faculty of information technology and engineering btec hnd ... · 1.1.5 suitable network for the...
Post on 06-Apr-2020
6 Views
Preview:
TRANSCRIPT
ICON College of Technology and Management
Faculty of Information Technology and Engineering
BTEC HND in Computing and Systems Development (CSD)
Assignment
Unit 27: Network Operating Systems
Tutor: Mohammed Jaffer Hasan
Submitted by
ID No: 14869
Alexandru Isac
89 Montalt Road
London, London IG8 9TB
Session: Sep 2017
Table of Contents
1 LO1: Evaluation of Network operating System Principles .......................................................... 4
1.1 Evaluations of various types of NOS .................................................................................. 4
1.1.1 Network services requirements ................................................................................... 4 1.1.2 Appropriate network for the case scenario .................................................................. 4 1.1.3 Comparison and evaluation of various NOS ................................................................ 5 1.1.4 Recommendation of NOS ........................................................................................... 6 1.1.5 Suitable network for the above scenarios (-peer to peer/client server) .......................... 6
1.2 Disaster recovery and business continuity ........................................................................... 7
1.2.1 Different types of backup ........................................................................................... 8 1.2.2 Various types of RAID ............................................................................................... 8 1.2.3 Raid level 0 .............................................................................................................. 10
2 LO2 implementation plan of NOS ............................................................................................ 12
2.1 Designing of implementation plan .................................................................................... 12
2.1.1 Installation ............................................................................................................... 12 2.1.2 Hardware specification ............................................................................................. 12 2.1.3 addressing ................................................................................................................ 12 2.1.4 Security .................................................................................................................... 12
2.2 Evaluation and justification of plan .................................................................................. 13
3 LO3 implementation of NOS [P3.1, M3] .................................................................................. 14
3.1 Implementation of NOS including .................................................................................... 14
3.1.1 Installation ............................................................................................................... 14
3.2 Configuration and testing ................................................................................................. 17 3.3 Evaluation ........................................................................................................................ 23
4 LO4 Managing of Network Operating System.......................................................................... 24
4.1 Identification, selection and justification of network monitoring tool ................................ 24
4.1.1 HP Open View ......................................................................................................... 24 4.1.2 ZENOS V.5.0 ........................................................................................................... 25 4.1.3 Open NMS ............................................................................................................... 26
4.2 Baseline security report network....................................................................................... 27
5 References list ......................................................................................................................... 32
Introduction
Network operating system is referred to operating system forming integral part of the computer
system. It is designed and developed in order to support personal computer system or workstation of
the organization by connecting to a local area network known as LAN. Network operating system
allows the organization to share files and documents and access printer among numerous computer
system connected within a network either on a private network or local area network. Computing and
system development helps to establish diverse range of skills in relation to modern computing and
networking technologies. The concept of computing and system development helps to give an in-
depth knowledge and understanding about different aspects of networking and computing discipline.
The objective of the study is to provide detailed information about computing and system
development. Based on given case scenario, requirements of network operating system of the
company will be identified and depending on that appropriate network operating system will be
recommended.
1 LO1: Evaluation of Network operating System Principles
1.1 Evaluations of various types of NOS
1.1.1 Network services requirements
Based on the case scenario, the company for its new branch in Manchester will be required
● Infrastructure services: it covers the necessities requirements of the company to be present
online. It includes VPN configuration, service design and installation, network design and
configuration, window as well as exchange server configurations (Simsarian, 2018).
● Wireless networks: it enables the company to use internet over a private network or local area
network. Robust as well as reliable wireless network servers will be designed.
● Managed support: the support team comprising of IT professional and technician will be
developed to provide system support and help manage computer systems.
● Data Backup and disaster recovery: data backup services will be implemented to keep the
company data secure. Besides, data recovery plan will be designed to eradicate business
failure issues in case of worst happen (Huang, 2017).
