Network Administration

Network Administration I have worked as a computer network administrator for over 5 years. I have worked mostly with networks in a mixed Microsoft Windows NT and Novell Netware environment. I am a Novell Certified Novell Engineer (CNE) and I am a certified Novell GroupWise Administrator. I have taken classes in configuration of Cisco routers. In this essay, I will discuss the definition of a network administrator, the tasks and responsibilities of a network administrator and share a day in the life of a network administrator. For documentation on my credentials, I am including my certification certificates. What is a Network Administrator? A network administrator is one who maintains and troubleshoots your computer systems. Depending on the size of your organization and the complexity of your technology, a network administrator's job can range from ten hours per week to full time. There are some obvious network administration tasks, such as installing or upgrading system software and managing user accounts and disks space, so you probably have some idea of what an administrator does. The International Telecommunications Union (ITU) is a consortium of telecommunications companies worldwide who have, among other things, defined a series of recommendations that describe how a telecommunications management network (TMN) should be operated. The ITU members

  • Word count: 2344
  • Level: AS and A Level
  • Subject: ICT
Access this essay

Project Management - The Project Manager must have the necessary technical skills but he should have additional managerial skills i.e. the ability to lead and motivate a diverse group of people.

Project Management What is a Project? It is a short-term activity that brings together people, equipment and resources with a shared objective. The project must: * have a specified objective * be developed within a specified time frame * be developed within a given budget The Project Manager Must have the necessary technical skills but he should have additional managerial skills i.e. the ability to lead and motivate a diverse group of people. Business experience is necessary. The project manager has to plan and staff the project, analyse risks, monitor progress, control budgets and prepare performance appraisals. It is his responsibility to ensure that the project is kept on budget and on time. The project should be broken up into sub-tasks with set "milestones". The project manager has to allocate tasks to individuals or groups. He has to manage resources (e.g. people, equipment and materials) in the best possible way, in order to get the job completed on time and within budget. The project manager must interact with management of the client organisation. He must agree acceptance criteria with the client. Characteristics of a Good Team * Leadership * Appropriate task allocation * Following proper procedures and standards (e.g. the right documentation) * Monitoring, costing and controlling * Project standards agreed by all team members * A

  • Word count: 2109
  • Level: AS and A Level
  • Subject: ICT
Access this essay

ICT in Organisations.

Assignment 2: ICT in Organisations Portfolio Assignment (2b) Graduate School of Education at Queens' University of Belfast Michael Edwards 11D Mr Kinkaid Introduction In the Graduate School of Education they use many different types of computers for many different things. Some staff will use their computers for typing long documents or letters; others may use them for creating PowerPoint presentations for lectures. In most organisations people will use their computers for similar things, but this isn't the case in a university. Server Hardware There are a number of servers, and these all do different jobs. Each server is allocated a name, and this is unique over the whole campus. Most of the main file servers are held within the computer centre. This allows them to rectify any problems that may arise if a server fails. All of the main servers work on dual hardware, and are hot swappable. This means that if one processor fails, or if one Random Access Memory slot fails, they are able to replace it, without any down time. The only time the server would go down would be in the case of a Power Supply Unit failing, and this can be fixed in a matter of minutes. In the computer centre all the computers are connected to a UPS and surge protection, in the form of sockets around the centre. The surge protection will stop computer components being damaged due to a

  • Word count: 2093
  • Level: AS and A Level
  • Subject: ICT
Access this essay

Designing Switched LAN Internetworks.

