Network Operating System Report: Types, Services, and Performance
VerifiedAdded on 2020/01/28
|27
|7247
|326
Report
AI Summary
This report provides a comprehensive analysis of Network Operating Systems (NOS). It begins by defining NOS and its role in managing network resources, covering various types such as Windows servers, Unix/Linux servers, and Netware, along with the services they offer, including printing, file sharing, routing, and network administration tools. The report then delves into the benefits of disaster recovery and NOS security, emphasizing their importance in maintaining business continuity. The report goes on to discuss the design and implementation of a NOS for a small organization, including planning, evaluation, testing, and performance baseline establishment. It also examines performance monitoring and optimization strategies. The report concludes by summarizing the key findings and recommendations, providing a thorough understanding of NOS functionalities and management.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.

NETWORK OPERATING SYSTEMS
Alin Tita ID 14121
Alin Tita ID 14121
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

Table of Contents
INTRODUCTION......................................................................................................................1
LO 1...........................................................................................................................................1
1.1 Types of network operating system and services........................................................1
1.2 Benefits of disaster recovery and NOS security..........................................................2
1.3 Comparison of current NOS in use.............................................................................3
LO 2...........................................................................................................................................4
2.1 Planning NOS to implement in scenario..........................................................................4
2.2 Evaluate the plan and user feedback................................................................................5
LO 3...........................................................................................................................................6
3.1 Implementation of a NOS service....................................................................................6
3.2 Testing of user requirements..........................................................................................11
3.3 Test results against expected results..............................................................................11
LO 4.........................................................................................................................................12
4.1 Establish and justify the performance baseline..............................................................12
4.2 Monitor NOS performance against baseline..................................................................13
4.3 Justify performance optimisation and updates to NOS..................................................14
CONCLUSION........................................................................................................................14
REFERENCES.........................................................................................................................15
INTRODUCTION......................................................................................................................1
LO 1...........................................................................................................................................1
1.1 Types of network operating system and services........................................................1
1.2 Benefits of disaster recovery and NOS security..........................................................2
1.3 Comparison of current NOS in use.............................................................................3
LO 2...........................................................................................................................................4
2.1 Planning NOS to implement in scenario..........................................................................4
2.2 Evaluate the plan and user feedback................................................................................5
LO 3...........................................................................................................................................6
3.1 Implementation of a NOS service....................................................................................6
3.2 Testing of user requirements..........................................................................................11
3.3 Test results against expected results..............................................................................11
LO 4.........................................................................................................................................12
4.1 Establish and justify the performance baseline..............................................................12
4.2 Monitor NOS performance against baseline..................................................................13
4.3 Justify performance optimisation and updates to NOS..................................................14
CONCLUSION........................................................................................................................14
REFERENCES.........................................................................................................................15

LIST OF FIGURES
Figure 1: Red level 3..................................................................................................................3
Figure 2: network simulation through cisco program................................................................5
Figure 1: Red level 3..................................................................................................................3
Figure 2: network simulation through cisco program................................................................5

INTRODUCTION
Network operating system (NOS) helps to manage the resources effectively along
with implication of efficiency and security. The report will discuss various types of NOS and
related services. Various benefits of network security and disaster recovery will be discussed.
Later report will design the network and network operating system for a small organization.
The report will test and evaluated the implementation for capabilities in organizational
operations. The report will also establish and justify the network performance baseline
besides of network performance optimisation with various methods.
LO 1
1.1 Types of network operating system and services
Network operating system (NOS) is computer operating system to control and serve the
client machines in network. Peer-to-peer and client-server communication in network is
implemented with NOS. Majorly, following services are offered by the NOS in network:
Printing services in network are handled and controlled to have remote access to
printers, scheduling of printing jobs and to react whenever the printers are not
available in network.
Network operating system has the services to permit the access on remote file servers
and to determine the set off users those can have access on remote file system
associated with network (Kimand Feamster, 2013).
Sharing of applications and internet services along with resources are under the
services of NOS as it controls the remote access to user resources in network
whenever the network implementation is transparent.
NOS support routing services along with major routing protocols.
Basic network administration tools are offered as services to administrators to manage
the simple mail transfer protocols and user activities in network.
Majorly there are three types of network operating systems:
Windows servers:
Windows servers like NT and 2000 are popular operating system. Functions of
directory services to manage the user accounts and information along with their credentials is
key point of attraction in operating system. Operating system supports a wide range of client
1
Network operating system (NOS) helps to manage the resources effectively along
with implication of efficiency and security. The report will discuss various types of NOS and
related services. Various benefits of network security and disaster recovery will be discussed.
Later report will design the network and network operating system for a small organization.
The report will test and evaluated the implementation for capabilities in organizational
operations. The report will also establish and justify the network performance baseline
besides of network performance optimisation with various methods.
LO 1
1.1 Types of network operating system and services
Network operating system (NOS) is computer operating system to control and serve the
client machines in network. Peer-to-peer and client-server communication in network is
implemented with NOS. Majorly, following services are offered by the NOS in network:
Printing services in network are handled and controlled to have remote access to
printers, scheduling of printing jobs and to react whenever the printers are not
available in network.
Network operating system has the services to permit the access on remote file servers
and to determine the set off users those can have access on remote file system
associated with network (Kimand Feamster, 2013).
Sharing of applications and internet services along with resources are under the
services of NOS as it controls the remote access to user resources in network
whenever the network implementation is transparent.
NOS support routing services along with major routing protocols.
Basic network administration tools are offered as services to administrators to manage
the simple mail transfer protocols and user activities in network.
Majorly there are three types of network operating systems:
Windows servers:
Windows servers like NT and 2000 are popular operating system. Functions of
directory services to manage the user accounts and information along with their credentials is
key point of attraction in operating system. Operating system supports a wide range of client
1
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

operating system and offer interoperability with Macintosh and Linux variants. The user
authentication process in operating system is effective to guide the user to use the system.
The authentication process uses alternative options to confirm the login as password and
smart cards can be used to logon the system. File and printing services are in built to handle
the network operations. The server is capable to offer the remote resources as native access to
them so that user can work transparently with remote printers and servers (Lister, 2013).
Active directory and security functions in operating systems are effective to work inside a
network.
Unix/Linux servers:
Originally UNIX was created to support the protected multitasking on computers in
which high performance and stability of system is also addressed effectively. Unix/Linux
operating systems can perform heavy tasks without crashing the system, this is because
UNIX processes are handled separately by the operating system. Even if the main application
crashes, there is a way of managing everything. Unless something brings down X Windows
system, the operating system would keep performing. Also, servers managed in Linux or
UNIX systems can run for several years without crashing. The multitasking abilities of these
operating systems are very rapid. This makes UNIX or LINUX a perfect solution for server
systems. High quality software, multiuser capabilities, modular architecture, easy
customization and responsive graphical user interface make the system as effective choice to
use in network. UNIX and LINUX can be deemed as true multiuser systems. Several users
can be logged into the system for long times without affecting performance. From the Apache
server to the Mozilla 1.0 (open source code) everything makes use of the powerful Gimp
graphics manipulation software. The only trick is, UNIX or LINUX may not be compatible
with few software packages that are meant for Macintosh or Windows. UNIX/LINUX works
as a very good network operating system because of the use of TCP/IP as its standard
protocol stack. The protocol is used overwhelmingly by the operating system. The strength of
network to protect the data and resources from hacking attacks is high than other systems.
High interoperability with windows system through SAMBA, strong security implication and
authentication system are remaining major characteristics of system. Another reason behind
the use of UNIX/LINUX as network operating system would be its support for dumb
terminals. You can configure UNIX as a dumb terminal easily. In fact, the idea of traditional
dumb terminals was all about UNIX servers. However, the system has poor popularity in
common users due to difficult structure of applications.
2
authentication process in operating system is effective to guide the user to use the system.
The authentication process uses alternative options to confirm the login as password and
smart cards can be used to logon the system. File and printing services are in built to handle
the network operations. The server is capable to offer the remote resources as native access to
them so that user can work transparently with remote printers and servers (Lister, 2013).
Active directory and security functions in operating systems are effective to work inside a
network.
Unix/Linux servers:
Originally UNIX was created to support the protected multitasking on computers in
which high performance and stability of system is also addressed effectively. Unix/Linux
operating systems can perform heavy tasks without crashing the system, this is because
UNIX processes are handled separately by the operating system. Even if the main application
crashes, there is a way of managing everything. Unless something brings down X Windows
system, the operating system would keep performing. Also, servers managed in Linux or
UNIX systems can run for several years without crashing. The multitasking abilities of these
operating systems are very rapid. This makes UNIX or LINUX a perfect solution for server
systems. High quality software, multiuser capabilities, modular architecture, easy
customization and responsive graphical user interface make the system as effective choice to
use in network. UNIX and LINUX can be deemed as true multiuser systems. Several users
can be logged into the system for long times without affecting performance. From the Apache
server to the Mozilla 1.0 (open source code) everything makes use of the powerful Gimp
graphics manipulation software. The only trick is, UNIX or LINUX may not be compatible
with few software packages that are meant for Macintosh or Windows. UNIX/LINUX works
as a very good network operating system because of the use of TCP/IP as its standard
protocol stack. The protocol is used overwhelmingly by the operating system. The strength of
network to protect the data and resources from hacking attacks is high than other systems.
High interoperability with windows system through SAMBA, strong security implication and
authentication system are remaining major characteristics of system. Another reason behind
the use of UNIX/LINUX as network operating system would be its support for dumb
terminals. You can configure UNIX as a dumb terminal easily. In fact, the idea of traditional
dumb terminals was all about UNIX servers. However, the system has poor popularity in
common users due to difficult structure of applications.
2