1.1.2 Appropriate network for the case scenario
After assessing the needs of the company new venture and seeking into its future requirements of
computing and networking system, it is critical to develop a virtual environment to support remote
computer system, data security, and print services as well as print server. Along with that, network
management tools, firewall protection for network project, antivirus software will be employed to
eradicate the threats of system failure and redundancy(Shin et al. 2014). In Figure 1 such principles of
operating system have been reflected. However, all of those are not interdependent; but somehow, an
efficient networking system should include all of these principles. In the following picture this aspect
has been included.
Figure 1: Network operating system principles, (Source: Santamaria, 2016)
In figure 1,
In the above picture,anefficient networking system has been reflected. On the other hands, it has also
instructed the relationship between each other. It is important to understand the relationship as well as
applications of network communication. Network managementand firewall protection (Santamaria,
2016). There are many vendors available in the market those are engaged to provide a support of a
network centric approach. It is the service standard of the vendors that establish the efficiency of
networking in a small organization as well as a group of network. Such vendors are discussed below
as per availability and features.
Stratum: Stratum provides open advanced while box switches along with advanced technology of
SDN interfaces. Switch networking solutions are mainly supported by faster communication and high
speed data transfer. On the other hand, it also provides software oriented programming as well as
featured aspects of security.
Cumulus Network: Cumulus networking is an open ended network and it is framed on Linux.
Having an open channel networking, the security measure of this vendor is restricted. It connects the
ease of OCP following updown 2.
Big switch light: Big Switch light is based on open network and having some features of Stratum. It
is built on Linux and there are several implications of SDN. The open networking channel establishes
faster data center approach having restricted security standards.
Linux Network: Having flash memory and bare channels of switching have made this vendor easier
to use. On the other hand, Linux establishes opem computing project and open flow centric
operations.
1.1.3 Comparison and evaluation of various NOS
Technical
Characteristics
windows Linux Mac Osx
Security Window operating system is highly vulnerable to cyber-
attacks. Despite many patches
are available but still titsvulnerability liable to high
security risks and threats
Linux has less level of vulnerability in
comparison to Window
OS. It is hampering by malware and hence can
maintain security
degree.
Security Vulnerability and threats on Mac
OSx is very less in
comparison to both systems. It provides
strong internal as well
external security
protection for the network server.
Software
availability
The software of window
operating system is easily available in the market and
cost varies depending upon
type of OS version
purchased. However, licensing policy are very
complicated
Linux OS are opens
source and software is available for free.
Free Mac OSX
software available
Maintainability This operating system requirespatches in order to
Maintenance is easy Very easy in comparison to both
regulate it
Scalability Upgrading as well as patching required enough
time and possess high risk to
prone to corruption or infection. Scalability is
available at all level.
OS has scalability but from the end of server
sides.
MAC OSX offer client-based scalability
options
Technical
Support
Excellent technical support There is no scope of
direct support instead on company forum
Support is available on
website and forum, but no direct support.
1.1.4 Recommendation of NOS
Window operating system is connected with several security issues and risks in comparison Linux and
Mac. That is reason why window is found to constantly release with new security essentials as well as
bug fixes. On other hand, Mac and Linux operating system offer great security solutions and options.
However, the major challenges while dealing with the operating system when it come to technical
support. These two operating system do not offer direct support like window OS. Window offer
excellent technical support mechanism from installation to implementation of operating system on the
computer system. Therefore, window has been number one in term of helping businesses in running
their OS application (Santamaria, 2016). Based on the comparison and evaluation of different OS,
Window operating system platform will be suitable based on the company requirements for
computing and system development.
1.1.5 Suitable network for the above scenarios (-peer to peer/client server)
The peer to peer network is the network where at least two computers have to share files to each other
and access devices and they can do this without the need for a separate server computer or program
(software). In the peer to peer network none of the providers are responsible for such thing as for
being the server, every single computer must stock information and action as a server. The Peer to
Peer Network is ideal to share the information but we have to take in calculation that this type of
network can’t have more than 10 computers. The Peer to Peer Network is also the simplest type of
Network but this also comes with a risk because Peer to Peer network can be very easy discovered
and accessed by unauthorized people.
