Download as ppt, pdf, or txt
Download as ppt, pdf, or txt
You are on page 1of 38

Network and system

Administration
Computer Networks

 Original purpose – to enable data communications between


computers and computerized devices.
 Secondary purpose – to provide reliable high-speed channels
for data exchange.
 Newer purpose – to provide secure communication channels
maintaining reliability and high data rates.
 Oldest approach – copy data to temporary media and
physically carry it between computers.
 Later approach – connect small number of very large
stationary mainframe computers together using cables.
Computer Networks
 Traditional approach – connect many small stationary personal
computers together using cables
 Modern approach – connect small portable computers, personal
electronic devices, and personal computers using cables or
wireless media
Advantage
enable transfer of digital information without copying it
to intermediate storage media
enable sharing of data and peripheral devices between
multiple users
enable centralized administration of many computers
increasing productivity and security
Computer Networks

Disadvantage –
impose increasing requirements onto technical
personnel’s skills and qualifications
carry potential security issues requiring secure
implementation and constant monitoring
Network Models
Peer-to-Peer (“Workgroup”):
 Implies two or more computers with modest processing
power and equal authority
 Enables every computer to send and receive data
directly to and from any other computer
 Implies no centralized administration – end users are
responsible for controlling access to their resources
 Advantages – requires simple configuration only and
carries reduced setup and maintenance costs
 Disadvantage – decentralized administration
complicates management as network grows in size
Network Models
Peer-to-Peer (continued):
 Disadvantage – decentralized security simplifies
unauthorized access to shared resources
 Suitable only for small networks when security and
growth are not critical
 Newer networks – enable file sharing over the Internet,
free or not free of charge (Napster, Freenet, BitTorrent)
Network Models
Peer-to-Peer (continued):
Network Models
Client/Server:
 Implies presence of a server – a dedicated computer
that controls communications between others
 Implements centralized security – servers control and
secure sharing of data, devices, and storage space
 Servers possess substantial processing power – use
advanced hardware (CPU, memory, storage, etc.)
 Servers benefit from using redundant and hot swap
hardware for reliability – minimizes downtime
 Servers require placement, environmental, and security
control by specially trained technical personnel
Network Models
Client/Server (continued):
 Servers are very expensive and require special network
operating systems (NOS) to enable communication,
security, and distribution of data and applications
 A NOS is expensive – licensed per user – and requires
deep expertise and high credentials for handling
 Commonly used NOS – Windows Server 2008/2003,
Mac OS X Server, Linux versions, SUN Solaris, etc.
 Clients are regular workstations carry general-use
operating systems (Windows 7/XP, etc) – connect to the
server for permission to access shared resources
Network Models
Client/Server (continued):
Network Models
Client/Server (continued):
 Advantage
centralized security management minimizes chances for
unauthorized access to resources
simplifies administration of large and growing networks
due to improved scalability
Advantage – enables monitoring, diagnostics, and
troubleshooting the network from one location
use of powerful servers that are optimized for heavy
processing loads improves responsiveness
offers extensive protections via security policies,
logging, network authentication, etc.
Network Models
Client/Server (continued):
 Disadvantage – requires substantial planning as well as
set up and maintenance costs and time
 Disadvantage – requires personnel with much higher
high technical expertise
Network and System Administration
 Both System Administration and Network
Administration are related to computer field and both
field overlaps in many functions.
 Even though the two fields are similar in many ways,
there exist lots of dissimilarities between them.
 System Administration mainly deals with the computer
systems and networks.
 Network administration involves maintenance and
upkeep of the computer hardware and software that
includes networking. 
Cont…
 A branch of engineering that concern the management of
human computer system is called network and system
administration.
 It address both technology of computer system and users
technology.
 It is also putting together a network of
computers( workstations, PCs and supper computers), getting
and keeping them running in spite of activities of users who
tend to cause the system fail.
 System administration: It is the management of computers
whether they are coupled by the network or not.
 It’s about hardware, software, user support, diagnosis, repair
and prevention.  Requires technical, administrative and
socio-psychological skills.
 It’s not just an administration job, it's a demanding engineer's
Cont..
Network administration
 Management of network infrastructure devices (routers and switches).
 Management of PCs in a network.
Goals of System and Network Administration
 To keep the network running properly and configuring and managing
services that are provided over the network.
o Services that we use regularly.
o Services that work in the background enabling other services to run
smoothly.
 Make sure that the network is available when employees and managers
need it.
o Put together a network of computers
o Get them running
o Keep them running (despite Users….
o Provide a Service to Users
o Requires skills of: Mechanic, Sociologist, Researcher
Cont…
 A system administrator, or sysadmin, is a person who is responsible for
the upkeep, configuration, and reliable operation of computer systems;
especially multi-user computers, such as servers.
 The system administrator seeks to ensure that the uptime, performance,
resources, and security of the computers he or she manages meet the needs
of the users, without exceeding the budget.
 To meet these needs, a system administrator may acquire, install, or
upgrade computer components and software; automate routine tasks; write
computer programs; troubleshoot; train and/or supervise staff; and provide
technical support.
 Network and system administration is a branch of engineering that
concerns the operational management of human–computer systems.
What is Human–computer system?
 An organized collaboration between humans and computers to solve a
problem or provide a service
Cont..
There are three main components in a human–computer system
 Humans: who use and run the fixed infrastructure, and cause most
problems.
 Host computers: computer devices that run software. These might be in a
fixed location, or mobile devices.
 Network hardware: This covers a variety of specialized devices including
the following key components such as Routers ,Switches Cables…
Works of different administrators
 A database administrator (DBA) maintains a database system, and is
responsible for the integrity of the data and the efficiency and performance
of the system.
 A network administrator maintains network infrastructure such as
switches and routers, and diagnoses problems with these or with the
behavior of network attached computers.
 A security administrator is a specialist in computer and network security,
including the administration of security devices such as firewalls, as well as
consulting on general security measures.
Cont…
 A web administrator maintains web server services (such as Apache or
IIS) that allow for internal or external access to web sites. Tasks include
managing multiple sites, administering security, and configuring necessary
components and software. Responsibilities may also include software
change management.
 A computer operator performs routine maintenance and upkeep, such as
changing backup tapes or replacing failed drives in a RAID. Such tasks
usually require physical presence in the room with the computer; and while
less skilled than sysadmin tasks require a similar level of trust, since the
operator has access to possibly sensitive data.
 A postmaster administers a mail server.
 A Storage (SAN) Administrator- Create, Provision, Add or Remove
Storage to/from Computer systems. Storage can be attached local to the
system or from a Storage Array Network (SAN) or Network Attached
Storage (NAS). Create File Systems from newly added storage. In some
organizations, a person may begin as a member of technical support staff or
a computer operator, then gain experience on the job to be promoted to a
sysadmin position
Network Operating System
 Network Operating System refers to software that implements an operating
system of some kind that is oriented to computer networking.
 For example, one that runs on a server and enables the server to manage
data, users, groups, security, applications, and other networking functions.
 The network operating system is designed to allow shared file and printer
access among multiple computers in a network, typically a local area
network (LAN), a private network or to other networks.
 NOS is the software that allows multiple computers to communicate, share
files and hardware devices with one another.
 Some examples of network operating systems include Novell NetWare,
Microsoft Windows NT, Microsoft Windows 2000, Microsoft Windows
Server 2003/2008/2012/2016, Sun Solaris, Linux, etc.
 Just as a normal operating system (like Windows or Linux) controls the
operations of an individual PC, a network needs to be managed by a
network operating system (or NOS).
Cont…
 There are two main flavors of NOS: those that run centrally on a file
server and those managed by the individual computers on the network.
 The main names in centralized NOSs are Microsoft Server, Unix and
Linux. These operating systems run on the file server: a central computer
that controls and monitors the entire network.
 The NOS is responsible for "community actions" like: sending users' print
jobs to the right printer in an orderly queue; allocating IP addresses so
workstations have a unique identity on the Internet; letting users share
resources stored centrally on the file server such as program files,
documents and storage space ("home directories").
 They also manage security to ensure that only users only get access to
resources they are authorized to use. This is usually achieved by network
logins and passwords.
 All current operating systems - Windows, Mac and Linux - have
networking abilities built into them so a dedicated NOS is not required.
They offer limited networking abilities to allow simple networking such as
"peer to peer" in a trusting environment (like home and small offices) to
allow file sharing and communal access to printers
Unix-like Systems Vs Windows Systems ..
 The UNIX operating system is a set of programs that link the computer and the
user.
 UNIX operating system was created in the 1960s and has been updated
continuously since then. It is a powerful multi-user, multitasking OS created
