sh. This file prints the outputs of different system and networking
requirements in a mySysMonitor.log file and which can be manually opened by the network
administrator through the terminal whenever the respective details are required by them. To
perform this, the report makes use of several UNIX or Linux based terminal commands along
with the respective extensions in order print the specific results. These commands and
extensions are then explained by the report. After that the report presents the various
screenshots of opening the files mySysMonitor.sh and mySysMonitor.log through the text
editor or through the terminal. These screenshots contain both the contents of the files as well
as output of the commands used.
Conclusion
In conclusion, the above report succeeds in highlighting the importance of Linux and
UNIX shell which though can be checked through the GUI interfaces, shell scripts can help
creating logs that automatically list the set of output as specified by the script file. The report
is observed to summarize the requirements followed by designing of one script file called
mySysMonitor.sh. This file prints the outputs of different system and networking
requirements in a mySysMonitor.log file and which can be manually opened by the network
administrator through the terminal whenever the respective details are required by them. To
perform this, the report makes use of several UNIX or Linux based terminal commands along
with the respective extensions in order print the specific results. These commands and
extensions are then explained by the report. After that the report presents the various
screenshots of opening the files mySysMonitor.sh and mySysMonitor.log through the text
editor or through the terminal. These screenshots contain both the contents of the files as well
as output of the commands used.
11NETWORK ADMINISTRATION AND MONITORING
Bibliography
Fujikawa, K., Harai, H., Ohmori, M. and Ohta, M., 2016. Quickly converging renumbering in
network with hierarchical link-state routing protocol. IEICE TRANSACTIONS on
Information and Systems, 99(6), pp.1553-1562.
Ilsche, T., Schöne, R., Bielert, M., Gocht, A. and Hackenberg, D., 2017, September. lo2s—
multi-core system and application performance analysis for Linux. In 2017 IEEE
International Conference on Cluster Computing (CLUSTER) (pp. 801-804). IEEE.
Ionescu, A.L.E.X., 2016. The Linux kernel hidden inside Windows 10.
Martino, B.L., Patria, G., Reale, F. and Federici, M., 2017, November. LXC and Dockers:
migrating OSA software on Linux containers. In Frontier Research in Astrophysics–II (Vol.
269, p. 073). SISSA Medialab.
Mohamed, A.A. and Ali, D.M., 2015. Network tapping system based on customized
embedded linux: Design and implementation. International Journal of Networks and
Communications, 5(4).
Praptodiyono, S., Sofhan, R., Pramudyo, A.S., Firmansyah, T. and Osman, A., 2019.
Performance comparison of transmitting jumbo frame on Windows and Linux
System. Telkomnika, 17(1), pp.68-75.
Rad, B.B., Bhatti, H.J. and Ahmadi, M., 2017. An introduction to docker and analysis of its
performance. International Journal of Computer Science and Network Security
(IJCSNS), 17(3), p.228.
Sharma, P., Chaufournier, L., Shenoy, P. and Tay, Y.C., 2016, November. Containers and
virtual machines at scale: A comparative study. In Proceedings of the 17th International
Middleware Conference (p. 1). ACM.
Bibliography
Fujikawa, K., Harai, H., Ohmori, M. and Ohta, M., 2016. Quickly converging renumbering in
network with hierarchical link-state routing protocol. IEICE TRANSACTIONS on
Information and Systems, 99(6), pp.1553-1562.
Ilsche, T., Schöne, R., Bielert, M., Gocht, A. and Hackenberg, D., 2017, September. lo2s—
multi-core system and application performance analysis for Linux. In 2017 IEEE
International Conference on Cluster Computing (CLUSTER) (pp. 801-804). IEEE.
Ionescu, A.L.E.X., 2016. The Linux kernel hidden inside Windows 10.
Martino, B.L., Patria, G., Reale, F. and Federici, M., 2017, November. LXC and Dockers:
migrating OSA software on Linux containers. In Frontier Research in Astrophysics–II (Vol.
269, p. 073). SISSA Medialab.
Mohamed, A.A. and Ali, D.M., 2015. Network tapping system based on customized
embedded linux: Design and implementation. International Journal of Networks and
Communications, 5(4).
Praptodiyono, S., Sofhan, R., Pramudyo, A.S., Firmansyah, T. and Osman, A., 2019.
Performance comparison of transmitting jumbo frame on Windows and Linux
System. Telkomnika, 17(1), pp.68-75.
Rad, B.B., Bhatti, H.J. and Ahmadi, M., 2017. An introduction to docker and analysis of its
performance. International Journal of Computer Science and Network Security
(IJCSNS), 17(3), p.228.
Sharma, P., Chaufournier, L., Shenoy, P. and Tay, Y.C., 2016, November. Containers and
virtual machines at scale: A comparative study. In Proceedings of the 17th International
Middleware Conference (p. 1). ACM.
12NETWORK ADMINISTRATION AND MONITORING
Tan, J. and Zhong, B., 2015. Comparative study on educational effects between Linux and
Windows. International Journal of Continuing Engineering Education and Life Long
Learning, 25(3), pp.315-327.
Yang, C.T., Chen, S.T., Den, W., Wang, Y.T. and Kristiani, E., 2019. Implementation of an
intelligent indoor environmental monitoring and management system in cloud. Future
Generation Computer Systems, 96, pp.731-749.
Yang, C.T., Liu, J.C., Chen, W.S., Leu, F.Y. and Chu, W.C.C., 2017. Implementation of a
virtual switch monitoring system using OpenFlow on cloud. International Journal of Ad Hoc
and Ubiquitous Computing, 24(3), pp.162-172.
Tan, J. and Zhong, B., 2015. Comparative study on educational effects between Linux and
Windows. International Journal of Continuing Engineering Education and Life Long
Learning, 25(3), pp.315-327.
Yang, C.T., Chen, S.T., Den, W., Wang, Y.T. and Kristiani, E., 2019. Implementation of an
intelligent indoor environmental monitoring and management system in cloud. Future
Generation Computer Systems, 96, pp.731-749.
Yang, C.T., Liu, J.C., Chen, W.S., Leu, F.Y. and Chu, W.C.C., 2017. Implementation of a
virtual switch monitoring system using OpenFlow on cloud. International Journal of Ad Hoc
and Ubiquitous Computing, 24(3), pp.162-172.
1 out of 13
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.