Building on prior success
Building on prior success
Name
Institution
The network operating software refers to software that runs on a server. It enables the server effectively manage data, groups, users, security applications and a number of networking tasks. The main reasons for using networks is enabling the clients communicate and share available resources effectively. The majority of the servers rely on a server that is far from the minimum hardware consideration as suggested by the vendor of the software. In order to determine the optimum hardware for the server, one should put in mind some questions. Such include; the number of clients connecting to the server, applications running on the server, storage space and even what the organization or business can afford (Ciccarelli, 2013).
The questions have varying intensity in terms of their importance in application. The most important consideration in this case is the number of applications running on the server (Ciccarelli, 2013).For instance; one can make a purchase of a cheap low-end server that Linux runs on adequately. This calls for sufficing of resource sharing and the existing simple application services. However, in order to perform advanced tasks and run resource intensive applications on a network, it requires heavy investment. This is for the purchase of servers having very high processing power and storage memory. All applications manufactured come with different processors storage requirements and RAM.
Question 1
The best operating system is The Window Server 2008. It is among the latest severs and the most current version from Microsoft. The server entered the market in February 2008. It is an improvement on the earlier version, Windows Server 2003. However, majority of the features in the older version are still visible in the new version. The windows based network operating systems are famous for their instinctive (GUI) graphical user interface. This also includes the capability of multitasking and the compatibility with a huge number of existing applications. The graphical user is a pictorial representation of the computer functions. In the case like that of network operating system, it enables administrators manage files, groups, users, printers and provision of security. The server has comes up to use with numerous editions in place. The most commonly installed editions include the standard edition, enterprise edition, web edition and the datacenter edition (Ciccarelli, 2013).
Question 2
I would make use of the initial server as a file server. This is because there is the use of client or rather server architecture. The sharing applications are many a time shareable on a on a file server specially designed for running of applications. The sharing gives a person the ability to share resources thus reducing costs and time taken to manage resources. Preferably, using another server for security purposes is a good option. The network administrators should understand well the resources on the servers that the users have to access. These may include the privileges of viewing and executing programs from the server. They also perform a number of functions such as reading, creating, deleting, and executing files shared in data directories (Kolesnikov, & Hatch, 2002).
In addition, the network administrators have to group the users according to the security levels and the assigned additional rights that most likely meet the needs of the groups. The server gives on the ability to establish who or what accesses what information. The individuals or workstations on new networks may access information that is available to the president, management and the team leader. The third server will best be in use as a printer server. This can increase efficiency of managing resources and ultimately reduce the operation costs of the organization. The server would take care of the print services in the work area. A printer directly can be directly having attachment to the print server or network in a location that is convenient users. Lastly, it will be worth using the last server as a remote access server (Ciccarelli, 2013).
Question 3
The VPN (Virtual Private Network) is very advantageous for the purposes of remote access implementation. This is because it is inexpensive for a company to afford. The VPN has unique features that make it much compatible with majority of other software’s such as window server 2008 and 2003. The VPN enables the remote users to make use of a special key exchange that should certainly have authentication by the VPN. After the authentication confirmation, there is immediate authorization of a network connection. The VPN will thus allow the person to back up the important files on a regular basis. This may take place on a daily basis, weekly or even monthly depending on various circumstances playing a key role in determination. This protects in event of power failure or occurrence of catastrophic events (Kolesnikov, & Hatch, 2002).
The other function of the VPN is the provision of additional security such as the point-to-point tunneling protocol. This encapsulates raw data and thus traversing the internet that is masked as the IP transmission. The other significant feature is the Layer 2 tunneling protocol. In this, the ends do not have to be on the same packet network switch to have the traffic flowing. L2TP hast tactics on how to correctly avoid the interpretation of frames it trying to isolate itself from traffic. In conclusion, the two fundamental designs of VPN are security and interoperability (Kolesnikov, & Hatch, 2002).
References
Ciccarelli, P. (2013). Networking basics. New York: Wiley.
Kolesnikov, O., & Hatch, B. (2002). Building Linux Virtual Private Networks (VPNs). Indianapolis, Ind: New Riders.
Leave a Reply
Want to join the discussion?Feel free to contribute!