-
What the type of Network Operating System (NOS) the Natural Forest Resources Management and Agroforestry centre use?
- What are the advantages and limitations of existing network operating systems in the organization?
- How organizational management and information resource manages network operating system with computer network?
-
Which network technology fits into the Natural Forest Resources Management and Agroforestry centre and makes it better to serve its customer?
-
What is the best type of operating system to be used in the organization?
1.6 Significance of the Study
The significance of research study as far as the study concerns the followings were expected:
- The study was a source of information for other Organizations on how to Manage Network Operating Systems in their LAN.
- It gave out the knowledge and understanding of network operating system in general
- It was revealed the better usage of Network Operating Systems in the Natural Forest Resources Management and Agroforestry centre (NAFRAC).
- The study also helped in manages the Network Operating Systems in the organization.
1.7 Scope of the Study
The study was conducted at the Natural Forest Resources Management and Agroforestry Centre (NAFRAC) for the period of four month i.e. from October 2007 to January 2008. The study was concentrated on the followings:
- How to manage the network to develop the organization.
- Also on how to manage network operating system in the organization.
1.8 Limitation of the Study
The study was likely to encounter the following limitations:
- Some of data were too confidential for the researcher to access thus hinders the data collection process. Moreover some of the respondents refused to provide support to disclose sufficient and relevant information because they feared to reveal organization secrets. This was a big constraint and caused a researcher to fail to come up with the corrected conclusion.
- The fund provided to conduct research was small and not enough for the whole period of the study due to the unforeseeable events that were occurred during the study and not at the time when budgets being estimated.
- To collect sufficient and relevant information, much time was needed. The time given to conduct research is not enough to attain a reasonable solution so that it was difficult to gather sufficient information. Also absence of respected respondents in their specific section.
- Biasness from some of the respondents was caused the researcher to fail to collect reliable information about the research problem.
1.9 Delimitation of the Study
The researchers solved the limitations of the study above as following:
- Due to confidentiality of data researcher made discussions with workers in order to collect the data, also created close relationship among them so as to give support on the research problem.
- The researcher used its own fund to cover up the cost of unforeseeable events that occurred during the study.
- Also researcher used extra time out of working hours and days to collect sufficient and relevant information.
- According to the biasness that took place researcher use observation method to come up with reliable information about the research problem.
CHAPTER TWO
2.0. LITERATURE REVIEW
2.1. Theoretical Literature reviews.
Versha Mehta N. Kumar (2003), Network operating system is an integrated set of programs tat is used to manger the various resources and overall operations of a computer system, It designed to support the activities of the computer installation. An operating system is responsible for the smooth and efficient operation of the entire computer system,
Kenneth C.Laudon (2005), Defined network operating system is the special software that routes and manages communications on the network and co-ordinates network resources. Also say that, Local Area Network capabilities are also defined by network operating system. The NOS can be resided on every computer in the network or it resides on the single dedicated server for all the applications on the network. The Microsoft Windows Server 2003, the serer versions of the windows 2000 Novell Netware and Linux are the mostly wide used NOS.
CLIENT COMPUTER.
SERVER (NOS). CLIENT COMPUTER.
PRINTER ROUTER. INTERNET/OTHER NETWORK.
Fig 1.Local area network
Jump Node (2006); recommend that network management is essential for any organization that relies on computer network to keep operating running smoothly with high performance. It is only for the large organization but also to small and mid-sized business, government agencies, education institutions, and other entities. All these done to meet the need of these organizations.
Stephen Haag (2004), network is a collection of computers that support the sharing of information, software and hardware devices.
Why network. A computer network has some of advantages with network you can share a printer among several computers, large or small files, so as you don’t have to keep multiple copies on different computers .also enable to share a broadband internet connection among many computers.
According to, on 28th September, 2007.”Network operating systems typically are used to run computers that act as servers. They provide the capabilities required for network operation. Network operating systems are also designed for client computers and provide functions so the distinction between network operating systems and stand alone operating systems is not always obvious.” Network operating systems provide the following functions:
File and print sharing.
Account administration for users and Security.
Installed Components
Client functionality
Server functionality
File and print sharing
Network services
File Sharing
Print sharing
User administration
2.1.1 Network Operating System Examples
Windows NT server and workstation - Can use multiple processors and run on Intel or RISC computers. Performs preemptive multitasking.
Windows 95 - Cannot use multiple processors or run on RISC computers. It cannot use NT drivers, but it can use older drivers.
OS/2 - supports preemptive multitasking and multithreading and protects applications from each other. It runs on Intel computers.
Macintosh - supports cooperative and preemptive multitasking and uses a window, icons, mouse environment for system control.
James A .O’Brien(2003),Operating system is the integrated system of programs that manages the operation of CPU,Controlls the input and output and storage resources and activities of the computer system and provides various support services as the computer executes application program of users. Also he continues saying that the primary purpose of the operating system is to maximize the productivity of computer system by operating in mostly efficient manner .An OS minimize the amount of human intervention required during processing.
2.1.2 Network operating system advantages:
1.Providing a user interface: This part of NOS allow to you to communicate with it so you can load program ,access files and accomplish other tusk .The three main types of interface are command driven menu driven and graphical user interface but most of software providing an easy-to-use GUI that use icons,bars,buttons boxes and other images.
