Describe the concepts of snapshotting and failover

Assignment Help Basic Computer Science
Reference no: EM13935924

Describe the concepts of snapshotting and failover as applied to virtualization.

Task 1.4
Describe how to tell if two machines are on the same IP network from their IP address and their subnet mask or their CIDR value.

Task 1.5
Create a table that shows the maximum number of networks and nodes associated with class A, class B and class C IPv4 addresses. Also show in your table the associated CIDR notation of each class type.

Task 1.6
Some of the following are not valid IPv6 values. What is wrong with each incorrect value?

FE80:0:0:ABAB:A00H:1212:2341:0

2001::1212:ab13

FE80::1231::1121

FE80:0:1212:AB13

Topic 2 : Configuring IP in Windows & Linux

Task 2.1 - Weekly summary of lecture slides

Complete a summary of the week's lecture material as per the "Topic summary requirements" guidelines on page 2 above.

Topic 2 questions:

Task 2.2

Describe the roles of the following:
· An IP address
· A default gateway
· A DHCP server

· A DNS server

Task 2.3

Complete the following table.

IPv4 /CIDR networks and equivalent subnet masks
CIDR notation
Equivalent
subnet mask
(Binary)
Equivalent subnet mask
(decimal notation)
/16
11111111.11111111.00000000.00000000
255.255.0.0
/18
/19
/20
/21
/22

Task 2.4

Describe why IPv6 tunnels are required at this point in history.

Task 2.5

Briefly describe the infrastructure and operation of worlds IPv4 DNS infrastructure and explain why it is critical to the operation of the Internet.

Topic 3 : Introducing Linux

Task 3.1 - Weekly summary of lecture slides

Complete a summary of the week's lecture material as per the guidelines on page 2 above.

Topic 3 questions:

Task 3.2

Linux was developed by a person from Finland. What is this person's name and briefly describe (few paragraphs only) points of interest about Linux development. This could be current day development or development of the initial Linux kernel.

What is the name of the Penguin mascot of Linux?

Task 3.3

In topic 3 we briefly discussed numerous Linux commands.

Create a table with all Linux commands encountered in topic 3 and give a short description of the function of each command.

Task 3.4

Choose any one of the above commands and fully document it. (One A4 page maximum). Your documentation should provide a low skilled PC user the information necessary for him/her to successfully use the command.
[This exercise should demonstrate the benefits to be had from writing your own documentation for complicated commands/concepts etc.]

Task 3.5

Fully document how to use the chmod command to change permissions using octal notation.

Task 3.6

Fully document how to use the chmod command to change permissions using symbolic notation.

Task 3.7

When you apply permissions to Linux directories they have a different effect to when they are applied to files. Explain why.

Topic 4 : File Systems

Task 4.1 - Weekly summary of lecture slides

Complete a summary of the week's lecture material as per the guidelines above.

Topic 4 questions:

Task 4.2

There is a significant difference in structure between the Linux file system and the file system in a Windows based machine.Explain the differences.

Task 4.3
Linux uses a process called mounting to establish a complete file system.
Describe what happens in a Linux mount and fully document the mount command along with all its arguments.

Task 4.4

Describe with examples the difference between Absolute and Relative Linux file system paths.

Task 4.5
Copying files from one directory to another is a task all Linux users must be fully proficient.
Describe (with examples) the following:
· How to copy a single file from anywhere to anywhere (absolute paths)
· How to copy multiple files from anywhere to anywhere (absolute paths)
· How the wildcard ? and * can be used in copy commands
· How the . and .. notations are used in copy commands
Note - The above methods are used in many Linux commands.

Topic 5 : Linux Internals
Task 5.1 - Weekly summary of lecture slides
Complete a summary of the week's lecture material as per the guidelines above.

Topic 5 questions:
Task 5.2
Shell scrips are used in Linux to automate complicated and repetitive tasks. Such scripts often use variables, pipes, parameters and grep to achieve the desired outcome.
Your task is to create an example script for each of the above (in bold text) that demonstrates how it works.Your 4 examples must be fully documented so that someone unfamiliar to Linux scripting could understand how each script works and therefore comprehend each of the 4 scripting concepts you have described.

Topic 6 : Securing Windows
Task 6.1 - Weekly summary of lecture slides
Complete a summary of the week's lecture material as per the guidelines above.

Topic 6 questions:
Task 6.2
Pre-emptive multitasking underpins all modern Operating Systems. Describe how pre-emptive multitasking operates and discuss why it is so important to operating systems like Windows and Linux.

Task 6.3
Describe the differences between Local, Roaming and Mandatory profiles.
Describe situations under which you would choose mandatory profiles over roaming profiles.

Task 6.4
There are similarities between the file system permissions used in Linux and Windows NTFS file permissions. Discuss.

Topic 7 : Windows Internals
Task 7.1 - Weekly summary of lecture slides
Complete a summary of the week's lecture material as per the guidelines above.

Topic 7 questions:
Task 7.2
There are many common elements between Linux shell scripting and Windows batch file scripting.
List five (5) such similarities describing common characteristics as well as any differences. Include at least 1 example in each case.

