33
ICON College of Technology and Management Faculty of Information Technology and Engineering BTEC HND in Computing and Systems Development (CSD) Assignment Unit 27: Network Operating Systems Tutor: Mohammed Jaffer Hasan Submitted by ID No: 14869 Alexandru Isac 89 Montalt Road London, London IG8 9TB

Faculty of Information Technology and Engineering BTEC HND ... · 1.1.5 Suitable network for the above scenarios (-peer to peer/client server) The peer to peer network is the network

  • Upload
    others

  • View
    6

  • Download
    0

Embed Size (px)

Citation preview

ICON College of Technology and Management

Faculty of Information Technology and Engineering

BTEC HND in Computing and Systems Development (CSD)

Assignment

Unit 27: Network Operating Systems

Tutor: Mohammed Jaffer Hasan

Submitted by

ID No: 14869

Alexandru Isac

89 Montalt Road

London, London IG8 9TB

Session: Sep 2017

Table of Contents

1 LO1: Evaluation of Network operating System Principles .......................................................... 4

1.1 Evaluations of various types of NOS .................................................................................. 4

1.1.1 Network services requirements ................................................................................... 4 1.1.2 Appropriate network for the case scenario .................................................................. 4 1.1.3 Comparison and evaluation of various NOS ................................................................ 5 1.1.4 Recommendation of NOS ........................................................................................... 6 1.1.5 Suitable network for the above scenarios (-peer to peer/client server) .......................... 6

1.2 Disaster recovery and business continuity ........................................................................... 7

1.2.1 Different types of backup ........................................................................................... 8 1.2.2 Various types of RAID ............................................................................................... 8 1.2.3 Raid level 0 .............................................................................................................. 10

2 LO2 implementation plan of NOS ............................................................................................ 12

2.1 Designing of implementation plan .................................................................................... 12

2.1.1 Installation ............................................................................................................... 12 2.1.2 Hardware specification ............................................................................................. 12 2.1.3 addressing ................................................................................................................ 12 2.1.4 Security .................................................................................................................... 12

2.2 Evaluation and justification of plan .................................................................................. 13

3 LO3 implementation of NOS [P3.1, M3] .................................................................................. 14

3.1 Implementation of NOS including .................................................................................... 14

3.1.1 Installation ............................................................................................................... 14

3.2 Configuration and testing ................................................................................................. 17 3.3 Evaluation ........................................................................................................................ 23

4 LO4 Managing of Network Operating System.......................................................................... 24

4.1 Identification, selection and justification of network monitoring tool ................................ 24

4.1.1 HP Open View ......................................................................................................... 24 4.1.2 ZENOS V.5.0 ........................................................................................................... 25 4.1.3 Open NMS ............................................................................................................... 26

4.2 Baseline security report network....................................................................................... 27

5 References list ......................................................................................................................... 32

Introduction

Network operating system is referred to operating system forming integral part of the computer

system. It is designed and developed in order to support personal computer system or workstation of

the organization by connecting to a local area network known as LAN. Network operating system

allows the organization to share files and documents and access printer among numerous computer

system connected within a network either on a private network or local area network. Computing and

system development helps to establish diverse range of skills in relation to modern computing and

networking technologies. The concept of computing and system development helps to give an in-

depth knowledge and understanding about different aspects of networking and computing discipline.

The objective of the study is to provide detailed information about computing and system

development. Based on given case scenario, requirements of network operating system of the

company will be identified and depending on that appropriate network operating system will be

recommended.

1 LO1: Evaluation of Network operating System Principles

1.1 Evaluations of various types of NOS

1.1.1 Network services requirements

Based on the case scenario, the company for its new branch in Manchester will be required

● Infrastructure services: it covers the necessities requirements of the company to be present

online. It includes VPN configuration, service design and installation, network design and

configuration, window as well as exchange server configurations (Simsarian, 2018).

● Wireless networks: it enables the company to use internet over a private network or local area

network. Robust as well as reliable wireless network servers will be designed.

● Managed support: the support team comprising of IT professional and technician will be

developed to provide system support and help manage computer systems.

