Configure network utilities on linux

Assignment Help Management Information Sys
Reference no: EM131594486

Purpose of the assessment

Analyze and compare various server management software such as Windows Server 2008, Unix, and Linux. Configure and troubleshoot server features such as Active directory, forest and accounts.

Assignment Description: The Assignment has two parts:

Part A: Linux and Windows OS commands-

Configure Network Utilities on Linux and Windows environments:

Your tasks are to investigate and document some of the most used TCP/IP connectivity utilities on Linux and Windows Operating Systems. For each of the listed utilities below, you must provide the following information, written in your own words, in your report:

- Command's name in the form it is used (case sensitive) along with purpose of the command (why it is used)
- Syntax
- Usage of at least one option
- One example of the commands used by you (include screenshots that you have captured of using the commands)

The Linux utilities you must investigate and document are:
- ifconfig
- ping

The TCP/IP related utilities that must be investigated for Windows are:
- ipconfig
- nslookup
- arp
- nbtstat

Part B

Purpose of the Part B Assessment:

This unit provides students with in depth knowledge and advanced professional skills to manage and maintain network servers. Students will be able to enquire some of the windows and Linux features and present one of the specific topics. In addition to that the overview of the modern day operating systems is also necessary to keep up with the current trend. This assignment is designed to acquire a theoretical view of the existing features of server operating system such as windows and Linux and compare them.

Submission Guidelines (PART B):

Choose one (1) topic from the list of topics given below. Read articles and technical configuration information about your chosen topic. These articles can be searched online or from a journal. Provide a Report (1500-2000 word-limit) and a PowerPoint presentation about the topic.

Report & Presentation Topics (Choose one):

1. Blackberry Operating System
2. iPhone OS (iOS)
3. Android Operating System
4. Sun Operating System
5. Windows Server Operating System
6. Tizen

The report must be submitted to the Moodle on Week 7 on your lecture day (check moodle submission link for the date/time).

Your report should include the following sections:
- Introduction
- Explanation
- Technical details
- Advantages/disadvantages.
- References (using IEEE reference style)

Your presentation should have at least 10 slides, and you should talk for no more than 4 minutes including answering questions during a one-to-one presentation method. You may suggest a topic that isn't on the list, but it must be approved. Your presentation should include the following:
- A list containing Presentation outline
- Background and related areas.
- A technical overview of the topic
- Improvements about the topic that has been made over years
- References

Preparation instructions: This will be done in your lab class on Week-7

- Do not use WIKIPEDIA as one of the source articles.
- Use IEEE style referencing, and properly reference any diagrams/ graphics making sure that reference sources are cited in the text of the report, and listed appropriately at the end in a reference list using IEEE reference style.
- In all cases, concentrate on the aspects of the topic that concern server-client approach (either from software and hardware aspect or both) or relation to networking
- You may provide cross platform advantage and/or disadvantage of the topic.

Word limit Report Word Limit - (1500 - 2000 words)

Reference no: EM131594486

Questions Cloud

Compute the net profit margin : Company X recorded the following profit figures in 2015-2017. Compute the net profit margin for 2015-2017
What are some of the characteristics of neighborhoods : What are some of the characteristics of neighborhoods that make them susceptible to drug-related offenses. Is there a drug-dealer profile
Ethical issue or the abuse of privacy : 1. What is an example of either an ethical issue or the abuse of privacy?
Describe your listening performance : Describe your listening performance. Explain whether you found yourself being critical when the person really just needed someone to listen.
Configure network utilities on linux : Configure Network Utilities on Linux and Windows environments - professional skills to manage and maintain network servers
Explain the differences between serial mass and spree murder : Explain the differences between serial, mass, and spree murder. Include specific details. Give examples of each
Inherent in the power of information : What are some potential problems and abuses inherent in the power of information?
What constitutes a set of guidelines : What constitutes a set of guidelines that will comprise a code of ethics for information professional?
Identify the true statements about the learning curve theory : Identify the true statements about the learning curve theory.Identify a true statement about an operations consulting process.