Netware
It was the first network operating system to manage the local area network but the
popularity of other operating system has eaten Netware. Latest release of the NetWare also
support the other technologies implemented in enterprise level network. Multiprocessing
power, loadable modules and dynamic PCI configuration are key characteristics of operating
system. Netware is a great pick for network operating systems for its services. If a Netware
client is installed, it can take complete advantage of the NetWare Server. Important services
offered by Netware as a network operating system would be as follows:
1) File Services – Netware File Services works in line with the NDS database. NDS is
responsible for providing single-point login systems for users. This means, users will
see the network resources alike. Based on the client programs, the way you see the
network can differ. For example, you can use Windows to map Netware file servers
and the logical drive. Netware resources are usually shown as logical drives in the
system.
2) Security – Netware offers high levels of security. This includes logon security, trustee
rights and identified directory/file attributes. This means, actions carried out on each
file can be controlled.
3) Printing Services – The operating system features very transparent printing services to
the client computer. Print requests can be redirected to the file server. These requests
are then off handed to the printer. Printer devices can be shared with workstations,
servers or to other networks. Netware print services supports at most 256 printers.
4) Messaging – Netware uses Message handling service to send messages across groups
and individuals. MHS can be installed and configured for complete e-mail
distribution. MHS supports many popular e-mail technologies too.
System supports only the IP based file and printing services in network. Also the client
support and interoperability is poor with latest version of windows, UNIX and mac. RSA
algorithm based public key interface is used as security in network communication
(Rowe.et.al.2015).
Netware is indeed a great operating system for the network. To make various network
protocols run in Netware, the public protocols of IP should be incorporated and replaced with
Netware’s proprietary protocols. If the network is IP based, Netware may not be a good
3
It was the first network operating system to manage the local area network but the
popularity of other operating system has eaten Netware. Latest release of the NetWare also
support the other technologies implemented in enterprise level network. Multiprocessing
power, loadable modules and dynamic PCI configuration are key characteristics of operating
system. Netware is a great pick for network operating systems for its services. If a Netware
client is installed, it can take complete advantage of the NetWare Server. Important services
offered by Netware as a network operating system would be as follows:
1) File Services – Netware File Services works in line with the NDS database. NDS is
responsible for providing single-point login systems for users. This means, users will
see the network resources alike. Based on the client programs, the way you see the
network can differ. For example, you can use Windows to map Netware file servers
and the logical drive. Netware resources are usually shown as logical drives in the
system.
2) Security – Netware offers high levels of security. This includes logon security, trustee
rights and identified directory/file attributes. This means, actions carried out on each
file can be controlled.
3) Printing Services – The operating system features very transparent printing services to
the client computer. Print requests can be redirected to the file server. These requests
are then off handed to the printer. Printer devices can be shared with workstations,
servers or to other networks. Netware print services supports at most 256 printers.
4) Messaging – Netware uses Message handling service to send messages across groups
and individuals. MHS can be installed and configured for complete e-mail
distribution. MHS supports many popular e-mail technologies too.
System supports only the IP based file and printing services in network. Also the client
support and interoperability is poor with latest version of windows, UNIX and mac. RSA
algorithm based public key interface is used as security in network communication
(Rowe.et.al.2015).
Netware is indeed a great operating system for the network. To make various network
protocols run in Netware, the public protocols of IP should be incorporated and replaced with
Netware’s proprietary protocols. If the network is IP based, Netware may not be a good
3

option. This is because the protocol has to be migrated to IPX Netware systems. This is an
expensive move and it requires close administration.
Comparison of current NOS
Parameter Windows UNIX/Linux Mac OS X
Software availability NOS has great support
for software tools as
there are many official
software are available
along with great
collection from
community. However,
the community
software are difficult
to trust for security
reasons.
Limited set of tools
are available but each
tool can be marked as
quality because there
is official channel to
verify the software and
to install them.
Security is high.
However, only few
developers has active
contribution in
software platform due
to limited scopes in
target market.
Most trust worthy set of
tools are available for
operating system as
highly skilled
professionals has
contribution in software.
However, most of
software are licenced and
has prices.
Scalability Each version is
effective to add more
users and devices to
operating system. The
operating system itself
has compact behaviour
due to proprietary
licence and ownership
so that scalability in
term of addition of
function is difficult.
The system has open
end architecture.
Modularised design
helps the developers to
prepare the software
and integration
according to demands.
As results, the
scalability is high in
term of users, devices
and software
integration.
This system also has
limited scalability to add
functions in operating
system but effective to
work with a very high
number of users and
resources in network.
Highly scalable for
network uses
(Sahebjamnia.et.al.2015).
Maintainability High maintenance due
to virus attacks and
vulnerability
possibilities.
Low maintenance due
to robust design. But
regular and stable
updates are required to
be free from bugs.
Low maintenance
requirements.
4
expensive move and it requires close administration.
Comparison of current NOS
Parameter Windows UNIX/Linux Mac OS X
Software availability NOS has great support
for software tools as
there are many official
software are available
along with great
collection from
community. However,
the community
software are difficult
to trust for security
reasons.
Limited set of tools
are available but each
tool can be marked as
quality because there
is official channel to
verify the software and
to install them.
Security is high.
However, only few
developers has active
contribution in
software platform due
to limited scopes in
target market.
Most trust worthy set of
tools are available for
operating system as
highly skilled
professionals has
contribution in software.
However, most of
software are licenced and
has prices.
Scalability Each version is
effective to add more
users and devices to
operating system. The
operating system itself
has compact behaviour
due to proprietary
licence and ownership
so that scalability in
term of addition of
function is difficult.
The system has open
end architecture.
Modularised design
helps the developers to
prepare the software
and integration
according to demands.
As results, the
scalability is high in
term of users, devices
and software
integration.
This system also has
limited scalability to add
functions in operating
system but effective to
work with a very high
number of users and
resources in network.
Highly scalable for
network uses
(Sahebjamnia.et.al.2015).
Maintainability High maintenance due
to virus attacks and
vulnerability
possibilities.
Low maintenance due
to robust design. But
regular and stable
updates are required to
be free from bugs.
Low maintenance
requirements.
4
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