Advantages and disadvantages of Peer to Peer Network:
Advantages Disadvantages
Is very easy to get done a configuration for a
peer to peer network
We can use maximum of 10 computers
They are easy to maintain They are not very secured
They have a low cost
Client server is the relation between two computers where the customer can have a request from the
server and the server has to fulfil the client’s request.
The customers or the clients can easily take the form as desktops, smartphones or workstations. A
network that is using a server to allow the clients to share information, data and devices is client
service network. In this network we can say that the client rely on server for recourse sharing and
processing. In case of a Client Server Network, any of the computers can be either a client or either a
server, it cannot be the both at the same time, is it not impossible but it is uncommon.
The client – server relationship can be made with the help of the routers or switches and this is
happening because those devices are covered in details.
If we want our computer to be function as a server than we need to be running a Network Operating
System.
A network Operating System is a special kind of software that have plenty characteristics such as
managing data or resources for a number of customers, does have the control of the type of the file
that the user want’s to open or read, has the capability to supply the applications to the clients , restrict
from where and when the customers and users can access the network and many others .
Advantages and disadvantages of Client Server Network
Advantages Disadvantages
All documents are memorised in a focal area The client server network is very expensive
Network peripherals are controlled centrally It requires a permanent staff to watch it ,
someone as a network manager
Data is all backed up on the main server Clients are dependent on the server
Capability to grow Difficult to set up
1.2 Disaster recovery and business continuity
Definition of term disaster recovery and business continuity
Business continuity forms a part of business strategy which is devise to ensure that all the important
data and information regarding the business should be available and accessible anytime on real time
basis. It is developed based on identification of security threats as well as risks to be faced by the
company to make sure that data and assets are secure and protected.
Disaster recovery is referred to field of security planning used by the company to protect itself from
the adverse impact of negative events or incidents such as power failure or black out (Lamantiaet al.
2015).
Figure 2: Recovery system of a networking system, (Source: Thottan, 2018, p.147)
In case of network security, it is important to have back up options that data should be recovered even
having disasters. The application of back up and network security has been measured in the above
picture. In this concern a specific networking system should engage an additional secondary storage
and followed by the same the implementation of a better transportation of data to secondary back up is
possible (Thottan, 2018).
Advantages of disaster recovery strategy
Cost savings
Disaster recovery plan help to recognize the various areas where cost and expenses can be saved by
the company. Besides, it helps to analyze the computing and networking environment to help
minimize expenditure.
Asset and inventory management
Through documentation, it allows the company to manage its assets and data effectively and also
provide understanding of it equipment inventory.
Network management
Besides, it help to manage the network and computing issues by developing mitigation strategies to
prevent effect of catastrophic or disaster (Thottan, 2018).
Ability to test
It provides the opportunity to test disaster management planning beforehand.
1.2.1 Different types of backup
Full backups: it is fundamental backup plan where all data and information are transfer to
another location.
Incremental backups: in this type of backup, only that information is back up which have
been changed previously.
Differential backup: in this type, all data that has been changed are back up every time, the
system is run (Todd et al. 2016).
1.2.2 Various types of RAID
RAID from redundant array of inexpensive disk is a way of memorizing the same files in different
places on a multiple hard disk in order to protect our data and our content in case of a drive failure.
There are many different types of RAID and these are:
-RAID 0
-RAID 1
-RAID 5
-RAID 0+1
-RAID 1+0
RAID 0 RAID 5 RAID 1
Minimum
Numbers of
disk
2 3 2
Fault
tolerance
None 1 disk 1 disk
Read speed fast Slow fast
Hardware
cost
Cheap High High
Performance HIGH HIGH Low
redudancy LOW HIGH HIGH
Raid 0 is using a method that is called stripping and the reason for that is because is taking a little
piece of data and is transferring to more drivers.
Raid 1 is providing data through a process called mirror.
This Raid is working basically with 2 hard drives, in case one drive fails then all the data could be
read from the other one.
The above picture represents the RAID 1
1.2.3 Raid level 0
We are only going to use this kind of Raid in case we want the performance but the data is not that
important for us. In this RAID the data is separated into blocks and then those blocks are written to
the disk. Raid 0 doesn’t provide any fault tolerance at all so in case one drive fails they are all going
to fail.
