Premium Essay

Linux Research Paper

In: Computers and Technology

Submitted By nlorick
Words 1059
Pages 5
NT1430 Linux Networking Research Paper
Nicholas Lorick
ITT Technical Institute St. Petersburg Campus

NT1430 Linux Networking Research Paper All people in the IT field are familiar with the IPv4 protocol and they are quickly becoming familiar with the IPv6 protocol. Bradley (2012) states the following:
Since the beginning of the internet, IPv4 has been synonymous with IP and few people ever stopped to think about which version of the protocol it was. But IPv4 has outlived its usefulness. Its successor, IPv6, after nearly two decades of development is finally ready to replace IPv4 as the backbone of the Internet. (p. 34) With all the new technology and devices now accessing the internet the move to IPv6 will eventually happen. According to Bradley (2012), IPv4 is out of IP addresses. IPv4 supports only 4.3 billion addresses; and with PCs, smartphones, tablets, and gaming systems connecting to the Internet, we are running out of IP address. IPv6 uses 128-bit addresses and can maintain 340 undecillion (340 × 1036) addresses. The IPv6 protocol brings with it other benefits. With IPv4 most of the internet relies on Network Address Translation. With IPv6, every device can have its own unique public IP address. Most home and small-business users have one IP address on the Internet -- the one for the router that links their hardware to their ISP. The router issues IP addresses internally to the devices that attach to it, but it must constantly keep track of which traffic belongs to which device, and translate the IP address from the internal one to the public one to facilitate online communications. (Bradley, 2012, p. 34) There are still people who have concerns about their devices working with IPv6. Bradley (2012) states the following:
Though IPv4 and IPv6 are not directly compatible, researchers realized that they couldn't simply flip a switch and…...

Similar Documents

Premium Essay

Research Paper

...Lesson Guide The Research Process In writing a research paper, you will use the skills you have already learned, such as summary, analysis, and synthesis. You will go beyond the readings in the text, however, to add breadth and depth to your paper. Depending on your topic, you might use library research for traditional sources, online research for Internet sources, field research, or a combination of the three. Each topic chapter provides a list of Research Activities at the end. These suggestions will guide you to source material outside the textbook and provide ideas for research papers. Additionally, make use of the topic chapter links provided on this Companion Website to find more readings on each subject. What follows is a list of the steps you will take in planning and writing a paper. Remember that writing is a recursive process; you will not necessarily follow these steps in this order, and you may find yourself backtracking and looping. Find a Subject. If a subject is not assigned to you, decide what subject you are going to research and write about. Your text provides you with a wealth of ideas to start with. Use it as a springboard for discovering ideas. Develop a Research Question. Formulate an important question that you would like to answer through your research. This helps you narrow and focus your topic. The answer to the research question will become your thesis statement. Conduct Preliminary Research. To help you narrow your topic further and to find......

Words: 917 - Pages: 4

Premium Essay

Linux Research

...The first thing I would like to talk about here would be SELinux, there are many contributors to SELinux but it all really comes back to four major organizations that are responsible for the initial public release of SELinux. These organizations include The National Security Agency, Network Associates Laboratories, The MITRE Corporation, and finally the Secure Computing Corporation. From my research I have found that it all really started with the NSA when they developed the LSM-based SELinux and made it part of Linux 2.6, and this has also led to the development of similar controls in the X Window System (XACE/XSELinux) and for Xen (XSM/Flask). Then NAI Labs implemented several additional kernel mandatory access controls, developed the example security policy configuration and also contributed to the development of the Linux Security Modules kernel patch. The MITRE Corporation helped several common Linux utilities because SELinux-aware and developed application security policies. The SCC developed a preliminary security policy configuration for the system that was used as a starting point for NAI Labs’ configuration, and also developed several new or modified utilities. SELinux controls access between applications and resources, and it does this by using mandatory security policy SELinux enforces the security goals of the system regardless of whether applications misbehave or users act carelessly. You can check of SELinux is enabled in Red Hat, or Fedora by using the......

Words: 541 - Pages: 3

Free Essay

Research Paper

...Date: March 22, 2012 To: Mrs. Depano From: Joffrey A. Peji Subject: Web access to Novell Group Wise, Pegasus Mail, Lotus Notes and Mozilla Novel Group Wise GroupWise can operate on a number of server and workstation platforms. Server platforms include NetWare, Linux, and Windows. One client runs on Microsoft Windows platforms, and a Java client operates on Linux and on Mac OS X. Novell has delivered closer client-feature parity in GroupWise 8.[1] There are also GroupWise connectors for Microsoft Outlook and Novell Evolution. The basic features of this is a messaging and collaborative software platform from Novell that supports email, calendaring, personal information management, instant messaging, and document management. The platform consists of the client software, which is available for Windows, Mac OS X, and Linux, and the server software, which is supported on Windows Server, NetWare, and Linux. The latest generation of the platform is GroupWise 2012. Pegasus Mail (PMail) is suitable for single or multiple users on stand-alone computers and for internal and Internet mail on local area networks. Pegasus Mail has minimal system requirements compared with competing products, for instance the installed program (excluding mailboxes) for version 4.52 requires only around 13.5 MB of hard drive space. Since Pegasus Mail does not make changes to the Windows registry or the system directory, it is suitable as a portable application for USB drives. Language packs are......

Words: 481 - Pages: 2

Free Essay

Research Paper

...proponents have reached the requirements and satisfy the client. The system will be implemented as soon as the system will be permitted. Figure 1.0 3.8 Data Gathering Procedures 3.9.20 Interview The proponents conducted several interviews to Mrs. Jane Diaz of CCS. The proponents asked questions about the history of the department, how they communicate with the CCS students and how they share handouts. 3.9.21 Observation The proponents observe that the communication between instructors and students is done through announcing. This observation helps the proponents to create messaging apps that can help the department. 3.9.22 Internet Research The proponent visited several websites on the internet o make research regarding Mobile Apps Development, Android Apps and some supporting information the proponents need in creating the documentation. The use of the internet helped the proponents to gather information that will widen their knowledge in creating the apps and the documentation. 3.9.23 Questionnaires Questions were given to some instructors that will be answered. The questions is the basis of the proponents in creating the propose system. 3.0 Review of Related Books 4.9.24 Hello Android by Ed Burnette (English Version) Great tools to help you get started with your first Android application. Introducing the basics of Android development, you slowly start getting......

Words: 2711 - Pages: 11

Free Essay

Paper Research

...most students' careers when they are assigned a research paper. Such an assignment often creates a great deal of unneeded anxiety in the student, which may result in procrastination and a feeling of confusion and inadequacy. This anxiety frequently stems from the fact that many students are unfamiliar and inexperienced with this genre of writing. Never fear—inexperience and unfamiliarity are situations you can change through practice! Writing a research paper is an essential aspect of academics and should not be avoided on account of one's anxiety. In fact, the process of writing a research paper can be one of the more rewarding experiences one may encounter in academics. What is more, many students will continue to do research throughout their careers, which is one of the reasons this topic is so important. Becoming an experienced researcher and writer in any field or discipline takes a great deal of practice. There are few individuals for whom this process comes naturally. Remember, even the most seasoned academic veterans have had to learn how to write a research paper at some point in their career. Therefore, with diligence, organization, practice, a willingness to learn (and to make mistakes!), and, perhaps most important of all, patience, a student will find that she can achieve great things through her research and writing. This handout will include the following sections related to the process of writing a research paper: Genre- This section will provide an......

Words: 345 - Pages: 2

Free Essay

Linux Cli Paper

...1) bash- is a Unix shell written by Brian Fox for the GNU Project as a free software replacement for the Bourne shell. Released in 1989, it has been distributed widely as the shell for the GNU operating system and as the default shell on Linux, Mac OS X and Darwin. 2) bsh- (Bourne shell) was the default Unix shell of Unix Version 7. Developed by Stephen Bourne at AT&T Bell Laboratories, it was a replacement for the Thompson shell. It was released in 1977 in the Version 7 Unix release distributed to colleges and universities. 3) tcsh- is a Unix shell based on and compatible with the C shell (csh). It is essentially the C shell with programmable command line completion, command-line editing, and a few other features. 4) csh- is a Unix shell that was created by Bill Joy while a graduate student at University of California, Berkeley in the 1970s. Other early contributors to the ideas or the code were Michael Ubell, Eric Allman, Mike O'Brien and Jim Kulp. The C shell is a command processor typically run in a text window, allowing the user to type commands. The C shell can also read commands from a file, called a script. 5) ksh- is a Unix shell which was developed by David Korn at Bell Labs in the early. Other early contributors were Bell Labs developers Mike Veach and Pat Sullivan, who wrote the Emacs- and vi-style line editing modes′ code, respectively. KornShell is backward-compatible with the Bourne shell and includes many features of the C shell,......

Words: 1015 - Pages: 5

Free Essay

Research Paper

...       Any topic (writer's choice) Name Institution     Paper instructions: Describe some reasons why Linux is installed on only a very small fraction of desktop computers. Linux is a robust multi-tasking networked open source operating system that has attracted a large market in recent past. The operating system is becoming popular with mobile phones and enterprise software and can only be installed on a small fraction of desktop computers for the following reasons; The installation process can get complex at times to a normal user. This may require support which may increase the total cost of ownership despite the software being free. Also the number of users using Linux desktop deployment is small which keeps firms off from porting desktop applications to a Linux environment. In addition, only a small amount of money is saved when someone decides to invest in Windows operating system.  Are there particular categories of products or users who might see Linux as more appealing than conventional operating systems? Do you think Linux's share of the desktop market will increase? Why or why not? Linux offers robust security measures making it hard to be hacked. Firms running sensitive data and information could improve the security of their systems by using Linux as opposed to MS-Windows which is vulnerable to hacking (Gallaugher, 2013). Similarly the operating system...

Words: 733 - Pages: 3

Premium Essay

Research Paper

...English 102— Research Paper Requirements and General Guidelines Dr. B. Bryant Office phone—671-6358 Office—Bldg. 1, room 119 E/ office 19 Research Paper due—May 2nd (Fri) 3:00 pm in my office It must contain copies of your research. 1. Your final paper needs to be 5-8 pages (not including “Works Consulted page”) in MLA format. NO PAPER UNDER 5 PAGES WILL BE ACCEPTED!!! 2. In your research folder—a folder that does not allow your research materials to fall out—you must have the following items: • Research Paper—11/25 • Rough Draft • Research proposal/outline due 4/24 for class time • COPIES OF YOUR RESEARCH! • Your paper must be sent to on safe assignment PLEASE NOTE: NO PAPER WILL BE ACCEPTED WITHOUT COPIES OF YOUR RESEACH! The paper will receive an F. 3. Research Materials—Included on your “Works Consulted” page, you must have at least 5 professional journal articles or books. You can have more; the research really depends on your topic. Also the research papers I gave you count as a source and Loot. 4. The journal articles can come from the internet, but make sure the article is a professional article with a thesis/research, not a general informational page. All internet articles must be cited as an internet source. You can use the museum websites and YouTube. 5. For books and articles in books, you must copy the title page, copyright page, table of contents and the......

Words: 628 - Pages: 3

Premium Essay

Research Paper About a Research Paper

...Research Paper about a Research Paper Name place Professor 05/22/11 Research Paper about a Research Paper Research is a way to formulate questions and ideas used to solve a give problem using of all sorts of sources to collect information that would generate a solution. Research in the simplest form could be presented as; my computer keeps rebooting. The research focus could involve looking threw the internet to find web help that addresses the same issue or finding a business that specialize in computer repair by doing a query for computer repair from online in your area or looking threw the phone book. In this instance, someone has prepared both sources with the intention to help find the answer from documented information (Booth, Colomb & Williams, 2008). Over centuries information and been collected in libraries all the information desired. The information age yielding the internet that contains information collected by others for others to answer questions and develop new questions, and find answers. Research papers are also used as a primary form of learning that begins in elementary school and used all threw college and beyond. Carriers have been built for the purpose of conducting research and writing research papers by teachers, scientists, writers, historians, lawyers, engineers – list is goes on. Educators have established the fact that formal research can be a tool used for learning, thinking and understanding......

Words: 1673 - Pages: 7

Free Essay

Research Paper

...Process management Research Paper Process management Research Paper Contents Title: 3 Abstract: 3 Introduction/Background 4 The Process 5 Process State 7 Process Scheduling 8 Methods 9 Results and findings 10 Process Creation 10 Threads 12 Scheduling 14 Synchronization 15 Buffering 16 Deadlock Handling 17 Related Work 18 Conclusion and Future Work 19 References 20 Appendix 20 List of your data 20 Design/Implementation 21 Source Codes 24 Process Creation 24 Threads 24 Peterson’s Algorithm 25 Bakery Algorithm 26 Softwares 26 Title: Process Management Abstract: A process is usually called as a program in execution. A process needs certain assets, including CPU time, memory, documents, and I/O gadgets, to achieve its undertaking. The working framework is in charge of the accompanying exercises regarding process administration i.e. process creation and erasure, process suspension and resumption (scheduling), procurement of instruments for process synchronization and process correspondence. Process administration is normally performed by the bit. In numerous cutting edge working frameworks, there can be more than one occurrence of a system stacked in memory in the meantime; for instance, more than one client could be executing the same project, every client having separate duplicates of the system stacked into memory. With a few projects, it is conceivable to have one duplicate......

Words: 5575 - Pages: 23

Free Essay

Linux Research Assignment 1

...1. What is the meaning of the acronym LAMP, and how is it used for creating dynamic websites? A: Lamp stands for “Linux, Apache, MySQL and PHP.” Together these software technologies can be used to form a fully-functional web server. Linux is the most popular operating system used in web servers. The most important of these four technologies is Apache, Apache is the software that serves webpages over the Internet via the HTTP protocol. Once Apache is installed, a standard Linux machine is transformed into a web server that can host live websites. Other components of LAMP include MySQL and PHP. MySQL is a popular open source database management system (DBMS) and PHP is a popular web scripting language. Together, these two products are used to create dynamic websites. Instead of only serving static HTML pages, a LAMP server can generate dynamic webpages that run PHP code and load data from a MySQL database. 2. For Internet websites which are located throughout the entire world, what is the estimated market share for dynamic websites which use LAMP as opposed to Microsoft IIS and the Microsoft Active Server Page scripting language? A: As of today, LAMP (Apache) = 56.4% and Microsoft IIS = 12.9% and I cannot find the percentages for the Microsoft Active Server Page. 3. What is PHP? A: PHP is a widely-used open source general-purpose scripting language that is especially suited for web development and can be embedded into HTML. 4. What is the JAVA Server......

Words: 353 - Pages: 2

Free Essay

Research Paper

...Writing a Research Paper in Literary Studies1 The most important aspect to bear in mind is that you are writing a research paper and not an essay! This means that you are arguing a thesis with reference to secondary literature – it is essential that you conduct relevant research and that you integrate your findings into your paper. Things to keep in mind: • Your paper should have a well-defined topic and a precisely formulated argument. • Your approach should be recognizably systematic. • Your argument should remain relevant and clear-cut, consistent and coherent throughout. • Your secondary material should be discussed critically and documented accurately. • Writing is a process; you should constantly revisit and revise. DON’T FORGET TO PRINT, SIGN AND ATTACH THE “PLAGIATSHINWEIS”! First steps Many students neglect the preliminary work of the writing process, but if you give it sufficient attention the actual writing of your paper will be faster and more organized than if you just start writing. The most important thing is to be systematic in your approach. 1. Finding a topic Perhaps the most difficult part of any research paper is finding an adequate topic, formulating a title and making a coherent argument. Once you have decided on a topic or a title, which in literary studies will most likely involve a certain text, rephrase it as a question to guide your research. You should also think about the methodology you intend to apply to your analysis. • ...

Words: 3119 - Pages: 13

Premium Essay

Linux Ii Research Assignment - Linux Security Technologies

...Research Assignment Linux Security Technologies Kristy Graves ITT Tech – Dayton Linux II IT302 Mandatory Access Control Mandatory Access Control (MAC) is a system wide policy that relies on the current system to control access (Syracuse University, 2009). Users cannot alter or make any changes to this policy. Only the administrator has the clearance and authorization to make changes (The Computer Language Company Inc., 2012). Mandatory access control mechanisms are more than Discretionary Access Control (DAC) but have trade offs in performance and convenience to all users (The Open Web Application Security Project, 2002). Users can access lower level documentation, but they cannot access higher level without the process of declassification. Access is authorized or restricted based on the security characteristics of the HTTP client. This can be due to SSL bit length, version information, originating IP address or domain, etc. Systems supporting flexible security models can be SELinux, Trusted Solaris, TrustedBSD, etc. DAC checks the validity of the credentials given by the user. MAC validate aspects which are out of the hands of the user (Coar, 2000). If there is no DAC list on an object, full access is granted to any user (Microsoft, 2012). SELinux SELinux has three states of operation. These states are enforcing, permissive, and disabled. SELinux was developed by the U.S. National Security Agency (NSA) and implements MAC in a Linux kernel (Sobell, 2011).......

Words: 875 - Pages: 4

Premium Essay

Research & Terminology Research Paper

... Research is defined as "studious inquiry or examination; especially : investigation or experimentation aimed at the discovery and interpretation of facts, revision of accepted theories or laws in the light of new facts, or practical application of such new or revised theories or laws" ("Research," 2012). It's said that research is one of the most important processes in the field of criminal justice. There are many ways to complete research which can cause the process of research to take the most time. This paper will discuss the different methods and the different terminology that is used in the criminal justice system. There are two common methods that are used in the criminal justice system and they are the qualitative and quantitative methods. As part of the readings, it was determined that there are so many different methods for researching. However, some of these research methods have never been heard of or people don't know anything about them. There are several steps that would need to be taken in order to complete the entire research cycle. The first term that will be discussed is Scientific Research, which means it's the "research into questions posed by scientific theories and hypothesis" ("Scientific Research," 2011). The most common research method that is used today is the scientific research method, which is used highly in the criminal justice system. Just about every aspect of the criminal justice system revolves around science. Doing......

Words: 599 - Pages: 3

Free Essay

Linux Paper

...Linux Features of Red Hat Red hat has many different features, I will cover a few of the main features in this section, and Red Hat contains more than 1,200 components covering a broad range of functionality. Red Hat Enterprise Linux provides CIOs and IT managers with the means to reduce costs while improving operational flexibility throughout their computing infrastructure. The following list provides a brief summary of the more important features: * Virtualization is provided in all Red Hat Enterprise Linux server products and is optionally available for desktop products. * Storage and extended server virtualization are provided with Red Hat Enterprise Linux Advanced Platform. * Red Hat Network supports virtualized guest operating systems * Virtual-manager, other management tools are available for single system or scripted virtualization management. * Integration with Red Hat Enterprise Virtualization is available for enterprise virtualization management. Networking & interoperability * Network storage enhancements include Autofs, FS-Cache, and iSCSI support * IPv6 support and conformance enhancements * Improved Microsoft® file/print and Active Directory integration, including support for Windows Security Features * SE Linux enhancements include Multi-Level Security and targeted policies for all services * SE troubleshooter GUI simplifies SE Linux management * Integrated directory and security capabilities * IPSEC......

Words: 769 - Pages: 4