Technical support High from official and
non-official sources
Limited support due to
number of variants.
Limited support due to
premium nature and
usages policies.
Device Availability File locking, provision
of redundant arrays,
client failover methods
and support of fault-
tolerant hardware
configuration are all
provided by Windows
network operating
systems. However,
Windows NT Server
V3.51 does not
guarantee device
availability.
UNIX/LINUX
promises high levels
of device availability.
RAID blends with this
operating system
seamlessly to ensure
performance,
availability and
accuracy.
Just like Windows, MAC
has a defined layout for
device availability. It
ensure quick turnaround
from downtime and also
provides a platform for
RAID and file locking.
User Management Windows provides
several levels of
security and
accessibility. It offers
no access, restricts
users to read only
functionalities and
provides write access
to some. Permissions
for network users can
be changed too.
Windows NOS uses
domain controllers to
manage user accounts
in one or several
systems. It is very
good with centralized
control of network.
UNIX/LINUX
provides multi user
mult session facilities.
It is known for its
remote login services.
This means, many
users can run private
sessions in UNIX. The
user has to log into an
emulated terminal or
character-based
terminal through a
network or serial
connection. TELNET
and RLOGIN
protocols are used to
login over the
network,
MAC is useful in small
or moderately sized
environments. It cannot
be adopted in large
corporate settings where
many users access the
network.
5
non-official sources
Limited support due to
number of variants.
Limited support due to
premium nature and
usages policies.
Device Availability File locking, provision
of redundant arrays,
client failover methods
and support of fault-
tolerant hardware
configuration are all
provided by Windows
network operating
systems. However,
Windows NT Server
V3.51 does not
guarantee device
availability.
UNIX/LINUX
promises high levels
of device availability.
RAID blends with this
operating system
seamlessly to ensure
performance,
availability and
accuracy.
Just like Windows, MAC
has a defined layout for
device availability. It
ensure quick turnaround
from downtime and also
provides a platform for
RAID and file locking.
User Management Windows provides
several levels of
security and
accessibility. It offers
no access, restricts
users to read only
functionalities and
provides write access
to some. Permissions
for network users can
be changed too.
Windows NOS uses
domain controllers to
manage user accounts
in one or several
systems. It is very
good with centralized
control of network.
UNIX/LINUX
provides multi user
mult session facilities.
It is known for its
remote login services.
This means, many
users can run private
sessions in UNIX. The
user has to log into an
emulated terminal or
character-based
terminal through a
network or serial
connection. TELNET
and RLOGIN
protocols are used to
login over the
network,
MAC is useful in small
or moderately sized
environments. It cannot
be adopted in large
corporate settings where
many users access the
network.
5

1.2 Benefits of disaster recovery and NOS security
Disaster recovery means to access the resources and information in network whenever
the primary resources of network connectivity go down or fails due to damage and theft.
Roper strategies for disaster recovery and network security are required to ensure the
availability of information.
In a network, disaster can be anything that puts the entire system and its operations at
risk. This includes equipment failures to cyber attacks to natural disasters. Disaster recovery
aims to keep the business going or at least close to normal operation after a disaster. The
disaster recovery process involves two important stages: planning and testing. And, it may
have separate physical sites for carrying out the recovery operations. Disaster Recovery is
very important because businesses have become less tolerant to downtime and are reliant on
high availability. Also, network downtime can devastate the overall functionality of the
business. Two important elements of recovery and downtime would be recovery time
objective and recovery point objective. In a network setting, disaster recovery plans are
structured procedures. These procedures are designed to respond to unplanned incidents that
threat the network carefully. In most cases, the disaster recovery plan happens in step by step
stages to bring up the disrupted system and reduce the negative impact it has on the company’
overall operations.
Here are few reasons why disaster recovery is important:
1) The financial impact of a lost network or slow internet connectivity can cost the
business millions of dollars.
2) Disaster recovery improves the overall quality of life.
3) During extreme emergencies, loss of contact can be disastrous
4) Business investments should be balanced against many practical considerations and
complexities that prepare for the future. This is where disaster recovery comes into
the picture:
a. Cost – to comprehensive disaster recovery
b. Testability – disaster recovery plans can be technically difficult
c. Overemphasis – without proper provisions, a sophisticated server solution can
become futile
6
Disaster recovery means to access the resources and information in network whenever
the primary resources of network connectivity go down or fails due to damage and theft.
Roper strategies for disaster recovery and network security are required to ensure the
availability of information.
In a network, disaster can be anything that puts the entire system and its operations at
risk. This includes equipment failures to cyber attacks to natural disasters. Disaster recovery
aims to keep the business going or at least close to normal operation after a disaster. The
disaster recovery process involves two important stages: planning and testing. And, it may
have separate physical sites for carrying out the recovery operations. Disaster Recovery is
very important because businesses have become less tolerant to downtime and are reliant on
high availability. Also, network downtime can devastate the overall functionality of the
business. Two important elements of recovery and downtime would be recovery time
objective and recovery point objective. In a network setting, disaster recovery plans are
structured procedures. These procedures are designed to respond to unplanned incidents that
threat the network carefully. In most cases, the disaster recovery plan happens in step by step
stages to bring up the disrupted system and reduce the negative impact it has on the company’
overall operations.
Here are few reasons why disaster recovery is important:
1) The financial impact of a lost network or slow internet connectivity can cost the
business millions of dollars.
2) Disaster recovery improves the overall quality of life.
3) During extreme emergencies, loss of contact can be disastrous
4) Business investments should be balanced against many practical considerations and
complexities that prepare for the future. This is where disaster recovery comes into
the picture:
a. Cost – to comprehensive disaster recovery
b. Testability – disaster recovery plans can be technically difficult
c. Overemphasis – without proper provisions, a sophisticated server solution can
become futile
6

When disaster recovery happens is also important. The best way to handle disaster recovery
is through prevention and planning. The plan has to happen at an earlier stage. It involves the
following aspects:
1) Detect all possible disaster effects
2) Notify affected parties
3) Isolate affected systems
4) Repair the critically affected systems
Effective disaster recovery helps the organization to retrieve the information even when the
connection to server get failure as information can be saved to local backup devices or RAID
storages. Major advantage is in the form of data availability as resources can be renewed but
data collection and availability may affect the business operations. There may be certain
options to back up the data as secondary hard disk, optical drives, magnetic taps can be used
to generate copy of information but the most effective is RAID (redundant array of
inexpensive disks). RAID can be used in six standard levels in which RAID devices may be
organized in different manner to enhance the performance and data storage capabilities. It
offers high availability and security in NOS for the information so that disaster recovery can
be perform effectively (Marshalland Schrank, 2014).
Basics of RAID
RAID is the short-form for Redundant Array of Independent Disks. This is a way of
combining several small disks to form a large storage structure. The disks are also known as
array members. RAID disks are grouped together in several RAID levels. Each RAID level is
characterised by its Fault tolerance, Performance and Capacity. In a network, RAID
organization depends on two important factors. The aspects are clearly distinguished by the
following:
1) Organization of data in the array. Three important RAID storage techniques would be
as follows: Parity (a storage technique that uses checksum methods and striping),
Striping (breaking a flow of data in certain block sizes) and Mirroring (a method of
copying data in storage).
2) Installation of RAID hardware and software
There are several RAID levels. This includes the following:
7
is through prevention and planning. The plan has to happen at an earlier stage. It involves the
following aspects:
1) Detect all possible disaster effects
2) Notify affected parties
3) Isolate affected systems
4) Repair the critically affected systems
Effective disaster recovery helps the organization to retrieve the information even when the
connection to server get failure as information can be saved to local backup devices or RAID
storages. Major advantage is in the form of data availability as resources can be renewed but
data collection and availability may affect the business operations. There may be certain
options to back up the data as secondary hard disk, optical drives, magnetic taps can be used
to generate copy of information but the most effective is RAID (redundant array of
inexpensive disks). RAID can be used in six standard levels in which RAID devices may be
organized in different manner to enhance the performance and data storage capabilities. It
offers high availability and security in NOS for the information so that disaster recovery can
be perform effectively (Marshalland Schrank, 2014).
Basics of RAID
RAID is the short-form for Redundant Array of Independent Disks. This is a way of
combining several small disks to form a large storage structure. The disks are also known as
array members. RAID disks are grouped together in several RAID levels. Each RAID level is
characterised by its Fault tolerance, Performance and Capacity. In a network, RAID
organization depends on two important factors. The aspects are clearly distinguished by the
following:
1) Organization of data in the array. Three important RAID storage techniques would be
as follows: Parity (a storage technique that uses checksum methods and striping),
Striping (breaking a flow of data in certain block sizes) and Mirroring (a method of
copying data in storage).
2) Installation of RAID hardware and software
There are several RAID levels. This includes the following:
7
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

