New Technology Research for Network Systems Administration

In: Other Topics

Submitted By jmm121873
Words 325
Pages 2
My field of study is Network Systems Administrations. I am most interested in networking technology. I currently understand very little about networking, which is to say I understand the functionality but not how it works. The topic I chose was Home-linking Technology. The article I read was “Dual Band Router leverages 802.11ac wireless standard.” from the Product News Network. The article started by describing the speed of the new 802.11ac router. Equipped with the Broadcom 5 GHz WI-Fi chip, the Cloud Router 5700 can deliver speeds up to 1750 Mbps. Its predecessor, the 802.11n has vendor promised speeds of up to 600 Mbps. The Cloud Router also supports wireless HD streaming and multi-person online gaming. It allows users to monitor and control your network remotely. In addition the 5700 provides support of the IPv6 standard and is backwards compatible so the previous generation 802.11n will not become obsolete. I also learned new terminology;
IEEE- Institute of Electrical and Electronics Engineers. It is listed as “the world’s largest professional association dedicated to advancing technological innovation and excellence for the benefit of humanity.”
802.11- Set of standards for implementing wireless local area network (WLAN) computer communication in the 2.4, 3.6 and 5GHz frequency bands.
SPI Firewall- (Stateful Packet Inspection) is a firewall that keeps track of the state of the network connections traveling across it.
WPA2- (Wi-Fi Protected Access II) is a security protocol and security certification program developed by the Wi-Fi Alliance to secure wireless computer networks. This article was very fascinating to read. The writer did a thorough job describing the technology. As I did my search for definitions of the new vocabulary, it leads me to even more information and questions about networking. In my opinion this article was a great…...

Similar Documents

Network Systems Administration

...Introduction: Global Positioning System, GPS Summary of key findings: Google,, Wikipedia, In a nutshell describing GPS - A navigational system involving satellites and computers that can determine the latitude and longitude of a receiver on Earth by computing the time difference for signals from different satellites to reach the receiver. Today, it is widely used by the civilian public for both commercial and recreational use. In addition to GPS, other systems are in use or under development. The Russian Global Navigation Satellite System (GLONASS) was in use by only the Russian military, until it was made fully available to civilians in 2007. The navigational signals transmitted by GPS satellites encode a variety of information including satellite positions, the state of the internal clocks, and the health of the network. These signals are transmitted on two separate carrier frequencies that are common to all satellites in the network. Two different encodings are used: a public encoding that enables lower resolution navigation, and an encrypted encoding used by the U.S. military. So in 20 years you can just imagine where this will lead… As of December 2013, there are 32 satellites in the GPS constellation. The additional satellites improve the precision of GPS receiver calculations by providing redundant measurements. With the increased number of satellites, the constellation was changed to a......

Words: 358 - Pages: 2

A New Vision for Public Administration

...Review of “A New Vision for Public Administration” Charles T. Goodsell Public Administration Review, 66.4, July/August 2006: 623:635 Theme The theme of the article by Goodsell is illustrating “how public administration in the United States can be seen on its own terms, and not those of others” (p. 634). This article argue that the professors and practitioners of the field have inadvertently allowed it to be observed and interpreted from standpoints imposed by others who are external to its institutions and subject matter (p. 623). These include elected officials and politicians and a variety of critics supporting programs for improvement. The representations of the field expected by these outside viewers have been indiscreetly acknowledged within public administration, leaving the field disposed for influence as a tool for purposes other than its own. This situation has made it difficult for the field's leaders to formulate a separate intellectual vision for public administration that is consonant with their appropriate goals and concerns (p.623). Topic The topic under consideration is to contend that it is time for the field to advance, in the sense that it must express, at least to itself, a vision that apprehends its understanding of public administration's contented involvement to a democratic society. The article also present that the vision is no more “true” in an objective sense than the visions of others. The subject of investigation are the......