2.Resource management:NOS uses a variety of resource management program to manage the hardwires and network resources of a computer system ,including its CPU,memory secondary storage devices ,telecommunication processors and input and output peripherals.
3.File Management: Operating system contain file management program that control the creation, deletion and access file of data and program file management also involve keeping track of physical location of files on magnetic disk and other secondary devices.
4. Task Management: the program of OS manages the accomplishment of the computing task of end users. They give each task a slice of a CPU’s time and interrupt the CPU operation to substitute other tasks. Task management may involves a multitasking capability where several computing tasks can occur at the same time
5. Utility: The operating system of the network provides utilities and other services.
2.1.3 Why Use Network Operating System (NOS).
The following are the reasons behind on using Network operating system (NOS):
Centralized authentication and authorization and security.
High Centralization of resources
Storage and peripheral devices can be easily shared
High Performance and easy to maintain
Servers can be dedicated to a single task to support thousands of clients
2.1.4 Network operating system disadvantages.
The terms listed below are the disadvantages of network operating system:
Central point of failure.
May need additional staff to maintain it properly.
More expensive, may need to purchase a server OS.
2.1.5 Managing Network Operating System
Jessica Keyes (2000), the cost saving for the using a Meta directory to maintain and manage a network operating system fall into two main areas:
The most obvious and easier to calculate is reduction in administration effort required to manage implementations.
This is in the area of improved security by ensuring that only authorized personnel have access to the network operating system .This is potentially a much greater cost saving but is very hard to calculate.
According to Saini (2003). Network Operating System (GUI) such as window XP is the new operating system launched by Microsoft has many striking new features while retaining many old favorite features. This Microsoft ‘s new edition comes in two version Home and Proffessional.Proffessional edition has all the features included in Home plus the following:
More sophisticated security features including support for IPSec and smart card authentication
Enhancements for mobile users/laptop.
Dual processor support
Enhanced management features.
2.1.6 Network Operating System (CLI)
1. UNIX
UNIX is a multi-use, time sharing operating system. It is an operating system of immense power and has become popular operating system because of the following features:
UNIX provides a simple and logically consistent language through which the user can interact with the system. The language is easy to learn, fairy simple to understand and difficult to forget.
Provides a vide variety of software tools and resources, so the program development progress rapidly.
Both system services and user programs are insured against too rapid obsolescence, by being nearly machine independent.
Programs can be moved to new computer along with operating system ,while new system service become available on practically all versions of the UNIX system at once.
Also UNIX provide a layer system which are kernel and Shell
KERNEL
Kernel is an heart of UNIX system .it controls the computer resources, allotting them to different users and to different tasks. When user log in it check for its authorization, keep track of kernel, assigns storage for user’s files and run the shell program. Also it handles the transfers of information between computer and terminals, tapes, drives and printers.
SHELL
Kernel doesn’t deal directly with users, instead it starts up a separate interactive program called shell for each user when she/he log in. The shell act as interface between user and the system. A shell enable user to interact with resources of computer such as programs, files and devices. Shell is a command interpreter, takes the user commands and set them for execution. These kernel and shell collaborate to provide user with UNIX services and handle any resulting output from the operating system.
2. LINUX
This is powerful and commonly used variant of UNIX operating system. It is popular because it is a freeware and can be downloaded from the internet .It’s reduced version of UNIX offering almost all features available under UNIX such as multitasking, virtual memory management and TCP/IP networking.This owns on multiple hardware platform and applications available on this system are growing very fast, it is extensively used by ISPs.
According to following are the advantages of LINUX over Windows
(a) Advantages:
Cost - The most obvious advantage of using Linux is the fact that it is free to obtain, while Microsoft products are available for a hefty and sometimes recurring fee. Microsoft licenses typically are only allowed to be installed on a single computer, whereas a Linux distribution can be installed on any number of computers, without paying a single dime.
Security - In line with the costs, the security aspect of Linux is much stronger than that of Windows. Why should you have to spend extra money for virus protection software? The Linux operating system has been around since the early nineties and has managed to stay secure in the realm of widespread viruses, spyware and adware for all these years. Sure, the argument of the Linux desktop not being as widely used is a factor as to why there are no viruses. My rebuttal is that the Linux operating system is open source and if there were a widespread Linux virus released today, there would be hundreds of patches released tomorrow, either by ordinary people that use the operating system or by the distribution maintainers. We wouldn’t need to wait for a patch from a single company like we do with Windows.
Choice (Freedom) - The power of choice is a great advantage. With Linux, you have the power to control just about every aspect of the operating system. Two major features you have control of are your by way of numerous , and the . In Windows, you either stuck using the boring default desktop theme, or risking corruption or failure by installing a third-party shell.
Software - There are so many software choices when it comes to doing any specific task. You could search for a text editor on and yield hundreds, if not thousands of results. My article on explains how there are so many options just for editing text on the command-line due to the open source nature of Linux. Regular users and programmers contribute applications all the time. Sometimes it’s a simple modification or feature enhancement of a already existing piece of software, sometimes it’s a brand new application. In addition, software on Linux tends to be packed with more features and greater usability than software on Windows. Best of all, the vast majority of Linux software is free and open source. Not only are you getting the software for no charge, but you have the option to modify the source code and add more features if you understand the programming language. What more could you ask for?
