Comparison Of Different Operating Systems And Network Design For A Business

Selection of Operating System

There are different operating system that can be installed in the hosts for the management of the system software and the hardware resources. The newer version of the Windows are compared for the improvement of the performance of the employees and creating a controlled environment. The selection of the operating system have an impact on the memory management, network performance, etc. The windows operating system are user friendly and it is currently used by 80 to 90 percent users. It provides different functionality and compatible with most of the service and the application (Peter et al. 2016). The windows operating system are vulnerable to virus and spyware that can degrade the performance and requires a lots of memory and processor for running. The Mac OS is used for the Apple computers and it is developed by the Apple and thus there is less risk of software or hardware crashing. It cannot be installed on other computers and there are only few programs that can run on Mac thus it cannot be a choice for its implementation in the current network as a host operating system (Otani et al. 2017). The third choice is the Linux operating system that is available at a free of cost and it can be downloaded or modified for using in the proposed network. The linux comes as a kernel and there are other software that are bundled for meeting the requirement of the user. It needs a good deal of knowledge for the users to operate the linux operating system.

Save Time On Research and Writing
Hire a Pro to Write You a 100% Plagiarism-Free Paper.
Get My Paper

Thus it is recommended that the Windows operating system is the best choice for its deployment because it is easily available and the same configuration of the computer can be used for installing the Linux. For the development of the network a network design is prepared by subnetting the network according to the departments of the organization (Mijumbi et al. 2016). An analysis is made on the available network operating system that should be used for the configuration of the servers and improve the security and manageability of the network. The network operating system is used for the management of the printing service and sharing of database considering the management of the network security and the name directory (Luo et al. 2015). The operating system used by the routers should also be analysed for the selection of the network device and management of the configuration of the router for reducing the complexity of the network.

Mainly Cisco routers are used that used the internetwork operating system (IOS) as its NOS. Different technical support is available from CISCO for the management or troubleshooting problems in the router and the switches used in the network. The use of similar type of network devices for the whole network can reduce the cost of replacement and backup devices can be kept for replacement of a faulty device without affecting the downtime of the network (Perlman, Kaufman and Speciner 2016). The IOS uses the command line interface for the configuration of the device and there are different cisco simulators that can be used for the development of the prototype before implementation in the real life for testing the network. Moreover cisco provides rebuilds and patches for the improvement of the security of the network operating system used in the cisco device (Shin et al. 2014). The release are tested rigorously for fixing the bugs and the routers can be upgraded to the latest version for increasing the security of the network.

Network Design for the Configuration of Servers

It is used by the organization for recovering from any unexpected condition and resume the current operation of the business. For successful recovery of the business it is important to create a disaster plan and handle the emergency event according to the plan for maintaining a continuity in the business. The disaster recovery and the business continuity plan is used together but they are dissimilar with each other. The business continuity describes the ability of the business to continue with the critical function and the different business processes when any disaster occurs in the current business (White, Fisch and Pooch 2017). An alternative design of the network should be created for the development of the disaster recovery plan and it should be audited for the identification of the flaws and achievement of the goals and objectives of the organization. Different metrics are used for the measurement of the environment of disaster recovery and the ability of the network to restore the network to its last working condition (Silberschatz, Galvin and Gagne 2014). The organization can gain different benefits with the implementation of the disaster recovery plan and they are given below:

Reducing the network downtime – the medium sized business organization can face a loss of $82,200 to $256,000 for a downtime of teen hours and the creation of the disaster management plan can reduce the cost and increase the efficiency.

Save Time On Research and Writing
Hire a Pro to Write You a 100% Plagiarism-Free Paper.
Get My Paper

Quick time of recovery and backing up data – If there is an incident of loss of data the client can loss the faith and with the implementation of the backup service the redundancy of the data can be increased and thus no data would be lost.

Containment of cost – A business disaster recovery plan would reduce the risk of loss of money as the downtime of the network can incur extra cost (Prezioso et al. 2015). The cost of management of the network can be curtailed with recording the details of the network equipment’s and creating a recovery zone.

Inventory and management of the network – The list of the device, protocols and the configuration used for configuring the device should be documented such that the functionality can be managed. It also helps in troubleshooting the network and identify the functionality of the network.

Backup servers and cloud storage should be used for the management of the data and the backup server should be connected using a high speed encrypted link such that the data transmitted through the link is not available to any third part agent. The local servers should be used for storing the frequently used data for reducing the waiting time of the user ad increasing the redundancy of the data.

There are different RAID options that are available for the management of the file server and hosting the website of the organization for the management of the information and files. Among the different RAID options, RAID 5 is selected for the configuration of the network attached storage with disk striping and parity (Shin et al. 2014). The striping is used for reconstruction of the data if the current disk fails. It used parity for reliability and redundancy for increasing the efficiency of the network. In the RAID configuration more than drives are working parallel and for the optimization of the situation different levels of RAID are applied. The RAID 0 is used for stripping, RAID 1 is used for mirroring, RAID 5 is used for parity stripping, RAID 6 is applied for double parity and RAID 10 is applied for combination of striping and mirroring.

Selection of Network Operating System

Installation – the servers created with the minimum hardware requirement that is essential for supporting different service and operation. The use of commercial server for base server can be an ideal choice for the organization for providing sufficient support to the users connected in the organization. The operating system used for the server should be compatible with the network device and support virtualization of the server. The minimum memory for the server should be 8 Gb for supporting the virtualization of the server into two virtual machine and manage the loads on the physical server (Ramaswamy et al. 2016). The minimum size of the hard disk should be 1TB and 150 Gb free space should be allocated to the virtual machine. There are different ports available and the ports should be configured for the management of the incoming and the outgoing traffic from the server. The servers should be configured with the firewalls policy and proper addressing plan should be used for the configuration of the interface of the device.

Addressing – A proper subnetting plan should be created for the allocation of the IP address to the interface of the networking device. Here a class A IP address is selected for the management of the internal device and the class A address is selected since it is ideal for large network. The addressing plan should be created according to the number of departments and the users connected in the network (Porras et al. 2015). It helps in reduction of the wastage of the IP address and generation of less broadcast message from the routers for reducing the unnecessary in the network.