The above picture represents RAID 0
We can use a raid recovery software but in case one drive fails then all our data is lost.
Raid level 5 is writing data blocks to all the disk and is very similar to raid 0.However, one additional
parity block is written in each row. This additional parity, derived from all the data blocks in the row,
provides redundancy. If one of the drives fails and thus one block in the row is unreadable, the
contents of this block can be reconstructed using parity data together with all the remaining data
blocks.
If all drives are OK, read requests are distributed evenly across drives, providing read speed similar to
that of RAID0. For N disks in the array, RAID0 provides N times faster reads and RAID5 provides
(N-1) times faster reads. If one of the drives has failed, the read speed degrades to that of a single
drive, because all blocks in a row are required to serve the request.
Write speed of a RAID5 is limited by the parity updates. For each written block, its corresponding
parity block has to be read, updated, and then written back. Thus, there is no significant write speed
improvement on RAID5, if any at all.
The capacity of one-member drive is used to maintain fault tolerance. E.g. if you have 10 drives 1TB
each, the resulting RAID5 capacity would be 9TB.
If RAID5 controller fails, you can still recover data from the array with RAID 5 software. Unlike
RAID0, RAID5 is redundant and it can survive one member disk failure
2 LO2 implementation plan of NOS
2.1 Designing of implementation plan
2.1.1 Installation
2.1.2 Hardware specification
Processor: 1.6 Ghz CPU (Minimum)
And 2X 1.6 GHz CPU (maximum)
RAM: 1.75 GB (Minimum) and 3.5 GB (maximum)
HDD: 1X 40 GB of free space
2.1.3 addressing
LAN: 10.10.10.0/24
Workstation: 10.10.10.1
File server: 10.10.10.2
Printer: 10.10.10.3
Remote support: 10.10.10.4
Web server: 10.10.10.5
2.1.4 Security
Security policy: security policy of the organization will be in lieu with all its business assets
comprising of both physical and virtual assets. This will help the company to manage its business
easily. Company need to devise security plan by identify security risks and threats and depending
upon that designing mitigation strategies (Tofighbakhsh, 2017). Every employee need to adhere as
well as comply with company security in order to protect company assets and data.
Password management: security policy should incorporate password management to keep the data
and information secure and safe. For this, the company needs to develop appropriate password policy
to be followed by the staffs while working on the company network servers. The password policy
should include provision to use alphanumeric combination mentioning minimum length of password
to be used (Huang et al. 2017).
Patch management: patching of network operating system as well as hardware is critical to keep the
business assets at particular degree in order to run application. This will help to enhance the
efficiency and performance along with characteristics of installed software and applications. Window
OS release its patches frequently which can be updated into the system. The server administrator
needs to perform test and set up the patches on network server to solve the requirements of the
computing system (Moon et al. 2016). Besides, server administrator in patch management should
monitor and scan vulnerability of the system if it requires any kind of patching.
2.2 Evaluation and justification of plan
The plan devised has the ability to meet the requirements of the company as mentioned in the given
case scenario. The plan incorporates security policy, password and patch management. The plan
effectively identifies the system and network requirements of the company. Along with that, the plan
provides basic understanding about the installations and security measures that can be implemented
by the company. The plan also proposed suitable network operating system that fit in all future and
present needs of the company. Besides, it incorporates basic security and risk mitigation strategies to
protect and secure. The initial justification of implementing such strategic security concern is that the
organization engages many professional heads who tend to make data and capital transfer. Therefore,
it is not possible to make a check or monitor all of the operations. Besides that, manual operations
may not manage extensive resources available in the database. All these aspects have justified
launching a new security measure apart from conventional efforts. If it is not possible to manage all of
the security policies, there is a possibility of data loss or theft. On the other hand, it is also important
that most of the patch management and security policies are dynamic as per availability market
scenario as well as possible thefts available in the organization. In that concern a, well improved
security system can assure the protection of digital assets. All these possibilities have established the
value of the security plan managed for the company as per the case. The above specification of
hardware and software has been suggested based on the available operations as well as height of
security that the respective firm tend to implement. For example, smaller capacity of RAM or web
server may bring constraints for making faster operations.