Hardware - Linux is perfect for those old computers with barely any processing power or memory you have sitting in your garage or basement collecting dust. Install Linux and use it as a , a , or a . There are endless possibilities. Old or computers with barely any RAM run Linux without any issue. Good luck running Windows on these machines and actually finding a use for them.
(b) Disadvantages:
Understanding - Becoming familiar with the Linux operating system requires patience as well as a strong learning curve. You must have the desire to read and figure things out on your own, rather than having everything done for you. Check out the .
Compatibility - Because of its free nature, Linux is sometimes behind the curve when it comes to brand new hardware compatibility. Though the kernel contributors and maintainers work hard at keeping the kernel up to date, Linux does not have as much of a corporate backing as alternative operating systems. Sometimes you can find third party applications, sometimes you can’t.
Alternative Programs - Though Linux developers have done a great job at creating alternatives to popular Windows applications, there are still some applications that exist on Windows that have no equivalent Linux application. Read to find out some of the popular alternatives.
A key advantage that Linux has over Windows is greater security for your computer and its data. The viruses, spy ware, worms, and browser hijackings that are pandemic in the Windows world are almost unheard of among Linux users. This is because Linux is designed from the ground up to be secure.
Now that you have an understanding of some of the Linux advantages, its time get out there and experiment. Windows can be a great tool for the lazy and incompetent, but it takes a true scholar and one who wants to learn to run a robust operating system like Linux.
2.2 Empirical Literature Review
Saini Pradeep Kumar(2003),defined operating system is like a interpreter between the user and computer ,it accept commands given user in simple English like language and converts it into signals or machine language codes which computer hardware can understand. Also he recommend that a user of the computer doesn’t understand an electronic signals so it impossible or very difficult for him or her to operate computer without the help of an operating system.
He conclude that it is essential that operating system must be first running on the system before being used by user for performing a task. Operating system is like a manager of accompany who manages and co ordinates all the functions of company and its automatically loaded first when you switch on your computer.
C.S French (2001), recommend that the computer should monitor and control their operations where possible by using the software which performs these monitoring and controlling operations called operating system.
He observed that operating system should have the following features:
Efficiency, in term of processor and resource utilization throughout of job, response time for multi –access system turn-round time.
Reliability, in term of being errors free and handling all possibilities in execution of job.
According to Stephen Haag (2002), defined computer network that is the network of two or more computer connected so that they can communicate with each other and share information, software peripherals devices and processing power. Also Mr. French verify that to have a network you may have two or more computers, but many of the network have dozens, hundred or even thousand of computers. Also he continue that if you want to connect the computer to the network you need hardware devices that serves a connection from your computer to another network ,that is the internet.
CHAPTER THREE
3.0. RESEARCH METHODOLOGY
The chapter provides details of the design and approaches for the research, such as Research design, Research techniques, Population, Sample size, Sampling method, Data collection method and Types of data collected.
3.1. Research Design
The study was of descriptive nature. In conducting the research of “managing network operating system”, the research activities were lay on the case study as the major component to be considered. This design has been recommended because it was less comparative expensive and data collection was manageable than in other research design
3.2. Research Techniques
Research applied both quantitative and qualitative techniques in collecting and analyzing data during the research activities. The qualitative technique was used for open ended questions while quantitative technique used for closed questions. Therefore, to seek relevant information from knowledgeable persons whether formally or informally was applied.
3.3. Population Inquiries
The study of population was based on the internal management and employees from the centre. Population refers to the total number of cases from which a sample was taken. As far as this study was concerned, it was conducted at the Natural Forest Resources Management and Agroforestry Centre, NAFRAC centre where the population of about 76 employees will be targeted.
3.4. Sample Size
To be able to generalize the targeted population, the sample was consisted of about 35 respondents of various sections including IT manager, and administrative staffs.
3.5. Sampling Method
During the research activities, two methods of sampling were used. These were simple random sampling and purposive sampling method.
3.5.1. Simple random sampling
This method was enabled to get the sample unit which was represented the whole population without making biasness to specific unit whereby every unit in a population had an equal chance to be represented into the problem.
3.5.2. Purposive sampling
This method was employed in order to determine the sample to be represented, where by a researcher was made an inquiry to targeted departments of Networking and IT Manager/officers.
3.6. Data Collection Method
In the research process, both primary and secondary data were collected, using different methods for each type of data. The following methods were applied during data collection such as: -
3.6.1. Interview
The discussion was held with targeted population and their comments be recorded and then analyzed. This was involved direct consultation with the ordinary members of staff from different departments within the NAFRAC.
3.6.2. Observation
A researcher participated in the daily routine and procedures in various activities without asking from respondents. This was enabled the researcher to collect data and get explanation about various procedures.
3.6.3. Questionnaire
A series of questions was constructed. The respondents were required to answer the questions following the instructions to each question to obtain the data related to managing network operating system.
3.6.4. Documentation
On this category of method of data collection about the study various documents were reviewed such as books, networking manual, networking reports, organizational brochures and other supporting documents that assisted to make up findings of the study. Also this method minimizes the cost in data collection.
