BN206 System Administration

Hello, this question is here because we've worked on this and other similar assignments. If you don't know the answer, you can ask us for help. We guarantee an original paper free from Plagiarism.

Order a Similar Paper Order Different Paper

We got you covered for the whole semester.


This assignment will provide students with advanced skills and knowledge to manage and maintain network server networks.

Students will learn how to use various Operating System features such as Linux and Windows.

They will also be able learn about the different tasks performed daily by the system administrator.

It is important to be able to review the most current operating systems in order to keep up to date with the latest trends.

This assignment is intended to give you an overview of the current features of Server operating systems like Linux and windows, and then compare them.

This assignment tests the students ability to demonstrate their achievements.

a) Learn about various server management systems.

b. Manage emerging tools and methods for system management.



The use of the communications network will see a remarkable increase, even though it is only a few years away.

To optimize and start the operation of this network, it is important to incorporate and adopt a solid management of the network facility.

The definition of network management can vary depending on who is performing the operation.

Any organization should consider the flow of work that the network management system will be used in [1].

The report’s main purpose is to focus on the management of networks, taking into account important aspects such as reliability and security details.

Background and related areas

Over the past decades, network management concepts have advanced greatly.

The vendor and user have complete freedom to choose between the NMS (network management system) or any combination thereof.

This was done according to the need and which system would work best in the specific environment.

However, it is possible to say that it wasn’t so simple. Without a few committed open network advocates vision, the concept would not have been possible. Users would still be stuck with vendor-proprietary networking management system (NMS).

Explanation Of The Subject


Network management can be described as the act of monitoring and initializing the network’s primary functions, as well as modifying them. [2].


These functions are the primary functions of the network and can be linked to functions that support direct user requirements.

They provide direct access to the network for the user and take care of data exchanged during the process.

Globally, it is accepted that managing resources and activities requires planning, organizing and monitoring them.

This is also applicable to the management of a network.

The OSI (or internet network management system) is primarily focused on the concept accounting, monitoring, control and network management.

The model doesn’t include planning and organizing.

Management of business organizations is of little value. The same principle can be applied for networking.

The networks would be useless if they were not properly managed.

It would have been difficult to communicate between machines like switches, computers and private branches because of the differences in their architecture.

Due to technological innovation and complexity, the difficulty would increase. In order to reduce the difficulty of the network design, more components and users are needed.

Internet activity is one of many key elements in the management of networks.

These initial efforts were started by AARPAnet Research Project, which originated in the United States[4].

Security Technical Details

The network management security concept reduces the risk of human error and manual work by simplifying administration via the security policy and workflow tools. It also simplifies the management through a single interface.

The network management security is able to reduce risk and protect data. This is done by using the information about threats, vulnerability, and their criticality. Also, it evaluates the options to block an attack.

A single interface allows policy administration to be simplified. It automates policy changes, and may also include compliance audits.


Software, which controls the switching system and signaling system, can be considered a major source for network vulnerability.

Computer programs are created and designed by humans. Errors can sometimes prove to be extremely dangerous, especially when they affect the network.

Although automated techniques can be used to ensure that the computer program is performing its intended task and free from errors, they are not yet foolproof.

The best solution in this area is to expect fewer errors and their effects through appropriate testing and safeguard [6].

Reduce Costs

Each user desires the best network for the lowest price.

This is best achieved by spreading out the cost of the design to a large number users.

This requires that the design not only be applicable to one user group, but also should be flexible enough to fit the requirements of multiple users.

It should therefore be multipurpose. This directly means that it should be possible use mass production technique.

These implementations will directly lower the overall cost of management of the network [7].

Advantages and disadvantages


Cost Saving: If the network design is appropriate, it would directly reduce the cost of network management.

Speed: How fast the network works depends on how many people are connected to it.

The speed of the network will be accelerated if it is in a well-managed area.

Flexibility: It is possible to have as much flexibility in your home as it can in an organisation.


Errors: The human-oriented process can lead to errors.

Design problem: The network’s overall operation is determined by the design that is created for it.

It could cause a serious problem.

Complexity in detecting faults within a system: This is when you consider network design in large organizations with more than one workstation.

The detection process of an error in the network can be time-consuming and lengthy [8].

Improvement about The Topic

Participation and education of users: Poor performance can be caused by bad user behavior.

People should be more familiar with the system in order to get the most out of it.

Citrix/ thin Client: Webifying enterprise applications may improve user interface consistency, but it will also decrease network performance.

It uses five times as much bandwidth as the channel, which is why it’s not as useful.

Keep junk traffic out of the network: It is best to avoid junk files being flowed into the network.

This would reduce overall network traffic [9].


According to the report, network management plays an important role and will play a significant part in the communication process.

If networking is not properly organized and planned, it will be difficult to apply the necessary effort to accounting, monitoring, controlling, and other aspects.

Refer to

“Payless: Low-cost network monitoring for software defined networks.

Network Operations and Management Symposium, 2014 IEEE.

“Transparent, flexible Network Management for Big Data Processing in Cloud.”

Alejandro and Ashraf Mattrawy.

“Smart wireless sensor network management using software-defined networking.

Communications (QBSC), 2014 27th Biennial Symposium.

Kim, Hyojoon, Nick Feamster.

Software defined networking is a way to improve network management.

IEEE Communications Magazine 51.2 (2013) 114-119

“Management challenges and orchestration in virtualizing network functions.”

IEEE Communications Magazine 54.1 (2016), 98-105.

Josep M. Guerrero and Omid Palizban.

“Microgrids, active network management-part 2: System operation and protection.

Renewable and Sustainable Energy Reviews, 36 (2014): 451-451

Sandstrom and Annica Bodin.

“Network Governance at the top-The case for ecosystem-based marine and coastal management.”

Marine Policy 55 (2015), 57-63.

Seppanen, Janne and Martin Varela are Aggeliki Sgora.

Journal of Visual Communication and Image Representation25.3 (2014) 565-577.

“Connective Management and Governance Network Performance: The Mediating Role of Throughput Legitimacy

Results from survey research regarding complex water projects in the Netherlands.

Environment and Planning C. government and policy 33.4 (2015): 746-64

If you don't know the answer to this question, you can ask us for help. We guarantee an original paper free from Plagiarism.

Order a Similar Paper Order Different Paper

You can trust us with any of your assignments. We got you covered for the whole semester. We dedicate one writer to do all your assignments

Leave a Reply

Your email address will not be published. Required fields are marked *