Analyze the Linux Performance in Network Management

Authors

  • Mohammad Salem Hamidi Lecture and Vice Chancellor, Department of Computer Science, Jahan University, Kabul, Afghanistan
  • Sikandar Zulqarnin Lecture, Department of Computer Science, Jahan University, Kabul, Afghanistan
  • Jamshid Ahmadi Student, Department of Computer Science, Jahan University, Kabul, Afghanistan
  • Nazir Gul Student, Department of Computer Science, Jahan University, Kabul, Afghanistan
  • Mohammad Ilyasl Student, Department of Computer Science, Jahan University, Kabul, Afghanistan

Keywords:

Linux, Management, OS (Operating system), Open source, Linux systems, Linux networks

Abstract

Computational models utilized for experiments in high-energy physics are progressively becoming globally distributed and grid based. This shift is driven by both technical factors, such as the proximity of computing and data resources and increased demand, as well as strategic considerations, including investment strategies. This transformation poses unprecedented challenges for network infrastructure, end systems, and computing and storage solutions. Among the significant challenges is the reliable and efficient transfer of scientific data sets, which have now reached the scale of many petabytes (10^15 bytes) and are expected to grow to the Exabyte range within a decade. This data transfer must occur seamlessly between various devices and computing centers across the globe. Both the network infrastructure and end systems need to offer capabilities that support high-capacity continuous data transmission efficiently. Recent trends in technology show that although the raw data rates used in networks are increasing rapidly, the pace of development of microprocessor technology has slowed. Therefore, the processing overhead of network protocols has skyrocketed compared to the time spent transmitting packets, resulting in reduced throughput for network applications. In a growing number of cases, it is the end system of the network, rather than the network itself, that is accountable for the diminished performance of network applications. In this study, the process of receiving Linux packets from the NIC to the application is studied. We have developed a mathematical model to depict the packet reception process in Linux. The key factors that affect the network performance of Linux systems are analyzed. The primary objective of my work is to investigate the utilization of Linux in the field of network management; find out the Linux tools and functionality used for management; and identify the most suitable Linux distribution for network administration. Secondary data collection methodology is used, I collected data from books, articles and valuable sources. As a result, we have come to the conclusion that Linux, like other commercial operating systems, is not secure outside of the box. We have provided recommendations on actions that can be taken to enhance the security of Linux.

References

Yaswinski MR, Chowdhury MM, Jochen M. Linux security: A survey. 2019 IEEE International Conference on Electro Information Technology (EIT). 2019 May; 357–362.

Dastres R, Soori M. A review in recent development of network threats and security measures. International Journal of Computer and Information Engineering. 2021; 15(1): 75-81.

Zurier S. (2022). 10 essential Linux tools for network and security pros. Network World. [Online] Available from: https://www.networkworld.com/article/3656629/10-essential-linux-security-tools-for-network-professionals-and-security-practitioners.html

Wu W, Crawford M, Bowden M. The performance analysis of Linux networking–packet receiving. Comput Commun. Mar 2007; 30(5): 1044–1057.

De La Cruz R. Security analysis between Windows, Linux and macOS. Innovatus: A Journal on Computing Technology Innovations. May 2023; 6(1): 1–15.

Okechukwu OG. Security evaluation of Google Chrome operating system. IOSR Journal of Computer Engineering (IOSR-JCE). 2014; 16(6): 64–67.

Mohammed A, Sama S, Mohammed M. Enhancing network security in Linux Environment. [Thesis]. Sweden: School of Information Science, Computer and Electrical Engineering Halmstad University; 2012. [Online] https://www.diva-portal.org/smash/get/diva2:492355/FULLTEXT01.pdf.

Mishra MK, Goyal D. Security analysis in Open-Source Linux Network. Int J Comput Sci Netw Secur. Aug 2014; 14(8): 63–67.

Host Namaste. (Jan 2020). Cheap Linux hosting solutions for affordable domain hosting. Med`ium. [Online] Available from: https://medium.com/@host_namaste/cheap-linux-hosting-solutions-for-affordable-domain-hosting-3e9e7128c9a4.

Agarwal T. (2014). Linux operating system: Types, working, differences & its commands. ElProCus-Electronic Projects for Engineering Students. [Online] Available from: https://www.

elprocus.com/linux-operating-system/.

Eric Galstyan. (Apr 2023). How Linux OS can enhance cybersecurity: A guide for security professionals. Medium. [Online] Available from: https://medium.com/@galstyaneric/how-linux-os-can-enhance-cybersecurity-a-guide-for-security-professionals-35576bcd2d20.

Brittany Day. (May 2023). How secure is Linux? Linux Security. [Online] Available from: https://linuxsecurity.com/features/how-secure-is-linux.

Published

2023-10-31