Network management assignment, Computer Networking

One of the key roles of a System/Network Administrator is to monitor log files. This usually requires helper scripts (i.e. Perl programs) so a summary of large log files can be quickly scanned to determine if there is anything wrong with the server or network. The assignment will examine your understanding of the material covered so far in the unit.

For this assignment you will write a Perl program to process Linux log files and produce reports. The daemons klogd and syslog/syslog-ng receive log messages from the kernel on a local machine, and also can be configured to receive log messages from remote systems - the machine is then known as a "log server". These messages are then typically stored in files within the /var/log directory. Most log messages are stored in /var/log/messages. The lines in these log files will often (but not always) start with the date and time, followed by: the computer hostname from which the message was sent, the name of service which sent the log message, a unique number representing that service in square brackets, and the message in its own format. See the provided example messages file.

 

Posted Date: 3/14/2013 12:57:28 AM | Location : United States







Related Discussions:- Network management assignment, Assignment Help, Ask Question on Network management assignment, Get Answer, Expert's Help, Network management assignment Discussions

Write discussion on Network management assignment
Your posts are moderated
Related Questions
PROBLEM WITH BROADCASTING: There are some issues with the broadcast. For each broadcast frame on the network every computer uses computational sources and places the data into

DNS Message There are  the only  two kinds  of DNS message DNS query and reply messages. Further mote both query  and reply message have  the same  format  as shown in figure.

Firewall The NAT router allows receiving of number of a data streams. If it receives a transmission in the form of acknowledgement or data streams or error responses from an ex



Configure Router1. From Host1, connect to the console of Router 1 and establish a console session. Directions for creating a console connection using HyperTerminal are in Appen

Network Devices a.Hub b.Repeater c.Bridge d.Gateway e.Switch f.Router Connecting devices can  classified  into networking and internetworking  devices when

- EIA/ TIA specifies and RJ-45 connector for unshielded twisted-pair (UTP) cable. The letter RJ stand for registered jack and the number 45 refers to a specific wiring sequence.

Question: a) List three characteristics and two potential problems of a peer-to-peer environment. b) List three characteristics and two potential problems of a client/

Q. Explain about Domain Name System? -In the past, mapping of IP addresses was static using a host file -Impossible in today's dynamic environment -Domain Name System (DN