0% found this document useful (0 votes)
37 views29 pages

CH 1 Introduction and Background

4 year pdf

Uploaded by

nafyjabesa1
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
37 views29 pages

CH 1 Introduction and Background

4 year pdf

Uploaded by

nafyjabesa1
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 29

1

System and Network


Administration
(ITec4112)
INFORMATION TECHNOLOGY DEPARTMENT, WALLAGA
UNIVERSITY, 2022/2023
2

Chapter One

Introduction and Background


Background Definition
◆ In order to better grasp the generic description, it useful to break down the title into
its components, System and Administrator.
◼ system, n: A group of interacting, interrelated, or interdependent elements that together
form a complex whole.
◼ administer, v: to manage or supervise the execution, use, or conduct of
⚫ The profession of System Administration should therefore be described as one in
which practitioners “manage or supervise the execution, use, or conduct of a
group of interacting, interrelated, or interdependent computer human elements”

1-3
1.1. Computer Systems & Network overview
◊ A computer network is a group of computers/devices(Nodes) that use a
set of common communication protocols over digital interconnections for
the purpose of sharing resources located on or provided by the network
nodes.
◊ The nodes of a computer network may include personal computers,
servers, networking hardware, or other specialised or general-purpose
hosts.
◊ The interconnections between nodes are formed from a broad spectrum of
telecommunication network technologies, based on physically wired,
optical, and wireless technologies.
◊ A communication protocol is a set of rules for exchanging information over
a network. physically wired, optical, and wireless
1-4
The Network Diagram

Wired Network PC Firewall The Internet

Fiber Optic Network Cable

Router
Switch

Server Other LANS

Wireless Network
1-5
Virtual Private Network

◊ VPN is a private network that can access public networks


remotely. VPN uses encryption and security protocols to
retain privacy while it accesses outside resources.
◊ When employed on a network, VPN enables an end user
to create a virtual tunnel to a remote location. Typically,
telecommuters use VPN to log in to their company
networks from home.

◊ Authentication is provided to validate the identities of the two peers.


◊ Confidentiality provides encryption of the data to keep it private from prying eyes.
◊ Integrity is used to ensure that the data sent between the two devices or sites has not been tampered with.
1-6
Client/Server Network

➢In a client/server arrangement, network services are


located on a dedicated computer called a server.

➢ The server responds to the requests of clients.

➢The server is a central computer that is continuously


available to respond to requests from clients for file,
print, application, and other services.

➢ Most network operating systems adopt the form of a client/server relationship.


➢ Typically, desktop computers function as clients, and one or more computers with
additional processing power, memory, and specialized software function as servers.
1-7
The Internet
How Information Travel Through the Internet
The simplest
definition of A page on the Internet—whether it's full of words, images or
the Internet is both—doesn't come to you in one shipment. It's translated into
digital information, chopped into 1500 byte pieces called
that it's a PACKETS, and sent to you like a puzzle that needs to be
network of reassembled. Each part of the packet has a specific function:
computer Sequence ID
networks Header ID’s where the information belongs in relation
Provides the to the rest of the information
complete
End of Message
destination
ID’s the end of the
address for
packet
the packet Data Block
The portion of the overall
information carried by the
1-8 packet
The Internet
How Information Travel Through the Internet
• When you connect to a Web site through an ISP and start exchanging information, there
isn't a fixed connection between your computer and the Web server computer hosting the
Web site. Instead, information is exchanged using the best possible path at that particular
time. Special computers called routers determine these paths, avoiding slow links and
favoring fast ones.

Your Web Servers


Computer ISP Routers

1-9
Cloud Computing

▪ Cloud computing is Internet-based computing,


whereby shared resources, software, and
information are provided to computers and other
devices on demand, like the electricity grid.
▪ A Cloud is a type of parallel and distributed system
consisting of a collection of interconnected and
virtualized computers that are dynamically
provisioned and presented as one or more unified
computing resources based on service-level
agreements established through negotiation between
the service provider and consumers.
1 - 10
Properties & Characteristics

1 - 11
1.2. Philosophy of System Administration(1)
◆ System Administration is the design, installation, configuration, operation, and support of these servers to
support the operation need of information technology infrastructure of an organization.
◆ Generally it is planning, installing, and maintaining computer systems involving servers and clients that work

together in a network environment using operation system like Windows 2008 Server or Linux platform,
A. Network Administration
⚫ Network administration involves a wide array of operational tasks that help a network to run smoothly and
efficiently.
⚫ Without network administration, it would be difficult for all but the smallest networks to maintain network

operations.
◼ The main tasks associated with network administration include:

◆ Design, installation and evaluation of the network


◆ Execution and administration of regular backups

◆ Creation of precise technical documentation, such as network diagrams, network cabling documents, etc.

◆ Provision for precise authentication to access network resources

◆ Provision for troubleshooting assistance

◆ Administration of network security, including intrusion detection


1 - 12
1.2. Philosophy of System Administration(2)

◆System Administrators are in charge of “servers” as well as of personal


computers, desktop machines, laptops and, increasingly, mobile devices.
◆With the evolution of computing coming full circle, we find that the

migration from the mainframe computer to the personal and independent


computing device to the networked server back to the central
Infrastructure as a Service model inherent in today’s Cloud Computing
concepts places the System Administrator in the middle of it all.
⚫ So perhaps the main focus of a System Administrator’s job is then really
the central connection between the independent systems, the network
itself?
1 - 13
1.2. Philosophy of System Administration(3)
B. System Administration
⚫ A system administrator or sysadmin is a person who is responsible for the
upkeep, configuration and reliable operation of computer systems; especially
multi-user computers, such as servers.
⚫ The system administrator seeks to ensure that the uptime, performance,

resources, and security of the computers he or she manages meet the needs of
the users, without exceeding the budget.
⚫ To meet these needs, a system administrator may acquire, install, or upgrade

computer components and software; provide routine automation; maintain


security policies; troubleshoot; train and/or supervise staff; or technical support in
projects.

1 - 14
1.2. Philosophy of System Administration(5)
◆System Administrators are;

◼ plan, budget and design networks


◼ backup or storage systems,

◼ add and delete users (well, user accounts, anyway1),

◼ install and update software packages,

◼ draft policy documents,

◼ fight spam with one hand while rebuilding a corrupted revision control system with the

other.
⚫ They have access to all systems in the organization, may undergo retina- and
fingerprint scanners to access “Mission Impossible”-style protected datacenters
and spend countless hours in front of a multitude of computer screens, typing
away on oddly shaped keyboards consuming not entirely healthy amounts of
coffee and energy drinks.
1 - 15
1.2. Philosophy of System Administration(6)
◆What does a sysadmin do?

◼ User account management


◼ Hardware management

◼ Perform filesystem backups, restores

◼ Install and configure new software and services

◼ Keep systems and services operating

Monitor system and network


Troubleshoot problems
◼ Maintain documentation
◼ Audit security

◼ Help users, performance tuning, and more!

1 - 16
Hardware Management
◆ Adding and removing hardware
⚫ Configuration, cabling, etc.
◆ Purchase
⚫ Evaluate and purchase servers + other hardware
◆ Capacity planning
⚫ How many servers? How much bandwidth, storage?
◆ Data Center management
⚫ Power, racks, environment (cooling, fire alarm)
◆ Virtualization
⚫ When can virtual servers be used vs. physical?
1 - 17
Backups
◆Backup strategy and policies
⚫ Scheduling: when and how often?

⚫ Capacity planning

⚫ Location: on-site vs. off-site.

◆Monitoring backups

⚫ Checking logs

⚫ Verifying media

◆Performing restores when requested

1 - 18
Software Installation
◆ Automated consistent OS installs
◼Desktop vs. server OS image needs.
◆ Installation of software
◼Purchase, find, or build custom software.
◆ Managing software installations
◼Distributing software to multiple hosts.
◼Managing multiple versions of a software pkg.