Major Network: 10.10.10.0/24

Available IP addresses in major network: 254

Number of IP addresses needed: 122

Available IP addresses in allocated subnets: 144

About 64% of available major network address space is used

About 85% of subnetted network address space is used

Subnet Name

Needed Size

Allocated Size

Address

Mask

Dec Mask

Assignable Range

Broadcast

Router 1 S0/0/0

1

2

10.10.10.152

/30

255.255.255.252

10.10.10.153 – 10.10.10.154

10.10.10.155

Router 1 Fa0/0

1

2

10.10.10.148

/30

255.255.255.252

10.10.10.149 – 10.10.10.150

10.10.10.151

Router 2 S0/0/0

1

2

10.10.10.160

/30

255.255.255.252

10.10.10.161 – 10.10.10.162

10.10.10.163

Router 2 Fa0/0

1

2

10.10.10.156

/30

255.255.255.252

10.10.10.157 – 10.10.10.158

10.10.10.159

User group1

30

30

10.10.10.64

/27

255.255.255.224

10.10.10.65 – 10.10.10.94

10.10.10.95

User group2

30

30

10.10.10.96

/27

255.255.255.224

10.10.10.97 – 10.10.10.126

10.10.10.127

Printer group 1

3

6

10.10.10.128

/29

255.255.255.248

10.10.10.129 – 10.10.10.134

10.10.10.135

Printer group 2

3

6

10.10.10.136

/29

255.255.255.248

10.10.10.137 – 10.10.10.142

10.10.10.143

Server

2

2

10.10.10.144

/30

255.255.255.252

10.10.10.145 – 10.10.10.146

10.10.10.147

Wireless access point

50

62

10.10.10.0

/26

255.255.255.192

10.10.10.1 – 10.10.10.62

10.10.10.63

Security – For increasing the security of the network the unused ports of the network device should be disabled. The unknown user should not have the access of the internal network and the servers should be configured with password policy such that the user is authenticated for accessing the internal servers. A disaster recovery plan should be created for the management of the errors and the emergency condition and secure the network from data loss (Perlman, Kaufman and Speciner 2016). For increasing the security of the network monitoring tool should be used that would record the flow of data traffic in the network and can be used as an evidence if any illegal attempt is made for accessing the secure information of the organization. For increasing the security the routers should be configured with access control list and applied to the interface of the router (Mijumbi et al. 2016). The inbound and outbound rules should be created for blocking the unknown users to connect with the internal server network and maintain the security of the organizational network. 

Simulation – A prototype of the network is created in cisco packet tracer 7.1 with all the available network device and components for the development of the network framework. The selection of the hardware and connecting the device with each other is important for successfully deploy the network (White, Fisch and Pooch 2017). The routers should be configured with the appropriate protocol for meeting the needs of the organization.

  • Selection of the hardware –The hardware is selected based on the requirement of the medium sized organization and it can handle the request of the user connected in the network efficiently. For the selection of the hardware it is kept in mind that the  
  • Network components –There are different network components that are required for the management of the communication between the devices such as switches, routers, network interface cards, wireless access points, etc. The information should be shared with the users using different medium and different resources should be used for the management of the local and the network operating system.

Importance of Disaster Recovery and Business Continuity Plan

For the implementation of the network operating system a study is made on the mechanism and the differences across the different systems for sharing of the resources within the users connected in the network. The execution of the jobs and the data handling should be managed with the implementation of the network operating system (De Nooy, Mrvar and Batagelj 2018). The data support should be used for the manipulation of the files and manage the wide area network directory by limiting the access of the network and maintaining the security of the network.

Installation – For the installation of the network operating system the network should be designed with different procedures and processes and the existing hosts should be listed that should be provided different services. The network operating system should be attached with the hosts connected in the network and it should be used as a dedicated host (Freeman 2015). For the installation of the network operating system the hardware specification of the server should be analysed and it should be configured for supporting the needs of the organization. The servers should have the ability of virtualization for handling the emergency condition and the active directory of the server should be configured for the users using the system.

Services – There are different services such as management of the directory which is important for the management of the different network components and eliminating the current problems of the organization. The network administrator is responsible for maintaining the directory separately for the management of the logins and sharing of files with the different users connected in the network (Berde et al. 2014). For the network designed for the medium sized organization Windows servers is used as the network operating system and active directory is configured for providing different permission to the users to access the resources of the network. The simplicity of the network can be maintained with the configuration of the active directory and it can also be used for the management of the large network.

Naming – For the configuration of the internal domain network the DNS name and resolution should be configured such that there is no conflict with the initial configuration. A single namespace should be used for the creation of the DNS zone and it can create a mismatch with thee security zones. The use of the namespace can reduce the complexity of the network administrator for the management of the network components. The domain can different from each other and the naming convention helps in reducing the complexity for the management of the dynamic environment (Esser et al. 2015). The naming convention should be selected based on the parsability and minimum character for management of the informational components. The name should be consistent and used for achievement of the certain level of logic and deal with the computer name intuitively.  

The security policy is the key factor of the success of the network framework and it should be created with setting the types of domains and management of the enforcement process for controlling the allowable transaction in the network. The transaction should contain the set of rules for the management of the roles and responsibility of the users and support the changes in the login session. The configuration off the network policy can restrict the unknown user to connect with the resources of the organization without appropriate permission.

Benefits of Disaster Recovery Plan

Security – The raw access of the data is restricted with the enforcement of the security policy and it contains the different kernel devices, disk devices and separate domains should be used for accessing the different types of components. The integrity of the data and service with the system is important for defining the access of the control and separating the domain access for the management of the potential damage (Hong et al. 2015). The malicious codes should be prevented to be executed in the server and login program should be managed and the login session should be used for the authentication of the user. For increasing the security of the system the routers should be configured with access control list for the management of the access of the network resources and secure the network from external threats.

