This website uses cookies to ensure you have the best experience. Learn more

Linux Research Paper

1081 words - 5 pages

NT1430 Linux Networking Research Paper
Nicholas Lorick
ITT Technical Institute St. Petersburg Campus

NT1430 Linux Networking Research Paper
All people in the IT field are familiar with the IPv4 protocol and they are quickly becoming familiar with the IPv6 protocol. Bradley (2012) states the following:
Since the beginning of the internet, IPv4 has been synonymous with IP and few people ever stopped to think about which version of the protocol it was. But IPv4 has outlived its usefulness. Its successor, IPv6, after nearly two decades of development is finally ready to replace IPv4 as the backbone of the Internet. (p. 34)
With all the new technology and devices now accessing the ...view middle of the document...

IPv6 devices are built using a process called dual stack that permits IPv6 and IPv4 to run simultaneously alongside each other. (p. 34)
DHCP servers in Linux can be configured to use IPv6. A bulleted point in the Sobell (2012) Linux text reveals the following:
IPv6 enables stateless address autoconfiguration. With IPv4, DHCP (page 489) is usually used to automate network configuration. With IPv6, autoconfiguration makes it possible for hosts to configure their IP addresses automatically and autonomously without the need for a central service like DHCP. (p. 373)
A completely new implementation of DHCP that covers IPv6 is DHCPv6. Autoconfiguration works in most situations. But, Network Administrations who choose to have more control over their networks might us DHCPv6. It gives the Administrator the ability to specify certain host addresses that can persist even if the host or network interface has to be replaced. Autoconfigured addresses depend on the interface hardware address. (Sobell, 2012, 376)
According to Sobell (2012), this also allows configuration of other operational parameters, such as local DNS resolver addresses, which are not well supported with autoconfiguration. This feature is important on networks that run IPv6 only.
DHCPv6 also introduces the notion of a stateless mode, which is a way to enjoy the simplicity of autoconfiguration using router advertisements while also allowing the Administrator to manage static configuration elements (e.g., DNS resolver addresses) using a very simple DHCP configuration that is easily made fault tolerant. (Sobell, 2012, p. 376)
I have included a sample configuration of a Linux DHCP server and have included explanations of the sample. According to Harrison (“Quick how to:,” n.d.), You can define your server configuration parameters in the dhcpd.conf file which may be located in the /etc the /etc/dhcpd or /etc/dhcp3 directories depending on your version of Linux. Note: The skeleton dhcp.conf file that is created when you install the package may vary in its completeness. In Ubuntu / Debian, the skeleton dhcpd.conf file is extensive with most of the commands deactivated with a # sign at the beginning. In Fedora / RedHat / CentOS an extensive sample is also created with activated commands. It is found in the following location which you...

Other Papers Like Linux Research Paper

Linux Essay

1010 words - 5 pages bnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnm Research Assignment 2.1 4/9/2012 Kathleen Cline | Research Assignment 2.1 Linux security technologies SELinux, chroot jail, and iptables For each security technology, explain what organization (if any) is behind it

Linux Security Essay

686 words - 3 pages Install a Fedora Linux Operating System on a Server 1. During the install, the option to sync with a NTP (Network Time Protocol) server was checked. From a security perspective, why is it important for a system to keep accurate time? So that all events have a proper timestamp for documentation. 2. During the install, a password has been set for the “root” user. What is the “root” user, and when is it appropriate to use this

Linux Networking

554 words - 3 pages Linux Networking Homework ------------------------------------------------- Chapter 5 1. Which commands can you use to determine who is logged in on a specific Terminal? Who, w, hostname, finger 3. What happens when you give the following commands if the file name done already exists? $ cp to_do done $ mv to_do done Answer: Either command overwrites Done with contents of To_do. $ cp - copy files and directories,$ mv - move

Linux Security

1599 words - 7 pages . National Security Agency(NSA). “SELinux was released under the NSA under the GNU GPL open source license. SELinux is essentially a Linux kernel with a number of utilities that provide enhanced security functionality. But the critical component of SELinux is how it implements and handles mandatory access controls. SELinux is important because mandatory access controls are essential to limiting access to daemons and users to only what they need. It