3.7. Types of Data Collected
In order to collect data from various sources within NAFRAC both primary and secondary approach were used as follows:
3.7.1. Primary data
The research data was obtained through observations, interviews and questionnaires from the employees and others workers within the Natural Resources Management and Agro forestry centre (NAFRAC).
3.7.2. Secondary data
These were the data that was obtained through various documents such as networking reports, organizational brochures journals, books, and files concerning networks and operating systems.
3.7.3 Data analysis techniques
The collected data was analyzed using both quantitative and qualitative methods. Numeric data was analyzed quantitatively using statistical methods involving percentage comparisons. Non-numeric data was analyzed qualitatively.
CHAPTER FOUR
PRESENTATION OF RESEARCH FINDINGS & DATA ANALYSIS.
4.1.0 PRESENTATION OF RESEARCH FINDINGS
This chapter presents analysis and discussion the research findings as per study research
Questions and research objectives. The data gathered are presented, analyzed, and interpreted using descriptive analysis approach.
4.1.1 INTRODUCTION.
The researcher finds that, the NAFRAC system is not centralized though it is networked; it means that there is no management of NOS which can act as the centralization tool. The Natural Forest resource Agroforestry and management centre (NAFRAC) network is a combination of small peer to peer networks (workgroup). Although there is a server at the NAFRAC, much part of the network has been configured as peer to peer where each PC user has equal access right as every other user in the network. Thus, any user can access the PC without any restrictions, though there are some passwords but these are normally known by many people or sometimes it was a default, you just press enter EXAMPLE guest user account.
However, the NAFRAC is in the progress to implement centralized systems which have strong and powerful signals to facilitate performance and efficiency of the centre daily activities. The centre has not yet train employees about Management of Network Operating systems and services.
4.1.2 RESPONDENTS VIEWS ABOUT MANAGING NETWORK OPERATING SYSTEMS AT THE CENTRE
The following are the opinions of the respondents regarding the Management of Network operating systems (NOS) at the NAFRAC. The results of their responses to the questions are indicated below.
Question 1: Do you have any idea of the Network Operating Systems?
Source: computations from questionnaires
Figure 1: NAFRAC Employee’s response on an idea of network operating system.
The study revealed that 80% of the respondents have an idea of the Network Operating Systems while 20% of them don’t have any ideas on the network operating system
Question 2: What type of Network operating system (NOS) the centre use?
Source: computations from questionnaires
Fig 2: NAFRAC Employee’s response to the type of NOS the centres use.
When the respondents were asked on the type of network operating system they use, most of them 71.4% respond that they are using Window XP as their network operating system at the centre, 17.1% said that they don’t know type of NOS they are using, 5.7% said that they are using Windows 98, 2.9% using Macintosh and 2.9% also uses Windows 2000.
Question 3: Whom one manages installed network technology and network operating system within the centre?
Source: computations from questionnaires
Figure 3: NAFRAC employee’s response on whom one manages NOS at the centre.
The findings revealed that most of respondents 45.7% said that is system administrator manages NOS at the centre, Also about 22.9% they don’t know whom one manages network operating system at the centre, 22.9% said is ICT management and 8.6% said that the one manages NOS is network Engineer.
Question 4: Do you have the server(s) in the centre?
Table 1: NAFRAC Employee’s response on the server at the centre.
Source: computations from questionnaires
Most of the respondents74% revealed that they have server at the NAFRAC, But some of them 26% said that they don’t know if the centre has got the server. Due to the percentage above it indicates that the centre has got a server.
Question 5: What is the type of media the centre use?
Source: computations from questionnaires
Fig 4: NAFRAC Employee’s response on type of media the centre use.
The study revealed that 60% use wireless connection from and to the router.23% said that the centre use both wireless and cable media and 17% said that centre use cable media. This implies that organization use wireless connection for its network.
Question 6: Do you have a local area network in the centre?
Table 2: NAFRAC Employee’s response on local area at the centre.
Source: computations from questionnaires
When the respondents were asked if they do have LAN at the centre, most of them 82.9% were aware of the fact that they are networked since they were sharing printers and other services such as sharing of files at the centre. But few of them 17.1% they said that they don’t have a local area network at the centre. This revealed that they don’t have any ideas about local area network.
Question 7: Which kind of network technology the centre does use?
Source: computations from questionnaires
Figure 5: NAFRAC Employee’s response on the network technology the centre use.
The majorities about 45.7% of respondents said that the computer network technology which they use is Ethernet. Also 34.3% have said that they don’t know the type network technology the centre use. But 8.6% have said that they use Ring topology as their network operating system,8.6% of them respond that the centre use Fast Ethernet technology and 2.9% said that the centre use FDDI network technology.
Question 8: How many computers do you have in the centre?
Table 3: NAFRAC Employee’s response on the number of computers at the centre.
Source: computations from questionnaires
The findings revealed that the number of computers at the centre is range from 10-20 computers by 62.9% of the majorities. About 14.3%said that range of computer is 1-20 at the centre, 14.3% said that the number of computers is about 20-30 and 2.9% indicate the range is 30-50 computers. From this it implies that the range of computer is about 10-20 computers.
Question 9: Have you ever changed from one network media to another such as from cable to wireless or within cables media such as coaxial to twisted or wireless media such as infrared to microwave etc?
Source: computations from questionnaires
Figure 6: NAFRAC Employee’s response on change from one network media to another.
The respondent required to say Yes or No from the question. The findings revealed that most of them 80% have said that they haven’t change from one network media to another one while 20% have said that they did change from one network media to another.
Question 10:
(a)Do you think there any advantages of use network operating system in the centre?
Source: computations from questionnaires
Figure 7: NAFRAC Employee’s response on advantages of network operating system in the centre.
The study indicated that most of the respondents 82.85% said that there some advantages of using network operating system in the centre while 17,14% they don’t know any advantages of network operating system in the centre. But the findings revealed that most of them know advantages of network operating system they use.
I f yes mention them?
Most of the respondents mentioned some of the advantages they know, they mentioned advantages of network operating system such as file sharing ,sharing resources, reduce cost, increase transparency and security of data, it flexible, set up can be configured and file management is possible at the centre.
Question 11:
(a)Do you think there any disadvantages of use network operating system in the centre?
Table 4: NAFRAC Employee’s response on disadvantages of using network operating system in the centre.
Source: computations from questionnaires
The findings revealed that most of the employees about 62.85% at the centre they don’t know any disadvantages of using an operating system at the centre while using it for their daily activities. Also about 34.28% of them, they know some of disadvantages of using an operating system at the centre while 2.85% didn’t respond on the question from the questionnaire given.
(b)If yes mention them?
The study revealed that 34.28% of the respondents seems that they know some of the disadvantages of using network operating system at the centre, and they mention ed disadvantages of network operating system such as it requires skilled staff to manage, reduce privacy of data, cost of hardware (server) for client/server network operating system, causes eye effects and single point of failure.
4.2.0 DATA ANALYSIS
According to the proposed methods of data collection in chapter three, the researcher applied the following methods in collecting data, namely, Interview, Questionnaire, Observation and Documentation.
4.2.1 INTERVIEW AND QUESTIONNAIRE
In relation to the data collected through these methods, the major objective for all these was to come up with relevant information reflecting the management of network operating system at the NAFRAC. Reflecting to the Interview conducted and Questionnaires distributed to the employees at the centre were aimed at getting different responses on the management of network operating system at the centre. The respondents were needed to put tick on either “Yes” or “No” according to his/her views. However they also given a chance to give out their views in narration on some of the questions and selecting some of the selections given to them.
The total numbers of representatives were 35 being supplied with questionnaire sets, and the other 5 representatives were interviewed by the researcher.
4.2.2 OBSERVATIONS:
The observation method was conducted at the centre as proposed on chapter three and the following are the evaluations of it.
4.2.2.1 Problems of Virus Transmission and Infection
The Problem confronting the System Administrator at the NAFRAC is the Virus transmission and infection to the computers at the centre, towards their role of making sure that computer systems are running under safe and secure environments. The problem was much notable to PCs with internet connection as compared to stand alone PCs.This resulting to the hard work of installing Anti-virus to every individual computer at the centre(NAFRAC), instead of installing at the server only if the system could be centralized.
4.2.2.2 Network troubleshooting
Recognizing and diagnosing networking problems with the goal of keeping your network running optimally is another problem confronting system administrator at the centre. Failure to improve network performance and maintaining connectivity of devices (fault management)
(a) About Connectivity Problems
Connectivity problems occurs when end stations cannot communicate with other areas of your local area network (LAN) or wide area network (WAN). Using management tools, you can often fix a connectivity problem before users even notice it. Connectivity problems include:
Loss of connectivity - When users cannot access areas of your network, your organization's effectiveness is impaired. Immediately correct any connectivity breaks.
Intermittent connectivity - Although users have access to network resources some of the time, they are still facing periods of downtime. Intermittent connectivity problems can indicate that your network is on the verge of a major break. If connectivity is erratic, investigate the problem immediately.
Timeout problems - Timeouts cause loss of connectivity, but are often associated with poor network performance.
(b) About Performance Problems
NAFRAC network has performance problems when it is not operating as effectively as it should. For example, response times may be slow, the network may not be as reliable as usual, and users may be complaining that it takes them longer to do their work. Some performance problems are intermittent, such as instances of duplicate addresses. Other problems can indicate a growing strain on your network, such as consistently high utilization rates.
(c) Solving Connectivity and Performance Problems
When you troubleshoot your network, you employ tools and knowledge already at your disposal. With an in-depth understanding of your network, you can use network software tools, such as "Ping", and network devices, such as "Analyzers", to locate problems, and then make corrections, such as swapping equipment or reconfiguring segments, based on your analysis.
4.2.2.3 Problems resulted from poor network documentation
Major parts of the NAFRAC network are not documented. This case is so serious at the server building (Ndagashida) comparing to other two buildings the researcher has visited. The researcher himself has experienced a great delay in identifying and troubleshooting problems at this particular workgroup. Network cables and hub ports have not been labeled, also much of the troubleshooting work done here is essentially try and error method, which in some cases has lead to other unintended problems such as disconnecting users from network.
4.2.3 DOCUMENTATION:
With the cooporation and kindly assistances Under this method,the researcher got from the NAFRAC’s staff especially from documantation and dissemination department and adminstative staff, was able to review different documents particularly those acknowledging the general management of network operating system activities. The researcher also visit NAFRAC’s bronchures which enabled him to get various information from it which included the missions and vision and the objectives of the NAFRAC.