Network Simulation – For the development of the network a prototype of the network is configured in cisco packet tracer and different protocols are used for the configuration of the network device and supporting the communication between the users connected in the network.  

Documentation – The network configuration should be documented for troubleshooting the network. A checklist should be created containing all the security audits and administering the network configuration for the installation of the network operating system (Jiang et al. 2016). For the development of the system the network should be documented and it helps the network administrator for troubleshooting the errors in the network.

For the management of the network operating system different tools should be selected for the analysis of the network traffic and monitoring the flow of data. The performance metrics and the industry standards should be followed for the management of the third party sources. The retention of the raw data is essential for increasing the security of the network and a baseline should be created for the network for the management of the logs and unstructured data (Liang and Yu 2015). An alert should be created for the exceeding the threshold limits and specification of the upper and the lower range for the management of the performance of the network. Real time monitoring is important for the diagnosis of the network and creating a performance baseline report based on the network (Gu et al. 2017). The monitoring of the network also helps in identification of the flaws in the configuration of the other network device and use appropriate protocol for the development of the secure network framework. The PRGT tool can be used for the creation of the network topology map and configuring the network with security alerts with the ability for troubleshooting the errors and management of the service.

The network operating system should be selected based on the evaluation of the system security controls and management of the issues associated with the access of the operating system. The availability of the data and the request should be based on the auditing of the information system. The standards followed by the operating system should be analysed before selecting the best operating system. The services that should be provided to the users connected in the network should be identified and the operating system should be selected according to the service for increasing the efficiency of the network and reducing the complexity of the management of the network (Lara, Kolasani and Ramamurthy 2014). The operating system selected should give the network to implement a control on the network and eliminating the risk such that there is control on reliance and no data is lost. The network operating system should act as the first layer for the security of the network and it should be used for the identification, authorization and authentication of the access of the resources for the users with the implementation of security controls, permissions and management of the access of the resources to the different levels of users. The users are mapped using different credentials for centralizing the network system and maintaining the ownership of the files and information residing in the database of the information system (Martins et al. 2014). For the measurement of the performance of the network operating system the risk associated with the system should be identified and capability of the hardware for running the network operating system. The compatibility issues of the operating system and the performance of the network is essential for analysing the performance and aligning it with the needs of the network. The performance and delay caused by the misconfiguration of the network operating system can impact on the network and increase delay and jitter in the network (Lord and Washington 2018). The loss of the data packets in the network can impact the performance of the network and a research is made on the available network operating system for the selection of the best in terms of performance and complexity in the configuration of the operating system for utilization of the resources and management of the traffic from a single point.  

Backup Servers and Cloud Storage

References

Berde, P., Gerola, M., Hart, J., Higuchi, Y., Kobayashi, M., Koide, T., Lantz, B., O’Connor, B., Radoslavov, P., Snow, W. and Parulkar, G., 2014, August. ONOS: towards an open, distributed SDN OS. In Proceedings of the third workshop on Hot topics in software defined networking (pp. 1-6). ACM.

De Nooy, W., Mrvar, A. and Batagelj, V., 2018. Exploratory social network analysis with Pajek. Cambridge University Press.

Esser, S.K., Appuswamy, R., Merolla, P., Arthur, J.V. and Modha, D.S., 2015. Backpropagation for energy-efficient neuromorphic computing. In Advances in Neural Information Processing Systems (pp. 1117-1125).

Freeman, R.L., 2015. Telecommunication system engineering(Vol. 82). John Wiley & Sons.

Gu, W., Wang, J., Lu, S., Luo, Z. and Wu, C., 2017. Optimal operation for integrated energy system considering thermal inertia of district heating network and buildings. Applied Energy, 199, pp.234-246.

Hong, S., Xu, L., Wang, H. and Gu, G., 2015, February. Poisoning Network Visibility in Software-Defined Networks: New Attacks and Countermeasures. In NDSS (Vol. 15, pp. 8-11).

Jiang, R., Chen, J.Y., Ding, Z.J., Ao, D.C., Hu, M.B., Gao, Z.Y. and Jia, B., 2016. Network operation reliability in a Manhattan-like urban system with adaptive traffic lights. Transportation Research Part C: Emerging Technologies, 69, pp.527-547.

Lara, A., Kolasani, A. and Ramamurthy, B., 2014. Network innovation using openflow: A survey. IEEE communications surveys & tutorials, 16(1), pp.493-512.

Liang, C. and Yu, F.R., 2015. Wireless network virtualization: A survey, some research issues and challenges. IEEE Communications Surveys & Tutorials, 17(1), pp.358-380.

Lord, D. and Washington, S., 2018. Introduction. In Safe Mobility: Challenges, Methodology and Solutions (pp. 1-10). Emerald Publishing Limited.

Luo, X., Wang, J., Dooner, M. and Clarke, J., 2015. Overview of current development in electrical energy storage technologies and the application potential in power system operation. Applied energy, 137, pp.511-536.

Martins, J., Ahmed, M., Raiciu, C., Olteanu, V., Honda, M., Bifulco, R. and Huici, F., 2014, April. ClickOS and the art of network function virtualization. In Proceedings of the 11th USENIX Conference on Networked Systems Design and Implementation (pp. 459-473). USENIX Association.

Miao, J., Zhang, N., Kang, C., Wang, J., Wang, Y. and Xia, Q., 2017. Steady-state power flow model of energy router embedded AC network and its application in optimizing power system operation. IEEE Transactions on Smart Grid.

Mijumbi, R., Serrat, J., Gorricho, J.L., Bouten, N., De Turck, F. and Boutaba, R., 2016. Network function virtualization: State-of-the-art and research challenges. IEEE Communications Surveys & Tutorials, 18(1), pp.236-262.

Otani, T., Toube, H., Kimura, T. and Furutani, M., 2017. APPLICATION OF AI TO MOBILE NETWORK OPERATION.

Perlman, R., Kaufman, C. and Speciner, M., 2016. Network security: private communication in a public world. Pearson Education India.

Peter, S., Li, J., Zhang, I., Ports, D.R., Woos, D., Krishnamurthy, A., Anderson, T. and Roscoe, T., 2016. Arrakis: The operating system is the control plane. ACM Transactions on Computer Systems (TOCS), 33(4), p.11.

Porras, P.A., Cheung, S., Fong, M.W., Skinner, K. and Yegneswaran, V., 2015, February. Securing the Software Defined Network Control Layer. In NDSS.

Prezioso, M., Merrikh-Bayat, F., Hoskins, B.D., Adam, G.C., Likharev, K.K. and Strukov, D.B., 2015. Training and operation of an integrated neuromorphic network based on metal-oxide memristors. Nature, 521(7550), p.61.

Ramaswamy, P.C., Chardonnet, C., Rapoport, S., Czajkowski, C., Sanchez, R.R., Arriola, I.G. and Bulto, G.O., 2016. Impact of electric vehicles on distribution network operation: real world case studies.

Shin, S., Song, Y., Lee, T., Lee, S., Chung, J., Porras, P., Yegneswaran, V., Noh, J. and Kang, B.B., 2014, November. Rosemary: A robust, secure, and high-performance network operating system. In Proceedings of the 2014 ACM SIGSAC conference on computer and communications security (pp. 78-89). ACM.

Silberschatz, A., Galvin, P.B. and Gagne, G., 2014. Operating system concepts essentials. John Wiley & Sons, Inc..

White, G.B., Fisch, E.A. and Pooch, U.W., 2017. Computer system and network security. CRC press.

Zhu, J., 2015. Optimization of power system operation (Vol. 47). John Wiley & Sons.