Warning: Use of undefined constant referer - assumed 'referer' (this will throw an Error in a future version of PHP) in /usr/home/essaywo/public_html/essays on line 102

Warning: Use of undefined constant host - assumed 'host' (this will throw an Error in a future version of PHP) in /usr/home/essaywo/public_html/essays on line 105

Warning: Cannot modify header information - headers already sent by (output started at /usr/home/essaywo/public_html/essays:102) in /usr/home/essaywo/public_html/essays on line 106

Warning: Cannot modify header information - headers already sent by (output started at /usr/home/essaywo/public_html/essays:102) in /usr/home/essaywo/public_html/essays on line 109
Network Administration and Security - Online Papers

Network Administration and Security

Network Administration and Security CW 1

SY2S21

Ryan Howells - 09025634

Contents
Introduction 2
Part 1 3
System Administrator tool – Netstat 3
System Administrator tool – VMstat 4
Network Administrator tool – TCPdump 6
Part 2 7
i) 7
ii) 7
iii) 7
References 8


Introduction

I have been asked to write a report on the tools and commands that are available on a UNIX operating system that would typically be used by a Unix system administrator or Network administrator.
I will discuss the usage and the benefits of two commands useful for a system administrator and two commands useful to a network administrator. This will include a typical real world system related ...

Want to read the rest of this paper?
Join Essayworld today to view this entire essay
and over 50,000 other term papers

memberships as well as other information. The main benefit of using netstat is to keep up to date with the network activity and configuration in order to make sure the performance of the network is optimized.
By default netstat will display a list of open sockets. If no address families are specified then the active socket of all configured address families will be printed.
It is important as a system administrator ensure that network utilization is a priority. Therefore the command netstat -i is useful command which will display a table of all network interfaces unless specified. It shows the state of all network interfaces configured to the system that are used for tcp/ip traffic.

For example

% netstat -i
Name Mtu NetworkAddress Ipkts Ierrs Opkts Oerrs Coll
ln0 1500 DLI none 15801688 0 7091305 1471 390544
ln0 1500 08:00:2b:35:b3:94 15801688 0 7091305 1471 390544
fta0 ...

Get instant access to over 50,000 essays.
Write better papers. Get better grades.


Already a member? Login

in from disk (kB/s).
so: Amount of memory swapped to disk (kB/s).

IO;
bi: Blocks sent to a block device (blocks/s).
bo: Blocks received from a block device (blocks/s).

System
in: The number of interrupts per second, including the clock.
cs: The number of context switches per second.

These are percentages of total CPU time.
us: user time
sy: system time
id: idle time

For example, if a system has been slowed down with a problem of some sort such as a bottleneck at its most peak use time, it would be the job of the system administrator to locate where the problem lies. So you would use the vmstat command which would be used with a time delay to give a good reflection of ...

Succeed in your coursework without stepping into a library.
Get access to a growing library of notes, book reports,
and research papers in 2 minutes or less.


CITE THIS PAGE:

Network Administration and Security. (2011, March 16). Retrieved March 28, 2024, from http://www.essayworld.com/essays/Network-Administration-and-Security/96184
"Network Administration and Security." Essayworld.com. Essayworld.com, 16 Mar. 2011. Web. 28 Mar. 2024. <http://www.essayworld.com/essays/Network-Administration-and-Security/96184>
"Network Administration and Security." Essayworld.com. March 16, 2011. Accessed March 28, 2024. http://www.essayworld.com/essays/Network-Administration-and-Security/96184.
"Network Administration and Security." Essayworld.com. March 16, 2011. Accessed March 28, 2024. http://www.essayworld.com/essays/Network-Administration-and-Security/96184.
JOIN NOW
Join today and get instant access to this and 50,000+ other essays


PAPER DETAILS
Added: 3/16/2011 03:12:30 PM
Submitted By: rattyry
Category: Computers
Type: Premium Paper
Words: 1555
Pages: 6

Save | Report

SHARE THIS PAPER

SAVED ESSAYS
Save and find your favorite essays easier

SIMILAR ESSAYS
» The Aviary, The Aquarium, And E...
» Wendy's Restaurant Network Mana...
» Computer Forensics
» The Effects of 9/11 on Airport ...
» A Comparison Of Two Network Ope...
» A Comparison Of Two Network Op
» Internet, Its Effects In Our Li...
» The Internet Its Effects And It...
» The Internet And Its Effects An...
» Oil's Role In the Iraqi War and...
Copyright | Cancel | Contact Us

Copyright © 2024 Essayworld. All rights reserved