Network management assignment, Computer Networking

One of the key roles of a System/Network Administrator is to monitor log files. This usually requires helper scripts (i.e. Perl programs) so a summary of large log files can be quickly scanned to determine if there is anything wrong with the server or network. The assignment will examine your understanding of the material covered so far in the unit.

For this assignment you will write a Perl program to process Linux log files and produce reports. The daemons klogd and syslog/syslog-ng receive log messages from the kernel on a local machine, and also can be configured to receive log messages from remote systems - the machine is then known as a "log server". These messages are then typically stored in files within the /var/log directory. Most log messages are stored in /var/log/messages. The lines in these log files will often (but not always) start with the date and time, followed by: the computer hostname from which the message was sent, the name of service which sent the log message, a unique number representing that service in square brackets, and the message in its own format. See the provided example messages file.

 

Posted Date: 3/14/2013 12:57:28 AM | Location : United States







Related Discussions:- Network management assignment, Assignment Help, Ask Question on Network management assignment, Get Answer, Expert's Help, Network management assignment Discussions

Write discussion on Network management assignment
Your posts are moderated
Related Questions
Question 1 Describe the architecture and usage of ISDN Question 2 Write about different network structures in use Question 3 Explain the concept of framing in Data Li

How Firewall configuration makes all the difference The greatest blunder that any company make is to just install a firewall and think that they have ensured perfect securit

Control Frames for Lost Tokens If station goes down ... token lost Predecessor listens for data frame or token Noticing none, retransmits token Sends whofoll

QUESTION (a) In CSS, each element in a document is considered to be in an invisible box. Give three ways how to make the box visible (b) (i) Explain the meaning and use of t

#questiGE 1-A Objectives: • Consolidate EIGRP knowledge. • Introduce the Route Redistribution concept. • Introduce the EIGRP External Routes concept. • Introduce the Default Met

Can you define the concept of Repeaters, Hubs, Bridges, Switches and Routers?

Lat take the CONNECT (client side), LISTEN, and ACCEPT (server side) socket primitives a) Why are these three needed for a TCP connection? b) Why are none of them needed for a U

a) Manages protocol access to the physical network medium b) Permits multiple devices to uniquely signify one another on the data link layer

Session layer examples are Netbios Names, SQL, NFS, X Windows, and RPC

Example of transport layer are:- a) TCP is connection oriented. b) UDP is connectionless