Designing Switched LAN Internetworks design switched LAN internetworks: * LAN switching * Virtual LANs (VLANs) * ATM switching Evolution from Shared to Switched Networks In the past, network designers had only a limited number of hardware options when purchasing a technology for their campus networks. Hubs were for wiring closets and routers were for the data center or main telecommunications operations. The increasing power of desktop processors and the requirements of client-server and multimedia applications, however, have driven the need for greater bandwidth in traditional shared-media environments. These requirements are prompting network designers to replace hubs in their wiring closets with switches, as shown in Figure 12-1. Figure 12-1: Evolution from shared to switched internetworks. This strategy allows network managers to protect their existing wiring investments and boost network performance with dedicated bandwidth to the desktop for each user. Coinciding with the wiring closet evolution is a similar trend in the network backbone. Here, the role of Asynchronous Transfer Mode (ATM) is increasing as a result of standardizing protocols, such as LAN emulation (LANE), that enable ATM devices to coexist with existing LAN technologies. Network designers are collapsing their router backbones with ATM switches, which offer the greater backbone bandwidth

  • Word count: 1971
  • Level: AS and A Level
  • Subject: ICT
Access this essay

Computer crime can broadly be defined as criminal activity involving an information technology infrastructure, including illegal access

In this day and age, computer security means to provide confidentiality, integrity and prevention against misuse, accidents and malfunctions, with respect to both computer system and the type of information that it contains. The definitions that I have chosen are: "Computer Misuse Act 1990 "An Act to make provision for securing computer material against unauthorized access or modification; and for connected purposes". It states 3 offenses." [LexisNexis, 2008] Convention on Cybercrime: "The Convention is the first international treaty on crimes committed via the Internet and other computer networks, dealing particularly with infringements of copyright, computer-related fraud, child pornography and violations of network security. It also contains a series of powers and procedures such as the search of computer networks and interception." [Convention on Cybercrime 2008] Computer crime can broadly be defined as criminal activity involving an information technology infrastructure, including illegal access "Under the Convention, damaging, deletion, deterioration, alteration or suppression of computer data without right comprises the 'data interference' offense which can be limited to conduct resulting in serious harm." [LexisNexis, 2008] The three definitions used, for explaining the term computer misuse are quite different from each other. All the definitions covers the whole

  • Word count: 1871
  • Level: AS and A Level
  • Subject: ICT
Access this essay

Local area networks (LANs).

DEFINITION The concept of local area networks (LANs) is not new. It represents a logical development of computer technology. With the advent of microcomputers in the 1980s many office workers began bringing their own disks into work, compromising data integrity. They also began keeping their own databases, which companies did not like. The answer was to create a computer network. A computer network is a group of computers connected together enabling users to share resources and communicate with each other. Resources can be hardware, software, or data. Without a network, each employee might require a dedicated printer connected to his workstation or individual copies of application software loaded on his workstation. A network will also allow dissimilar computers to communicate and share resources. This means that an IBM PC can communicate with an Apple Macintosh with ease. There are three general types of networks: Local Area Networks (LANs), Metropolitan Area Networks (MANs), and Wide Area Networks (WANs). They are described or classified by the area of coverage and by the method of information exchange. A LAN encompasses two or more computers connected by one or more types of medium (usually wire) located within close proximity of each other. This distance is generally limited to 2 kilometers. A MAN is a network that connects two or more LANs. It is basically

  • Word count: 1703
  • Level: AS and A Level
  • Subject: ICT
Access this essay

Illegal music downloads. This Essay will treat and analyze main points of advantages and disadvantages of unauthorized media files sharing; Government's aspiration to put down a breach of copyright; the influence of free and unlimited music downloads on

INTRODUCTION Nowadays, music has become an integral part in the life of modern man. For many years people have been expressing their feelings using music or the words expressed by the appropriate tune. Music has developed over several decades: many professional artists had appeared in that period, whose records were accessed to everyone in any music store in the forms of LPs, then cassettes, then CDs... It can be spend hours on discussing the development of the music industry, which has become one of the most profitable business areas. However, during the development of this sphere in the world of business has appeared a set of new, various industries, one of which is the Internet Network. With the advent of the global information network, the music industry began to suffer losses, because the Internet network with high speed began to develop piracy, unauthorized (illegal) media files sharing. This Essay will treat and analyze main points of advantages and disadvantages of unauthorized media files sharing; Government's aspiration to put down a breach of copyright; the influence of free and unlimited music downloads on various spheres of activities, such as industries of recording, marketing and modern technologies; piracy impact on the job market and musicians' income; the effect of copyright infringement on the level of economic growth of the country. Nowadays almost

  • Word count: 1630
  • Level: AS and A Level
  • Subject: ICT
Access this essay

ICT Implementation

3. Implementation: Tables 3.11 Item on Order table: The first thing I did when creating my database system was creating the tables. I made 5 different tables which include; Item Stock, Supplier, Order, Item on Order and Transaction table. In my first table (Item on Order) I entered fields that are relevant to gaining information about the order list in order to update the stock, like the id number, quantity ordered, price paid etc. I also entered the data type for that field like whether it was an AutoNumber, Text, and Date/Time etc. The primary key for tblItemOnOrder is ItemOrderID. Validation- to ensure only the correct format would be accepted: * Quantity on order- User can only enter quantity between 1 and 24 * Price Paid- User cannot enter price below £1 or above £50 The price paid field was tested with both normal and erroneous data, the validation was a success as it allowed the correct price values to be entered, but I like boys incorrect data displayed an error message. The user can only enter a value between £1 and £50. There are also lookups in the Item on Order table such as on the field id number; it needs to be looked up from the Item Stock table. The screen above shows a lookup being implemented into the item on order system, so when the user selects id number he can select which item of stock. The lookup is successful the user

  • Word count: 1501
  • Level: AS and A Level
  • Subject: ICT
Access this essay

Crime and crime prevention

Crime and crime prevention Introduction Internet can let people access to the worldwide market place and buy some stuff they want through Internet (example EBAY) and the product will come within one week. Instead of going library-getting information they want, people can also use the Internet and access to World Wide library and get lots of information from it. People can also play the online games and chat with friends on Internet. Internet can allow us to access entertainment easily, which include music, film, movies and games. It was on 24/7, so we can access it at any convenience time. The technology has changed our life, because it has made all the things easier because we can just buying goods at home without going outside. We also can get a cheaper stuff we want from the Internet by compare the price. But some people is making crime with the technology, so the identity theft are beginning to put people off shopping and banking online. As a survey get by a software firm show that 17% of people said they had stopped banking online while 13% had abandoned web shopping. The reason is they are worried about some people would get their card details and stolen money from it. Because the term refers to the practice of creating look-alike websites, often of banks and other financial institutions, and duping people into visiting them and giving out personal information such

  • Word count: 1453
  • Level: AS and A Level
  • Subject: ICT
Access this essay

The Sullivan's matrix report

Information Strategy "Organizations are increasingly able to gather and process information from a variety of new sources" (Ferguson et al., 2005 p51) 'Sullivan's matrix' introduces different ways to classify the IT/IS environment of an organisation. Within this matrix, there are four environments: Traditional, Opportunistic, Complex and Backbone. The idea of this report is to describe how the IS/IT environment of Inditex fits into Sullivan's matrix. According to Ward & Peppard (2002) organisations with a traditional IT/IS environment have a highly centralised control of their IT resources. "IS is not critical to the business" and IT is solely used to improve efficiency on a system-by-system basis. McAfee (2004) raises many points in his article to suggest that the IT/IS of Inditex fits into this Traditional environment. Inditex see IT as merely an enabler for their business. McAfee (2004) confirms this theory as he states that "The role of IT, then, is to support the process" (McAfee, 2004). Ward & Peppard state that within a Traditional environment, IT is simply used to support business processes and to improve the efficiency of the organisation. Another point which supports the theory is that Inditex have an excellent IT and business alignment. "business goals always shape the company's use of technology, never vice versa" (McAfee, 2004). This portrays Inditex

  • Word count: 1404
  • Level: AS and A Level
  • Subject: ICT
Access this essay