4.3.0 INTERPRETATION OF THE FINDING
Based on and in relation to the objectives of the study stated in chapter one (1) on page 3, here below is the interpretation of the findings.
4.3.1 According to the findings and previous data analysis, researcher discovered that network operating system is completely not centralized at NAFRAC. Instead the centre uses workgroup connections so as to make networking at the NAFRAC information system. Peer to peer networking is not a centralized system in such; it is a system which enables sharing of printer and other resources but not from the server.
However, the workgroup connections system provided at the centre meet certain proportion at which implementation of network operating system is at good stage.
4.3.2 Also the researcher observed from respondents and data analysis that there some of the advantages of using NOS at the centre such as file sharing, sharing of the resources, reduce cost of application software and hardware. Another was increase transparency of data and provides security of the data at the centre. On another side researcher discovered that there some of the disadvantages of NOS use at the centre which were:
- It requires skilled staff to manage and maintain at the center.
- Also it reduces the privacy of information among workers at the centre.
- Network operating system increase cost in term of hardware such as client/server network operating system need powerful and strong server which is costly.
4.3.3 In relation to the findings obtained above at the NAFRAC local area network revealed that system administrator is the one maintain and manages installed network technology and network operating system at the centre. This enables sharing of resources, files and resources at the centre.
4.3.4 On top of that the computer system at the NAFRAC is linked through Local Area Network by using Ethernet network technology. This enabled processing activities to be done throughout the centre’s departments.
4.3.5 According to the observation and data analysis, the researcher revealed that the NAFRAC use Window as its network operating system but the best type of NOS to be used at the centre is Linux which is free download from the internet without recurring fee and it provide strong security than Windows.
Although the process of implement a centralized system is going well, still there are some problems that researcher discovered when this study was conducted. First of all some staff are not taking this training of using it. This is because the Natural Forest Resources Management and Agroforestry centre does not take much serious on monitoring them on the importance of the training they are supposed to learn.
CHAPTER FIVE
CONCLUSION AND RECOMMENDATIONS.
This chapter concludes the study by revealing general observations particularly obtained in chapter four (4) which help to give a conclusion to the main research objective(s) posed. Then, it presents some recommendations partly obtained from the respondents and others are the views of the researcher himself having done a careful analysis and observation of the state of affairs at the organization.
5.1 Conclusion
This was generally observed that:
5.1.1 Network security which is the most important feature of the network operating system management is still weak at the centre. The study revealed that, poor system security is the result of the type of the network configuration used, which is peer to peer (NAFRAC workgroup).This type of network which was meant for small organizations, assumes that all network users have the same information needs to network resources something which is impractical. In reality different users have different information needs to the same network resource; therefore their access to the resource must be controlled accordingly. Share level security provided by peer to peer networks is not as flexible as user-level security found in most domain (Client-Server) networks and does not provide as much protection for data and computers such as viruses also in term of accessibility every one can uses the same password to access a shared resource, it is difficult to keep passwords secure. In addition, the access control provided by this security model is not as granular as that of user-level control which you can use to grant users highly specific sets of access permissions to network resources
5.1.2 The results from general observations and researcher’s own interaction with the network show that there is much problem with general network documentation. Much of the network items that were supposed to be documented have not been documented. This has a great impact on general troubleshooting process especially to a new staff as encountered by the researcher and worst of all can lead to loss of important network information. Loss of important network information can result into loss of sensitive data of the centre.
5.1.3 Also it has been observed that the IT department has centralized knowledge and techniques to the users who could have roles to play on the whole issue of managing the network. This has lead to IT staff to do everything even to those simple tasks that could have been done by end-users themselves. It should be understood that end users form an integral part in the whole process of managing the network. And because the network is there for them their involvement becomes not only necessary but also inevitable. Proper utilization of end users can minimize if not eliminates altogether many end-user-related problems and a good tool in fault management. Therefore end-users must be regarded as partners in an IT department.
5.2.0 Recommendations.
In future similar studies should focus on four major issues; improving user’s knowledge on the better utilization of IT facilities and services, importance of proper system documentation, Shifting from Peer to Peer to full Client-Server network, type of network operating system and implementation of a better network operating system at the Centre.
5.2.1 Improving User’s Knowledge
The researcher strongly believe that in order for the equipment to yield its maximum benefits to its users , then it is very important that the users should understand the equipment to its full potential and also know how to achieve this potential. It is in this case that the management should train its users to ensure that all users (computer operators) have the basic knowledge about operating and taking care of the machines (computers in this case). This, the researcher has experienced, leads to lower ‘down time’ of the equipment, as the operators do not have to wait for technicians, for user-solvable problems. Due to this, it increases the efficiently levels of the user’s job output leading to better satisfaction.
5.2.2 Proper System Documentation.
In relation to the findings section in chapter four, that one among other problems which are facing system administrator at the study area is poor network documentation for their systems. Most of them seemed to rely entirely on their heads as their documentation tool. Probably to them this sounds good as far as they can remember everything. But what if the IT officer (ITO) leaves the centre? What if the network responsibility has been delegated to a new staff? These and other related questions probably can remind Information Technology Officers the importance of having proper documentations for their networks that will enable easy trouble shooting of the network for users and new staff such as:
- A network diagram (network topology, Active Directory layout, etc.)