3 LO3 implementation of NOS [P3.1, M3]
3.1 Implementation of NOS including
3.1.1 Installation
Installation steps are as follows:
Step 1: Need to install windows 2018 edition in to the compatible hardware system for ADFC of the
controller which is the root domain of the hardware.
Step 2: In order to prepare forest level permission need to run the Command on ROOT-COMPANY
base on the ADC for forest in Company.com.
Caption: ROOT Command 1 (Above)
Caption: ROOT Command 2 (Above)
Caption: ROOT Command 3 (Below)
Caption: ROOT Command 4 (Above)
Caption: Start up of the installation (Above)
Caption: Choosing of configuration (Below)
Then the next step is to configure the language we want for the OS, the time and currency format we
want and also the keyboard language. Then we can press INSTALL.
Caption: Selection of location (Above)
The next step is to accept the terms and conditions.
The above picture shows that we agree with terms and conditions
Caption: Choosing of configuration (Below)
Caption: Finalization of installation process (Above)
3.2 Configuration and testing
According to Power et al. (2015), In order to identify the threats which is aligned with the installation
procedure a high-end security is need to be taken and must be using IPS and IDS between both inside
as well as outside networks. On the other hand, the administration of the networks must also be using
system in order to prevent from any kind of data loss and further protect data and information as well
as deploy a strong group of policies relating to security of data and information. In the view of (Azar
and Vaidyanathan, 2015), moreover, the password policy need to be installed in the entire computer
so that users may have a certain length, size, and text to ensure that their data are being protected by a
particular format of password. On the other hand, to improve management security procedure can be
made by detectingcommon security relating to miss-configuration as well as missing the updates
which are related with the security of the computer (Frisco et al. 2014). Therefore, it is necessary for
the company to monitor all the specific changes relating to the network security and procedure of their
system and ensure that all their data and information are being kept in a secured manner.
Configuration of windows server
Once we login the windows will open for us the Server Manager which is going to look like :
The above picture represents the Server Manager
Now we are ready to move to the next step which is configuration of the server Manager.
This is how our configuration is going to look like:
The above picture represents the first page of configuration
We must open the server manager and click add roles and features.
The next step is to reach the server roles tab:
The above picture shows the Server Roles tab
Then you have to press next till you reach the next step .
The above picture shows the Installation Type
Then we have to establish the server selection:
The above picture represents Server Selection
Then we are required to select the web server.
The above picture represents the selection of web server
Then we click next till the Role services and then we select again :
The above picture represents the role services]
Then we need to confirm the installation of the services.
The above picture represents Confirmation of installation
Then we are finally close to the end of installation.
The above picture shows the Installation Progress
Our server is now ready for configuration.
The above picture represents the configuration
The above picture represents the internet information
We are ready to insert a website.
The above picture show us how and where to insert our website.
3.3 Evaluation
As I managed to install our Windows Server 2012 and to configure I can say that is working perfectly
and there are not any issues, all the computers have been setup properly by myself so there are no
errors.
Testing is not completed
4 LO4 Managing of Network Operating System
4.1 Identification, selection and justification of network monitoring tool
There are various kinds of monitoring tools which are found in the market that would be effective in
monitoring the data and security policies relating to the organization. According to Kamenskih and
Tyurin (2015), the most acceptable monitoring tool which are being used by most of the companies in
the market are HP Open Viewer, Solar wind and much more. However, for this company the it is
therefore recommended to adopt the HP Open Viewer tool as it is build with more accurate features
that would further help the company in monitoring their change and manage their task more
preferable manner. Even, by the use of this tool the user would be able to gather information relating
to change or update through SMS or M2M enable or by Email formulated in the system. As
mentioned by Arthursson and Bristav (2016), the other most appropriate form of monitoring tool is
ZENSOS V.5.0 is open network monitoring source tool which deliberately has the capability to
manage the overall health and secure the network server at the bit level and further helps in
monitoring the overall network origin, moreover, by the adaptation of this tool the organization would
be able to gather information relating to any kind of warning through email or SMS. Moreover, by the
adaptation of these tools the organization would be able to maintain their position and secure their
data more beneficial and also ensure that they have a better and enhancing control over the domain of
the overall network system (Shin et al. 2014).
