Professional Documents
Culture Documents
Sys and Ntk Admin Tutor
Sys and Ntk Admin Tutor
Sys and Ntk Admin Tutor
Administration
tutorial for
4th year R AND EX
June 23 , 2023
By Abebech J. 1
Outline
By Abebech J. 2
Network Management and its devices
By Abebech J. 4
System and Network Administration
• System administration is not just about installing
operating systems.
• It is about planning and designing an efficient
community of computers so that real users will be
able to get their jobs done.
• What kinds of issues does system administration
cover?
• User management
• Hardware management
• Software management
• Service management
• Planning and implementing adequate security.
By Abebech J. 5
• Providing a comfortable environment for users.
The scope of Network Administration
• The management of a network, usually called network
administration,
• consists of procedures and services that keep the network
running properly.
• An important part of network management entails making
sure that the network is available .
• Other admin activities are:
• Monitoring the network capacity to ensure that all
transmission requirements can be met.
• Adding capacity to the network by increasing band width
interconnecting additional modes, or creating and
interconnecting additional networks.
• Training people to use the network effectively
• Assisting IT professionals Byin organizational applications6
Abebech J.
that will make good use of the network’s capabilities.
The scope of Network Administration
• Backing up the network software and data
regularly to protect against the failure of network
or any of its components
• Putting security procedures in place to make
certain that only authorized users have access to
the network .
• Response time: network personnel can respond
quickly and effectively in the event of a network
operational or security failure.
• Diagnosing and troubleshooting problems on the
network and determining the best course of action
to take to solve them.
By Abebech J. 7
The goal of Network administration
• The goal is
• Putting together network of computers
• to keep the network running properly
• and configuring and managing services that are
provided over the network.
• There are many services that we use
regularly.
• There are some which work in the
background enabling other services to run
smoothly.
By Abebech J. 8
User management
• Without users, there would be few challenges in system
and network administration.
• Users are both the reason that computers exist and their
greatest threat.
• User management is about interfacing humans to
computers.
• This brings to light a number of issues:
• User account: registering new users and deleting old ones.
• Comfort and convenience.
• Support services: human issues
• Ethical issues.
• Security.
• User management is important because the system exists to
be used by human beings.
By Abebech J. 9
User registration
• For small organizations, user registration is a relatively
simple matter.
• Users can be registered at a centralized location by the
system manager,
• and made available to all of the hosts in the network by
some sharing mechanism, such as a login server,
• distributed authentication service or by direct copying of
the data
• For larger organizations, with many departments, user
registration is much more complicated.
• The need for centralization is often in conflict with the
need for delegation of responsibility.
By Abebech J. 10
User registration
• It is convenient for autonomous departments to be able to
register their own users,
• The solution is
By Abebech J. 13
Principles and Suggested solutions for user registration
• With a network account, the user can use any host which
belongs to a network domain.
By Abebech J. 18
User Profiles
A user profile is a collection of a user’s personal files and settings
that define his or her working environment. (like Documents,
Desktop, Music, Pictures, & Favorites)
19
Windows registry
• Backups are like insurance: You pay for it even though you
hope to never need it. In reality, you need it.
By Abebech J. 22
Backup and restore
• The goal of backup
• is to be able to restore lost data in a timely manner,
By Abebech J. 25
Restores are requested for three
reasons.
• Accidental file deletion. A customer has accidentally erased one or more files
and needs to have them restored.
• Disk failure. A hard drive has failed, and all data needs to be restored.
• Archival. For business reasons, a snapshot of the entire “world” needs to be
made on a regular basis for disaster-recovery or legal.
By Abebech J. 26
Types of restores
• three types of restore requests typically serve three types of
customers.
• Complete restores after a disk failure serve the SAs who committed
to providing a particular SLA.
• Making the right investments can spread the cost of the backup and
restore system over many systems.
By Abebech J. 38
Practical applications for FSRM
• Use File Classification Infrastructure with the Dynamic Access
Control scenario.
• Create a policy that grants access to files and folders
based on the way files are classified.
• Create a file classification rule that tags any file that contains
at least 10 social security numbers as having customer
content.
• Expire any file that hasn't been modified in the last 10 years.
• Create a 200-MB quota for each user's home directory.
• Disallow any music files to be stored in personal shared
folders.
• Schedule a report that runs every Friday night at midnight
that generates a list of the most recently accessed files .
• help you determine the weekend storage activity
By Abebech J. 39
Remote Access and Management
• Remote access service gives authorized individuals
a way to access the company network from home,
customer sites, or other locations around the
country, the continent, or the world.
• In the early days, technical people wanted so they
could do extra work from home out of normal
working hours.
• More recently, it has become a core service that
everyone in a company uses.
• Now telecommuters work outside the office,
connecting only for specific services.
By Abebech J. 40
Remote Access and Management
• Remote access is achieved in many ways, but there are
two main categories.
sti o n s ?
Qu e
By Abebech J. 42