1) RAID 0 – this is based on stripping. It does not provide complete fault tolerance.
However, write and read speeds are improved, thus improving performance.
2) RAID 1 – this is based on mirroring techniques. It provides fault tolerance and
improves read speed only in certain cases.
3) RAID 0+1 – this is a blend of mirroring and stripping techniques. It has both fault
tolerance and performance.
4) RAID 1E – this is a blend of mirroring and stripping techniques. Has the ability to
survive the familiar of several non-adjacent disks.
5) RAID 5 – Uses striping and parity techniques. This allows better performance and it
survives the loss of a single disk.
6) RAID 6 – this is quite similar to RAID 5, however it has two different parity
functions. Performance of RAID 5 and RAID 6 are similar.
Figure 1: Red level 3
(Source: RAID level 3)
1.3 Comparison of current NOS in use
LO 2
2.1 Planning NOS to implement in scenario
Windows server is selected as the network operating system for company. Following
steps are considered to follow in implementation process:
Installation:
8
However, write and read speeds are improved, thus improving performance.
2) RAID 1 – this is based on mirroring techniques. It provides fault tolerance and
improves read speed only in certain cases.
3) RAID 0+1 – this is a blend of mirroring and stripping techniques. It has both fault
tolerance and performance.
4) RAID 1E – this is a blend of mirroring and stripping techniques. Has the ability to
survive the familiar of several non-adjacent disks.
5) RAID 5 – Uses striping and parity techniques. This allows better performance and it
survives the loss of a single disk.
6) RAID 6 – this is quite similar to RAID 5, however it has two different parity
functions. Performance of RAID 5 and RAID 6 are similar.
Figure 1: Red level 3
(Source: RAID level 3)
1.3 Comparison of current NOS in use
LO 2
2.1 Planning NOS to implement in scenario
Windows server is selected as the network operating system for company. Following
steps are considered to follow in implementation process:
Installation:
8

Windows system needs to have powerful processor with or above 2.2 GHz along with
4 GB of RAM. Computer hardware must need to have storage about 50 GB of space for
installation and user files in hard disk (Finn.et.al.2013).
Addressing:
Company can use Class C IP addresses between the range 192.168.168.0 and
192.168.168.24 as servers can be addressed with main address like 192.168.168.0 for web
server, 192.168.168.1 for mail server and so on. Workstations and printers in network can be
addressed with subnet IP addresses as it helps to make use of domain of IP addresses to
connect with more devices than the actual addresses. Devices under the web server as
workstations can be assigned with addresses from 192.168.169.0
Security:
Password policy is prepared to have password length of at least eight character long
and the combination of alphanumerical characters. Security is ensured with complicated
passwords. Security patches are bugs those can help the attackers to hack the data are closed.
Simulation:
Cisco packet tracer and simulation program is used to simulate the network structure.
Figure 2: network simulation through cisco program
2.1.2 Disaster recovery Strategy
RAID system is used with RAID 3 to ensure the data recovery in case of failure and damage
(Maekawa.et.al.2012).
9
4 GB of RAM. Computer hardware must need to have storage about 50 GB of space for
installation and user files in hard disk (Finn.et.al.2013).
Addressing:
Company can use Class C IP addresses between the range 192.168.168.0 and
192.168.168.24 as servers can be addressed with main address like 192.168.168.0 for web
server, 192.168.168.1 for mail server and so on. Workstations and printers in network can be
addressed with subnet IP addresses as it helps to make use of domain of IP addresses to
connect with more devices than the actual addresses. Devices under the web server as
workstations can be assigned with addresses from 192.168.169.0
Security:
Password policy is prepared to have password length of at least eight character long
and the combination of alphanumerical characters. Security is ensured with complicated
passwords. Security patches are bugs those can help the attackers to hack the data are closed.
Simulation:
Cisco packet tracer and simulation program is used to simulate the network structure.
Figure 2: network simulation through cisco program
2.1.2 Disaster recovery Strategy
RAID system is used with RAID 3 to ensure the data recovery in case of failure and damage
(Maekawa.et.al.2012).
9

2.2 Evaluate the plan and user feedback
Choosing a network operating system involves many factors. In this environment, the
network operating system should support 79 workstations along with 4 printers. It must have
security and sound functionality. Also, basic items like disk space, processors and memory
has to be present. Peripheral devices like removable storage, sound cards, scanners and NICs
should be covered too. Since, the network is ought to be implemented in an organizational
level, technical support should be available and is a determining factor. Always, the total cost
of ownership has to be considered, which includes the cost to obtain, install and support the
network operating system. Another factor that influences the choice of choosing an operating
system would be availability.
Operating systems under consideration are:
1) Windows 2012
2) UNIX Based – Sun Solaris, Hewlett Packard HPUX, IBM AIX
3) Linux Based
4) Macintosh OS X
5) Non-UNIX proprietary – z/OS, IBM OS/400
The chosen operating system requires certain hardware resources. Resources mentioned by
the manufacturer would be as follows:
1) RAM
2) Hard Disk capacity
3) Processor speed and type
4) Video resolution
Manufacturers give details of the minimum and optical hardware resources. Performance of
the network is strongly affected by this hardware configuration. In a network environment,
recommended configuration has to be provided. To take complete advantage of the operating
system’s features, additional resources like modems, speakers, NICs, sound cards and
microphones should be installed. Peripherals and system components are mere mechanical
and electronic components that require special programs to keep running. In this network,
there are 4 printers; this means a proper word processing or similar application is required to
send the print task and accomplish it.
Plan for the operating system is effective in term of hardware selection, memory and
security. There are approximately for 4 printers along with 79 workstations so that server
operating system and machine must need to be powerful to handle the load and requests in
effective time. Powerful processing capability of machines can be used with functions of
10
Choosing a network operating system involves many factors. In this environment, the
network operating system should support 79 workstations along with 4 printers. It must have
security and sound functionality. Also, basic items like disk space, processors and memory
has to be present. Peripheral devices like removable storage, sound cards, scanners and NICs
should be covered too. Since, the network is ought to be implemented in an organizational
level, technical support should be available and is a determining factor. Always, the total cost
of ownership has to be considered, which includes the cost to obtain, install and support the
network operating system. Another factor that influences the choice of choosing an operating
system would be availability.
Operating systems under consideration are:
1) Windows 2012
2) UNIX Based – Sun Solaris, Hewlett Packard HPUX, IBM AIX
3) Linux Based
4) Macintosh OS X
5) Non-UNIX proprietary – z/OS, IBM OS/400
The chosen operating system requires certain hardware resources. Resources mentioned by
the manufacturer would be as follows:
1) RAM
2) Hard Disk capacity
3) Processor speed and type
4) Video resolution
Manufacturers give details of the minimum and optical hardware resources. Performance of
the network is strongly affected by this hardware configuration. In a network environment,
recommended configuration has to be provided. To take complete advantage of the operating
system’s features, additional resources like modems, speakers, NICs, sound cards and
microphones should be installed. Peripherals and system components are mere mechanical
and electronic components that require special programs to keep running. In this network,
there are 4 printers; this means a proper word processing or similar application is required to
send the print task and accomplish it.
Plan for the operating system is effective in term of hardware selection, memory and
security. There are approximately for 4 printers along with 79 workstations so that server
operating system and machine must need to be powerful to handle the load and requests in
effective time. Powerful processing capability of machines can be used with functions of
10
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

