System - network administrator, Computer Networking

The program must be well documented which includes meaningful variable and subroutine names ("self documenting code") along with comments in the code. The following block of code will appear at the start of your program to which you will add meaningful descriptions (formatting, spelling and grammar will count here!! - the target of your descriptions is someone who can program at a basic level, but is not familiar with Perl - so be verbose where necessary :)

Format your code so it is readable - indent your code in blocks so that the "{" and "}" line up correctly. Use the code examples in the textbook as a guide. You are also allowed to put blank lines in the code where necessary to enhance readability. This makes the program easier to read in the same way that the blank lines I have placed between the paragraphs of this document make it easier to read.  i.e., use whitespace appropriately!

The messages log file will contain various records (lines) and fields (information) but not all the records or fields are needed to produce the required reports. The log file is to be processed to produce the requested report on screen. Only relevant records that correspond to the service that is of interest are to be processed, while all other records are to be skipped and not counted toward the statistics created.

Store the example messages log file in the" /home/user/assignment1 " directory along with your Perl program, but the program should work with the filename given as a commandline argument, or get the logs from the command line if no filename is given. That is the program could also receive the file from, for example piping "cat /var/log/messages |".


Posted Date: 3/14/2013 12:59:30 AM | Location : United States

Related Discussions:- System - network administrator, Assignment Help, Ask Question on System - network administrator, Get Answer, Expert's Help, System - network administrator Discussions

Write discussion on System - network administrator
Your posts are moderated
Related Questions
When programming a server or a client, we have to deal with port numbers and IP addresses, but we usually do this through an abstraction called a socket. Sockets are the standard A

What is the main purpose of OSPF? OSPF, or Open Shortest Path First, is a link-state routing protocol that uses routing tables to verify the best possible path for data exchang

implementing cnet sliding window protocol with 6 nodes

Describe at one disadvantage of a peer to peer network. When you are accessing the resources that are shared by one of the workstations on the network, that workstation takes

In distributed routing computation, every packet switch calculates its routing table locally and transmit messages to the neighbors. It also updates information regularly. If a pac

What do you mean by OSI? The Open System Interconnection (OSI) reference model explains how information from a software application in one computer moves by a network medium to

Recognize the access-list range for an extended IP access-list? Ans) IP extended access-lists use the number range of 100-199.

Connection Establishment TCP transmits  data in full duplex mode. When two TCP is two machines are  connected they are able  to send segments to each other simultaneously. This

Advantages and Disadvantage of Computer Networking Most of the benefits  of networking  can be  divided into  two  generic categories Connectivity and  sharing. Networks

POWER SUPPLY SYSTEM IN  SATELLITE SYSTEM Satellite Earth Station relies on the public power supply system. Two generators (1+1) of 250 KVA each in parallel connection having fa