digplanet beta 1: Athena
Share digplanet:

Agriculture

Applied sciences

Arts

Belief

Business

Chronology

Culture

Education

Environment

Geography

Health

History

Humanities

Language

Law

Life

Mathematics

Nature

People

Politics

Science

Society

Technology

Network operating system refers, to software that implements an operating system of some kind that is oriented to computer networking. For example, one that runs on a server and enables the server to manage data, users, groups, security, applications, and other networking functions.[1] The network operating system is designed to allow shared file and printer access among multiple computers in a network, typically a local area network (LAN), a private network or to other networks.


Network operating systems can be embedded in a router or hardware firewall that operates the functions in the network layer (layer 3) of the OSI model.[2]

  • Open Source Network operating system examples:
    • Cumulus Linux distribution, which uses the full TCP/IP stack of Linux.
    • Dell Networking Operating System (DNOS)is the new name for the operating system running on switches from Dell Networking. This will run on top of NetBSD
    • Open Network Operating System (ONOS)
    • VyOS, an open source fork of the Vyatta routing package

Peer-to-Peer[edit]

In a peer-to-peer network operating system users are allowed to share resources and files located on their computers and access shared resources from others. This system is not based with having a file server or centralized management source. A peer-to-peer network sets all connected computers equal; they all share the same abilities to use resources available on the network.[3]

Advantages

  • Ease of setup
  • Less hardware needed, no server needs to be purchased.

Disadvantages

  • No central location for storage.
  • Lack of security that a client/server type offers.

Client/Server[edit]

Network operating systems can be based on a client/server architecture in which a server enables multiple clients to share resources.[1] Client/server network operating systems allow the network to centralize functions and applications in one or more dedicated file servers. The server is the center of the system, allowing access to resources and instituting security. The network operating system provides the mechanism to integrate all the components on a network to allow multiple users to simultaneously share the same resources regardless of physical location.[3][4]

Advantages

  • Centralized servers are more stable.
  • Security is provided through the server.
  • New technology and hardware can be easily integrated into the system.
  • Servers are able to be accessed remotely from different locations and types of systems.

Disadvantages

  • Cost of buying and running a server are high.
  • Dependence on a central location for operation.
  • Requires regular maintenance and updates.

Security Issues Involved in using a Client/Server Network[edit]

In a client/server network security issues may evolve at three different locations: the client, the network, and the server. All three points need to be monitored for unauthorized activity and need to be secured against hackers or eavesdroppers.

'The Client

The client is the end user of the network and needs to be secured the most. The client end usually exposes data through the screen of the computer. Client connections to server should be secured through passwords and upon leaving their workstations clients should make sure that their connection to the server is securely cut off in order to make sure that no hackers or intruders are able to reach the server data. Not only securing the workstations connection to the server is important but also securing the files on the workstation (client) is important as it ensures that no hackers are able to reach the system. Another possibility is that of introducing a virus or running unauthorized software on the client workstation thus threatening the entire information bank at the server (Exforsys Inc., 2007).

The users themselves could also be a security threat if they purposely leave their IDs logged in or use easy IDs and passwords to enable hacking. Users may also be sharing their passwords in order to give the hackers access to confidential data (Wilson, Lin, & Craske, 1999). This can be overcome by giving passwords to each client and regularly asking clients to change their passwords. Also passwords should be checked for guessability and for their strength and uniqueness.

The Network

The network allows transmission of data from the clients to the server. There are several points on the network where a hacker could eavesdrop or steal important packets of information. These packets may contain important confidential data such as passwords or company details. It is important that these networks are secured properly to keep unauthorized professionals away from all the data stored on the server. This can be done by encrypting important data being sent on the network. However, encryption may not be the only possible way of protecting networks as hackers can work their way around encryption. Another method could be conducting security audits regularly and ensuring identification and authorization of individuals at all points along the network. This should discourage potential hackers (Wilson, Lin, & Craske, 1999). Making the entire environment difficult to impersonate also makes sure that the clients are reaching the true files and applications on the server and that the server is providing information to authorized personnel only.

The Server

The server can be secured by placing all the data in a secure, centralized location that is protected through permitting access to authorized personnel only. Virus protection should also be available on server computers as neal vast amounts of data can be infected. Regular upgrades should be provided to the servers as the software and the applications need to be updated. Even the entire body of data on a server could be encrypted in order to make sure that reaching the data would require excessive time and effort (Wilson, Neal, & Craske, 1999).

See also[edit]

References[edit]

  1. ^ a b Dean, Tamara (2009). "Network Operating Systems", Network+ Guide to Networks, 421(483).
  2. ^ Al-Shawakfa, Emad; Evens, Martha (2001). "The Dialoguer: An Interactive Bilingual Interface to a Network Operating System.", Expert Systems Vol. 18 Issue 3, p131, 19p, Retrieved 5/7/2011.
  3. ^ a b Winkelman, Dr. Roy (2009). "Chapter 6: Software", An Educator's Guide to School Networks, 6.
  4. ^ Davis, Ziff (2011). "network operating system", PCmag.comRetrieved 5/7/2011.