Linux Nt1430

517 words - 3 pages Josslynn Brown Linux NT1430 Chapter 1 1) Free software is software that gives you the user the freedom to share, study and modify it. We call this free software because the user is free. To use free software is to make a political and ethical choice asserting the right to learn, and share what we learn with others. The three main characteristics of free software are: The source code has to be distributed with the program, you cannot

Linux Security

448 words - 2 pages Linux Security Project Part 1 Instructor Sandro Tuccinardi Student Brian Dupee Security Policy Outline First World bank wants to provide banking services online to its customers. The institution estimates over $100,000,000 a year in online credit card transactions for loan applications and other banking services. According to a team that was formed using a Linux an open source infrastructure would roughly as

Linux Versus Windows NT

1007 words - 5 pages Linux versus Windows NT Forget the browser wars. This year's big nerd battle is the server shootout between Linux and Windows NT - and it's not just a bunch of geeks nit-picking. While both offer more affordable platforms for Web service than in the past, Linux and NT are polar opposites on almost every other level. They look different, run differently, support different software, and cost money in different places. So far though, most press

320 Linux Admin

816 words - 4 pages SELinux SELinux was developed by the United States National Security Agency. It was then released for open source development on December 22, 2000 and was merged into the main Linux kernel version 2.6.0-test3 on August 8, 2003. SELinux was designed to change the access control protocols for Linux users, to make them more secure and computer resources and applications less likely to be exploited. Prior to the development of SELinux, systems

Linux Security Technology

1875 words - 8 pages |Linux Security Technology | | 1. SELinux SELinux, an implementation of Mandatory Access Control (MAC) in the Linux kernel, adds the ability to administratively define policies on all subjects (processes) and objects (devices, files, and signaled processes). This mechanism is in the Linux kernel, checking for allowed operations after

Linux Operating Systems

808 words - 4 pages Linux Operating System Mark Stansbery POS/355 Alicia Pearlman May 5, 2012 Linux is an operating system just like Windows, and MAC OS, but more along the same lines of the UNIX operating system, because they have some of the same features. Out of the three most popular operating systems, Linux is surprisingly enough is the least popular. It is growing in popularity as more and more systems start to use it, but it still has a long way

Microsoft Acquiring Linux

524 words - 3 pages MICROSOFT ACQUIRES LINUX Introduction The Microsoft Corporation is the largest diversified computer software company in the world. Linux is simply a computer operating system. The stable and flexible nature of Linux has attracted people to use it at home and work computers. Linux has many advantages like they are more stable, secure as well as robust. It is considered to be perfect storage of huge information database. As a competitive

Related Essays

Unix/Linux Essay

2809 words - 12 pages UNIX, Linux, and Windows Server Critique POS/420 Name Professor Date University of Phoenix Abstract The following sections in this paper focus on analyzing operating systems for Riordan Manufacturing Inc. that specializes in plastic molding and design. Team B concentrated on five main areas of UNIX, Linux, and Windows Server. The five areas include Security, Administration, Networking, Performance, and Programmability. The team explains

Linux Security Technologies Essay

1229 words - 5 pages George McShane Research Paper 07/13/2012 Linux Security Technologies In today’s world there are many ways to gain access to the internet. You can go to your local library, a Starbucks, any airport, or even a McDonald’s. With all of these ways to have free access to the Web, the opportunity for hacker’s to get to your personal information is at an all time high. Linux programming has many ways to combat this situation with security

Windows Linux Security Essay

5790 words - 24 pages onto the more privileged services. 2- Windows and Linux security models The intent of this study, "An Approach to Analyzing the Windows and Linux Security Models", was to provide 29 acomparison research study of the security relatedelements such as capabilities versus privilegesbetween the Linux and Windows operating systems.While the research was being conducted, we realizedthat a set of common metrics is lacking to quantifythe security

Linux Essay

276 words - 2 pages Whether you are an experienced user of Linux or you just want to test run the system on your computer, there are several advantages that you can gain from using this operating system. One factor would be the cost, when you use Linux you will have to spend a penny this software is freely available. This operating system allows you to install the software on number computers unlike in the case of other application systems where you are limited to