Topic 8 : File Sharing
Task 8.1 - Weekly summary of lecture slides
Complete a summary of the week's lecture material as per the guidelines above.

Topic 8 questions:
Task 8.2
Samba servers perform the same role as a Windows servers; that is they both allow the sharing of folders\directories and their contained files to Windows clients.
1. Describe how to setup a shared folder on a Windows XP machine to share a folder with your student ID as the share name.
The share should be writable; it should use user security and only allow access to two specified users.2. Configure the same setup using Samba.

Your write-up of this exercise should include a screen capture of the Windows share dialog, and a printout of the smb.conf file.

Task 8.3
Discuss with appropriate screen captures at least 3 ways to establish a connection from a Windows client to a Windows or Samba server.

Topic 9 : Remote Access

Task 9.1 - Weekly summary of lecture slides

Complete a summary of the week's lecture material as per the guidelines above.

Topic 9 questions:

Task 9.2

The Remote Access lab session details how to:
1. Administer (via command line) a Linux machine from a Linux machine via an ssh connection
2. Run GUI applications across the ssh link
3. Copy file between machines using scp
4. Administer a remote Linux machine from XP (command line only)
5. Connect to a remote XP machine using Remote Desktop

Detail with appropriate screenshots the procedures required to accomplish each of the above networking tasks.

Your descriptions should help you consolidate some of the procedures that can be used to access remote machine via a network connection.

Topic 10 : Various topics
No summary or questions are required for topic 10.

Reference no: EM13935924

Questions Cloud

Enable the recording of reference material : Create a database to enable the recording of reference material associated with each product. Reference material will be stored in a digital format (video, html, PDF etc) and classified to enable users to search and view the reference material.
How will the euros value against the dollar be affected : While two other European countries that use the euro as their currency experience lower inflation than the United States. According to PPP, how will the euro's value against the dollar be affected?
Does variable costing profit present a more realistic view : Does variable costing profit present a more realistic view of firm performance in the two years?Explain.
What species common source of virus in foodborne disease : What species is the most common source of virus in foodborne disease and what measures might be taken to reduce the risk of viral transmission from this source?
Describe the concepts of snapshotting and failover : Create a table that shows the maximum number of networks and nodes associated with class A, class B and class C IPv4 addresses. Also show in your table the associated CIDR notation of each class type.
Describe the expected nominal return to us investors : Using this information and the PPP theory, describe the expected nominal return to US investors who invest in Mexico.
How many units should it order each time : An electronic retail chain wishes to minimize its ordering costs for a particularly popular model of laptop computer. This retail chain has a line of credit to finance its inventory and the current interest rate is 1.5%, How many units should it o..
Discuss few web service tools : We have discussed a few web service Following are the Unit testing tools. In your opinion, are they really useful?
Why do some investors continue to invest overseas : IFE. Shouldn't the IFE discourage investors from attempting to capitalize on higher foreign interest rates? Why do some investors continue to invest overseas, even when they have no other transactions overseas?

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Write application to allow user to enter a list of integer

Control flow: two sum problem. Write an application to allow user to enter a list of integers, ends the input once the user enter 0. Then ask user to enter a target number, which should be an integer too. Then go through the list of integers, find tw..

  How dui charges of domestic violence and influence career

Sensitive information and may end up in court as technical or expert witness. How can things like a DUI, charges of domestic violence and other items influence your career?

  The brazilian federal data processing service

Use the Internet to research the architectures that other government organizations and intelligence agencies use for email privacy, if any. Examine the proposed business ethical problem that the Brazilian Federal Data Processing Service is present..

  Evaluate the importance quality of service has to designers

Evaluate the importance quality of service has to designers. Choose two areas discussed in the textbook you would focus your attention to ensure quality of service for a team of designers that you were managing

  Write recursive c++ function returns the sum

Given an integer n > 0, write a recursive C++ function that returns the sum of 1 through n.

  Explain with a graph how sml is different from cml

Explain with a graph how SML is different from CML. Why CAPM equation might be more relevant than other equations when calculating required rate of return. (1000 words)

  What do the terms syntactic sugar and syntactic salt mean

What do the terms "syntactic sugar" and "syntactic salt" mean? From your knowledge of the C# programming language, list at least five syntactic sugar and salt features.

  Long-term organizational success

Attracting and retaining the most talented employees is essential for long-term organizational success. An important component to attracting and retaining such employees is the design and implementation of an effective compensation and benefit sys..

  How to deal with each type of known attack

Include Denial of Service attacks, Spoofing, Replays, TCP Session Hijacking, and Attacks on Encrypted Data (such as passwords).

  Create a class name gasprices

Purpose: Create a class name GasPrices. Its main() method holds an integer variable named pricePerBarrel to which you will assign a value entered by a user at the keyboard. Create a method to which you pass pricePerBarrel. The method displays the ran..

  Web servers containing customer portals

All departments--including Finance, Marketing, Development, and IT--connect into the same enterprise switch and are therefore on the same LAN. Senior management (CEO, CIO, President, etc.) and the Help Desk are not on that LAN; they are connected ..

  How do block-level tags and inline tags relate

How do block-level tags and inline tags relate to each other- Give an example of each type of tag and given that the following style was contained in an external style sheet

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd