Question

Discuss what NIS is and the setup and uses of NIS servers in a Linux environment. Consider a scen...

Discuss what NIS is and the setup and uses of NIS servers in a Linux environment.

Consider a scenario where you have to setup one such server for your institution, discuss its setting in an institution and what purpose it could serve and whether or not you will require a Master Server.

Please provide more than 250 words

0 0
Add a comment Improve this question Transcribed image text
Answer #1

The NIS or the Network Information system is the administration system that are used for smaller networks and is being developed by Sun Microsystems. Nis works similar to the DNS and it is being designed for smaller networks. It can be used in LANs. The NIS uses a client/server model and the RPC interface for communication between the host Linux machines. The NIS uses a server, administrative tools and client programs. NIS is basically implemented with the Network File System of the Linux Operating system.

Nis allows authentication and also logon information that are to be stored on the centrally located server. This actually includes the password and the username for login authentication. For configuring a NIS server, a server and a client machine must be required and then the /etc/hosts files are updated on both the machine. Lastly, running the portmap and xinetd services to complete the configuration.

Based on the scenario, the NIS can be configured within the LAN and it could serve the purpose as well but on a very small scale. It does require a master server to configure. Because NFS can be configured in a normal server as well. With that NFS, the NIS configuration can also be performed. And once the configuration is done. The master server will act as a central repository for hosting all the configuration and also maintains an authoritative copy of files that are used by the NIS clients. Similar way the NIS client will authenticate by the NIS server during the logon process. Passwd, group and even the host files are being shared by the NIS.

Add a comment
Know the answer?
Add Answer to:
Discuss what NIS is and the setup and uses of NIS servers in a Linux environment. Consider a scen...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • Regional Gardens Ltd is a company that runs a number of related gardening enterprises. It has...

    Regional Gardens Ltd is a company that runs a number of related gardening enterprises. It has a large display garden that it opens for public inspection a number of times a year. These enterprises include the Regional Gardens Nursery which sells plants and garden supplies to the public, and Regional Garden Planners which provides garden advice, design and consultancy services. Regional Gardens Ltd has a small data center at its main site in Bathurst where the company’s servers and data...

  • identified and discuss at least three alternatives (options) that the company could consider. for each option...

    identified and discuss at least three alternatives (options) that the company could consider. for each option indicate if it is legal and ethical, probably legal but unethical or illegal and unethical. what are your recommendations? in other words, of the several alternatives you identified what do you think the company should do? what is your rationale for your recommendations? in other words, why do you recommend this course of action? 4 What is your rationale for your recommendations? In other...

  • 1. Which of the following commands will locate all of the program files on a computer...

    1. Which of the following commands will locate all of the program files on a computer on which the SUID bit is set? Select one: a. find / -type SUID b. find / -perm +4000 -type f c. find / -perm +SUID -type f d. find / -suid 2. A server/computer combination appears in both hosts.allow and hosts.deny. What's the result of this configuration when TCP wrappers runs? Select one: a. TCP wrappers refuses to run and logs an error...

  • Figure 1 LAN Subnet: 192.168.40.0124 LAN Switch Internet External Firewall Internal Firewall DMZ Subnet: 192.168.10.0/24 LAN devices Web Server running on port 80 IDS (Snort VM) Remote Access S...

    Figure 1 LAN Subnet: 192.168.40.0124 LAN Switch Internet External Firewall Internal Firewall DMZ Subnet: 192.168.10.0/24 LAN devices Web Server running on port 80 IDS (Snort VM) Remote Access Server (Nginx VM) (OpenVPN) Overview Medium to large organisations typically consist of services that are accessed/consumed from external parties for various purposes. As such, a DMZ is a suitable solution to segregate such services from internal networkis). The network diagram provided (Figure 1) illustrates the IT environment of a medium organisation, which...

  • Use the following scenario. Review the scenario first and then continue on with your assignment. Consider...

    Use the following scenario. Review the scenario first and then continue on with your assignment. Consider saving the PDF or printing it out for your reference. You have been meeting with the CEO, the project sponsor, your manager, and the heads of all the other departments to discuss the project and their expectations. You are starting to be concerned about the level of risk of this project and whether or not the organization really understands it. As far as you...

  • The purpose of this assignment is to identify laws and federal regulations governing employment. Consider what...

    The purpose of this assignment is to identify laws and federal regulations governing employment. Consider what you have learned about employment laws and federal regulations governing employment, particularly regarding the distinctions between independent contractors and employees and how business is conducted with each. Read the scenario below. Scenario Madrid and Berne is a top-rated accounting firm with offices in Phoenix and Tucson. Madrid and Berne wanted to provide bookkeeping as an additional service to its clients. It hired Joan Newman...

  • Questions 1. How do conceptual frameworks of accounting attempt to create a theory of accounting? Describe...

    Questions 1. How do conceptual frameworks of accounting attempt to create a theory of accounting? Describe the components of the IASB Framework and how it contributes to a theory of accounting. 2. Some people argue that there is no need for a general theory of accounting as established in a conceptual framework. They say there is no overall theory of physics. biology, botany or psychology, so there is no need for an overall theory of accounting. Furthermore, attempts to develop...

  • Of the following four responses which do you feel is the most ethical and why? Why...

    Of the following four responses which do you feel is the most ethical and why? Why do you feel the way you di about the right to health care? The reflection answer must be at least 250 words or more thank you A. I agree with Dr. Miller. We need to provide a clear minimum of health care to everyone, and the Affordable Care Act is a step in the right direction, even if it doesn't provide the ultimate solution....

  • To respond to the Learning Activities, click on the blue hyperlink in the Topic area. Week...

    To respond to the Learning Activities, click on the blue hyperlink in the Topic area. Week 1 Learning Activity You will read the learning activity below and follow the instructions provided. You will create the memorandum and submit in the discussion area. Post the entire memorandum into the discussion area rather than provide as an attachment. Do not post in the discussion area until you have written the memorandum. If the seal is broken without posting, a zero for this...

  • Read Chapter 14, and discuss the following case to the best of your abilities: CASE OF...

    Read Chapter 14, and discuss the following case to the best of your abilities: CASE OF ANNE AND THE RUNAWAY STROLLER Anne, a 75-year-old woman suffering from late-stage Alzheimer’s disease was walking to a neighborhood restaurant holding on to the arm of her husband and a friend. Suddenly, a young woman, talking on her cell phone as she was running behind a stroller containing a young baby, ran toward Anne, veering to the side at the last second and then...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT