StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Network Management and Systems Administration - Essay Example

Cite this document
Summary
This is done through the different layers of networking protocols. Networks can involve; enterprise WLAN, fixed switching, modular switching, and enterprise high capacity switch routers. The…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER91.8% of users find it useful
Network Management and Systems Administration
Read Text Preview

Extract of sample "Network Management and Systems Administration"

Network Management and Systems Administration Introduction The ials under application protocols help in understanding networkmanagement. This is done through the different layers of networking protocols. Networks can involve; enterprise WLAN, fixed switching, modular switching, and enterprise high capacity switch routers. The network system administration involves the procedure of ensuring, reliability, predictability, and security of computing workstations, networks, and services. The application protocols show how URL protocols can be developed.

This can be done by invoking another application in handling the custom protocol. This is done by registering the accessible application as a URL handler. After launching the application successfully, command line parameters can be used in getting the URL that launched it (Farrel, 2004). This is possible for, the protocols run within Windows Explorer and Windows Internet Explorer by using the Run command. These applications for URL protocols should have a mechanism of acting on malicious data.

This is so because application handlers can get data from un-trusted sources. The parameters and URL might have malicious data that can interfere with handling the data application.Application protocols are simple. They enable the browser to launch a program. The browser can include; PDF reader or word. This is done by momentary the requested URL to the program. The examples of application protocols include; onenote, mailto, and news protocols. The simplicity of the application protocols is shown by the protocol scheme that they are associated.

For example onenote protocol is associated in the registry by a local installed application like onenote.exe. This association is created with the addition of a new URL protocol.The simplicity makes the launching the protocols to be easier in windows web browsers. The browsers include; Safari, Chrome, Opera, IE, and Firefox support the application protocols. This is done by the use of Windows ShellExecuteEx. However, the browsers behave differently in launching the protocols. This simplicity makes the application protocols acutely vulnerable.

Thus, the browsers prompt a user every time in launching the wanted program.The user has the leeway of prompting a task. This is done by asking any time anew task is to be performed. The default value used for enabling the warning is 0xi, while the one used for disabling the warning is 0x0. The application developer or administrators do set the policy on behalf of the user. However, due to security reason the prompt is discouraged. In the later versions of window launching of the Application Protocol URL for handling will require consultation of Protected Mode Evaluation policy.

This will help in target execution (Javier, 2002). The policy by default will ensure the user is prompted for access, to launch the program at Medium Integrity Level.The vulnerabilities of application protocols came from the developers. The developers do build support for the feature in their programs. In most case, this becomes a source of security bugs. This is because the programs are not written with untrusted data expectation. This web supplied URL is passed on the command line. The vulnerable programs have simple logic bugs.

This can be in from of buffer overflowing due to failure to handle command line arguments that are longer than the fixed size. Others can have complex problems. For example, some programs without confirming with the user, undertake a lasting design change. Decoding and encoding the URLs before passing through a target program is another behavior employed by developers.Developers of the Web can not provide for a way of detecting whether a client has given a protocol that is unavailable. Showing the unregistered protocols is done differently by the application protocols.

At the same time, there is no standard way of detecting a user’s browser in invoking a protocol (Troppens, 2011). The availability of application protocols is detected by commands. ReferencesFarrel, A. (2004). The Internet and its protocols: a comparative approach. NY: Morgan Kaufmann.Javier Esparza, C. L. (2002). Application and theory of Petri nets 2002: 23rd International Conference, ICATPN 2002, Adelaide, Australia, June 24-30, 2002 : proceedings, Volume 23. GX: Springer.Ulf Troppens, R. E.-F. (2011). Storage Networks Explained: Basics and Application of Fibre Channel SAN, NAS, ISCSI,InfiniBand and FCoE.

NJ: John Wiley and Sons.

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Network Management and Systems Administration Essay - 1”, n.d.)
Network Management and Systems Administration Essay - 1. Retrieved from https://studentshare.org/information-technology/1591281-network-management-and-systems-administration
(Network Management and Systems Administration Essay - 1)
Network Management and Systems Administration Essay - 1. https://studentshare.org/information-technology/1591281-network-management-and-systems-administration.
“Network Management and Systems Administration Essay - 1”, n.d. https://studentshare.org/information-technology/1591281-network-management-and-systems-administration.
  • Cited: 0 times

CHECK THESE SAMPLES OF Network Management and Systems Administration

Why Do We Distinguish Between Network Administration and System Administration

hellip; Why Do We Distinguish Between Network Administration and systems administration?... Why Do We Distinguish Between Network Administration and systems administration?... We also need to explore the distinctions on management of networks and systems to answer the question on why we distinguish between the two.... The effects of the distinction on management of networks and systems Having learnt the reason for the distinction, it is important to discuss the effects that such distinctions have on management of networks and systems....
3 Pages (750 words) Essay

Heteregeneous Networks

interoperability toolkit with acronym SFU in 1999 to streamline, the integration between windows server 2003 family, windows XP professional and the windows 2000Family of operating systems and Unix/Linux systems in heterogeneous networks.... Since its introduction in 1999, SFU plays a key position that supports heterogeneous networks like Windows and UNIX systems to functionally integrate.... By providing interoperability tools and protocol support to unify these systems, Achieves thesis goal as simple and straightforward as possible....
24 Pages (6000 words) Coursework

Why do we distinguish between network administration and systems administration

The field of system administration is a broad term used to define the roles and responsibilities of the person who maintains and operate the IT infrastructure of the company as a whole.... Today most of the IT systems thrive on the issue of linking different technologies.... In doing this, therefore, we need to clearly define the roles and responsibilities of the people involved in the maintenance and troubleshooting of computer systems in general....
3 Pages (750 words) Essay

Wireless ad hoc network management

t the present moment,and consequent to problems which arose from previous network management systems,the organization is engaged in the implementation of a policy-based management framework for wireless ad hoc networks with focus on Quality of Service management.... They were irrelevant because they were related to operational automatic network management systems, currently not in place in our organization.... They were irrelevant because they were related to operational automatic network management systems, currently not in place in our organization....
4 Pages (1000 words) Essay

Network Management and Systems Administration SLP

Not such a good way to learn it is important to know about this, as without security on network protocols there is a good chance of hacking the system.... Not so sure about the one on network security by Dr.... And to report back on three of the tutorials on the Application Protocols web page....
2 Pages (500 words) Research Paper

Heterogeneous Networks

interoperability toolkit with acronym SFU in 1999 to streamline, the integration between windows server 2003 family, windows XP professional and the windows 2000Family of operating systems and Unix/Linux systems in heterogeneous networks.... Since its introduction in 1999, SFU plays a key position that supports heterogeneous networks like Windows and UNIX systems to functionally integrate.... By providing interoperability tools and protocol support to unify these systems, SFU makes the achievement of this goal as simple and straightforward as possible....
24 Pages (6000 words) Assignment

The Use of Policy-Based Network Management

Strategies which are a follow-on from the objectives of management describe the preferred performance of distributed heterogeneous networks and systems, and state means to implement this conduct.... This part of the paper will present different studies regarding Policy-based Network management and its implementation.... The paper "The Use of Policy-Based network management" highlights that network management market has developed over time with the growth of software and hardware resolutions that has facilitated administrators to sustain and follow the status of enterprise networks....
9 Pages (2250 words) Research Paper

Modern Operating Systems

This report "Modern Operating systems" discusses modern Operating systems ss collection of synergistic components working together for making the computer productive and accessible to its user.... Thus, being an intermediary between the users of computer applications and the resources of the computer systems, the OS offers the following three fundamental services to the users:Operating System also provides information and tools for the user/administrator for the purpose of tailoring, controlling, and tuning the system so as to achieve optimum performance....
6 Pages (1500 words) Report
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us