- A list of the computer names and IP addresses if applied
- Supporting documentation for software licenses purchased, along with documentation showing who the installation disks were given to at the end of the project
- Receipts for hardware purchases
- A detailed description of any configuration procedures used (group policy settings, user account configurations, VPN configurations, etc.)
- The names and contact information of any one that you worked with on the project, as well as notes about the roles they played in the project (who approved what, etc.)
5.2.2.1 Network Documentation
Faster Trouble Shooting: Good documentation reduces the need to research solutions to the same problem each time the problem arises. A visual network diagram can help to identify potential problem areas in time.
Reduced Information Loss: Network documentation prevents loss of important network information when employees leave the centre making transition period less painful.
Easier Task Sharing: Information Technology Officers can successfully delegate network responsibilities because important information is available in written form.
Improved Network Design: A current network diagram is a key tool in any further design process.
Greatest Benefit of All: Complete up to date network documentation saves time.
5.2.3 Shifting From Peer To Peer to Full Client-Server Network.
Following security problems outlined in the ‘Research findings section’ the researcher recommends the management to discard the existing system and move to a new and more security conscious system which is client-server network. The following are the advantages of it.
Centralized Security: Client-Server networks provide centralized control over access to network resources. In addition access security can be customized to meet centre requirements, which helps to protect sensitive data from loss, destruction, theft, or unauthorized disclosure. Above all, most client-server environments have discretionary access control which allows a system administrator to grant or deny access to a file (resource).This will further increase system security.
Data Security: Data stored centrally is backed up in a timely and reliable manner. This reduces the potential cost of lost data and a key tool in failure recovery.
5.2.4 Type of Network Operating System
According to findings and observation, the researcher recommends that on the progress of the centre to implement a centralized network system it has to use client/server type of network operating system in its local area network. The network operating system provides the mechanism to integrate all the components of the network and allow multiple users to simultaneously share the same resources irrespective of physical location. The following are the advantages and disadvantages of client/server network operating system
(a) Advantages of a client/server network:
Centralized - Resources and data security are controlled through the server.
Scalability - Any or all elements can be replaced individually as needs increase.
Flexibility - New technology can be easily integrated into system.
Interoperability - All components (client/network/server) work together.
Accessibility - Server can be accessed remotely and across multiple platforms.
(b) Disadvantages of a client/server network:
Expense - Requires initial investment in dedicated server.
Maintenance - Large networks will require a staff to ensure efficient operation.
Dependence - When server goes down, operations will cease across the network.
Centralized Applications: Many applications enable multiple clients to access a single network version of the application. This provides centralized management, centralized security, and simultaneous upgrades of the applications.
Fault Tolerance: Most network operating systems (NOS) provide a number of fault tolerance features, such as disk mirroring, disk duplexing, and disk stripping. These features serve to improve reliability and minimize network down time.
5.2.5 Implementation of a better network operating system at the NAFRAC
The centre should implement a better network operating system when it is ready to implement this system. Different network operating system has different advantages and limitations, the following are the advantages and limitations of different network operating systems.
5.2.5.1 Advantages of LINUX over Windows
The following are the advantages of LINUX over Windows:
Cost - The most obvious advantage of using Linux is the fact that it is free to obtain, while Microsoft products are available for a hefty and sometimes recurring fee. Microsoft licenses typically are only allowed to be installed on a single computer, whereas a Linux distribution can be installed on any number of computers, without paying a single dime.
Security - In line with the costs, the security aspect of Linux is much stronger than that of Windows. Why should you have to spend extra money for virus protection software? The Linux operating system has been around since the early nineties and has managed to stay secure in the realm of widespread viruses, spyware and adware for all these years. Sure, the argument of the Linux desktop not being as widely used is a factor as to why there are no viruses. My rebuttle is that the Linux operating system is open source and if there were a widespread Linux virus released today, there would be hundreds of patches released tomorrow, either by ordinary people that use the operating system or by the distribution maintainers. We wouldn’t need to wait for a patch from a single company like we do with Windows.
Choice (Freedom) - The power of choice is a great advantage. With Linux, you have the power to control just about every aspect of the operating system. Two major features you have control of are your by way of numerous , and the . In Windows, your either stuck using the boring default desktop theme, or risking corruption or failure by installing a third-party shell.
Software - There are so many software choices when it comes to doing any specific task. You could search for a text editor on and yield hundreds, if not thousands of results. My article on explains how there are so many options just for editing text on the command-line due to the open source nature of Linux. Regular users and programmers contribute applications all the time. Sometimes its a simple modification or feature enhancement of a already existing piece of software, sometimes its a brand new application. In addition, software on Linux tends to be packed with more features and greater usability than software on Windows. Best of all, the vast majority of Linux software is free and open source. Not only are you getting the software for no charge, but you have the option to modify the source code and add more features if you understand the programming language. What more could you ask for?
Hardware - Linux is perfect for those old computers with barely any processing power or memory you have sitting in your garage or basement collecting dust. Install Linux and use it as a , a , or a . There are endless possibilities. Old or computers with barely any RAM run Linux without any issue. Good luck running Windows on these machines and actually finding a use for them.
