Showing posts with label IT Hardware and Networking. Show all posts
Showing posts with label IT Hardware and Networking. Show all posts

Cloud Network

by 09:23

Cloud Computing



Cloud Computing is a internet based computing that provides computing services – storage, data bases, networking, software over the Internet this process  called by Cloud Computing.
Cloud computing and storage solutions provide users and enterprises with various capabilities to store and process their data in either privately owned or third party data centers that may be located  far from the user ranging in distance from across the world.
Cloud computing offers several benefits for business and end users. Cloud computing is the list of the evolution and adoption of existing technologies and paradigms. The goal f cloud computing is allow to users to take benefit from all these technologies, without the need for technology knowledge about with each one of them. The cloud aims to cut costs, and help to users focus on their business instead of being impeded by IT obstacles. The main enabling technology for cloud computing is virtualization. With operating system level virtualization essentially creating a scale system of multiple independent computing devices idle computing resources can be allocated and used more efficiently.
Users routinely facing difficult problems, Cloud computing adopts concept from service oriented architecture that can help the user break the issues into service that can be integrated to provide a solution.



Deployment models of Cloud Computing


Cloud computing services can be private, public and hybrid.
Private cloud is a type of cloud computing that involves distinct and secure cloud based environment in which only the specified client can be operate. As with other cloud models, private cloud will provide computing powers as a service within a visualized environment using an underlining pool of physical computing resource. How ever , under the private cloud is only accessible by a single organization providing that organization with greater control and privacy.

Public computing is a service provider makes resources, such as application s and storage, available to the general  public over the internet. Public cloud services may be free or offered on a pay-per-usage model. It is easy and inexpensive setup because hardware, application and bandwidth costs are covered by the provider and no wasted resources because you pay for what needed use. Public cloud is a proprietary network or data center that uses cloud computing technologies, such as virtualization.

The hybrid cloud is combined of a public cloud provider and private could platform. That is designed  for use by a single organization. The public and private cloud infrastructure, which operate independently of each other, communicate over an encrypted connection, using technologies that allows for the portability of data and applications.

Cloud computing Privacy


The service provider can access the data in the cloud at any time.  It may accidentally or deliberately after or even delete information. Many cloud provider can share information    with third parties if necessary for the purposes of law and order even without a warrant.Which users must agree to before they start
Using cloud services. Solution to privacy include policy and legislation as well as end users choices for how data stored. Users can encrypt data that is processed or stored within the cloud to prevent unauthorized access. Many organization bound by compels regulatory obligations and governance standards are still hesitant to place data or workloads in the public cloud for fear of outages, loss or theft.  However the resistance is fading as logical isolation has proven reliable and the addition of data encryption and various identity and access management tools has improved security within the public cloud.  

  

Difference Between L1,L2 and L3 Support

by 11:08


L1 , L2 and L3 support


L1 Support

Level 1 technical support engineers attend and provides solution to basic problems, including password issues ,Printer issues and basic software installation and overall end user support. Routing and networking issues calls to L2 and L3 level specialist.


L2 support

Level 2 support handle task that networking related issues and trouble shooting, attend software and configuration issues and system hardware and network connectivity problems resolved by level 2 supports.
Hardware issues maybe resolve on or off side.


L3 support

L3 level takes highly specialized task such as network and database administration, Firewall concept configuration and trouble shooting, overall Server repair and maintenance taken by L3 level support.

VMware and Vitualization

by 13:47


VMWARE


What is VMWare?

VM Ware is a vitual machine software. The major role of the VMWare  Virtualization software
Programs are for business use. Virtualization software including desktop, server and cloud management software
VMWare server
VMWare server is a Virtualization product that makes it possible to partition a single physical
Server into multiple virtual machines. VMWare works with Windows, Solaris, Linux and Netware
Any or all of which can be used currently on the same hardware.
A virtual machine can be builds once and deployed multiple times in diverse environment.