operating system to manage the resources and users. Memory is established according to
demands so that most of user files can be stored locally to provide the quick access to
information. Memory is fast and parallel to process so that disaster recovery is also possible.
Proper backup schedule is used to encourage the data availability and business continuity.
Various network components like servers, workstations and printers are used to meet the user
requirements.
Servers are safeguarded with authentication process and secure interoperability
functions. Servers are also kept in isolation so that each department in company can access
only the files in specific folder with proper permissions and rights (Dukes.et.al.2013). User
accounts and details are managed in active directory to offer the access from any terminal in
network. However the user feedback are also collected about the performance issues and risk
with third party software. User’ opinion about the risk with unknown applications and files
are considerable as information may be lost or corrupted through attacks. Feedback is also
collected about the performance as server operating system got hanged during parallel
processing of request and stops to respond for a while. However, the increase in processing
power and random access memory can solve the performance issues.
Windows operating system is an ideal choice to satisfy all these requirements. It is
quite easier and faster to do operations in a Windows network operating system. The GUI
installed is very great. For example, you can set a VPN in few minutes and get it working.
The operating system is aware of all other modules, this means you can install and remove
modules without hurting the entire system. Configuring the windows server is very easy too.
Setting up an open VPN in linux is very difficult. However, Windows server is aware of it all.
From routing to NAT to firewalls, all necessary rules are created by the NOS. A very good
reason to choose and plan for Windows NOS would be security. This is very important as
you can configure the way people access and use the operating system. Active Directories in
Windows NOS is a carefully framed feature that helps in handling all users attached to the
system. Users can be broken to organizations, sites and groups. The group policy object gives
administrators lots of power. Using the GPO, you can control the way software gets installed
and used by clients. The server offers Dynamic Access Control that helps professionals
develop centralized security models. These models govern the way network resources are
accessed. Such models are extremely useful in handling sensitive data, both automatically
and manually. Claim based access controls can be initiated very easily in Windows NOS.
11
demands so that most of user files can be stored locally to provide the quick access to
information. Memory is fast and parallel to process so that disaster recovery is also possible.
Proper backup schedule is used to encourage the data availability and business continuity.
Various network components like servers, workstations and printers are used to meet the user
requirements.
Servers are safeguarded with authentication process and secure interoperability
functions. Servers are also kept in isolation so that each department in company can access
only the files in specific folder with proper permissions and rights (Dukes.et.al.2013). User
accounts and details are managed in active directory to offer the access from any terminal in
network. However the user feedback are also collected about the performance issues and risk
with third party software. User’ opinion about the risk with unknown applications and files
are considerable as information may be lost or corrupted through attacks. Feedback is also
collected about the performance as server operating system got hanged during parallel
processing of request and stops to respond for a while. However, the increase in processing
power and random access memory can solve the performance issues.
Windows operating system is an ideal choice to satisfy all these requirements. It is
quite easier and faster to do operations in a Windows network operating system. The GUI
installed is very great. For example, you can set a VPN in few minutes and get it working.
The operating system is aware of all other modules, this means you can install and remove
modules without hurting the entire system. Configuring the windows server is very easy too.
Setting up an open VPN in linux is very difficult. However, Windows server is aware of it all.
From routing to NAT to firewalls, all necessary rules are created by the NOS. A very good
reason to choose and plan for Windows NOS would be security. This is very important as
you can configure the way people access and use the operating system. Active Directories in
Windows NOS is a carefully framed feature that helps in handling all users attached to the
system. Users can be broken to organizations, sites and groups. The group policy object gives
administrators lots of power. Using the GPO, you can control the way software gets installed
and used by clients. The server offers Dynamic Access Control that helps professionals
develop centralized security models. These models govern the way network resources are
accessed. Such models are extremely useful in handling sensitive data, both automatically
and manually. Claim based access controls can be initiated very easily in Windows NOS.
11

In any organization, the storage space plays a critical role. It is inevitable to think about NOS
without storage space. There are so many reliability and security concerns to be considered.
Efficient network operating systems provide tonnes of storage methods. These storage
methods will optimize the way you handle centralized management, resources and achieve
scalability. SANs and NAS become easy to configure and cheap with the right NOS. One of
the biggest feature in new network operating systems would be storage space. This feature
will let you use inexpensive and efficient hard drives. It will give you the freedom to create
storage pools too.
LO 3
3.1 Implementation of a NOS service
Windows 7 is selected as the operating system to be installed in workstations and windows
server 2008 is recommenced in servers. However the installation process for both of the
operating system is same and easy.
Pre-installation and Pre-upgrade tasks
To install Windows Server 2012, the environment has to be prepared. To prepare for the
operating system installation from the Microsoft media, the following tasks should be
completed:
1) A server from the recommended system platforms should be used.
2) The following should be confirmed:
a. The server should have a DVD drive
b. The server’s license keys must be valid
3) Additional storage options and instructions should be verified
4) Additional NICs must be selected
5) The server has to be configured and has to be up-to-date
If the organization uses Proliant Gen8 Servers from HP, the following procedure would work
well. Intelligent Provisioning in HP Proliant Gen8 Servers will make sure your server has up
to date software, firmware and drivers. Before the NOS is installed, the server should have
the latest intelligent provisioning firmware. A simple way to install Windows Server 2012
would be as follows:
1) Boot the server (can be done by pressing F10). To check HP IP version, the system
information in Intelligent Provisioning Screen can be used.
12
without storage space. There are so many reliability and security concerns to be considered.
Efficient network operating systems provide tonnes of storage methods. These storage
methods will optimize the way you handle centralized management, resources and achieve
scalability. SANs and NAS become easy to configure and cheap with the right NOS. One of
the biggest feature in new network operating systems would be storage space. This feature
will let you use inexpensive and efficient hard drives. It will give you the freedom to create
storage pools too.
LO 3
3.1 Implementation of a NOS service
Windows 7 is selected as the operating system to be installed in workstations and windows
server 2008 is recommenced in servers. However the installation process for both of the
operating system is same and easy.
Pre-installation and Pre-upgrade tasks
To install Windows Server 2012, the environment has to be prepared. To prepare for the
operating system installation from the Microsoft media, the following tasks should be
completed:
1) A server from the recommended system platforms should be used.
2) The following should be confirmed:
a. The server should have a DVD drive
b. The server’s license keys must be valid
3) Additional storage options and instructions should be verified
4) Additional NICs must be selected
5) The server has to be configured and has to be up-to-date
If the organization uses Proliant Gen8 Servers from HP, the following procedure would work
well. Intelligent Provisioning in HP Proliant Gen8 Servers will make sure your server has up
to date software, firmware and drivers. Before the NOS is installed, the server should have
the latest intelligent provisioning firmware. A simple way to install Windows Server 2012
would be as follows:
1) Boot the server (can be done by pressing F10). To check HP IP version, the system
information in Intelligent Provisioning Screen can be used.
12

2) Select configure and install
3) Configure the server’s hardware settings
4) Select the operating system you wish to install. Windows server 2012 R2 can be
installed in four different modes. For this environment, the GUI mode of Windows
Server 2012 R2 should be chosen. Else, the type of installation can be default, manual
or custom.
5) Follow the on screen instructions to complete the process.
Microsoft strongly recommends users to perform the following actions before installing
Windows Server 2012 R2:
1) The UPS has to be disconnected. This includes other peripherals like printers, external
hard disks and so on.
2) Existing data should be backed up. This includes details of network infrastructure
servers like the DHCP servers. The backup should have details of system partitions
and boot information too.
3) Antivirus programs can interfere with the installation of NOS. Antivirus programs
should be disabled. The firewall setting has to be set on by default.
4) The windows memory diagnostic tools should be run to test the system’s RAM.
5) The Active directory environment for Windows Server 2012 R2 should be prepared.
You can prepare the forest by running adprep.exe.
Installation:
1. Insert windows 2008 server installation media in disk drive and configure bios to select
disk drive as first boot media.
2. Save the changes by pressing F10 and reboot the system.
13
3) Configure the server’s hardware settings
4) Select the operating system you wish to install. Windows server 2012 R2 can be
installed in four different modes. For this environment, the GUI mode of Windows
Server 2012 R2 should be chosen. Else, the type of installation can be default, manual
or custom.
5) Follow the on screen instructions to complete the process.
Microsoft strongly recommends users to perform the following actions before installing
Windows Server 2012 R2:
1) The UPS has to be disconnected. This includes other peripherals like printers, external
hard disks and so on.
2) Existing data should be backed up. This includes details of network infrastructure
servers like the DHCP servers. The backup should have details of system partitions
and boot information too.
3) Antivirus programs can interfere with the installation of NOS. Antivirus programs
should be disabled. The firewall setting has to be set on by default.
4) The windows memory diagnostic tools should be run to test the system’s RAM.
5) The Active directory environment for Windows Server 2012 R2 should be prepared.
You can prepare the forest by running adprep.exe.
Installation:
1. Insert windows 2008 server installation media in disk drive and configure bios to select
disk drive as first boot media.
2. Save the changes by pressing F10 and reboot the system.
13
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

3. Select your language to install and proceed with next button.
3. Enter your product key and select windows server edition. Select standard edition for
graphical interface and administrative tools (Stanek, 2014).
14
3. Enter your product key and select windows server edition. Select standard edition for
graphical interface and administrative tools (Stanek, 2014).
14

4. Accept the agreements and policies. Choose custom to install a fresh version.
5. Select tour drive or partition to install operating system.
15
5. Select tour drive or partition to install operating system.
15

6. Now the installation process starts. The system may reboot several times during the
installation process.
7. There is no administrator account in default setting so enter the username administrator
and provide password for account then login.
16
installation process.
7. There is no administrator account in default setting so enter the username administrator
and provide password for account then login.
16
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

8. Installation complete.
Delegation Model
The delegation model has to be prepared to understand how the system is ought to be
managed. The key to a successful delegation model would proper planning. It requires a long
term strategy and a discipline upon which the environment gets managed. Three basic ways
of managing the environment are:
1) Decentralized
2) Centralized – meant for large and medium organizations
3) Shared or delegated – can be used by organizations of different sizes.
Once the delegation model is picked, access has to be delegated. Delegation of access
depends on many factors like the applications installed, installed roles and the server. For
example, roles and applications may have interfaces where access has to be elevated. In other
situations, local built-in groups can be used to provide different levels of access. Built in local
groups in Windows Server 2012 R2 are as follows:
1) Access control and assistance operators – remote authentication of permissions and
attributes for resources
2) Administrators – full control and access to the computer
3) Backup – ability to take backups and restore files based on permissions assigned for
each folder or file
4) Distributed COM Users – start, stop, activate and use DCOM objects
5) Event Log Readers
17
Delegation Model
The delegation model has to be prepared to understand how the system is ought to be
managed. The key to a successful delegation model would proper planning. It requires a long
term strategy and a discipline upon which the environment gets managed. Three basic ways
of managing the environment are:
1) Decentralized
2) Centralized – meant for large and medium organizations
3) Shared or delegated – can be used by organizations of different sizes.
Once the delegation model is picked, access has to be delegated. Delegation of access
depends on many factors like the applications installed, installed roles and the server. For
example, roles and applications may have interfaces where access has to be elevated. In other
situations, local built-in groups can be used to provide different levels of access. Built in local
groups in Windows Server 2012 R2 are as follows:
1) Access control and assistance operators – remote authentication of permissions and
attributes for resources
2) Administrators – full control and access to the computer
3) Backup – ability to take backups and restore files based on permissions assigned for
each folder or file
4) Distributed COM Users – start, stop, activate and use DCOM objects
5) Event Log Readers
17

6) Guests – users are not given access to the system apart from basic applications and the
internet. Temporary profiles are created upon logon.
7) IIS Users – used by IIS web services
8) Network Configuration Operators – ability to change IP and TCP/IP settings
Services
In order to change the user groups to have access on all printers and departmental directory,
use the following steps:
1. Go to control panel, select administrative tools and then select active directory users and
computers.
2. In console select users and navigate to the properties of the user account.
3. Click on ‘member of’ option and then click on group in which user needs to be like
printing group or directory group etc. Make changes permanent by clicking set primary group
button.
4. In this manner, file permission and directory access can be managed.
Naming
In order to assign the name and address to devices in network, organization can use
the DHCP protocol to assign the dynamic IP address to computers. For naming purpose,
18
internet. Temporary profiles are created upon logon.
7) IIS Users – used by IIS web services
8) Network Configuration Operators – ability to change IP and TCP/IP settings
Services
In order to change the user groups to have access on all printers and departmental directory,
use the following steps:
1. Go to control panel, select administrative tools and then select active directory users and
computers.
2. In console select users and navigate to the properties of the user account.
3. Click on ‘member of’ option and then click on group in which user needs to be like
printing group or directory group etc. Make changes permanent by clicking set primary group
button.
4. In this manner, file permission and directory access can be managed.
Naming
In order to assign the name and address to devices in network, organization can use
the DHCP protocol to assign the dynamic IP address to computers. For naming purpose,
18

active directory can be used to delete, rename or change password of user accounts associated
to server.
3.2 Testing of user requirements
NOS implementation has addressed the user requirements as strong password
policies, user account configuration and administrative permissions are managed effectively.
Need of user account setting is enforced with complexity in password along with minimum
requirements of characters and numbers in password. The complexity of password helps the
user to fight against the brute force and assumption based attacks. User account password is
configured to be expired after a regular time period so that user can enhance the security with
newer passwords. Each user is included in printing group so that can access all the printers
available in various offices (Sutcliffe, 2012). Users are created as standard users except the
administrators so that directory access control and user account information can be managed
effectively. All the standard application and resources are shared with users and
administrators are powered to make changes with user permissions and rights. Few new
groups are created to meet the user requirements like departmental users, global directory
users and print system to assist the user in business operations.
3.3 Test results against expected results
Testing process is required to clarify the functions and role of arrangements in
network. Various servers are connected to devices to meet the user requirements. Test results
are given below in comparison of expectations from implementation.
Parameter to test Test result Expected result
User friendly System in computers is user
friend as graphical buttons and
links helps to enhance the
administration and other
business operations.
System must need to be
according to familiarity of users
so that they can accomplish
work in effective manner.
Security Excellent due to password
policies as user needs to change
the older password after a
specific time with strong
password.
Need an option to implement
user account security (Che and
Maag, 2014).
Sharing Groups are created to manage
the sharing of resources
High sharing of printing service
along with dedicated directory
19
to server.
3.2 Testing of user requirements
NOS implementation has addressed the user requirements as strong password
policies, user account configuration and administrative permissions are managed effectively.
Need of user account setting is enforced with complexity in password along with minimum
requirements of characters and numbers in password. The complexity of password helps the
user to fight against the brute force and assumption based attacks. User account password is
configured to be expired after a regular time period so that user can enhance the security with
newer passwords. Each user is included in printing group so that can access all the printers
available in various offices (Sutcliffe, 2012). Users are created as standard users except the
administrators so that directory access control and user account information can be managed
effectively. All the standard application and resources are shared with users and
administrators are powered to make changes with user permissions and rights. Few new
groups are created to meet the user requirements like departmental users, global directory
users and print system to assist the user in business operations.
3.3 Test results against expected results
Testing process is required to clarify the functions and role of arrangements in
network. Various servers are connected to devices to meet the user requirements. Test results
are given below in comparison of expectations from implementation.
Parameter to test Test result Expected result
User friendly System in computers is user
friend as graphical buttons and
links helps to enhance the
administration and other
business operations.
System must need to be
according to familiarity of users
so that they can accomplish
work in effective manner.
Security Excellent due to password
policies as user needs to change
the older password after a
specific time with strong
password.
Need an option to implement
user account security (Che and
Maag, 2014).
Sharing Groups are created to manage
the sharing of resources
High sharing of printing service
along with dedicated directory
19
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

effectively as printer can be
accessed by anyone but
directory is only accessible at
members of group.
to users and group.
Management Easy and effective Easy to accomplish.
Performance Good Excellent
Availability Limited High
In this manner, test results shows that implementation is effective at target users as it
meets most of user requirements. However, the system must need to enhance the security of
user accounts by assigning the roles and time to access in business. Performance and
availability can be enhanced with addition of high power processor along with dedicated
functionality of servers. As mail server and file servers needs to be separated and backup for
availability purpose (Zeng.et.al.2012).
Windows Server 2012 R2 is an efficient platform where 79 client computers and 4
network printers can be installed with file servers, email servers and local DNS. Active
directory structure in this server allows users to perform their tasks promptly. Users can share
devices and access folders they are authorized to. With respect to availability and
confidentiality, this server (2012 R2) proves to be efficient and reliable. Administrators are
given the ability to manage users and control their access. This includes operations like
security, data backup and updates. It is very easy to install updates in Windows Server 2012
R2. These patches get rid of many security related problems. Even as the company expands
its network, Windows Server 2012 R2 can blend well.
LO 4
4.1 Establish and justify the performance baseline
There are number of network monitoring tools available in market in which Microsoft
network monitor, Nagios, Capsa free and GFI languard are most popular software. Microsoft
network monitor can be used to establish the performance baseline as the server must need to
perform certain operations under the defined quality. Following baseline is prepared:
Benchmarking: it is required to define the minimum performance and quality of the server in
comparison of various software and hardware used in network. The comparison between
older and newer set of components is required to test the capabilities of resources. New
20
accessed by anyone but
directory is only accessible at
members of group.
to users and group.
Management Easy and effective Easy to accomplish.
Performance Good Excellent
Availability Limited High
In this manner, test results shows that implementation is effective at target users as it
meets most of user requirements. However, the system must need to enhance the security of
user accounts by assigning the roles and time to access in business. Performance and
availability can be enhanced with addition of high power processor along with dedicated
functionality of servers. As mail server and file servers needs to be separated and backup for
availability purpose (Zeng.et.al.2012).
Windows Server 2012 R2 is an efficient platform where 79 client computers and 4
network printers can be installed with file servers, email servers and local DNS. Active
directory structure in this server allows users to perform their tasks promptly. Users can share
devices and access folders they are authorized to. With respect to availability and
confidentiality, this server (2012 R2) proves to be efficient and reliable. Administrators are
given the ability to manage users and control their access. This includes operations like
security, data backup and updates. It is very easy to install updates in Windows Server 2012
R2. These patches get rid of many security related problems. Even as the company expands
its network, Windows Server 2012 R2 can blend well.
LO 4
4.1 Establish and justify the performance baseline
There are number of network monitoring tools available in market in which Microsoft
network monitor, Nagios, Capsa free and GFI languard are most popular software. Microsoft
network monitor can be used to establish the performance baseline as the server must need to
perform certain operations under the defined quality. Following baseline is prepared:
Benchmarking: it is required to define the minimum performance and quality of the server in
comparison of various software and hardware used in network. The comparison between
older and newer set of components is required to test the capabilities of resources. New
20

software and hardware must be compact in size to enhance the performance (Bonald and
Feuillet, 2013).
Load test: manually the server is loaded with high number of connections and data request so
that the server capability to handle the maximum load can be known. This is required to
prevent the system from going down off services. Bottleneck performance issues can be
covered and identified in network. Incomplete request due to connection issues must need to
be logged for continuous services from broken points.
Stress test: performance baseline is defined with stress test in which the server capabilities are
known to handle the number of request for the same resources. It is required to redirect and
manage the stressful conditions in network to accomplish the user requests. Network must
need to bench process the request or need to respond with adequate message for users.
Contention baseline: server and components in network must need to react in case the server
goes down or specific resources are not available. Baseline is defined as at least thousand
user requests must be accomplished on network servers. Network is prepared to redirect the
request and contention to related devices to reduce the chance of failure (Mei.et.al.2013).
Tools for testing NOS
Web load
Web load is used to test performance and load. It helps in performing stress and load testing
on internet applications. Load gets generated from on-premise machines and the cloud. Key
features of WebLOAD are automatic correlation, recording/playback and JavaScript. The tool
allows heavy user loads and complicated web situations too.
JMeter
This is an open source code that takes care of performance testing. JMeter gets integrated
with test plans easily. Apart from being a load tester, JMeter is a functional testing tool too. It
can be used to create functional test plans. JMeter can be loaded into the network or server
and can be used to check performance and analyze performance in different conditions.
4.2 Monitor NOS performance against baseline
Network operating system is capable to manage the users and user request as
company needs to accomplish the maximum load of 79 users on server. The server and
21
Feuillet, 2013).
Load test: manually the server is loaded with high number of connections and data request so
that the server capability to handle the maximum load can be known. This is required to
prevent the system from going down off services. Bottleneck performance issues can be
covered and identified in network. Incomplete request due to connection issues must need to
be logged for continuous services from broken points.
Stress test: performance baseline is defined with stress test in which the server capabilities are
known to handle the number of request for the same resources. It is required to redirect and
manage the stressful conditions in network to accomplish the user requests. Network must
need to bench process the request or need to respond with adequate message for users.
Contention baseline: server and components in network must need to react in case the server
goes down or specific resources are not available. Baseline is defined as at least thousand
user requests must be accomplished on network servers. Network is prepared to redirect the
request and contention to related devices to reduce the chance of failure (Mei.et.al.2013).
Tools for testing NOS
Web load
Web load is used to test performance and load. It helps in performing stress and load testing
on internet applications. Load gets generated from on-premise machines and the cloud. Key
features of WebLOAD are automatic correlation, recording/playback and JavaScript. The tool
allows heavy user loads and complicated web situations too.
JMeter
This is an open source code that takes care of performance testing. JMeter gets integrated
with test plans easily. Apart from being a load tester, JMeter is a functional testing tool too. It
can be used to create functional test plans. JMeter can be loaded into the network or server
and can be used to check performance and analyze performance in different conditions.
4.2 Monitor NOS performance against baseline
Network operating system is capable to manage the users and user request as
company needs to accomplish the maximum load of 79 users on server. The server and
21

