Analyze The Linux Performance In Network Management

Analyze The Linux Performance In Network Management

Author Details

1. Dr Mohammad Salim Hamidi, Jahan University Kabul Afghanistan
2. Sikandar zulqarnin, Jahan University Kabul Afghanistan
3. Wahdatullah Sharafat, Jahan University Kabul Afghanistan
4. Mohammad Ilyasl, Jahan University Kabul Afghanistan

Computational models for experiments in high-energy physics are increasingly globally distributed and grid-based, both for technical reasons (e.g. proximity of computing and data resources and demand) and strategic reasons (e.g. investment). To support such computing models, network and end systems, computing and storage face unprecedented challenges. One of the biggest challenges is to reliably and efficiently transfer scientific data sets – now in the range of many petabytes (1015 bytes) and expected to grow to Exabyte’s within a decade – between devices and computing centers around the world. Both the network and the end systems should be able to provide capabilities to support broadband continuous data transmission with end tones. Recent trends in technology show that although the raw data rates used in networks are increasing rapidly, the pace of development of microprocessor technology has slowed. Therefore, the processing overhead of network protocols has skyrocketed compared to the time spent transmitting packets, resulting in reduced throughput for network applications. Increasingly, the network end system, rather than the network, is responsible for the degraded performance of network applications. In this paper, the process of receiving Linux packets from the NIC to the application is studied. We develop a mathematical model to characterize the process of receiving packets in Linux. The key factors that affect the network performance of Linux systems are analyzed. 2006 Elsevier B.V. All rights reserved. The main goal of my work is to find out the use of Linux in network management. Find out the Linux tools and functionality used for management. Know the best Linux distribution for network administration. Secondary data collection methodology is used in this post, I collected data from books, articles and valuable sources. As a result, we have come to the conclusion that Linux, like other commercial operating systems, is not secure out of the box. We have recommended some things that can be done to make Linux more secure.

Keywords

Linux, Management, OS (Operating system), Open source, performance
  1. http://www.linux-box.org/http://www.itworld.com/nl/lnx_se/05072002
  2. http://www.itworld.com/nl/lnx_sec/05142002
  3. http://www.itworld.com/nl/lnx_sec/04302002
  4. http://www.itworld.com/nl/lnx_sec/12182001

Salem Hamidi, et.al (2003);Analyze the linux performance in network management,IPEM JOURNAL OF COMPUTER APPLICATION &RESEARCH, 8(1),9-15

X