◆ Patching and updating software


1 - 19
Troubleshooting
◆ Problem identification
⚫ By user notification
⚫ By log files or monitoring programs

◆ Tracking and visibility


⚫ Ensure users know you’re working on problem
⚫ Provide an ETA if possible

◆ Finding the root cause of problems


⚫ Provide temporary solution if necessary
⚫ Solve the root problem to permanently eliminate

1 - 20
System Monitoring
◆Automatically monitor systems for
◼Problems (disk full, error logs, security)

◼Performance (CPU, mem, disk, network)

◆Provides data for capacity planning

◼Determine need for resources

◼Establish case to bring to management

1 - 21
Helping Users
◆Request tracking system
⚫ Ensures that you don’t forget problems.

⚫ Ensures users know you’re working on their problem; reduces

interruptions, status queries.


⚫ Lets management know what you’ve done.

◆User documentation and training

⚫ Policies and procedures

◆Schedule and communicate downtimes

1 - 22
Communicate
Customers

⚫ Keep customer appraised of process.


◼ When you’ve started working on a request with ETA.
◼ When you make progress, need feedback.

◼ When you’re finished.

⚫ Communicate system status.


◼ Uptime, scheduled downtimes, failures.
⚫ Meet regularly with customer managers.
Managers

⚫ Meet regularly with your manager.


⚫ Write weekly status reports.
1 - 23
Specialized Skills
◆ Heterogeneous Environments
⚫ Integrating multiple-OSes, hardware types, or network protocols, distributed sites.
◆ Databases
⚫ SQL RDMS
◆ Networking
⚫ Complex routing, high speed networks, voice.
◆ Security
⚫ Firewalls, authentication, NIDS, cryptography.
◆ Storage
⚫ NAS, SANs, cloud storage.
◆ Virtualization and Cloud Computing
⚫ VMware, cloud architectures.
1 - 24
Qualities of a Successful Sysadmin
◆ Customer oriented
⚫ Ability to deal with interrupts, time pressure
⚫ Communication skills

⚫ Service provider, not system police

◆ Technical knowledge
⚫ Hardware, network, and software knowledge
⚫ Debugging and troubleshooting skills

◆ Time management
⚫ Automate everything possible.
⚫ Ability to prioritize tasks: urgency and importance.

1 - 25
First Steps to Better SA
◆ Use a request system.
⚫ Customers know what you’re doing.
⚫ You know what you’re doing.

◆ Manage quick requests right


⚫ Handle emergencies quickly.
⚫ Use request system to avoid interruptions.

◆ Policies
⚫ How do people get help?
⚫ What is the scope of responsibility for SA team?

⚫ What is our definition of emergency?

◆ Start every host in a known state.


1 - 26
Principles of SA
◆ Simplicity
⚫ Choose the simplest solution that solves the entire problem.
⚫ Work towards a predictable system.

◆ Clarity
⚫ Choose a straightforward solution that’s easy to change, maintain, debug, and explain
to other SAs.
◆ Generality
⚫ Choose reusable solutions that scale up; use open protocols.
◆ Automation
⚫ Use software to replace human effort.
◆ Communication
⚫ Be sure that you’re solving the right problems and that people know what you’re doing.
◆ Basics First
⚫ Solve basic infrastructure problems before advanced ones.
1 - 27
The Three Pillars of Exceptional System Design
◆ Exceptional System Administrators are generalists – they have been trained in a
wide area of topics,
⚫ Deepened their understanding of several and perhaps have become subject

matter experts in a few, but ultimately back into a role that allows them to apply
their ability to connect the dots, to see the big picture and the connections
between and effects of multiple systems on each other.
◼ They are well-equipped,
◆ To model new components of an infrastructure or
◆ To redesign a system from scratch to meet the new requirements.

⚫ An exceptional system exhibits inherent structural integrity and this integrity is


provided by these three pillars: Simplicity, Security and Scalability to be the
core qualities enabling a harmonious development- and deployment process.
1 - 28
Generally, At the end,
◆ Consider the following description given by the Buerau of Labor
Statistics:
◼ Systems administrators design, install, and support an organization’s
computer systems. They are responsible for LANs, WANs, network segments,
and Internet and intranet systems. They work in a variety of environments,
including large corporations, small businesses, and government
organizations. They install and maintain network hardware and software,
analyze problems, and monitor networks to ensure their availability to users.
These workers gather data to evaluate a system’s performance, identify user
needs, and determine system and network requirements.

1 - 29

You might also like