So I will present three examples of monitoring tool software :
4.1.1 HP Open View
HP Open View is the former name for a Hewlett-Packard product family that consisted
of network and systems management products. In 2007, HP Open View was rebranded as HP
BTO (Business Technology Optimization) Software when it became part of the HP Software
Division. The products are now available as various HP products, marketed through the HP
Software Division
The above picture represents HP open View operations
4.1.2 ZENOS V.5.0
Zenos Core is one of the best and very powerful source IT monitoring platform that have as scope to
monitories applications, servers, storage, networking and virtualization to provide availability and
performance statistics. It also has a high-performance event handling system and an advanced
notification system.
The above picture represents Zenos
Once you login to Zenos Core Web UI for the first time, you are presented with a two-step wizard that
asks you to create user accounts and add your first few devices / hosts to monitor. You are then taken
directly to the Dashboard tab. Use the Dashboard, Events, Infrastructure, Reports and Advanced tabs
to configure Zenos Core and review reports and events that need attention.
4.1.3 OpenNMS
OpenNMS is an open source enterprise grade network management application that offers automated
discovery, event and notification management, performance measurement, and service assurance
features. OpenNMS includes a client app for the iPhone, iPad or iPod Touch for on-the-go access,
giving you the ability to view outages, nodes, alarms and add an interface to monitor
The above picture represents OPEN NMS
Once you successfully login to the Open NMS web UI, use the dashboard to get a quick ‘snapshot
view’ of any outages, alarms or notifications. You can drill down and get more information about any
of these sections from the Status drop down menu. The Reports section allows you to generate reports
to send by e-mail or download as a PDF.
4.2 Baseline security report network
Microsoft Baseline Security Analyser (MBSA) is considered to be the most appropriate and easy to
use tool that helps most of the users of the network service to determine that the state of security of
the computer on the basis of the recommendation formulated by Microsoft Security. According to
Silberschatzet al. (2014), the Microsoft Baseline Security Analyzer (MBSA) tool is appropriate as it
scans the various files which are being stored in the computer and after scanning the files it provides a
specific form of suggestion or recommendation to the user relating to security and privacy as well as
provide detailed specification about the corrupted file if found during the scanning procedure. In
accordance to Vasilakiset al. (205), therefore, based on reports that would be gathered by the
administrator in order to make their data and other information relating to the company more secure
and well organization so that they are further being able to mitigate and kind of uncertainty occurring
within their organization. Hence, monitoring tools need to be implemented within the computer
system that would be effective in securing more valuable data and ensure that the company is being
provided with time to time alerts relating to updating of the tool.
The above picture shows us which computer we are choosing to scan by IP address
The above picture represents the Process of Scanning
The above picture represents the result of the scanning
The above picture represents the Report of MBSA
4.2.1.1.1.1.1 Conclusion
The overall assignment deals with specification and installation procedure of a strong network that
would be effective for the organization in order to produce an accurate and more enhancing report.
Moreover, based on the assignment it has been found that the company needs to be more specific in
securing their data and file which is being used by the organization while operating their services. On
the other hand, the assignment holds a scientific discussion relating to identification of the network
and evaluation of the principles associated with the network system. Even, the procedures which are
associated with the implementation plan of NOS 675 have also been explained more accurately.
Moreover, configuration and testing process are also being discussed in the assignment relating to the
implementation procedure of the network system into the business. However, with the explanation of
the installation procedure managing of Network Monitoring tool are also being identified and justified
accordingly.
5 References list
Arthursson, D. and Bristav, M., Xcerion AB, 2016. Network operating system. U.S.
Patent Application 14/754,512.
Azar, A.T. and Vaidyanathan, S. eds., 2015. Computational intelligence applications in
modeling and control. Springer International Publishing.
