Delivery in day(s): 5
Unit 27 Network Operating Systems Merit Copy
Network Operating System (NOS) is one of the most prominent elements in Information systems. The effective and proper choice of the same depends upon the type and size of the organization is a vital factor. If the NOS is not properly selected according to the requirements, it will affect the overall functioning of the IT department and also on the business performance. NOS are a type of system that is functioned in the computer which helps in the transfer of data and its sharing within the Local Area Networks. In this unit 27 network operating systems merit copy, the understanding the network operating system principles and the proper selection of the NOS is discussed along with the different types of NOS. The implementation of NOS has to be planned properly considering the Disaster Recovery Plan. The various phases in the disaster recovery is also examined in this report. The implementation process has to be proper so that the further issues and possibilities of disaster happenings can be eliminated. This is also discussed in this report. Once the implementation is done, there is a vital need for performance monitoring. A proper performance monitoring will ensure the smooth functioning of the entire business operation.
Task -1: Understand network operating systems principles
1.1 Evaluation of business needs and selection of an appropriate NOS
A network operating system is a system operated in a computer. The workstations in any company is managed and supported by NOS. The servers and the personal computers are connected to a Local Area Network (LAN) so that the sharing of the data can be enabled. NOS helps an organization to perform the functions like printing and its sharing, sharing of database, file systems, sharing of applications, network‘s system housekeeping and many more Selection of a proper network operating system (NOS) is one of the crucial aspects in an organization. The choice of an effective Network Operating System will affect the business operations to a larger extend. If there is the presence of a low level protocol, its function will be affected by the implementing NOS as the way the interaction takes place between the user and the network services even in a mid-sized company.
NOS is basically a software that runs on the services and it facilitates the flow of the resources which are shared in the network. With the help of the NOS, the data can be stored in a secured way in the server. Therefore a large amount of data can be accessed by a wide range of users simultaneously. This multitasking capacity of the NOS enables the efficiency in the business operations and in the smooth team work by the people as there will be no delay or difficulty in accessing the multiple data stored in the server. Some of the effective NOS available are Novell NetWare, Microsoft Windows NT Server and various Unix-based systems. One of the most effective NOS is Novell Netware. The use of which are related to file and print servers. This is mainly used in small and medium business organization and hence it’s suitable for the relevant company when it opens its branch in Manchester.
1.2 Evaluation of Disaster Recovery Procedures
If there are any disruptions or operational difficulties in the processing capacity of a computer, it is termed as a disaster. In such scenarios, the data and information stored in the server will be lost if there is no provision for disaster recovery. The main aim of the disaster recovery is to reallocate all the information in the database to another computer. The recovery of these processes takes place at disaster recovery services provider name and location of the hot site. Through this, the configuration and other network requirements of the system are intact and it can be used technically whenever and wherever required. Periodical testing on this can be a good strategy in order to ensure the protection and security of the information, as a part of the processing strategy in another computer system. It is essential to keep the disaster recovery for network operating system. If there is no provision of disaster recovery in cloud computing, all the stored data will be lost and these data cannot be recovered. This has a huge impact on the business continuity.
Task -3: Be able to implement network operating systems
3.1 Preparation and installation of selected NOS
Once the network operating system is selected, the next step is to implement the NOS. The first step involved in the implementation stage is to migrate the application software, all the systems, interfaces and hardware to the operational environment. The next step is the implementation of the data strategy by the team. The required business strategy for the data will be scripted in the implementation plan. This may be archive of all the inputs and outputs of the systems and so on. The next step involves the testing of the system and insuring the same, this is done in order to know the functionality of the systems and the sub systems are perfect and operating as specified in the implementation plan.
3.2 Configuration of NOS
If the performance of the systems is as expected and according to the specifications, the next procedure is the certification of the hardware and the software. Once the certification is done, these will become Operational System. After the evolvement of the operational system, the developer has to create a user manual guide. Well before the public distribution of the user guide, it is assessed and examined by the User Guide group to eliminate any errors or omission in this.