printing resources can bench process the jobs to perform. Load testing indicated that the
servers are capable to perform the user requests within the effective time and there is no
conflict among two operations. Dedicated web server, mail server and file server helps to
reduce the load as request from users get distribution among resources to being complete.
Printers are also four in number so that operating system has low load on per device.Update
to hardware and software are not so effective some time as they only need to have improve
the graphical user interface not the performance. But the new improvementsare also made to
enhance the optimistic use of memory and processing power (Khan.et.al.2013).
In opposite situations, servers are cached at local workstations so that information can
be used locally in folders to make them available whenever the server is online. With limited
number of users in organization, the server and printing services can be stressed as there are
fewer chances of server failures with present number of request and users. However, the
number of user request specific to resource in network may result in the failure of the
resource so that operating system must need to be protected with a fix range of request to
queue. Remaining request must be dropped or redirected to accomplish the work.
4.3 Justify performance optimisation and updates to NOS
Performance of the network is effective to meet the organizational requirements along
with user convenience as security patches in network are covered with update of software and
hardware with stable release. The software bugs and holes are closed with updated
configuration and settings in devices. Computers in network are enforced to use the password
policies in network to secure the computer and data. Password policies are made to safe guard
the systems from unwanted access. Servers are updates to optimise the performance as
network users are distributed dynamically to accomplish the request at various servers.
Performance is also increased with new technology in hardware changes (Chen and Yao,
2013).
Computers and storage devices in network along with communication channels are
reviewed for the vulnerabilities issues as organization needs to safe the communication
private and confidential from unwanted users. Security patches are installed and passwords
are made stronger with new password policy.
Windows Server 2012 R2 provides the following features to ensure security:
1) Access – administrators can manage the way network resources are accessed.
22
servers are capable to perform the user requests within the effective time and there is no
conflict among two operations. Dedicated web server, mail server and file server helps to
reduce the load as request from users get distribution among resources to being complete.
Printers are also four in number so that operating system has low load on per device.Update
to hardware and software are not so effective some time as they only need to have improve
the graphical user interface not the performance. But the new improvementsare also made to
enhance the optimistic use of memory and processing power (Khan.et.al.2013).
In opposite situations, servers are cached at local workstations so that information can
be used locally in folders to make them available whenever the server is online. With limited
number of users in organization, the server and printing services can be stressed as there are
fewer chances of server failures with present number of request and users. However, the
number of user request specific to resource in network may result in the failure of the
resource so that operating system must need to be protected with a fix range of request to
queue. Remaining request must be dropped or redirected to accomplish the work.
4.3 Justify performance optimisation and updates to NOS
Performance of the network is effective to meet the organizational requirements along
with user convenience as security patches in network are covered with update of software and
hardware with stable release. The software bugs and holes are closed with updated
configuration and settings in devices. Computers in network are enforced to use the password
policies in network to secure the computer and data. Password policies are made to safe guard
the systems from unwanted access. Servers are updates to optimise the performance as
network users are distributed dynamically to accomplish the request at various servers.
Performance is also increased with new technology in hardware changes (Chen and Yao,
2013).
Computers and storage devices in network along with communication channels are
reviewed for the vulnerabilities issues as organization needs to safe the communication
private and confidential from unwanted users. Security patches are installed and passwords
are made stronger with new password policy.
Windows Server 2012 R2 provides the following features to ensure security:
1) Access – administrators can manage the way network resources are accessed.
22
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

2) Auditing – administrators have the freedom to take reports of the way network
resources are used
3) Certificate services – active directory certificate services and CA can be managed
4) Computer – overall computer performance and processes can be managed and
analyzed
5) Credentials – user credentials, groups and accounts are managed
6) Cryptography – manages encryption and certificates
7) Files – complete ownership of files can be take with secure delete strategies
8) Security policies – administrators can manage and analyze security policies
9) Security principals – administrators can manage and analyze security principals
10) System security – diagnose, plan and handle overall system security.
CONCLUSION
The report has been discussed the various types of network operating system and
services along with benefits of network security and disaster recovery. Network design and
network operating systems are used to accomplish the requirements of organization. Network
system and operating system is tested and recommended with some improvements. Network
system is monitored for performance baselines and evaluation for optimisation in
performance.
23
resources are used
3) Certificate services – active directory certificate services and CA can be managed
4) Computer – overall computer performance and processes can be managed and
analyzed
5) Credentials – user credentials, groups and accounts are managed
6) Cryptography – manages encryption and certificates
7) Files – complete ownership of files can be take with secure delete strategies
8) Security policies – administrators can manage and analyze security policies
9) Security principals – administrators can manage and analyze security principals
10) System security – diagnose, plan and handle overall system security.
CONCLUSION
The report has been discussed the various types of network operating system and
services along with benefits of network security and disaster recovery. Network design and
network operating systems are used to accomplish the requirements of organization. Network
system and operating system is tested and recommended with some improvements. Network
system is monitored for performance baselines and evaluation for optimisation in
performance.
23

REFERENCES
Books and Journals
Bonald, T. and Feuillet, M., 2013. Network performance analysis. John Wiley & Sons.
Che, X. and Maag, S., 2014. Passive performance testing of network protocols. Computer
Communications, 51, pp.36-47.
Chen, H. and Yao, D.D., 2013. Fundamentals of queueing networks: Performance,
asymptotics, and optimization (Vol. 46). Springer Science & Business Media.
Dukes, L., Yuan, X. and Akowuah, F., 2013, April. A case study on web application security
testing with tools and manual testing. In Southeastcon, 2013 Proceedings of
IEEE (pp. 1-6). IEEE.
Finn, A., Lownds, P., Luescher, M. and Flynn, D., 2013. Windows Server 2012 Hyper-V
Installation and Configuration Guide. John Wiley & Sons.
Khan, R., Khan, S.U., Zaheer, R. and Babar, M.I., 2013. An Efficient Network Monitoring
and Management System. International Journal of Information and Electronics
Engineering, 3(1), p.122.
Kim, H. and Feamster, N., 2013. Improving network management with software defined
networking. IEEE Communications Magazine, 51(2), pp.114-119.
Lister, A., 2013. Fundamentals of operating systems. Springer Science & Business Media.
Maekawa, M., Shimizu, K., Jia, X., Sinha, P., Park, K.S., Ashihara, H. and Utsunomiya, N.,
2012. Operating System. Distributed Environments: Software Paradigms and
Workstations, p.259.
Marshall, M.I. and Schrank, H.L., 2014. Small business disaster recovery: a research
framework. Natural Hazards, 72(2), pp.597-616.
Mei, Y., Liu, L., Pu, X., Sivathanu, S. and Dong, X., 2013. Performance analysis of network
I/O workloads in virtualized data centers. IEEE Transactions on Services
Computing, 6(1), pp.48-63.
24
Books and Journals
Bonald, T. and Feuillet, M., 2013. Network performance analysis. John Wiley & Sons.
Che, X. and Maag, S., 2014. Passive performance testing of network protocols. Computer
Communications, 51, pp.36-47.
Chen, H. and Yao, D.D., 2013. Fundamentals of queueing networks: Performance,
asymptotics, and optimization (Vol. 46). Springer Science & Business Media.
Dukes, L., Yuan, X. and Akowuah, F., 2013, April. A case study on web application security
testing with tools and manual testing. In Southeastcon, 2013 Proceedings of
IEEE (pp. 1-6). IEEE.
Finn, A., Lownds, P., Luescher, M. and Flynn, D., 2013. Windows Server 2012 Hyper-V
Installation and Configuration Guide. John Wiley & Sons.
Khan, R., Khan, S.U., Zaheer, R. and Babar, M.I., 2013. An Efficient Network Monitoring
and Management System. International Journal of Information and Electronics
Engineering, 3(1), p.122.
Kim, H. and Feamster, N., 2013. Improving network management with software defined
networking. IEEE Communications Magazine, 51(2), pp.114-119.
Lister, A., 2013. Fundamentals of operating systems. Springer Science & Business Media.
Maekawa, M., Shimizu, K., Jia, X., Sinha, P., Park, K.S., Ashihara, H. and Utsunomiya, N.,
2012. Operating System. Distributed Environments: Software Paradigms and
Workstations, p.259.
Marshall, M.I. and Schrank, H.L., 2014. Small business disaster recovery: a research
framework. Natural Hazards, 72(2), pp.597-616.
Mei, Y., Liu, L., Pu, X., Sivathanu, S. and Dong, X., 2013. Performance analysis of network
I/O workloads in virtualized data centers. IEEE Transactions on Services
Computing, 6(1), pp.48-63.
24
1 out of 27
Related Documents

Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.