Words: 1603 - Pages: 7

New Technology in My Field Research Essay

...Abstract The study of computer forensics has quickly emerged and technology used in theis type of forensics is being developed quite rapidly. As swiftly as the field and its importance are growing, many practitioners still remain unaware of computer forensics and its role in the technological world. A paper provides an overview of the relatively new field of computer forensics. The paper also illustrates why, in the wake of 9-11 and other terrorist acts, the research and development of computer forensics is of international importance. (A) I chose to write my article on computer forensics mainly because I have been involved with computer forensics numerous times in my life. The most recent experience I’ve had with computer forensics was last year. I was informed by my wife that her best friend had received a visit from DHS after their daughters had mentioned that their dad had been touching them and asking them to do things that they were uncomfortable with. DHS determined that they needed to investigate the situation and began to gather the necessary information. During the investigation my wife’s friend had noticed that her husband was starting to be very secretive and was locking up his computer anytime she walked into the room and had been using a 128 bit encrypted flash drive that he never let leave his person. He started being verbally abusive and physically abusive to both her and their 2 young daughters and she locked him out of the house. I......

Words: 716 - Pages: 3

New Technology in the Field of Networking Systems Administration

...New Technology in the Field of Networking Systems Administration The field of Networking Systems Administration has many new things happening every year. With the way the development of new technology is, it is very difficult for a lot of none technologically inclined people too keep up most of the time. One of these companies that are always coming up with new technology is called AMD. They are a company that develops processors for many of the leading brands of computers today. Their most recent development is a new processor chip that is supposed to be faster than their leading competitor’s (Sakr, 2014). From what this article says this new Processor chip is called the Kaveri and combines 4 CPU cores and 8 GPU cores “and gives them unheard-of levels of computing independence, such that AMD feels justified in describing them collectively as a dozen ‘compute cores. ’” From the way this article has described this new technology, it is going to make the computer gaming world’s games run faster and better in many different ways. Now many technologically knowledgeable people would be inclined to believe that this is all just marketing nonsense, but according to Sharif Sakr, the Senior European Editor of, says that AMD seems to be being very open with their companies thinking with this new processor (Sakr, 2014). This new technology is still waiting on home reviews from the customers who have bought this new processor, but if it lives up to what it is......

Words: 500 - Pages: 2

Network System Administration

...mouse pointer across the screen. When the mouse signals the computer about how the user has moved the mouse, which of the following answers best describes what the mouse tells the CPU? d. None of the other answers is even remotely close to what the mouse tells the CPU. 19. For a particular computer display, the screen resolution is set to 1280 × 1024. Which of the following is true about the term screen resolution, these two numbers, and what they describe? (Choose two answers.) b. The screen resolution is the number of lighted dots per inch (DPI) currently in use on the screen. c. The screen is using more than 1 million pixels. List the Words Inside Acronyms RAM Random Access Memory OS Operator System CPU Central Processing Unit KB Kilobytes MB Megabytes GB Gigabytes TB Terabytes USB Universal Serial Bus HDD Hard Disk Drive ODD Optical Disk Drives I/O Input and Output DPI...

Words: 547 - Pages: 3

Network Systems Administration

...Application b. Network c. Physical d. Data Link 37. Identify the configuration that is best for networks with varying security levels, such general users, a group of users working on a secret research project, and a group of executives. a. Multilayered firewall b. Screened subnet firewall c. Border firewall d. Ordinary firewall 38. Which of the following would you not expect to find on a large network? a. Router b. Switch c. Hub d. Firewall 39. Which of the following is a weakness of WLANs? a. WPA b. RF shielding c. User groups d. SSID beaconing 40. Identify an advantage of IPv6 over IPv4. a. More secure b. Larger address space c. IPSec support d. More commonly used 41. Identify one of the first computer viruses to appear in the world. a. Nimda b. ILOVEYOU (aka Loveletter) c. Lehigh d. Code Red NT2580 Introduction to Information Security STUDENT COPY: FINAL EXAM © ITT Educational Services, Inc. All Rights Reserved. - 10 - 02/12/2012 42. Which of the following is not a primary type of computer attack? a. Structured b. Specific c. Direct d. Indirect 43. How do worms propagate to other systems? a. Through file infection b. As a result of a program flaw c. Through the network service d. By user’s consent 44. Which of the following type of program is also commonly referred to as a Trojan horse? a. Keystroke logger b. Backdoor c. Spam d. Worm 45. Which defense-in-depth layer involves the use of chokepoints? a.......

Words: 606 - Pages: 3

Principles of Network and System Administration

...Chapter (Self-test Objective) Question # 1: What kinds of issues does system administration cover? Answer: As we discussed in class, a Network System Administrator has to be knowledgeable, has to have customer service skills to be stay calm & collected when a complaint occurs, and must be able to rectify the problem. As the course text book “Principles of Network and System Administration”, by author Mark Burgess mentions in chapter #1 section 1.6 The challenges of system administration : “System administration is not just about installing operating systems. It is about planning and designing an efficient community of computers so that real users will be able to get their jobs done. That means: • Designing a network which is logical and efficient. • Deploying large numbers of machines which can be easily upgraded later. • Deciding what services are needed. • Planning and implementing adequate security. • Providing a comfortable environment for users. • Developing ways of fixing errors and problems which occur. • Keeping track of and understanding how to use the enormous amount of knowledge which increases every year.” The author also mentions that some of the Network System Administrators are responsible for both the hardware of the network and the computers which it connects, i.e. the cables as well as the computers and some are only responsible for the computers. Most importantly a System Administrator must have an understanding of how data flows from......

Words: 337 - Pages: 2

Network Systems Administration

...Frank’s, no one remembers who gave it that name, the owner for the vast majority of my life is named William Jackson Davis and if he ever knew the titular namesake he never told me or anyone I know, but history or name aside no one I ever heard of had anything but praise for the pies that were produced there, 4 hour waits on a Friday or Saturday were not uncommon. So it was there I was headed on that portentous evening nearly thirty years ago after a back breaking week of working in construction putting drywall on houses, with a great hunger and thirst only such demanding and dusty work can produce and looking forward to nothing more than the filling and delicious pizza and ice cold refreshing beer when I noticed that the owners had hired a new waitress, a striking Green eyed beauty with a bust that would cause babies for miles around to begin salivating, now as a young single man not many years out of the Marine Corps my reaction was somewhat predictable, I hit on her like a Miner Forty-niner on a rich vein in the Mother lode! But my every advance was rebuffed, my best come-on lines elicited no more than a little chuckle and although I never gave up trying, after six months with nary a cup of coffee shared I had pretty much relegated her to a great reason to not get my pizza to go, but little chance of anything more meaningful. And so it was that on a fairly average Friday night in November as I entered a local watering hole it was my penchant to frequent, I noticed her......

Words: 821 - Pages: 4

Network Administration Portfolio

...these documents, secure, in house. A well-designed network infrastructure that has the applicable requirements of the users is often well worth the financial sunk cost. A solid network is considered one of the most critical resources in an organization, both in the private and public sector, especially with paperless transmission of business documents between companies. A solid network is the cornerstone for providing the means of transmitting data (sometimes sensitive), from one computer to another. The mission of any business is to offer a useful product, increase profits, and increase work force potential. Because of these possibilities networks may increase the organizational learning rate, which many business professionals believe is the only fundamental advantage in competition. The accuracy and speed of daily business transactions for large and small organizations are vital to their success. Unscheduled disruptions resulting in the failure to process these daily business transactions can be costly, and potentially disastrous. This essay will describe some of the possible gains, and drawbacks one may face when installing/upgrading a network. Advantages Employees want the ability to have access to all files, and services whenever needed. It is no surprise that our modern workplace is no longer bound to the office. It is a continuous workforce connected globally through the Internet via networks. The new virtual workplace is powered by routers/switches,......