● Data Backup and disaster recovery: data backup services will be implemented to keep the

company data secure. Besides, data recovery plan will be designed to eradicate business

failure issues in case of worst happen (Huang, 2017).

1.1.2 Appropriate network for the case scenario

After assessing the needs of the company new venture and seeking into its future requirements of

computing and networking system, it is critical to develop a virtual environment to support remote

computer system, data security, and print services as well as print server. Along with that, network

management tools, firewall protection for network project, antivirus software will be employed to

eradicate the threats of system failure and redundancy(Shin et al. 2014). In Figure 1 such principles of

operating system have been reflected. However, all of those are not interdependent; but somehow, an

efficient networking system should include all of these principles. In the following picture this aspect

has been included.

Figure 1: Network operating system principles, (Source: Santamaria, 2016)

In figure 1,

In the above picture,anefficient networking system has been reflected. On the other hands, it has also

instructed the relationship between each other. It is important to understand the relationship as well as

applications of network communication. Network managementand firewall protection (Santamaria,

2016). There are many vendors available in the market those are engaged to provide a support of a

network centric approach. It is the service standard of the vendors that establish the efficiency of

networking in a small organization as well as a group of network. Such vendors are discussed below

as per availability and features.

Stratum: Stratum provides open advanced while box switches along with advanced technology of

SDN interfaces. Switch networking solutions are mainly supported by faster communication and high

speed data transfer. On the other hand, it also provides software oriented programming as well as

featured aspects of security.

Cumulus Network: Cumulus networking is an open ended network and it is framed on Linux.

Having an open channel networking, the security measure of this vendor is restricted. It connects the

ease of OCP following updown 2.

Big switch light: Big Switch light is based on open network and having some features of Stratum. It

is built on Linux and there are several implications of SDN. The open networking channel establishes

faster data center approach having restricted security standards.

Linux Network: Having flash memory and bare channels of switching have made this vendor easier

to use. On the other hand, Linux establishes opem computing project and open flow centric

operations.

1.1.3 Comparison and evaluation of various NOS

Technical

Characteristics

windows Linux Mac Osx

Security Window operating system is highly vulnerable to cyber-

attacks. Despite many patches

are available but still titsvulnerability liable to high

security risks and threats

Linux has less level of vulnerability in

comparison to Window

OS. It is hampering by malware and hence can

maintain security

degree.

Security Vulnerability and threats on Mac

OSx is very less in

comparison to both systems. It provides

strong internal as well

external security

protection for the network server.

Software

availability

The software of window

operating system is easily available in the market and

cost varies depending upon

type of OS version

purchased. However, licensing policy are very

complicated

Linux OS are opens

source and software is available for free.

Free Mac OSX

software available

Maintainability This operating system requirespatches in order to

Maintenance is easy Very easy in comparison to both

regulate it

Scalability Upgrading as well as patching required enough

time and possess high risk to

prone to corruption or infection. Scalability is

available at all level.

OS has scalability but from the end of server

sides.

MAC OSX offer client-based scalability

options

Technical

Support

Excellent technical support There is no scope of

direct support instead on company forum

Support is available on

website and forum, but no direct support.

1.1.4 Recommendation of NOS

Window operating system is connected with several security issues and risks in comparison Linux and

Mac. That is reason why window is found to constantly release with new security essentials as well as

bug fixes. On other hand, Mac and Linux operating system offer great security solutions and options.

However, the major challenges while dealing with the operating system when it come to technical

support. These two operating system do not offer direct support like window OS. Window offer

excellent technical support mechanism from installation to implementation of operating system on the

computer system. Therefore, window has been number one in term of helping businesses in running

their OS application (Santamaria, 2016). Based on the comparison and evaluation of different OS,

Window operating system platform will be suitable based on the company requirements for

computing and system development.

1.1.5 Suitable network for the above scenarios (-peer to peer/client server)

The peer to peer network is the network where at least two computers have to share files to each other

and access devices and they can do this without the need for a separate server computer or program

(software). In the peer to peer network none of the providers are responsible for such thing as for

being the server, every single computer must stock information and action as a server. The Peer to

Peer Network is ideal to share the information but we have to take in calculation that this type of

network can’t have more than 10 computers. The Peer to Peer Network is also the simplest type of

Network but this also comes with a risk because Peer to Peer network can be very easy discovered

and accessed by unauthorized people.

Advantages and disadvantages of Peer to Peer Network:

Advantages Disadvantages

Is very easy to get done a configuration for a

peer to peer network

We can use maximum of 10 computers

They are easy to maintain They are not very secured

They have a low cost

Client server is the relation between two computers where the customer can have a request from the

server and the server has to fulfil the client’s request.

The customers or the clients can easily take the form as desktops, smartphones or workstations. A

network that is using a server to allow the clients to share information, data and devices is client

service network. In this network we can say that the client rely on server for recourse sharing and

processing. In case of a Client Server Network, any of the computers can be either a client or either a

server, it cannot be the both at the same time, is it not impossible but it is uncommon.

The client – server relationship can be made with the help of the routers or switches and this is

happening because those devices are covered in details.

If we want our computer to be function as a server than we need to be running a Network Operating

System.

A network Operating System is a special kind of software that have plenty characteristics such as

managing data or resources for a number of customers, does have the control of the type of the file

that the user want’s to open or read, has the capability to supply the applications to the clients , restrict

from where and when the customers and users can access the network and many others .

Advantages and disadvantages of Client Server Network

Advantages Disadvantages

All documents are memorised in a focal area The client server network is very expensive

Network peripherals are controlled centrally It requires a permanent staff to watch it ,

someone as a network manager

Data is all backed up on the main server Clients are dependent on the server

Capability to grow Difficult to set up

1.2 Disaster recovery and business continuity

Definition of term disaster recovery and business continuity

Business continuity forms a part of business strategy which is devise to ensure that all the important

data and information regarding the business should be available and accessible anytime on real time

basis. It is developed based on identification of security threats as well as risks to be faced by the

company to make sure that data and assets are secure and protected.

Disaster recovery is referred to field of security planning used by the company to protect itself from

the adverse impact of negative events or incidents such as power failure or black out (Lamantiaet al.

2015).

Figure 2: Recovery system of a networking system, (Source: Thottan, 2018, p.147)

In case of network security, it is important to have back up options that data should be recovered even

having disasters. The application of back up and network security has been measured in the above

picture. In this concern a specific networking system should engage an additional secondary storage

and followed by the same the implementation of a better transportation of data to secondary back up is

possible (Thottan, 2018).

Advantages of disaster recovery strategy

Cost savings

Disaster recovery plan help to recognize the various areas where cost and expenses can be saved by

the company. Besides, it helps to analyze the computing and networking environment to help

minimize expenditure.

Asset and inventory management

Through documentation, it allows the company to manage its assets and data effectively and also

provide understanding of it equipment inventory.

Network management

Besides, it help to manage the network and computing issues by developing mitigation strategies to

prevent effect of catastrophic or disaster (Thottan, 2018).

Ability to test

It provides the opportunity to test disaster management planning beforehand.

1.2.1 Different types of backup

Full backups: it is fundamental backup plan where all data and information are transfer to

another location.

Incremental backups: in this type of backup, only that information is back up which have

been changed previously.

Differential backup: in this type, all data that has been changed are back up every time, the

system is run (Todd et al. 2016).

1.2.2 Various types of RAID

RAID from redundant array of inexpensive disk is a way of memorizing the same files in different

places on a multiple hard disk in order to protect our data and our content in case of a drive failure.

There are many different types of RAID and these are:

-RAID 0

-RAID 1

-RAID 5

-RAID 0+1

-RAID 1+0

RAID 0 RAID 5 RAID 1

Minimum

Numbers of

disk

2 3 2

Fault

tolerance

None 1 disk 1 disk

Read speed fast Slow fast

Hardware

cost

Cheap High High

Performance HIGH HIGH Low

redudancy LOW HIGH HIGH

Raid 0 is using a method that is called stripping and the reason for that is because is taking a little

piece of data and is transferring to more drivers.

Raid 1 is providing data through a process called mirror.

This Raid is working basically with 2 hard drives, in case one drive fails then all the data could be

read from the other one.