5.2.5.2 Disadvantages LINUX over Windows:
Understanding - Becoming familiar with the Linux operating system requires patience as well as a strong learning curve. You must have the desire to read and figure things out on your own, rather than having everything done for you. Check out the .
Compatibility - Because of its free nature, Linux is sometimes behind the curve when it comes to brand new hardware compatibility. Though the kernel contributors and maintainers work hard at keeping the kernel up to date, Linux does not have as much of a corporate backing as alternative operating systems. Sometimes you can find third party applications, sometimes you can’t.
Alternative Programs - Though Linux developers have done a great job at creating alternatives to popular Windows applications, there are still some applications that exist on Windows that have no equivalent Linux application. Read to find out some of the popular alternatives.
A key advantage that Linux has over Windows is greater security for your computer and its data. The viruses, spyware, worms, and browser hijackings that are pandemic in the Windows world are almost unheard of among Linux users. This is because Linux is designed from the ground up to be secure.
Now that you have an understanding of some of the Linux advantages, its time get out there and experiment. Windows can be a great tool for the lazy and incompetent, but it takes a true scholar and one who wants to learn to run a robust operating system like Linux.
APPENDICES
APPENDIX I
BIBLIOGRAPHY AND REFFERENCES
C.S French (2001), Data Processing and information technology (10th edition reprinted).
.
.
James A. O’Brien (2003), Introduction to Information System (11st edition).New York, America, Mc Graw-Hill/Irwin.
Jump node (2006), Network Management and monitoring (3rd edition).Tata McGraw-Hill, New
Jessica Keyes (2000), Internet Management: CRC Press.
Kenneth C.Laudon (2005): Essential of Management Information system: sixth Edition, U.S.A. America: Natalie E. Anderson.
Saini Pradeep Kumar (2003), Computer applications in management (1st edition).New Delhi: Anmol Publications Pvt Ltd.
Stephen Haag and Alan I. Rea, Jr, (2004), Computing Concepts (2nd edition).Graw-Hill/Irwin,New York. America.
Tom Carson (2001): Information security and management, Understanding ISO 17799.Mc-Graw-Hill, New York
Versha Mehta N .Kumar (2003), Computer Applications in Business Management (1st Edition), New Delhi, India: Anmol Publications Pvt.Ltd.
APPENDIX II
RESEARCH QUESTIONNAIRE
I Masanja Martin, a student of Institute of Accountancy Arusha pursuing Advance Diploma in Information Technology (ADIT), This questionnaire is based on study of Managing Network Operating Systems in the organization, with an idea of knowing the contribution of network operating systems in Natural Forest Resources Management and Agroforestry Centre (NAFRAC).
The research is for academic purpose only and not otherwise, any information provided will be treated confidential and used for intended objectives I promise that your reply will be appreciated and the result of the study will be shown in the statistical form only. At your appreciated earliest time, please return the completed questionnaire for better performance of the fieldwork.
Name………………………………………………………………………………………..
The following are the research questions, so you’re kindly requested to answer the questions to this research more successful. Put (tick) the number in the brackets below where appropriate.
1. Do you have any idea about network operating system?
Yes (1) No (2)
2. What type of Network operating system the centre use?
Macintosh (1) Window XP (2) Linux (3) Windows 98 (4)
Windows 2000 (5) don’t know (6)
3. Whom one manages installed network technology and network operating system within the centre?
ICT Management (1)
Network engineer (2)
System administrator (3)
Don’t know (4)
4. Do you have server(s) in the centre?
Yes (1) No (2)
5. Which of the following is the type of network media do use in the centre?
Wireless (1) Cable (2) Both (3)
6. Do you have local area network in the centre?
Yes (1) No (2)
7. Which kind of network technology do use in your centre?
Ethernet (1) Ring Topology (2) Fast Ethernet (3) FDDI (Fiber distributed data interface) (4) don’t know (5)
8. How many computers do you have in the centre?
1-10 (1) 10-20 (2) 30-50 (3) 50-100 (5)
9. Have you ever changed from one network media to another such as from cable to wireless or within cables media such as coaxial to twisted, or wireless media such as infrared to microwave etc? Yes (1) No (2)
10. Do you think there are any advantages of use network operating system in the centre?
Yes (1) No (2)
If yes mention them
1.……………………………………………………………………………………………2…………………………………………………………………………………………….3…………………………………………………………………………………………….4…………………………………………………………………………………………….
11. Do you think there are any disadvantages of use network operating system in the centre?
Yes (1) No (2)
If yes mention them
1……………………………………………………………………………………………..2…………………………………………………………………………………………......3……………………………………………………………………………………………..4…………………………………………………………………………………………….
"Thanks very much for spending your time to fill in this questionnaire”
APPENDEX III
FIELD WORK SCHEDULE
The chart below shows the budgeted time for each activity whereby it take sixteen (16) weeks i.e. from 1st October 2007 up to 31st January 2008 to complete the research activities and report submission.
Table 5: Schedule of Activities.
APPENDEX IV
RESEARCH BUDGET
Budget break down: The chart below shows the budgeted time for each activity whereby it take sixteen (16) weeks i.e. from 1st October 2007 up to 31st January 2008 to complete the research activities and report submission.
Table 6: Research budget