3.3 Analysis of Test result
Once the implementation of the NOS is done in the company there is a requirement for the periodical testing of the implemented NOS. This is done in order to ensure that the NOS is performing as expected and there is a smooth flow of things. The test plan document has to be generated for the purpose of testing. This is to know and document the tasks and the methods that are to be used in the testing. There are certain test parameters that are needed to be highlighted in the test plan. The criteria for measurement, methodology for conducting the tests, task plan charts and so on to know the efficiency of the disaster recovery plan. The quality and the applicability of the disaster recovery plan is also tested to know whether the business operations can be continued even the critical situations when the disaster occurs and there is an assurance of data recovery during disaster. The accuracy of disaster recovery plan is hence a critical aspect and it has to be maintained well.
3.4 Types of Testing
- Checklist Testing: This testing method is done by experienced testers. Checklists are used for doing testing. The lists will be of high level and there will be a particular criteria to be included in the check list.
- Simulation testing:This testing is used for disaster recovery plan. The test moderator prepares a disaster scenario and a team of people do role play of the disaster. The feedback of the team is then evaluated and applied.
- Parallel testing:This test is done when the organizations move from one system to another. This testing involves more end users. The testing is done to ensure that the processes will be of same level when done in another system.
4.1 Performance Baseline for Manchester Branch
There is an essentiality of the continuous monitoring in order to ensure the successful implementation of the NOS in Manchester Branch. The monitoring has to be done on all the required fields like data streams, severs and on the performance of the NOS. Without a proper monitoring, there will be further issues and also the hidden issues will not be able to be analysed. This will be lead to the more probability of disaster and further chaos situations leading to inefficiencies in the operations of the IT department.
4.2 Performance Monitoring Report
In the performance monitoring, there is a requirement of running a number of tests as a part of the performance monitoring of NOS. The testing involves file transfers among more than two stations. The main purpose of the monitoring is to know the effectiveness of the NOS and how well it operates and the degree of risks related to data loss or occurrence of disaster.
4.3 Effective way to manage and monitor the performance of the network
Routine maintenance for a computer is necessary to be made in order to prevent ion the most cases data losses, interruptions in the computer working, performance changes. It should be started from the OS to the leads and cables that connect the computer to the electrical socket and network router. Routine maintenance are regarded as a cost and time savers, business benefiting from this routine checks by finding earlier signs of as possible system fail and preparing the solution before any loss to happen.
At the stage of conclusion, it is noted that Network Operating Systems are essential for connecting the multi users within the Local Area Network. The NOS has an excellent multi-tasking capacity that ensures the simultaneous functioning of the work and the smooth flow of business operations. In this unit 27 network operating systems merit copy, the relevance and application of the NOS is examined for the Manchester branch of the company. The proper selection of the NOS that is best suited for the company can be made from the list of NOS. Once the selection of NOS is made, the plan for the implementation has to be made. In this stage, the role of Disaster Recovery Plan is inevitable. The disaster plan and its process is examined in this report. The implementation of the NOS is also discussed in this report. The need for the proper security controls in the NOS is essential and this is discussed in this report. The various steps involved in the implementation stage is also discussed in this report. Once the NOS is implemented, there has to proper monitoring of the same. Without a proper monitoring, the issues and pitfalls in the implementation cannot be assessed. This may lead to further issues in the business affecting the overall business functions and also in the continuity of the business.
Storey, N. R. (1996). Safety critical computer systems. Addison-Wesley Longman Publishing Co., Inc.
Jain, R. (2008). The art of computer systems performance analysis. John Wiley & Sons.
Preece, J., Rogers, Y., Sharp, H., Benyon, D., Holland, S., & Carey, T. (1994).Human-computer interaction. Addison-Wesley Longman Ltd.
Sahner, R. A., Trivedi, K., & Puliafito, A. (2012). Performance and reliability analysis of computer systems: an example-based approach using the SHARPE software package. Springer Publishing Company, Incorporated.
Levy, H. M. (1984). Capability-based computer systems (Vol. 12). Bedford: Digital Press.
Singh, N. (1995). Systems approach to computer-integrated design and manufacturing. John Wiley & Sons, Inc.
Mumford, E., & Weir, M. (1979). Computer systems in work design--the ETHICS method: effective technical and human implementation of computer systems: a work design exercise book for individuals and groups. Wiley.