Words: 867 - Pages: 4

Network Systems Administration

...for LAN’s as well as phone lines. Coaxial cables are also useful for internet connection. 7.1.4 Satellite is a way of creating a network over long distances. WiMAX, is a standards-based technology enabling the delivery of last mile wireless broadband access as an alternative to cable and DSL. HSPA+, enhances the widely used WCDMA (UMTS) based 3G network with higher speeds for the end user. 7.1 Review 1) UTP and Coaxial cables can be used if signal enhancers are placed at correct distances. 2) WLAN’s are limited to shorter distances due to signal interference from attenuation and objects between the AP and devices. 7.2.1 Dedicated lease lines are very effective in transmission, but can be costly. 7.2.2 Full mesh topologies are good for no fault networking. Creating it can be difficult to maintain and assemble. Partial mesh is good when every computer is not important in the network. 7.2.3 Star topologies are great for small LAN’s. But, they have a high level of fault error in the system. 7.2.4 T1 uses 24 DSO channels, E1 has a speed of 2048 Mbps, E3 has 16 E1 channels, T3 has 43,736 Mbps and 28 DS1 channels. 7.2 Review 1) PPP allows their frames to flow from the customer router to the ISP router. A control protocol is used to set a standard everyone can understand. 2) LAN’s tend to have more immediate clients, WAN technology tends to be affected by distance. 7.3.1 The shipping sites could form a partial mesh topology, the Foundry can connect......

Words: 341 - Pages: 2

New Telephone System Research

...New Telephone System Research Josh Foster I have been given the task to design the telephone system for the company’s new location that is going to be built shortly. To accomplish this I first need to understand what kind of telephone system the company currently uses today. Which is The Plain Old Telephone Service (POTS) is what most companies are running today. So when researching this system out I found out that there are several different components that make up the POTS system. When the POTS system first started back in 1877 it was with Bell Telephone Company. Then it was one line one house which was a fixed –line system. Now everything runs to a central office and is distributed from there. The POTS system we have now starts out at your local telephone company’s office this is referred to as a central office. There are many lines coming out of the office going everywhere but one will get to our office so we could have service. The line that comes from the central office to our building will connect us to the system and that line will be a twisted pair cable (which is a copper cable). This will give us a local loop to the telephone company. In some remote location the telephone companies have to install remote sites to shorten loop lengths to provide better quality service for all rural areas. There are a few more things I would like to mention that is in the POTS system. The first is that it has long distance, which gives you the ability to call out of your......

Words: 1236 - Pages: 5

Systems Administration

...COURSE TITLE: BICT LEVEL 300 EVENING SUBJECT: SYSTEMS ADMINISTRATION Q1. Outline the installation process of the Ubuntu Server Edition? Ans. * By using a pen drive or from a VMware network * By using a CD-ROM or do a bootable disc and slot it into the device * Q2. Describe the installation process of Ubuntu from a CD or a bootable disc. Ans. * First, download and burn the appropriate ISO file from the Ubuntu web site3. * Boot the system from the CD-ROM drive. * At the boot prompt you will be asked to select the language. This is default and it will show up immediately you install the server. * After, select an installation language. This is what will see you through the installation process. * Choose the continent and country. This is very important because there are servers all over the world that the Ubuntu or Linux system can go in for updates. It looks for servers available in the specified region and relays you to that server. This makes updating quite easy. * You will then asked to select your keyboard layout or the keyboard detection. * It will load the components from the CD or bootable drive onto the system. * The installer then discovers your hardware configuration, and configures the network settings using Dynamic Host Configuration Protocol (DHCP) which will make everything automatic and find your local host name by default * However, if you want to configure the network manually, you will need a static IP......

