Professional Documents
Culture Documents
Chapter 1
Chapter 1
Chapter One
Introduction to System and Network Administration
NSA Lecture Note :Compiled by Mr. Diriba
2 Outline
For example
Computer system
Human organ system
Network system
NSA Lecture Note :Compiled by Mr. Diriba
What is administration ?
5
In human-computer system administration, the definition is broadened to include
all of the organizational aspects and also engineering issues, such as system fault
diagnosis.
❑ The main issues are the following:
❖ System design and rationalization
❖ Resource management
❖ Fault handling
❑ In order to achieve these goals, it requires
❖ Procedure
❖ Team work
❖ Ethical practices
❖ Appreciation of security
NSA Lecture Note :Compiled by Mr. Diriba
6
What is a system administration?
System administration is the field of work in which some one manages one or more
systems, be they software, hardware, servers or workstations.
Its goal is ensuring the systems are running efficiently and effectively.
For example
Installation, support, maintenance, supervising…
❑ Skills required
Operating system
Applications
Hardware
Software troubleshooting
Computer security
Programming languages (scripting)
NSA Lecture Note :Compiled by Mr. Diriba
Who is system administrator?
7
A technical person who manage the system is called system administrator.
❑ Duties/ Responsibilities of system administrator;
➢ Morning checks of systems/software.
➢ Performing backups of data.
➢ Applying operating system updates, and configuration changes.
➢ Installing and configuring new hardware/software.
➢ Adding/deleting/creating/modifying user account information, resetting passwords, etc.
➢ Answering technical queries.
➢ Responsibility for security.
➢ Responsibility for documenting the configuration of thesystem.
➢ Troubleshooting any reported problem or reported problems.
➢ System performance tuning.
➢ Keeping the network
NSAupLecture
andrunning.
Note :Compiled by Mr. Diriba
8 Cont…
…User Account Management
User Ids
Mail
Home directories (quotas, drive capacities)
Default startup files (paths)
Permissions, group memberships,
accounting and restrictions
Communicating policies and procedures
Disabling / removing useraccounts
Network monitoring
Uses of a system that monitors a computer network for slow or failing components
and notifies network administrator.
Ethically, the first responsibility must be to the greater network community, and
then to the users of our system.
System programs are software used to directly modify or directly give the command to the computer.
Application programs are software that are used to perform specific tasks.
Software program that provides service for computer user
Cannot act without “permission”
NSA Lecturefrom
Note :Compiled by Mr. Diriba
operating system
Cont…
22
For example : if there is no operating system.
User 1 want to write some document file and want to save it on the computer hard
disk
How can user 1 perform this activity?
❖ User 1 explicitly tells the computer that what he wants to do by writing a code.
❖ This is the most tedious things to do.
❖ If the computer had operating system, all process will handed by the Os.
1988 AT&T and Sun Microsystems jointly develop System V Release 4 (SVR4).
This later developed into UnixWare and Solaris 2.
▪ Do not confuse this with the home directory of the superuser, which is usually /root
▪ At boot time, the root partition is initially the only one mounted
Note that the open source community does not always follow this guideline. When
applications are installed by compiling from source code, the default installation
directory is usually/usr/local
▪ This can be changed using command line options when the application is installed.
This directory contains all the software and add-on package that are not part of the
default installation.
Allows root to login even if no additional partitions can be mounted – the home
directories for ordinary accounts (under /home) may be on a separate partition
/var contains data files that change during normal system operation
▪ Spool directories and files
▪ Administrative and logging data
▪ Transient and temporary files
▪ Key subdirectories include:
In computing, a file system or filesystem controls how data is stored and retrieved.
Without a filesystem, data placed in a storage medium would be one large body of
data with no way to tell where one piece of data stops and the next begins.
File and file system are at the very heart of what system administration about.
Every task in host administration or network configuration involves making changes
to files.
The file system is organized in a hierarchy (tree)
The “root directory” (/) is at the top of the tree.
Pieces of the filesystem may exist on multiple disk partitions or on remote file
servers on the network.
The pieces are 'mounted' onto directories to make the file system appear as a single
tree NSA Lecture Note :Compiled by Mr. Diriba
45
File types
Several types of object exist in the filesystem
Normal files
▪ A set of contiguous data identified by a name
▪ Inclues text files, graphics files, exécutable programs, etc;
▪ The filesystem does not distinguish the type of data.
▪ '.' is not a special character in file names and the filesystem does not recognize
separate names and extensions (e.g. report.txt), though many applications do use an
extension to identify the type of data in the file
Directories
Directories contain named 'links' to other files
They cannot be opened, read and written like ordinary files
❑ Ext2
▪ referred to as “second extended system” Created in 1993.
▪ Probably the most common 'native' linux file system format
❑ Ext3
▪ Extension of ext2 to support journaling, backwards compatible
▪ A journaling file system is a system that records in a separate log changes
and updates to files and data before such actions have been completed.
▪ Much faster to check file system consistency after a crash
NSA Lecture Note :Compiled by Mr. Diriba
50 Cont…
❑ Ext4:
▪ ext4, standing for “fourth extended system”, was created in 2006.
▪ Because this file system overcomes numerous limitations that the third
extended system had, it is both widely used, and the default file system that
most Linux.
❑ Reiser File System
▪ A more modern journaling file system, not compatible with ext2
▪ Larger administrative overhead, do not use on very smallpartitions
❑ Others
▪ Extent File System”, was created by Silicon Graphics and originally made for their OS
“IRIX”, but was later given to Linux.
NSA Lecture
▪ Can choose file system typesNote :Compiled bytime
at installation Mr. Diriba
51 File system formats of other systems
Linux also supports the native file systems of other operating systems
▪ Useful on dual-boot systems
FAT, VFAT
▪ Used on floppies, and Windows 95/98
NTFS
▪ Used on Windows NT, 2000, XP
▪ Under linux, only read access is supported reliably
HPFS
▪ Native file system of OS/2
CDROM
▪ ISO9660 with Joliet and Rockridge extensions
NSA Lecture Note :Compiled by Mr. Diriba
52 Network file system formats
Linux can also mount file systems from remote file servers using a number of file
sharing protocols
The native UNIX file sharing protocol, originally from Sun Microsystems
The native Windows file sharing protocol, supported on linux by the Samba package
After booting, a desktop SuSE Linux system will usually present a graphical login
dialog
▪ Enter your login name and password (both are case sensitive)
▪ KDE desktop environment started
Systems (eg servers) which do not run a graphical desktop will present a
command line login
▪ Enter login name and password
▪ A 'shell' (command interpreter) is started
Please log in now:
▪ Log in as the user 'tux'
▪ Supply the password 'penguin'
NSA Lecture Note :Compiled by Mr. Diriba
Logging out
55
Please:
Log out
Thank you!
NSA Lecture Note :Compiled by Mr. Diriba