External links[edit]


Original courtesy of Wikipedia: http://en.wikipedia.org/wiki/Network_operating_system — Please support Wikipedia.
This page uses Creative Commons Licensed content from Wikipedia. A portion of the proceeds from advertising on Digplanet goes to supporting Wikipedia.
754135 videos foundNext > 

https://youtube.com/devicesupport

Network Operating Systems & Policies

Chapter 2: Configuring a Network Operating System

CIS 347: Chapter 9: Network Operating Systems

This is Dr. Schuessler's presentation on Chapter 9 out of the Tamara Dean text over Network Operating Systems. It is for class CIS 347: Data Communications at Tarleton State University.

Network Operating System

Simple guide in installing windows XP Pro. Prepared by : Norman Carlo Custodio Jhoffree Abram Prado Mary Christine Silao ... ... ... feel free to like or comment-- ciaosu~

Operating Systems 1 - Introduction

Hey if you like what you see join the facebook page: http://www.facebook.com/pages/SMKS/283714331761475 This new series will illustratively explain operating systems. Looking into the different...

Introduction - Network Operating Systems for evolving Networks

The webinar demonstrates what it takes to transition a project to Scrum, some real -- time project experiences rolling out Scrum process enterprise - wide and how to successfully implement...

A10 Networks' Advanced Core Operating System (ACOS)

Discover how A10 Networks ACOS is increasingly the platform of choice for enterprises, service providers, Web giants and government organizations seeking to optimize the performance and security...

CCNA1v5 Capítulo 2 - Configuring a Network Operating System (201413-2)

Elaborado por Diego Guerrero Hernández, Jorge Gaspar Lira.

Introduction to Servers

Follow Eli on the Vlog Channel: https://www.youtube.com/user/EliComputerGuyLive Info Level: Beginner Presenter: Eli the Computer Guy Date Created: March 23, 2010 Length of Class: 52 Minutes...

754135 videos foundNext > 

1828 news items

 
Business Wire (press release)
Tue, 14 Apr 2015 05:56:15 -0700

SANTA CLARA, Calif.--(BUSINESS WIRE)--IP Infusion, Inc., a leading provider of intelligent network software for telecom and data communications services, today unveiled OcNOS™, the first, full-featured network operating system for data center and ...
 
Satellite PR News (press release)
Thu, 16 Apr 2015 05:56:15 -0700

SANTA CLARA, Calif.–(SATPRNEWS.COM)–IP Infusion, Inc., a leading provider of intelligent network software for telecom and data communications services, today announced that its new OcNOS™, the first, full-featured network operating system for data ...

PCC Mobile Broadband

PCC Mobile Broadband
Fri, 17 Apr 2015 06:58:04 -0700

IP Infusion, a leading provider of intelligent network software for telecom and data communications services, this week unveiled OcNOS, a carrier grade network operating system for data center and enterprise networking. The OcNOS which brings the power ...
 
Business Wire (press release)
Wed, 15 Apr 2015 05:56:15 -0700

SANTA CLARA, Calif.--(BUSINESS WIRE)--OcNOS™, IP Infusion's new full-featured network operating system for data center and enterprise networking, was selected as a finalist for Interop Las Vegas' 2015 Best of Interop Awards in the networking category.
 
PR Web (press release)
Tue, 28 Apr 2015 07:37:30 -0700

Penguin Computing, provider of high performance computing, enterprise data center and cloud solutions, today announced that the company will offer the Pica8®, Inc. PicOS operating system as an option on Penguin Computing's Arctica “bright box” top of ...
 
IT Business Net
Tue, 28 Apr 2015 13:26:15 -0700

Penguin Computing, provider of high performance computing, enterprise data center and cloud solutions, today announced that the company will offer the Pica8®, Inc. PicOS operating system as an option on Penguin Computings Arctica bright box top of rack ...

Network World

Network World
Tue, 28 Apr 2015 12:18:45 -0700

The Cumulus Rack Management Platform is based on the company's Cumulus Linux network operating system code base. Out-of-band management switches running Cumulus RMP may be managed by the same Linux toolsets as both servers and ...

Network World

Network World
Thu, 23 Apr 2015 09:36:34 -0700

Dell also added to that partner roster this week with the inclusion of IP Infusion, a developer of network operating system software for enterprises and service providers. IP Infusion's OcNOS includes support for MPLS and VPLS for WAN, VPN and data ...
Loading

Oops, we seem to be having trouble contacting Twitter

Support Wikipedia

A portion of the proceeds from advertising on Digplanet goes to supporting Wikipedia. Please add your support for Wikipedia!

Searchlight Group

Digplanet also receives support from Searchlight Group. Visit Searchlight