by AT&T Bell Laboratories.
 It is quite popular among scientists, engineers, and academics because of its
most valued properties such as flexibility, portability, network capabilities, etc.
 It is a stable, multi-user, multitasking system for servers, PCs, and laptops. It is
written in the C language, enabling the UNIX operating system to operate on
various platforms.
 UNIX operating system comes with a Command Line Interface (CLI).
 UNIX knowledge is required for actions that aren't covered by graphical
software or when there isn't a window interface available, such as during a telnet
Advantages and Disadvantages of UNIX Operating System
Advantages
Many large online stores operate their websites on UNIX or Linux servers.
It has also been used to control mobile phones and other electronic devices.
It consumes less memory when running complicated programs.
It may handle the virtual memory very effectively.
The virtual memory grows as many programs come into the main memory.
 In UNIX, most of the jobs are completed with fewer resources.
The UNIX operating system is both free and safe, so it is commonly used by
web hosting providers. 
Domain Name Server (DNS), Dynamic Host Configuration Protocol
(DHCP), and the webserver are all tools used by many web hosting servers.
It allows you to open many programs, and all the programs execute in parallel
using multiprocessor technology.
It offers numerous users a safe and secure environment to interact with servers
online without worrying about security issues.
The communication with the UNIX servers is quick and error-free.
Multiple web servers and electronic devices do not require user participation.
It is an excellent choice for machines and systems that require little or no user
interactions.
It may handle the automatic working of systems very effectively.
Con’t
Disadvantages
For UNIX, there is no proper documentation available.
If the user has an issue, he must seek the advice of an expert, as obtaining online
assistance from the documentation is quite difficult.
UNIX commands are far more difficult to learn than Windows, MS-DOS, and
macOS.
It is difficult to use for new users.
Because most UNIX work is done with commands in the CLI, beginners must
learn various commands.
It is designed exclusively for programmers, not for new users.
 Some users with a lot of experience have trouble utilizing the commands since
the names of some commands are extremely different.
Most of the UNIX commands use cryptic words.
It's tough for a non-technical user to grasp how commands work.
Some commands use unusual characters, and it may be difficult for new
programmers to grasp them.
The user interface of the UNIX operating system is not attractive.
Some variants of UNIX need most memory usage.
What is Windows Operating System?
 Windows is an operating system that was designed and developed by
Microsoft Cooperation.
 It is one of the most famous OSs around the world.
 Windows uses a Graphical User Interface (GUI).
 It allows the users to store files, watch videos, run software, play games, and
access the Internet.
 The first version of Microsoft Windows is version 1.0 that was released
on November 10, 1983.
 Microsoft Windows comes in various versions, including Windows XP,
Vista, Windows 95, Windows 7, 8, 10, and 11.
 The first business-oriented Windows version, known as Windows NT 3.1,
was introduced in 1993. The next versions, Windows 3.5, 4/0, and Windows
2000, were released.
 Microsoft created the various versions of Windows XP for home and the
commercial environment when it was released in 2001.
 It was built using common x86 hardware, like AMD and Intel processors.
 Therefore, it may run on different hardware, including HP, Dell, Sony
systems, and custom-built PCs.
Cont..
• The Windows operating system comes with very useful features.
• The user may easily create folders and arrange their files.
• The start button can be used to locate the installed software on the system.
• Users may also use the start button to access the control panel and get
system help and support.
• Different themes may also be used to customize the desktop. It also comes
with various helpful software, including Microsoft Excel, PowerPoint, and
Word.
Advantages
• The Windows platform is suitable for game and software developers.
• Because Windows has a large user base, so designers want to create
utilities, games, and programming for the operating system.
• Windows 10 is intended for use on both touch-screen devices and desktop
systems.
• Windows 10's user interface is meant to operate better with a Windows
gadget.
Cont…
 As the Windows operating system is used by 95% of users, most equipment
merchants create drivers for Windows.
 Most equipment may be differentiated naturally by attachment and play include.
You do not require to install the equipment physically, but it is used when linked,
like a console, mouse, webcam, cell phone, etc.
 All versions of Microsoft Windows have something in common that allows users
to switch from one version to another easily.
 Users of Windows 7 will have no difficulty switching to Windows 10 because the
majority of the features of Windows 10 are the same as those of Windows 7.
 The user interface of Windows is also easier to use than those of UNIX and MAC.
 Disadvantages
 Most of Windows's products are paid, such as design programming, games, download chief,
and another popular programming. Users must purchase these products or pay a monthly
charge to use them.
 Linux operating system is open-source and free to use for anyone, but Windows requires a
purchased license and cannot be used for free. Windows operating

Cont..
Windows operating system is also expensive. You'll also need to purchase
other Microsoft software, such as MS Office, to do regular office work on
the system.
 Windows have a high amount of hacker attacks. Hackers may easily crack
Windows security.
 As a result, Windows users are relying on anti-virus software and must pay
monthly charges to firms to secure their data.
 In addition, Windows users must keep their operating systems up to date in
order to receive security fixes.
 Windows operating system support is not ideal for most users. Only a few
significant enterprises may rely on the Windows team for assistance.
 Common users must look for forums to fix their problems.
 If you install Windows, your computer will have plenty of RAM, lots of
good hard drive space, and a good graphics card.
 It is due to the features used in Windows.
 If you wish to install graphics applications, such as Photoshop, you should
have at least 16 GB of RAM.
differences between the UNIX and Windows
Features UNIX Operating System Windows Operating System

User-Interface It comes with a Command It comes with a Graphical


Line Interface (CLI). User Interface (GUI).

Licensing It is a free and open- It is a licensed operating


source operating system. system.

Security It is more secure because It is less secure than


all system updates require UNIX operating system.
explicit user permission.

Processing It supports It doesn't support


multiprocessing. multiprocessing.
Case-Sensitive It is fully case-sensitive, It has case sensitivity as
and files can be an option.
considered separate files.
Basic It is a command-based It is a menu-based
operating system. operating system.
Cont..
Hardware In a UNIX system, hardware Almost all hardware has
support is limited. Some hardware drivers available.
could not have drivers built-in.

File System It uses the Unix File System (UFS), It makes use of the New
which includes the STD.ERR and Technology File System
STD.IO file systems. (NTFS) and the File
Allocation System (FAT32).
Reliability Unix and its distributions are well Although Windows has
known for their high level of become more stable in
stability. recent years, it still falls
short of the reliability
offered by Unix systems.
Data Backup Creating a backup and recovery It contains a built-in backup
and system in UNIX is time-consuming, and recovery system that
Recovery but it is becoming easier with the makes it more user-friendly.
release of new Unix distributions.
What is Linux?
 Linux is the kernel – the central controller

 Add some tools to get an operating system

 Shells (enter commands into the system)

 Systems management (add users)

 Applications (email, web, development)

 Package it up into a Linux distribution

 Started in the 1970’s at Bell Labs, adopted by universities

 UNIX is now a trademark of the Open Group

 An OS must be certified to be called UNIX

 Linux is not certified so it is UNIX-like


What is Linux’s job?
 The kernel manages application processes

 Allocates and reclaims memory

 Arbitrates access to disk and CPU

 Abstracts hardware specific functions so applications are hardware-


agnostic

 Provides security and isolation of users

 Switches between multiple processes (preemptive multitasking)

 Humans write software in source code

 Compilers translate source to machine code

 If you have the source, you can make changes and see how it works

 Open Source means you can inspect and change the source
Command Line File System Browsing
 Commands have the following syntax:
command [options] [arguments]
 Each item is separated by a space
 Options modify the command's behavior
 Arguments are filenames or other information needed by the command
 Separate commands with semicolon (;)
Command Example:
Date, Time, and Calendar
date – display date and time
cal – display calendar
Linux File System Hierarchy
• Files and directories are organized into a single-rooted inverted tree
structure
• Names are case-sensitive, delimited by the / (forward slash) character
• Each shell and system process has current directory
• Current working Directory
• pwd
• Displays the absolute path to the current directory
cd changes directories
– To an absolute path:
$ cd /home/joshua/work
– To a relative path:
$ cd project/docs
– To a directory one level up: $ cd ..
– To your home directory: $ cd
– To your previous working directory: $ cd -
Listing Directory Contents
 Lists the contents of the current directory or a specified directory
 Usage:
 ls [options] [files_or_dirs]
 Every user has a home directory, typically under /home
 Contains user-specific configuration files as well as user data
 Represented by the ~ character
 Absolute Path Names
 Absolute pathnames begin with a slash (/)
 Complete "road map" to file location
 Can be used anytime you wish to specify a file name
 Relative pathnames do not begin with /
 Specifies location relative to your current working directory
  Can be used as a shorter way to specify a file name
File Names
 File names may be up to 255 characters
 All characters are valid, except the “/”
 It may be unwise to use certain special characters in filenames
 Some characters should be protected with quotes when referencing
them
 File names are case-sensitive
 Example: MAIL, Mail, mail, and mAiL
 Again, possible, but may not be wise
Copying Files and Directories
 cp - copy files and directories
 Usage:
 cp [options] file destination
 More than one file may be copied at a time if the destination is a directory
 cp [options] file1 file2 dest
 If the destination exists and is a directory, the copy is placed there with the
same name.
 If the destination exists and is a file, the copy overwrites the destination file.
 If the destination does not exist, the copy is created with that name.
Moving and Renaming Files and Directories
mv - move and/or rename files and directories
• Usage: mv [options] file destination
More than one file may be moved at a time if the destination is a directory. mv
[options] file1 file2 dest
Cont…
 If the destination exists and is a directory, the source file or directory is
moved there with the same name.
 If the destination exists and is a file, the source file is moved to that
filename, overwriting the file.
 If the destination does not exist, the source file or directory is renamed
with that name.
 Removing and Creating Files
 rm - remove files
 Usage:
 rm [options] filenames...
 -i – interactive
 -r – recursive
 -f - force
 touch – create empty files or update file timestamps
Creating and Removing Directories
mkdir make a directory
rmdir remove an empty directory
rm -r recursively remove a directory and all of its contents
Determining File Content
Files can contain many types of data
Check file type with file before opening to determine
appropriate command or application to use
Syntax:
file [options] filename(s)

You might also like