Words: 611 - Pages: 3

A New Patronage Network Driven by a Transfer Technology Office Sustained Per Citizens

...A new patronage network driven by a Transfer Technology Office sustained per Citizens By Jose Mariscal Definition Patronage is the support, encouragement, privilege, or financial aid that an organization or individual bestows to another. In the history of art, arts patronage refers to the support that kings or popes have provided to musicians, painters, and sculptors. It can also refer to the right of bestowing offices or church benefices, the business given to a store by a regular customer, and the guardianship of saints. The word "patron" derives from the Latin patronus, "patron," one who gives benefits to his clients (see Patronage in ancient Rome). Abstract This essay proposes a new patronage network driven by a Transfer Technology Office sustained per Citizens. Engage to generate wealth created by innovator citizens and that this wealthy be distributed to thinker citizens. Source readings: patronage history and the books The World is Flat and Open Business Models. From the Beginning of the first Organized Societies, the art, supported by patronage Were sciences. The development of the same innovations to generate this value was by wealthy people and / or political power within society (e.g. family Medici, Pope Julius II who sponsored Rafael). In other words, the benefits of this value was for people with resources and in some ways was "monopolized" the creation of innovations by the high echelons of society. Whatever its roots, it became firmly......

Words: 954 - Pages: 4

It302 Linux System Administration Research Assignment 1

...IT302 Linux System Administration Research Assignment 1 SELinux or Security Enhanced Linux uses an architecture that separates enforcement from access policy decisions. With this architecture different types of policies can be implemented, including Role-Based Access Control (RBAC), Type Enforcement (TE), and Multi-Level Security (MLS). The module assigns security labels to each subject or object. It uses a security class to determine the kinds of relationship a pair of labels might have. The triplet consisting of a pair of labels and a class are then sent to a policy server to determine if access is allowed. The security labels are assigned dynamic integer security ID's (SID's); the reply from the policy server is cached in an 'access vector cache' for performance reasons. SELinux was developed in coordination with the open source community and the National Security Agency (NSA) to provide the highest level of security for the Linux operating system. Linux V-Server – The three basic elements of the VServer are: * The security context. A process in one security context cannot see processes in other security contexts, neither with the 'ps' command, nor with 'cat /proc' nor in any other way. As side-effect, this means that a process in one context cannot kill processes in other contexts. * Capabilities. The existing Linux kernel provides a wide variety of capabilities which can be taken away from processes. These include the ability to change network......

Words: 423 - Pages: 2

Network Administration

...Advanced Network Technology June 1993 OTA-BP-TCT-101 NTIS order #PB93-203735 Recommended Citation: U.S. Congress, Office of Technology Assessment, Advanced Network Technology--Background Paper, OTA-BP-TCT-1O1 (Washington, DC: U.S. Government printing Office, June 1993). For sale by the U.S. Government Printing Office Supcl IIIILWIICIII (If [k)c ulllLlll\. \lAll stop $s01’, \$ Allllg((u. [)(’ 2(141? () ~?x ISBN 0-16 -041805-4 -— . . Foreword omputer networks are having dramatic impacts on our lives. What were once esoteric tools used only by scientists and engineers are becoming more widely used in schools, libraries, and businesses. At the same time, researchers are working to develop even more capable networks that promise to change fundamentally the way we communicate. This background paper analyzes technologies for tomorrow’s information superhighways. Advanced networks will first be used to support scientists in their work, linking researchers to supercomputers, databases, and scientific instruments. As the new networks are deployed more widely, they will be used by a broader range of users for business, entertainment, health care, and education applications. The background paper also describes six test networks that are being funded as part of the High Performance Computing and Communications Program. These test networks are a collaboration of government, industry, and academia, and allow researchers to try new approaches to network design and to attack a......

Words: 37290 - Pages: 150

Generic Power Bank - 20,000 mAh - Super Slim Design With Polymer Battery - Rose Gold KSh 1,749 (14) Buy now | Android TV Boxes & Accessories | Accessing Oracle...