Network management assignment, Computer Networking

One of the key roles of a System/Network Administrator is to monitor log files. This usually requires helper scripts (i.e. Perl programs) so a summary of large log files can be quickly scanned to determine if there is anything wrong with the server or network. The assignment will examine your understanding of the material covered so far in the unit.

For this assignment you will write a Perl program to process Linux log files and produce reports. The daemons klogd and syslog/syslog-ng receive log messages from the kernel on a local machine, and also can be configured to receive log messages from remote systems - the machine is then known as a "log server". These messages are then typically stored in files within the /var/log directory. Most log messages are stored in /var/log/messages. The lines in these log files will often (but not always) start with the date and time, followed by: the computer hostname from which the message was sent, the name of service which sent the log message, a unique number representing that service in square brackets, and the message in its own format. See the provided example messages file.

 

Posted Date: 3/14/2013 12:57:28 AM | Location : United States







Related Discussions:- Network management assignment, Assignment Help, Ask Question on Network management assignment, Get Answer, Expert's Help, Network management assignment Discussions

Write discussion on Network management assignment
Your posts are moderated
Related Questions
Cut-Through is the best mode of switching. Store and Forward reads in the whole frame, confirms the frame is valid, and then forwards the frame onto the wire. Cut-Through only chec

Half-Duplex - Capability for data transmission in only single direction at a time among sending station and a receiving station.

There are basically two functions for creating routing tables, which are as given: Manual entry Software Further there are two types for computing routing table inf

Problem 1 Describe the architecture of the TCP/IP protocol suite Problem 2 Describe the principle of operation of REXEC protocol Problem 3 Describe the concept

Assume the following 64-bit DES key (expressed in hexadecimal): FEFE FEFE FEFE FEFE (a) What is the term for such a key? (b) State the value of each of the 48-bit round keys

Sharing  information  To understand  how distance vector routing  works examine the  internet shown in  the  clouds represents local  area network . the  number  inside each c

Full-Duplex Ethernet 10Base5 as well as 10Base2 are half-duplex Full-duplex raises capacity of each domain No require for CSMA/CD

A carrier is frequency modulated with a sinusoidal signal of 2 kHz, resulting in a maximum frequency deviation of 5 kHz. (a) Find the bandwidth of the modulated signal (b) The ampl


Explain the term- congestion The average queue size over the last cycle and the current cycle is calculated. This value is the threshold. By averaging over two cycles instead o