The above picture represents the RAID 1

1.2.3 Raid level 0

We are only going to use this kind of Raid in case we want the performance but the data is not that

important for us. In this RAID the data is separated into blocks and then those blocks are written to

the disk. Raid 0 doesn’t provide any fault tolerance at all so in case one drive fails they are all going

to fail.

The above picture represents RAID 0

We can use a raid recovery software but in case one drive fails then all our data is lost.

Raid level 5 is writing data blocks to all the disk and is very similar to raid 0.However, one additional

parity block is written in each row. This additional parity, derived from all the data blocks in the row,

provides redundancy. If one of the drives fails and thus one block in the row is unreadable, the

contents of this block can be reconstructed using parity data together with all the remaining data

blocks.

If all drives are OK, read requests are distributed evenly across drives, providing read speed similar to

that of RAID0. For N disks in the array, RAID0 provides N times faster reads and RAID5 provides

(N-1) times faster reads. If one of the drives has failed, the read speed degrades to that of a single

drive, because all blocks in a row are required to serve the request.

Write speed of a RAID5 is limited by the parity updates. For each written block, its corresponding

parity block has to be read, updated, and then written back. Thus, there is no significant write speed

improvement on RAID5, if any at all.

The capacity of one-member drive is used to maintain fault tolerance. E.g. if you have 10 drives 1TB

each, the resulting RAID5 capacity would be 9TB.

If RAID5 controller fails, you can still recover data from the array with RAID 5 software. Unlike

RAID0, RAID5 is redundant and it can survive one member disk failure

The above picture represents RAID 5

2 LO2 implementation plan of NOS

2.1 Designing of implementation plan

2.1.1 Installation

2.1.2 Hardware specification

Processor: 1.6 Ghz CPU (Minimum)

And 2X 1.6 GHz CPU (maximum)

RAM: 1.75 GB (Minimum) and 3.5 GB (maximum)

HDD: 1X 40 GB of free space

2.1.3 addressing

LAN: 10.10.10.0/24

Workstation: 10.10.10.1

File server: 10.10.10.2

Printer: 10.10.10.3

Remote support: 10.10.10.4

Web server: 10.10.10.5

2.1.4 Security

Security policy: security policy of the organization will be in lieu with all its business assets

comprising of both physical and virtual assets. This will help the company to manage its business

easily. Company need to devise security plan by identify security risks and threats and depending

upon that designing mitigation strategies (Tofighbakhsh, 2017). Every employee need to adhere as

well as comply with company security in order to protect company assets and data.

Password management: security policy should incorporate password management to keep the data

and information secure and safe. For this, the company needs to develop appropriate password policy

to be followed by the staffs while working on the company network servers. The password policy

should include provision to use alphanumeric combination mentioning minimum length of password

to be used (Huang et al. 2017).

Patch management: patching of network operating system as well as hardware is critical to keep the

business assets at particular degree in order to run application. This will help to enhance the

efficiency and performance along with characteristics of installed software and applications. Window

OS release its patches frequently which can be updated into the system. The server administrator

needs to perform test and set up the patches on network server to solve the requirements of the

computing system (Moon et al. 2016). Besides, server administrator in patch management should

monitor and scan vulnerability of the system if it requires any kind of patching.

2.2 Evaluation and justification of plan

The plan devised has the ability to meet the requirements of the company as mentioned in the given

case scenario. The plan incorporates security policy, password and patch management. The plan

effectively identifies the system and network requirements of the company. Along with that, the plan

provides basic understanding about the installations and security measures that can be implemented

by the company. The plan also proposed suitable network operating system that fit in all future and

present needs of the company. Besides, it incorporates basic security and risk mitigation strategies to

protect and secure. The initial justification of implementing such strategic security concern is that the

organization engages many professional heads who tend to make data and capital transfer. Therefore,

it is not possible to make a check or monitor all of the operations. Besides that, manual operations

may not manage extensive resources available in the database. All these aspects have justified

launching a new security measure apart from conventional efforts. If it is not possible to manage all of

the security policies, there is a possibility of data loss or theft. On the other hand, it is also important

that most of the patch management and security policies are dynamic as per availability market

scenario as well as possible thefts available in the organization. In that concern a, well improved

security system can assure the protection of digital assets. All these possibilities have established the

value of the security plan managed for the company as per the case. The above specification of

hardware and software has been suggested based on the available operations as well as height of

security that the respective firm tend to implement. For example, smaller capacity of RAM or web

server may bring constraints for making faster operations.

3 LO3 implementation of NOS [P3.1, M3]

3.1 Implementation of NOS including

3.1.1 Installation

Installation steps are as follows:

Step 1: Need to install windows 2018 edition in to the compatible hardware system for ADFC of the

controller which is the root domain of the hardware.

Step 2: In order to prepare forest level permission need to run the Command on ROOT-COMPANY

base on the ADC for forest in Company.com.

Caption: ROOT Command 1 (Above)

Caption: ROOT Command 2 (Above)

Caption: ROOT Command 3 (Below)

Caption: ROOT Command 4 (Above)

Caption: Start up of the installation (Above)

Caption: Choosing of configuration (Below)

Then the next step is to configure the language we want for the OS, the time and currency format we

want and also the keyboard language. Then we can press INSTALL.

Caption: Selection of location (Above)

The next step is to accept the terms and conditions.

The above picture shows that we agree with terms and conditions

Caption: Choosing of configuration (Below)

Caption: Finalization of installation process (Above)

3.2 Configuration and testing

According to Power et al. (2015), In order to identify the threats which is aligned with the installation

procedure a high-end security is need to be taken and must be using IPS and IDS between both inside

as well as outside networks. On the other hand, the administration of the networks must also be using

system in order to prevent from any kind of data loss and further protect data and information as well

as deploy a strong group of policies relating to security of data and information. In the view of (Azar

and Vaidyanathan, 2015), moreover, the password policy need to be installed in the entire computer

so that users may have a certain length, size, and text to ensure that their data are being protected by a

particular format of password. On the other hand, to improve management security procedure can be

made by detectingcommon security relating to miss-configuration as well as missing the updates

which are related with the security of the computer (Frisco et al. 2014). Therefore, it is necessary for

the company to monitor all the specific changes relating to the network security and procedure of their

system and ensure that all their data and information are being kept in a secured manner.

Configuration of windows server

Once we login the windows will open for us the Server Manager which is going to look like :

The above picture represents the Server Manager

Now we are ready to move to the next step which is configuration of the server Manager.

This is how our configuration is going to look like:

The above picture represents the first page of configuration

We must open the server manager and click add roles and features.

The next step is to reach the server roles tab:

The above picture shows the Server Roles tab

Then you have to press next till you reach the next step .

The above picture shows the Installation Type

Then we have to establish the server selection:

The above picture represents Server Selection

Then we are required to select the web server.

The above picture represents the selection of web server

Then we click next till the Role services and then we select again :

The above picture represents the role services]

Then we need to confirm the installation of the services.

The above picture represents Confirmation of installation

Then we are finally close to the end of installation.

The above picture shows the Installation Progress

Our server is now ready for configuration.

The above picture represents the configuration

The above picture represents the internet information

We are ready to insert a website.

The above picture show us how and where to insert our website.

3.3 Evaluation

As I managed to install our Windows Server 2012 and to configure I can say that is working perfectly

and there are not any issues, all the computers have been setup properly by myself so there are no

errors.

Testing is not completed

4 LO4 Managing of Network Operating System

4.1 Identification, selection and justification of network monitoring tool

There are various kinds of monitoring tools which are found in the market that would be effective in

monitoring the data and security policies relating to the organization. According to Kamenskih and

Tyurin (2015), the most acceptable monitoring tool which are being used by most of the companies in

the market are HP Open Viewer, Solar wind and much more. However, for this company the it is

therefore recommended to adopt the HP Open Viewer tool as it is build with more accurate features

that would further help the company in monitoring their change and manage their task more

preferable manner. Even, by the use of this tool the user would be able to gather information relating

to change or update through SMS or M2M enable or by Email formulated in the system. As

mentioned by Arthursson and Bristav (2016), the other most appropriate form of monitoring tool is

ZENSOS V.5.0 is open network monitoring source tool which deliberately has the capability to

manage the overall health and secure the network server at the bit level and further helps in

monitoring the overall network origin, moreover, by the adaptation of this tool the organization would

be able to gather information relating to any kind of warning through email or SMS. Moreover, by the

adaptation of these tools the organization would be able to maintain their position and secure their

data more beneficial and also ensure that they have a better and enhancing control over the domain of

the overall network system (Shin et al. 2014).

So I will present three examples of monitoring tool software :

4.1.1 HP Open View

HP Open View is the former name for a Hewlett-Packard product family that consisted

of network and systems management products. In 2007, HP Open View was rebranded as HP

BTO (Business Technology Optimization) Software when it became part of the HP Software

Division. The products are now available as various HP products, marketed through the HP

Software Division

The above picture represents HP open View operations

4.1.2 ZENOS V.5.0

Zenos Core is one of the best and very powerful source IT monitoring platform that have as scope to

monitories applications, servers, storage, networking and virtualization to provide availability and

performance statistics. It also has a high-performance event handling system and an advanced

notification system.

The above picture represents Zenos

Once you login to Zenos Core Web UI for the first time, you are presented with a two-step wizard that

asks you to create user accounts and add your first few devices / hosts to monitor. You are then taken

directly to the Dashboard tab. Use the Dashboard, Events, Infrastructure, Reports and Advanced tabs

to configure Zenos Core and review reports and events that need attention.

4.1.3 OpenNMS

OpenNMS is an open source enterprise grade network management application that offers automated

discovery, event and notification management, performance measurement, and service assurance

features. OpenNMS includes a client app for the iPhone, iPad or iPod Touch for on-the-go access,

giving you the ability to view outages, nodes, alarms and add an interface to monitor

The above picture represents OPEN NMS

Once you successfully login to the Open NMS web UI, use the dashboard to get a quick ‘snapshot

view’ of any outages, alarms or notifications. You can drill down and get more information about any

of these sections from the Status drop down menu. The Reports section allows you to generate reports

to send by e-mail or download as a PDF.

4.2 Baseline security report network

Microsoft Baseline Security Analyser (MBSA) is considered to be the most appropriate and easy to

use tool that helps most of the users of the network service to determine that the state of security of

the computer on the basis of the recommendation formulated by Microsoft Security. According to

Silberschatzet al. (2014), the Microsoft Baseline Security Analyzer (MBSA) tool is appropriate as it

scans the various files which are being stored in the computer and after scanning the files it provides a

specific form of suggestion or recommendation to the user relating to security and privacy as well as

provide detailed specification about the corrupted file if found during the scanning procedure. In

accordance to Vasilakiset al. (205), therefore, based on reports that would be gathered by the

administrator in order to make their data and other information relating to the company more secure

and well organization so that they are further being able to mitigate and kind of uncertainty occurring

within their organization. Hence, monitoring tools need to be implemented within the computer

system that would be effective in securing more valuable data and ensure that the company is being

provided with time to time alerts relating to updating of the tool.

The above picture represents MBSA check for misconfiguration

The above picture shows us which computer we are choosing to scan by IP address

The above picture represents the Process of Scanning

The above picture represents the result of the scanning

The above picture represents the Report of MBSA

4.2.1.1.1.1.1 Conclusion

The overall assignment deals with specification and installation procedure of a strong network that

would be effective for the organization in order to produce an accurate and more enhancing report.

Moreover, based on the assignment it has been found that the company needs to be more specific in

securing their data and file which is being used by the organization while operating their services. On

the other hand, the assignment holds a scientific discussion relating to identification of the network

and evaluation of the principles associated with the network system. Even, the procedures which are

associated with the implementation plan of NOS 675 have also been explained more accurately.

Moreover, configuration and testing process are also being discussed in the assignment relating to the

implementation procedure of the network system into the business. However, with the explanation of

the installation procedure managing of Network Monitoring tool are also being identified and justified

accordingly.

5 References list

Arthursson, D. and Bristav, M., Xcerion AB, 2016. Network operating system. U.S.

Patent Application 14/754,512.

Azar, A.T. and Vaidyanathan, S. eds., 2015. Computational intelligence applications in

modeling and control. Springer International Publishing.

Considine, C., Crowley, S., Gardner, G., Shannon, C., Kwinn, M.J., Henderson, S.J. and

Santamaria, P., 2016, April. Architecting a development and testing plan for the Army's

common operating environment: Applying agile systems of systems development to army

network acquisition. In Systems Conference (SysCon), 2016 Annual IEEE (pp. 1-6).

IEEE.

Frisco, P., Gheorghe, M. and Pérez-Jiménez, M.J. eds., 2014. Applications of Membrane

Computing in Systems and Synthetic Biology. Heidelberg: Springer.

Huang, Y., Geng, J., Lin, D., Wang, B., Li, J., Ling, R. and Li, D., 2017, August. LOS: A

High Performance and Compatible User-level Network Operating System.

In Proceedings of the First Asia-Pacific Workshop on Networking (pp. 50-56). ACM.

Kamenskih, A.N. and Tyurin, S.F., 2015, February. Advanced approach to development

of energy-aware and naturally reliable computing systems. In Young Researchers in

Electrical and Electronic Engineering Conference (EIConRusNW), 2015 IEEE NW

Russia (pp. 75-77). IEEE.

Lamantia, T., Fournier, D., Schendelman, R., Haroldsen, K., Batson, A., Lieu, P., Merritt,

J., Mongwa, K., Norling-Christensen, D. and Reiner, E., INTRINSIC TECHNOLOGIES

LLC, 2015. Method of automated operating system deployment for a network of multiple

data processors. U.S. Patent 8,990,796.

Moon, S., Ryu, H.Y. and Shim, J.C., Electronics and Telecommunications Research

Institute, 2016. Method and apparatus for controlling life-cycle of process for network

operating system. U.S. Patent Application 14/997,696.

Power, D.J., Sharda, R. and Burstein, F., 2015. Decision support systems. John Wiley &

Sons, Ltd..

Raman, G., Wighe, C., Balraj, S., Shenoy, S.M., Rajarathinam, S. and Kamatala, S.R.,

Juniper Networks Inc, 2018. Managed reboot of a network operating system. U.S. Patent

9,940,160.

Shin, S., Song, Y., Lee, T., Lee, S., Chung, J., Porras, P., Yegneswaran, V., Noh, J. and

Kang, B.B., 2014, November. Rosemary: A robust, secure, and high-performance

network operating system. In Proceedings of the 2014 ACM SIGSAC conference on

computer and communications security (pp. 78-89). ACM.

Silberschatz, A., Galvin, P.B. and Gagne, G., 2014. Operating system concepts essentials.

John Wiley & Sons, Inc..

Simsarian, J.E., Kim, Y.J., Choi, N., Di Martino, C., Mohanasamy, N.N., Winzer, P.J. and

Thottan, M., 2018. Error awareness in a multi-layer transport network operating

system. Journal of Optical Communications and Networking, 10(3), pp.152-161.

Todd, M., Koster, S.R. and Wong, P.C.M., Hewlett-Packard Enterprise Development LP,

2016. System and method for securing a network from zero-day vulnerability exploits.

U.S. Patent 9,264,441.

Tofighbakhsh, M. and Wolter, D.R., AT&T Intellectual Property I LP, 2017. Network

operating system client architecture for mobile user equipment. U.S. Patent Application

15/423,547.

Tofighbakhsh, M. and Wolter, D.R., AT&T Intellectual Property I LP, 2017. Network

operating system client architecture for mobile user equipment. U.S. Patent 9,565,576.

Tripathi, S., Drost, R.J. and Yang, C.K.K., Pluribus Networks Inc, 2015. Servers,

switches, and systems with switching module implementing a distributed network

operating system. U.S. Patent 9,160,668.

Tripathi, S., Drost, R.J. and Yang, C.K.K., Pluribus Networks Inc, 2017. Integrated

server with switching capabilities and network operating system. U.S. Patent 9,742,697.

Vasilakis, N., Karel, B. and Smith, J.M., 2015, May. From Lone Dwarfs to Giant

Superclusters: Rethinking Operating System Abstractions for the Cloud. In HotOS.