Professional Documents
Culture Documents
System Administration and Maintenance: Learning Module
System Administration and Maintenance: Learning Module
AND MAINTENANCE
Learning Module
CHAPTER I ........................................................................................................................................................ 6
ACCESS CONTROL .......................................................................................................................................... 6
OBJECTIVES.................................................................................................................................................. 6
What to Do When . . . .................................................................................................................................... 6
1.1 Constructing a Site from Scratch ....................................................................................................... 6
1.2 Growing up a small site ....................................................................................................................... 6
1.3 Going Globally ..................................................................................................................................... 7
1.4 Replacement of Services...................................................................................................................... 7
1.5 Moving a Data Center to..................................................................................................................... 7
1.6 Move to / Open a new building .......................................................................................................... 8
1.7 Handling Office Moves at High Rate ................................................................................................. 8
1.8 Place evaluation ................................................................................................................................... 9
1.9 Mergers and Procurements Contract ................................................................................................ 9
1.10 Frequent Computer Failure Coping .............................................................................................. 10
1.11 Survival during a Big Failure or Stopping Work........................................................................... 10
1.12 What tools will each member of the SA Team have? ................................................................... 11
1.13 Ensure the restoration of equipment ............................................................................................. 11
1.14 Why do I have Reporting Structures and Procedures? ................................................................ 12
1.15 Why do you log policies?................................................................................................................ 12
1.16 Identifying the underlying environmental issues ......................................................................... 12
1.17 Having more money for the work.................................................................................................. 13
1.18 Have Plans to Completed ............................................................................................................... 13
1.19 Hold Clients Content ...................................................................................................................... 14
1.20 Good Maintaining Leadership ....................................................................................................... 14
1.21 Maintaining SAs Proud................................................................................................................... 14
1.22 To prevent processes from being too late ...................................................................................... 14
1.23 Coping with a Major Machine Influx ............................................................................................ 15
1.24 Dealing with New Users' Big Influx ............................................................................................... 15
1.25 The Large Influx of New System Admins...................................................................................... 15
1.26 Strong SA Team Attrition Level ..................................................................................................... 15
1.27 Strong User-Base Retention Stages ................................................................................................ 16
1.28 To be unique to a party ................................................................................................................... 16
2
1.29 To be the new company boss.......................................................................................................... 16
1.30 Search for a new job ........................................................................................................................ 16
1.31 Hiring a lot of new SAs easily ......................................................................................................... 17
1.32 Improve overall machine efficiency ............................................................................................... 17
1.33 Lessen Costs ..................................................................................................................................... 17
1.34 Adding Features .............................................................................................................................. 18
1.35 Stopping the Pain When You Do "This"........................................................................................ 18
1.36 Creating Consumer Confidentiality .............................................................................................. 18
1.37 Creating Self-Confidence for the team .......................................................................................... 18
1.38 Improving the follow-up of the squad ........................................................................................... 19
1.39 The treatment of an immoral or troubling order.......................................................................... 19
1.40 My Dish-washer forgot Spots on My Glasses ............................................................................... 19
1.41 Secure the Work .............................................................................................................................. 19
1.42 Train More ....................................................................................................................................... 20
1.44 Getting all the Job Done.................................................................................................................. 20
1.45 Stop burden...................................................................................................................................... 21
1.46 What would SAs expect of their managers?.................................................................................. 21
1.47 How are the SA Managers expected from their SAs?................................................................... 21
1.48 How would SA Managers do to their bosses? ............................................................................... 21
REFERENCES.......................................................................................................................................... 21
CHAPTER II ..................................................................................................................................................... 22
SYSTEM ADMINISTRATOR ......................................................................................................................... 22
Related fields ................................................................................................................................................ 22
Duties and Responsibilities of a System Administrator ............................................................................ 22
Recommendations for Better System Administration .............................................................................. 23
Using a Ticket Management System...................................................................................................... 23
Manage Quick Requests.......................................................................................................................... 23
Adopt Three Time-Saving Guidelines ................................................................................................... 23
1. Start Every New Host in a Known State .................................................................................... 24
2. Make Email Work Efficiently ..................................................................................................... 25
3. Document Everything ................................................................................................................. 25
4. Address the major loss of time ................................................................................................... 25
5. Find a quick solution ................................................................................................................... 25
6. Provide the necessary power and cooling.................................................................................. 25
3
7. Deploy Easy Monitoring ............................................................................................................. 26
CHAPTER III.................................................................................................................................................... 27
WORKSTATION ............................................................................................................................................. 27
Overview ....................................................................................................................................................... 27
Learning Objectives: .................................................................................................................................... 27
Setting up ...................................................................................................................................................... 27
Lesson Proper ............................................................................................................................................... 28
Managing workstation operating systems leads to three simple tasks: ................................................... 29
2.1. Installation is partially automated................................................................................................... 32
2.3 Cloning, among other methods ....................................................................................................... 33
2.4 Can you rely on Vendor installation?.............................................................................................. 34
2.5 Setup Checklists ................................................................................................................................. 35
2.6 Configuration of Device Technology and Applications................................................................. 35
2.7 Updates Are Other than Installations .............................................................................................. 36
2.8 One, Some, Many .............................................................................................................................. 37
When utilizing one, some, and many, you will have the possibility of a failed patch technology. ... 37
3. Network Configuration ........................................................................................................................... 38
3.2 Know When to Use Dynamic Leases ............................................................................................... 40
Assessing learning ........................................................................................................................................ 43
Activity 1....................................................................................................................................................... 43
CHAPTER IV ................................................................................................................................................... 45
SERVER............................................................................................................................................................. 45
Choose Providers Well-Known for Reliable Hardware ....................................................................... 48
Understanding the Cost Amount of Server Hardware......................................................................... 48
Continuing Data Integrity ...................................................................................................................... 52
Place Servers in your Data Center .......................................................................................................... 52
Client Server OS Arrangement ............................................................................................................... 53
Offer Remote Console Access ................................................................................................................ 53
Enhancing Reliability and Service Ability ............................................................................................. 56
CHAPTER 5 ...................................................................................................................................................... 62
SERVICES ......................................................................................................................................................... 62
Overview ....................................................................................................................................................... 62
Learning Objectives: .................................................................................................................................... 62
4
1. The Basics ......................................................................................................................................... 62
1.2 Operational Requirements................................................................................................................ 64
1.3 Open Architecture ............................................................................................................................. 65
1.4 Simplicity ........................................................................................................................................... 66
1.5 Vendor Relations ............................................................................................................................... 67
1.6 Machine Independence..................................................................................................................... 67
1.7 Environment ...................................................................................................................................... 68
1.8 Restricted Access ............................................................................................................................... 68
1.9 Reliability ........................................................................................................................................... 69
1.10 Single or Multiple Servers ............................................................................................................... 70
1.11 Centralization and Standards ......................................................................................................... 70
1.12 Performance..................................................................................................................................... 71
1.13 Monitoring ....................................................................................................................................... 71
1.14 Service Rollout ................................................................................................................................. 72
2. The Icing....................................................................................................................................... 72
3. Conclusion ................................................................................................................................... 75
5
CHAPTER I
ACCESS CONTROL
OBJECTIVES
By the end of the lecture, I will be able to:
1. demonstrate understanding of the principles and capabilities of access controls;
2. analyze standardized Access Management Models; and
3. create, handle, and retain power of access to the system;
***
What to Do When . . .
In this chapter, I put together the different elements of the rest of the book to include an overview
of how they can be used to cope with daily circumstances or to help unique system administrators (SAs)
to managers addressing questions.
6
Talk to your company and whether you plan to recruit to include information on programs that
display available to fixed issues.
Power and quality management tools so that you can foresee when to scale them.
Be ready for the arrival of new computers, employees and SAs.
1 .3 Going Globally
Design your WAN (Wide Area Network) architecture.
Follow the three laws of size, scale and volume.
Standardize processing hours for Greenwich Mean Time (GMT) to optimize log analysis
capabilities.
Make sure the support desk is open 24/7. Take a peek at how to use SAs in certain time zones.
Architect networks that take into account long-distance links — usually smaller latency and less
efficient
Qualify applications for use over high latency links.
Ensure that the compliance and regulatory systems remain sufficient in the light of global
operations.
7
1.6 Move to / Open a new building
Get keys to the new network construction field four weeks or more in advance.
Use the phone or walkie-talkies to connect inside the house.
Use your personal digital assistant (PDA) or non-electronic organizer.
Order WAN and Internet Service Providers (ISP) network links 2-3months in advance.
To explain to the authorities that the links between WAN and ISP take months to order and must
be made early.
Prewire offices with network jacks before, but not during, building.
Partner with a moving service who will help you organize the transfer.
Appoint a person to hold and retain a master list of the person who transfers and his or her new
office number, name of the cubicle or location.
Pick the day you want to freeze the master list. Send copies of the frozen list to the shipping service,
using the list of print stickers, and so on.
If anyone wants to change their position after this date, do not try to monitor and correct all
versions of the document that have been circulated. Move the person as the master list specifies,
then plan a second move to the person after the first move.
Provide each individual with a sheet of 12 labels pre-printed with his or her name and a new label
package, bag and personal computer (PC) location.
Send each user a plastic bag that is big enough for all of the PC cables. Technical people can remove
and reconnect their PCs upon arrival; technicians can do so for non-technical people.
Do buy more boxes than you know you're going to carry around.
Do not use carton boxes; rather, use cardboard bags that can be reused.
8
Formalize the process, limit it to one day a week, carry out preparation activity and shift the
workers and make it smoother with less downtime for customers and less transfer-related
problems for the SAs and sort out.
9
Ensure that all SA teams have a high-level overview diagram of all networks and a detailed map of
the local area network at each venue.
10
Conduct remedial or remedial measures in a small block of two or three, taking a bit more than
an hour to execute the whole measure. Collect and record the error message or log details that
might be important at the next conference.
Don't encourage a team leader, even a highly talented one, to leave and try and dig a rabbit out of
his hat. Because you can't foresee the duration of the closure, you will enforce a stringent
procedure to keep us in the loop.
11
Create a project toolbox and share responsibility for keeping it up to date and tracking borrowers
down.
Protect the Windows screwdriver kits safe. When you're asked to borrow a single screw driver,
grin and say, "Sorry, but you can have this box as a treat." Don't take it off.
Do not let the consumer use a screwdriver in the app. Politically find out what the guy is going to
do to accomplish. That's better than correcting the person's faults.
Use a screwdriver with adult guidance only if you are a computer user.
Have some inexpensive eyeglass repair kits in your spare room.
12
Ask the people configuring systems on the ground what issues they have the most and what
consumers talk about the most.
Decide if the design is straightforward enough to draw a whiteboard by hand; if not, it might be
too difficult to handle.
13
1.19 Hold Clients Content
Make sure you make a strong impact on potential clients.
Make sure you connect regularly with current clients.
Go to have lunch with them and listen to them.
Build a web page for Device Status.
Create a digital Business Hub for your website.
Avoid the worst performers.
Check how an exceptional proportion of grievances or tickets were generated by a single
customer or user group in comparison to the standard. If that is the case, schedule a meeting
between the client representative and the boss to discuss the situation. Replace this by a solution-
oriented meeting with the consumer representative and the partners identified by the boss. Build
goals and an action plan to tackle these concerns.
14
1.23 Coping with a Major Machine Influx
Make sure you grasp the economic disparity between your laptop and your computer hardware.
Teach the Chief Financial Officer or Chief Financial Officer (CFO) about the disparity, or they're
going to balk at high-priced servers.
Make sure you recognize the physical variations between your laptop and your server hardware.
Set up a limited range of common hardware installations and buy them in bulk.
Make sure you have streamlined download, setup, and alerts for your server.
Test the quality of the data center for power, space and lighting, ventilation and air-conditioning.
Ensure that even small computing rooms or closets are equipped with a cooling unit.
Unless there are new computers and existing workers.
15
Do things that boost morale: help a team design and make a T-shirt together — a dozen dollars
spent on T-shirts will contribute to a social change that cannot be increased by thousands of dollars.
Encourage all members of the community to read Chapter 32.
If they're all going for a bad apple, get rid of him or her.
17
Decide whether customers do not pay for the services you have. If customers are not able to pay
for the service, it doesn't matter.
Take care of the purchasing process and distribution of incidental appliances such as rats, mini-
hubs, etc. Don't just let consumers take what they need or steer the employees to order.
A tiny field office of a multinational company has visited a new SAto fund overseas field
offices. The local person who conducted the duties of the SA when there was no SA had told him on
the phone that the network was "painful." He thought it was extremely late when he got there and
experienced a heavy electrical shock from the 10Base-2 network. He closed the office and then sent
everyone home while he called the electrician to track down and repair the problem.
19
Please have the interests of the consumers in mind.
Don't think ill to the colleagues. This just makes you look pretty bad. Silence is a beautiful thing.
The closed mouth doesn't catch the foot.
20
1.45 Stop burden
Take your breaks! (Three-day breaks are not holidays.)
Take a break long enough to know what has not been well known it's better to find out when you're
out after a matter of days than when you're (heaven forbid) hit by a bus.
Take a walk; get out of the house for a bit.
Don't get lunch at your office.
Don't fail to get a life out of work.
Taking frequent or monthly massages.
REFERENCES
“The Practice of System and Network Administration” Second Edition - Thomas A. Limoncelli - Christina
J. Hogan - Strata R. Chalup
21