Considine, C., Crowley, S., Gardner, G., Shannon, C., Kwinn, M.J., Henderson, S.J. and
Santamaria, P., 2016, April. Architecting a development and testing plan for the Army's
common operating environment: Applying agile systems of systems development to army
network acquisition. In Systems Conference (SysCon), 2016 Annual IEEE (pp. 1-6).
IEEE.
Frisco, P., Gheorghe, M. and Pérez-Jiménez, M.J. eds., 2014. Applications of Membrane
Computing in Systems and Synthetic Biology. Heidelberg: Springer.
Huang, Y., Geng, J., Lin, D., Wang, B., Li, J., Ling, R. and Li, D., 2017, August. LOS: A
High Performance and Compatible User-level Network Operating System.
In Proceedings of the First Asia-Pacific Workshop on Networking (pp. 50-56). ACM.
Kamenskih, A.N. and Tyurin, S.F., 2015, February. Advanced approach to development
of energy-aware and naturally reliable computing systems. In Young Researchers in
Electrical and Electronic Engineering Conference (EIConRusNW), 2015 IEEE NW
Russia (pp. 75-77). IEEE.
Lamantia, T., Fournier, D., Schendelman, R., Haroldsen, K., Batson, A., Lieu, P., Merritt,
J., Mongwa, K., Norling-Christensen, D. and Reiner, E., INTRINSIC TECHNOLOGIES
LLC, 2015. Method of automated operating system deployment for a network of multiple
data processors. U.S. Patent 8,990,796.
Moon, S., Ryu, H.Y. and Shim, J.C., Electronics and Telecommunications Research
Institute, 2016. Method and apparatus for controlling life-cycle of process for network
operating system. U.S. Patent Application 14/997,696.
Power, D.J., Sharda, R. and Burstein, F., 2015. Decision support systems. John Wiley &
Sons, Ltd..
Raman, G., Wighe, C., Balraj, S., Shenoy, S.M., Rajarathinam, S. and Kamatala, S.R.,
Juniper Networks Inc, 2018. Managed reboot of a network operating system. U.S. Patent
9,940,160.
Shin, S., Song, Y., Lee, T., Lee, S., Chung, J., Porras, P., Yegneswaran, V., Noh, J. and
Kang, B.B., 2014, November. Rosemary: A robust, secure, and high-performance
network operating system. In Proceedings of the 2014 ACM SIGSAC conference on
computer and communications security (pp. 78-89). ACM.
Silberschatz, A., Galvin, P.B. and Gagne, G., 2014. Operating system concepts essentials.
John Wiley & Sons, Inc..
Simsarian, J.E., Kim, Y.J., Choi, N., Di Martino, C., Mohanasamy, N.N., Winzer, P.J. and
Thottan, M., 2018. Error awareness in a multi-layer transport network operating
system. Journal of Optical Communications and Networking, 10(3), pp.152-161.
Todd, M., Koster, S.R. and Wong, P.C.M., Hewlett-Packard Enterprise Development LP,
2016. System and method for securing a network from zero-day vulnerability exploits.
U.S. Patent 9,264,441.
Tofighbakhsh, M. and Wolter, D.R., AT&T Intellectual Property I LP, 2017. Network
operating system client architecture for mobile user equipment. U.S. Patent Application
15/423,547.
Tofighbakhsh, M. and Wolter, D.R., AT&T Intellectual Property I LP, 2017. Network
operating system client architecture for mobile user equipment. U.S. Patent 9,565,576.
Tripathi, S., Drost, R.J. and Yang, C.K.K., Pluribus Networks Inc, 2015. Servers,
switches, and systems with switching module implementing a distributed network
operating system. U.S. Patent 9,160,668.
Tripathi, S., Drost, R.J. and Yang, C.K.K., Pluribus Networks Inc, 2017. Integrated
server with switching capabilities and network operating system. U.S. Patent 9,742,697.
Vasilakis, N., Karel, B. and Smith, J.M., 2015, May. From Lone Dwarfs to Giant
Superclusters: Rethinking Operating System Abstractions for the Cloud. In HotOS.
top related