Introduction To Network and System Administration 1.1. What Is Network & System Administration?

You might also like

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 5

CHAPTER 1

INTRODUCTION TO NETWORK AND SYSTEM ADMINISTRATION

1.1. What is network & system administration?

Network & system administration is a branch of engineering that concerns the operational
management of human–computer systems. It is unusual as an engineering discipline in that it
addresses both the technology of computer systems and the users of the technology on an equal
basis.

Network administration is

 About putting together a network of computers (workstations, PCs and supercomputers),


getting them running and then keeping them running in spite of the activities of users
who tend to cause the system to fail.
 A system (procedure) implemented by a person or a group of persons under the
supervision of knowledgeable person that is network administrator.
 A process of installing, configuring, troubleshooting and maintaining a network.
 The way to monitor the delivery of information (including data, voice and video) across a
network and protect the network from internal and external security threats.

System:
It is a combination or an integration of subsystems which are independent objects, having
specific performances to attain the same goal.
In the network system, objects that constitute a system are:

 Users
 Hardware resources
 Software resources
 Network expertise/Network administrator
Network/ System Administrator:

It is a professional person who is responsible for the physical design, management of system and
network administration.

1
Network/System administrators are responsible for the security and availability of the network
services they manage.

What is network design?

Designing a network is an activity where various parameters are evaluated to arrive at a network
design that is optimal for a given set of conditions and requirements. The network administrator
chooses a design so that it can accommodate future needs, upgrades, and expansions.

Designing a network involves making various decisions regarding the architecture of the
network:

 The LAN and WAN technologies to be used.


 The transmission media to be used. E.g. UTP cables: CAT-5 or CAT-5e, thick or thin
coaxial cables, etc.
 The cable layout to create high speed backbones.
 The hardware equipment to be used.
The tasks involved in making a network design are:

 Understanding the requirements


o Identifying the rationale or basis to perform analysis
o Choosing the method of requirement analysis
o Analyzing the requirements

Network administrators must adhere to this and all relevant universal Information Technology
Policies, in particular:

 Network Connection Policy


 Wireless LAN Policy
 Network and System Monitoring Policy
 Network Security Policy
 Network Access Policy

For each network there should be at least one network administrator available at all times during
normal working hours and emergency call.

2
1.2. General network/system administration tasks

These tasks are performed by network/system administrator & it includes:

 Installing sever software (windows server OS); i.e., windows sever 2000, 2003 or 2005.
 Configuring active directory users and computers using DCPROMO utilities.
 Securing network resources (managing network security).
 Configuring and administering network print services.
 Administering the desktop computing environment (managing remote desktop
connectivity).
 Installing and configuring network devices-routers, switches, servers etc.
 IP addressing and sub-netting tasks.
 Verifying /testing network connectivity for error free communication.
All these tasks can be categorized in to 3:

1. Managing network accounts


2. Managing network security
3. Managing network performances
1) Managing network account involves the following sub tasks:

a) Creating user accounts


b) Creating group accounts
c) Creating computer accounts
d) Deleting user and computer accounts
e) Renaming user and computer accounts
f) Assigning access rights to the users (allow & deny policies)
2) Managing network security involves:

a) Securing data stored on the network (server computer) from external or unauthorized
bodies
b) Retrieving data from storage in the event of data loss
The network administrator must include the following points as a check list in his network
security planning:

3
i. What should be protected?
ii. From whom it should be protected?
iii. How likely is the occurrence of the threats or challenges?
iv. What is the estimated financial loss due to the threats or challenges?
There are two types of network securities:

a. Physical security – securing hardware resources such as cables, servers and others from
physical damage.
b. Data security – securing network data and software resources.
3) Managing network performance involves:

 Verifying the proper working of network devices such as network cards,


connectivity devices, computers, etc.
1.3. The key roles of system and network administrator

1. Documenting the network and its resources:


 Any modification made to the network should be documented immediately.
 This document contains the following information:
 Type of computer being used.
 The name of computer (assigned by network administrator).
 The IP address of computers.
 Operating system being used on each computer.
 The network design or map detailing the location of network resources.
2. Administering network IP addresses and sub-netting:
 Grouping computers on the basis of department or functional location.
 Assigning IP address and subnet masks: this can be done manually using static
configuration or dynamically using DHCP server.
3. Educating (Training) network users:
 It involves:
o The proper use of networking and its resources.
o Providing knowledge about virus threats & its solutions.
4. Designing a network which is logical and efficient:
 Deciding what services are needed.
 Planning and implementing adequate security.

4
 Providing a comfortable environment for users.
 Developing ways of fixing errors and problems which occur.
1.4. Concept of server based networking

In the environment with more than 10 users, a P2P network will not adequate. There is a need to
use a dedicated computer/server which optimize or increase the service of network to clients.
This type of networking is also known as client/server based network.

What is client/server?

It is a network architecture in which client requests data from server and the server responds to
the request in retrieving the required information.

 It is the base to manage & to administer networking.


 It is a dedicated computer that provides resources to the network users.
 It provides shared resources such as:
o Software
o Peripherals
o Files
o Storage devices
Advantages of server based networking:

1. Sharing centralized resources.


2. Managing network security.
3. Backup purposes.
4. Maximizing number of clients in the network.
5. High capacity to store data.

You might also like