VMWare vertualization Base


1.    
           Run multiple operating systems on one server.You can run both development and QA
on a single server .
2.      You can have multiple flavors  of OS on one server. Foe example, you can run 2 Linux.
 Windows OS on a single server.
3.      Multiple OS running on the server shares the hardware resources among them. For example
CPU, RAM, network devices and shared among development server and QA server running on
The same server.
4.      VMWare is implemented properly, you can migrate a virtual machine from one server to another server quickly without any downtime.
5.      If you have 16GB of RAM on server you can assign less RAM to one virtual machine ( 4GB to development server ) and more RAM and remaining RAM to another virtual machine that is running on that server
6.      This feature reduce the operational cost and power consumption, you will be using only one server and run both development system on it.

Types of Virtualization



Server Virtualization
Network virtualization is the complete reproduction of a physical network in software. Multiple process running in one physical network, allowing different operating systems to run on a single server as virtual machines. Server also enable faster workload development , increased application performance , and higher availability.

Network Virtualization
Network is the complete reproduction  of a physical network in software. Application run on the virtual network exactly the same as if on a physical network. Network presents logical networking devices – logical ports, switches, routers and firewalls,
Vpn and more. Virtual networks offer the same features and guarantees of a physic all network with the operational benefits and hardware independence of .

Desktop Virtualization
Deploying desktops as a managed service gives you the opportunities. You reduce cost and increase service by quickly and easily delivering virtualized desktops and application to branch offices, outsourced and offshore employee s and mobile workers.   

How to Become a Network Engineer

by 07:03
Guide for a new network administrator 

Hi, students would you like to become a network administrator, following skills must you should know





·         How to change the administrator password (there's more involved than changing a user's password). Pick a "strong" password (combination of letters, numbers, characters, etc.) and go through the steps to change the administrator password while your network technicians are still there (I did this step on my own and learned a lot but I don't recommend you do it that way if don't have to).

·         How to add users to and remove users from the network

·         How to adjust user rights on the network

·         How to change user passwords

·         How to perform a network backup (you should run a backup every night)

·         How to check (every morning) to make sure last night's backup ran, and that all necessary files (folders/drives) were backed up successfully

·         How to restore from a network backup tape. Make sure you know not only how to restore files to their original location, but also how to redirect the restore to a different location (especially helpful if you're just restoring something to verify that your backup tapes are good, which you should do periodically).

·         Where the server's error logs are (you should check them regularly, even more regularly while you're learning what kinds of messages to expect to find in there; the idea is not so much to understand every message you find, but to be able to recognize when something unusual is going on)

·         How to update antivirus protection (Ideally you would get a network/corporate version of antivirus software so that it can be installed and updated on the network, and the workstations can be updated and managed from the server. The server can be set to automatically check for updates as many times per day as you like, install the updates automatically to the network, and push the updates out to all workstations, so that your antivirus definitions on server and workstations are always up to date. However, if you have a small network and want to update everything manually you can do that, just be sure you update the servers as well as the workstations.)

·         What the name(s) of your server(s) is/are (I don't mean the make and model, I mean what unique names they have been assigned to them in the software)

·         What the IP address(es) of your server(s) is/are

·         What the basic specs of your server(s) is/are (make and model, chip, hard drive, RAM, etc. - some of this will sound the same as when buying a regular computer, some of it will probably be different)

·         The serial number of your server, the date purchased, and if you have a maintenance contract, the terms of the contract, who you should call if you need work performed under the contract, what information you will need to give them (e.g. a contract number), and how quickly they are supposed to respond

·         Where various data and programs are located on your server (the file paths)

·         What mapped drives there are (the drive letters, and where they point to)

·         If there is regular maintenance you should be doing

·         The proper procedure for rebooting your server (sometimes it's best to shut down certain programs first - that issue is dependent on what programs you're running on your server - or if you have multiple servers it may be advisable to reboot in a particular order).

·         When the server's UPS battery should be replaced - the server should be plugged into a UPS (uninterruptible power supply), and the battery should be replaced on a regular schedule, don't wait for it to die!
·         Follow the antivirus updated till date
Powered by Blogger.