0% found this document useful (0 votes)
7 views20 pages

Unit 1

System administration involves managing, configuring, and maintaining computer systems, servers, and networks to ensure efficient and secure IT operations. Key responsibilities include server setup, network management, security implementation, and user support, while its importance lies in business continuity, security, efficiency, compliance, and cost control. The document also discusses the evolution of system administration, IT infrastructure components, types of IT services, service level agreements, and IT service management frameworks.

Uploaded by

katuwalayush616
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
7 views20 pages

Unit 1

System administration involves managing, configuring, and maintaining computer systems, servers, and networks to ensure efficient and secure IT operations. Key responsibilities include server setup, network management, security implementation, and user support, while its importance lies in business continuity, security, efficiency, compliance, and cost control. The document also discusses the evolution of system administration, IT infrastructure components, types of IT services, service level agreements, and IT service management frameworks.

Uploaded by

katuwalayush616
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 20

Introduction to System Administration & IT

Infrastructure Services
Introduction to System
Administration
 Definition: System administration refers to the
management, configuration, and maintenance
of computer systems, servers, and networks.
 It encompasses all activities required to keep an
organization's IT infrastructure running
smoothly.
 System administrators (often called sysadmins)
serve as the backbone of IT operations,
ensuring that hardware, software, and services
remain available, secure, and performant.
 Goal: Ensure systems run efficiently and
securely.
 Key aspects include:
• Installation and configuration of operating
systems and applications
• User account management and access control
• System monitoring and performance tuning
• Backup and disaster recovery planning
• Troubleshooting hardware and software issues
Role and Responsibilities of a
System Administrator
 The system administrator's role is multifaceted
and varies by organization size, but core
responsibilities include:
 Technical Responsibilities:
 Server setup, maintenance, and upgrades
 Network infrastructure management
 Storage management and data organization
 Security implementation (firewalls, antivirus,
patches)
 Automation of routine tasks through scripting
 Operational Responsibilities:
• Monitoring system performance and availability
• Managing backups and restoration procedures
• Documentation of systems and procedures
• Capacity planning for future growth
 User Support:
• Help desk escalation support
• User account lifecycle management
• Training and guidance for technical staff
Importance of System
Administration in IT Infrastructure

 System administration is critical because:


 Business Continuity: Ensures critical systems remain
operational
 Security: Protects against cyber threats and data breaches
 Efficiency: Optimizes system performance and resource
utilization
 Compliance: Meets regulatory requirements for data
handling
 Cost Control: Prevents unnecessary hardware/software
expenditures
 Without proper administration, systems become unreliable,
insecure, and inefficient, leading to downtime, data loss,
and potential legal consequences.
History and Evolution of System
Administration

 System administration has evolved significantly:


 1960s-1970s: Mainframe era with dedicated
operators
 Physical management of large, room-sized
computers
 Batch processing with punch cards
 1980s: Rise of minicomputers and early
networking
 UNIX systems became prevalent
 Emergence of multi-user environments
 1990s: Client-server model and internet
expansion
• Windows NT and Linux gained popularity
• Networking became more complex
 2000s-Present: Virtualization and cloud
computing
• Shift from physical to virtual infrastructure
• Automation and DevOps methodologies
IT Infrastructure Components

 Hardware Components:
• Servers (rack-mounted, blade, tower)
• Storage systems
• Networking equipment (routers, switches, firewalls)
• End-user devices (workstations, laptops, mobile)
• Data center facilities (power, cooling, physical
security)
 Software Components:
• Operating systems (Windows Server, Linux
distributions)
• Middleware and runtime environments
• Database management systems
• Virtualization platforms
• Monitoring and management tools
• Security software (antivirus, IDS/IPS)
Types of IT Services

 Core IT services include:


 Web Services:
• Hosting and maintaining web servers (Apache, Nginx, IIS)
• Content management systems
• DNS configuration and management
• SSL/TLS certificate management (for HTTPS)
 Email Services:
• Mail server administration (Exchange, Postfix)
• Spam filtering and security
• Cloud email platforms (Microsoft 365, Google Workspace)
 Database Services:
• RDBMS administration (MySQL, PostgreSQL, SQL
Server)
• Performance tuning and optimization
• Backup and replication
 Other Services:
• File and print services
• Directory services (Active Directory, LDAP)
• VoIP and unified communications
• Backup and disaster recovery
Service Level Agreements (SLAs)

 SLAs are formal contracts between service


providers and customers that define:
 Key Components:
 Uptime guarantees (typically 99.9% or higher)
 Response times for different priority issues
 Resolution timeframes
 Availability windows and maintenance
schedules
 Penalties for non-compliance
 Types of SLAs:
 Customer-based (specific to one client)
 Service-based (covers a particular service for all
clients)
 Multi-level (corporate, customer, service levels)
IT Service Management (ITSM)
Frameworks

 ITSM frameworks provide best practices for


delivering IT services:
 ITIL: Most widely used framework
 Focuses on aligning IT services with business
needs
 Key Components:
 Service Value System (SVS) – The overall
model for how IT services create value.
 Service Value Chain – Core activities (Plan,
Improve, Engage, Design & Transition,
Obtain/Build, Deliver & Support).
 Practices – Incident Management, Change
Enablement, Problem Management.
 Guiding Principles – E.g., “Focus on value,”
“Start where you are,” “Progress iteratively.”
 COBIT (Control Objectives for Information
and Related Technologies):
 Focuses on governance and risk management
 Helps meet regulatory compliance requirements
 Key Components:
 Governance System & Components – Framework
elements (processes, organizational structures,
policies).
 Governance and Management Objectives –
Activities split into governance (Evaluate, Direct,
Monitor) and management (Plan, Build, Run, Monitor).
 Goals Cascade – Maps stakeholder needs to
actionable goals.
 Performance Management – Uses maturity models
and metrics to assess performance.
 Design Factors – Help tailor the framework to
specific organizational needs.

You might also like