Reviews

len1594486

8/8/2017 8:46:35 AM

Conclusion and references used in the Report /4 Logic is clear and easy to follow with strong arguments Consistenc y logical and convincing Mostly consistent logical and convincing Adequate cohesion and conviction Argument is confused and disjointed Presentation /10 All topics are pertinent and covered in depth. Ability to think critically and source material is demonstrated Topics are relevant and soundly analysed. Generally relevant and analysed. Some relevance and briefly presented. This is not relevant to the assignment topic. Reference style /4 Clear styles with excellent source of references. Clear referencing style Generally good referencing style Sometimes clear referencing style Lacks consistency with many errors

len1594486

8/8/2017 8:46:28 AM

Explanation of the Topic /7 Demonstrated excellent ability to think critically and sourced reference material appropriately Demonstra ted excellent ability to think critically but did not source reference Demonstrate d ability to think critically and sourced reference material appropriately Demonstrated ability to think critically and did not source reference material appropriately Did not demonstrate ability to think critically and did not source reference material appropriately material appropriat ely Technical details and Advantages/ Disadvantages /5 Excellent use of creditable sources. Accurate referencing. Obvious that outstanding effort made Extremely good effort Good effort made but not outstanding Made some effort. For example, Web searches only Very little attempt to reference. Lazy effort with inaccuracies

len1594486

8/8/2017 8:46:20 AM

Grade Mark HD 80% and above DI 70% to 79% CR 60% to 69% P 50% to 59% Fail <50% Excellent Very Good Good Satisfactory Unsatisfactor y Win & Linux Commands /5 All the commands are described appropriately Commands are relevant and soundly analysed. Generally relevant and analysed. Some relevance and briefly presented. This is not relevant to the assignment topic. Structure and Introduction /5 All topics are pertinent and covered in depth. Ability to think critically and source material is demonstrated Topics are relevant and soundly analysed. Generally relevant and analysed. Some relevance and briefly presented. This is not relevant to the assignment topic.

len1594486

8/8/2017 8:46:11 AM

Explanation of the topic Detail explanation of the topic. 7 Technical details and advantage/disadvantage of the Topic Discuss the features of the Topic, advantages and disadvantages of the topic in your own words. 5 Conclusion and references used in the Report A conclusion and proper references must be provided in the report 4 Slide Presentation - Use light background and dark foreground. The texts should not contain animation. - Provide a short introduction and the structure of the remaining presentation clearly - Every ins and outs mentioned in the slide should be explained clearly. - The reason of uses and the advantage and disadvantage must be discussed. - A conclusion and proper references must be provided along with the slides 10 Reference style Use IEEE referencing style only 4 Total 40

len1594486

8/8/2017 8:46:04 AM

Marking criteria: Marks are allocated as follows: Section to be included in the report Description of the section Marks PART A – Win & Linux Commands Configure Network Utilities based on Linux and Win 5 PART B – Report Structure and introduction to the Topic Introduction to the Topic, History about the topic 5

len1594486

8/8/2017 8:45:43 AM

Hi, i need a help in this assignment. please let me know if you can.. thanks • All work must be submitted on Moodle by the due date along with a title Page. • The assignment must be in MS Word format, 1.5 spacing, 11-pt Calibri (Body) font and 2.54 cm margins on all four sides of your page with appropriate section headings. • Reference sources must be cited in the text of the report, and listed appropriately at the end in a reference list using IEEE referencing style. • Your submission must be your own work, and will be checked for originality using Turnitin originality checking system.

Write a Review

Management Information Sys Questions & Answers

  What is the companys approach to sustainability

What is the company's approach to outsourcing and/or offshoring? What is the company's approach to sustainability?

  Explain the human implications of advancing audio visual

Explain the human implications of advancing audio visual - Explain how the five models or theories of change could address these human implications

  Describe the different kinds of indexes oracle uses

Describe the different kinds of indexes Oracle uses. Give an example of when you might use each type. Why might it be important to determine the size of an index? What happens to secondary indices when a page split happens in a file organization

  Management and it service providers

Source Selection, Negotiations, and Contract Management and this solution discusses interpersonal factors that come into play in a meeting between management and IT service providers. The elements of the meeting, ways to select the best contractor,..

  Discuss about the cyberbullying

List some examples of cyberbullying that you can think of and do you know any one, or have heard about anyone who has been cyber-bullied.

  Explain the general trend and trends within two subsets

Choose, at least, three areas and explain the general trend and trends within two subsets of the area (i.e., security has subsets of physical, perimeter, monitoring) over the last three years. Use at least one figure from Google Trends showing a ..

  Identify the critical infrastructure sectors

Identify the Critical Infrastructure Sectors. Choose three of the Sectors and discuss why a certain government agency was identified as the lead agency for that sector. Also discuss what other government agencies you believe should have been inc..

  Describe how you would ensure data security

Describe how you would ensure data security

  Advantages and disadvantages to the business

Discuss what decision making is performed and how does the SCM information system contribute to the decision making. Discuss the advantages and disadvantages to the business

  Comape an information systems development project

Compare and contrast an information systems development project in a global setting to one in a single country.

  Components of the software requirements specification

Requirement Specification Technique for the Web Based Student Registration System.

  Created a demand for mobile or cloud computing

What changes in technology have created a demand for mobile or cloud computing within the industry you have chosen

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd