SlideShare a Scribd company logo
Ch1: Network & System Administration
What is network & system administration?
 It is about putting together a network of computers, getting them
running and then keeping them running in spite of the activities of
users who tend to cause the system to fail.
It is a system implemented by a person or a group of persons under
the supervision of knowledgeable person who is network
administrator.
It is a process of installing, configuring, troubleshooting and
maintaining a network.
It is the way to monitor the delivery of information across a network
and protect the network from internal and external security threats.
What is a system?
 It is a combination or an integration of subsystems which are independent
objects, having specific performances to attain the same goal.
In the network system, objects that constitute a system are:
Users
Hardware resources
Software resources
Network expertise/Network administrator
Who is system / network administrator?
 It is a professional person who is responsible for the physical design,
management of network & system administration.
 Network/System administrators are responsible for the security and
availability of the network services they manage.
 Network administrators must adhere to the following universal
Information Technology Policies:
 Network Connection Policy
 Wireless LAN Policy
 Network and System Monitoring Policy
 Network Security Policy
 Network Access Policy
What is network design?
 It describes making various decisions regarding the
architecture of a network such as:
 The LAN and WAN technologies to be used
 The transmission media to be used
 The cable layout to create high speed backbones
 The hardware equipment to be used
General network administration tasks
 These tasks are categorized into 3:
1) Managing network accounts which includes:
a. Creating user accounts
b. Creating group accounts
c. Creating computer accounts
d. Deleting user and computer accounts
e. Renaming user and computer accounts
f. Assigning access rights to the users
2) Managing network performance which includes
 Verifying the proper working of network devices such as network
cards, connectivity devices, computers, etc.
3) Managing network security which includes:
a. Securing data stored on the network from external or
unauthorized bodies.
b. Retrieving data from storage in the event of data loss.
 There are two types of network securities:
i. Physical security – securing hardware resources such as cables,
servers and others from physical damage.
ii. Data security – securing network data and software resources.
 The network administrator must include the following points as
a check list in his/her network security planning:
 What should be protected?
 From whom it should be protected?
 How likely is the occurrence of the threats or challenges?
 What is the estimated financial loss due to the threats or
challenges?
The key roles of network & system administrator
1) Documenting the network and its resources:
o Any modification made to the network should be documented immediately.
o This document should include:
Type of computer being used.
The name of computer (assigned by network administrator).
The IP address of computers.
Operating system being used on each computer.
The network design or map detailing the location of network resources.
2) Administering network IP addresses and sub-netting:
o Grouping computers on the basis of department or functional
location.
o Assigning IP address and subnet masks: this can be done manually
using static configuration or dynamically using DHCP server.
3) Educating (Training) network users:
o It involves:
• The proper use of networking and its resources.
• Providing knowledge about virus threats & its solutions.
4) Designing a network which is logical and efficient:
 Deciding what services are needed.
 Planning and implementing adequate security.
 Providing a comfortable environment for users.
 Developing ways of fixing errors and problems which occur.
Concepts of server based network
 It is a network architecture in which client requests data from server and the
server responds to the request in retrieving the required information.
 It provides shared resources such as:
o Software
o Peripherals
o Files
o Storage devices
 Advantages of server based networking:
i. Sharing centralized resources.
ii. Managing network security.
iii. Backup purpose.
iv. Maximizing number of clients in the network.
v. High capacity to store data.
Concepts of Active Directory & Domain Controller
Active Directory (AD): Active directory is a database of computers,
users, shared printers, shared folders and other network resources
which enables user to find a particular resource and allows
administrator to see a hierarchal view of the network.
 Domain Controller (DC): It is a computer with windows server
OS that provides a complete network data base or active directory. It
provides the network administrator with a facility to control all objects in
the network environment.
End of Chapter 1

More Related Content

PPTX
SNA-H-CH1.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
sefuasfaw021
 
PPTX
Chapter - 1 Introduction system admin.pptx
abdibedilu2
 
PPTX
Presentation1.pptx
Felix533012
 
PPTX
introduction to network operating system
Carlos701746
 
PPTX
fundamentals to Network Administration.pptx
Carlos701746
 
PPT
1 - AdminRole.ppt
TekalignTaye
 
PPTX
Introduction to Network and System Administration
Duressa Teshome
 
PPTX
lecture 1.pptx
MelkamuEndale1
 
SNA-H-CH1.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
sefuasfaw021
 
Chapter - 1 Introduction system admin.pptx
abdibedilu2
 
Presentation1.pptx
Felix533012
 
introduction to network operating system
Carlos701746
 
fundamentals to Network Administration.pptx
Carlos701746
 
1 - AdminRole.ppt
TekalignTaye
 
Introduction to Network and System Administration
Duressa Teshome
 
lecture 1.pptx
MelkamuEndale1
 

Similar to chuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuu1.pptx (20)

PPTX
chp unit 1 Provide Network System Administration.pptx
TadeseBeyene
 
PPTX
Lesson 2: Server and clients and Lesson 3: Network management
dabuetkristian976
 
PPTX
1-Introduction.pptx computer Networking
fu583853
 
PPTX
Roles of is department members
effinsquirrel
 
PPT
INTRODUCTION.ppt
SolomonAnab1
 
PPTX
SYSTEM AND NETWORK ADMINISTRATION ppt-1.pdf_084326.pptx
carlosrugambwa1
 
PPTX
Unit 1 - Providing nw System Adminstr.pptx
DeebiiLataaGadaa
 
PPTX
Lecture 1 Network and System Introduction.pptx
icapps930
 
PPTX
Lecture 1 introduction
Wiliam Ferraciolli
 
PPTX
Network
MARYLYDIAJOHNBOSCO
 
PPTX
Networking Trends
Prof. Erwin Globio
 
PPTX
Network Administrator Project PowerPoint
Steven Washington
 
PDF
Meeting 2 introdcution network administrator
Syaiful Ahdan
 
PPTX
Exposée universitaire sur Network Administrator (2).pptx
ssuser01e5883
 
PPTX
windows server installation procedure or
YogeshKumar187055
 
PPTX
system and network administration course introduction
mairabutt12
 
PPTX
Lecture 12 monitoring the network
Wiliam Ferraciolli
 
PDF
BIS-302-System-Administration-and-Security.pdf
Thomas Assibi - FCCA, ACCA-DipIFR, ICAG, MBA, MSc, BSc(Hons) HND
 
PDF
Administrasi jaringan
seolangit2
 
PPTX
UNIT 1 Information SyfgytrytdystemAdmin.pptxgfytfgsduyg
abayneh19
 
chp unit 1 Provide Network System Administration.pptx
TadeseBeyene
 
Lesson 2: Server and clients and Lesson 3: Network management
dabuetkristian976
 
1-Introduction.pptx computer Networking
fu583853
 
Roles of is department members
effinsquirrel
 
INTRODUCTION.ppt
SolomonAnab1
 
SYSTEM AND NETWORK ADMINISTRATION ppt-1.pdf_084326.pptx
carlosrugambwa1
 
Unit 1 - Providing nw System Adminstr.pptx
DeebiiLataaGadaa
 
Lecture 1 Network and System Introduction.pptx
icapps930
 
Lecture 1 introduction
Wiliam Ferraciolli
 
Networking Trends
Prof. Erwin Globio
 
Network Administrator Project PowerPoint
Steven Washington
 
Meeting 2 introdcution network administrator
Syaiful Ahdan
 
Exposée universitaire sur Network Administrator (2).pptx
ssuser01e5883
 
windows server installation procedure or
YogeshKumar187055
 
system and network administration course introduction
mairabutt12
 
Lecture 12 monitoring the network
Wiliam Ferraciolli
 
BIS-302-System-Administration-and-Security.pdf
Thomas Assibi - FCCA, ACCA-DipIFR, ICAG, MBA, MSc, BSc(Hons) HND
 
Administrasi jaringan
seolangit2
 
UNIT 1 Information SyfgytrytdystemAdmin.pptxgfytfgsduyg
abayneh19
 
Ad

More from adugnanegero (9)

PPTX
Chapter 3pppppppppppppppppppppppppppp.pptx
adugnanegero
 
PPTX
ch2.pptxiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiii
adugnanegero
 
PPTX
Chapter 4.pptx compiler design lecture note
adugnanegero
 
PPTX
Chapter 2.pptx compiler design lecture note
adugnanegero
 
PPTX
Chapter 1.pptx compiler design lecture note
adugnanegero
 
PPT
fggggggggggggggggggggggggggggggfffffffffffffffffff
adugnanegero
 
PPTX
hghghghhghghgggggggggggggggggggggggggggggggggg
adugnanegero
 
PPT
ghhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhjjjjjjjjjjjjjjj
adugnanegero
 
PPT
RTOS Material hfffffffffffffffffffffffffffffffffffff
adugnanegero
 
Chapter 3pppppppppppppppppppppppppppp.pptx
adugnanegero
 
ch2.pptxiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiii
adugnanegero
 
Chapter 4.pptx compiler design lecture note
adugnanegero
 
Chapter 2.pptx compiler design lecture note
adugnanegero
 
Chapter 1.pptx compiler design lecture note
adugnanegero
 
fggggggggggggggggggggggggggggggfffffffffffffffffff
adugnanegero
 
hghghghhghghgggggggggggggggggggggggggggggggggg
adugnanegero
 
ghhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhjjjjjjjjjjjjjjj
adugnanegero
 
RTOS Material hfffffffffffffffffffffffffffffffffffff
adugnanegero
 
Ad

Recently uploaded (20)

PPTX
cloud computing vai.pptx for the project
vaibhavdobariyal79
 
PPTX
What-is-the-World-Wide-Web -- Introduction
tonifi9488
 
PDF
Unlocking the Future- AI Agents Meet Oracle Database 23ai - AIOUG Yatra 2025.pdf
Sandesh Rao
 
PDF
Research-Fundamentals-and-Topic-Development.pdf
ayesha butalia
 
PDF
The Future of Artificial Intelligence (AI)
Mukul
 
PDF
Economic Impact of Data Centres to the Malaysian Economy
flintglobalapac
 
PDF
Automating ArcGIS Content Discovery with FME: A Real World Use Case
Safe Software
 
PDF
Accelerating Oracle Database 23ai Troubleshooting with Oracle AHF Fleet Insig...
Sandesh Rao
 
PDF
NewMind AI Weekly Chronicles - July'25 - Week IV
NewMind AI
 
PDF
MASTERDECK GRAPHSUMMIT SYDNEY (Public).pdf
Neo4j
 
PDF
OFFOFFBOX™ – A New Era for African Film | Startup Presentation
ambaicciwalkerbrian
 
PDF
Google I/O Extended 2025 Baku - all ppts
HusseinMalikMammadli
 
PDF
Trying to figure out MCP by actually building an app from scratch with open s...
Julien SIMON
 
PDF
Oracle AI Vector Search- Getting Started and what's new in 2025- AIOUG Yatra ...
Sandesh Rao
 
PPTX
OA presentation.pptx OA presentation.pptx
pateldhruv002338
 
PDF
Event Presentation Google Cloud Next Extended 2025
minhtrietgect
 
PDF
Get More from Fiori Automation - What’s New, What Works, and What’s Next.pdf
Precisely
 
PDF
AI Unleashed - Shaping the Future -Starting Today - AIOUG Yatra 2025 - For Co...
Sandesh Rao
 
PDF
Security features in Dell, HP, and Lenovo PC systems: A research-based compar...
Principled Technologies
 
PDF
CIFDAQ's Market Wrap : Bears Back in Control?
CIFDAQ
 
cloud computing vai.pptx for the project
vaibhavdobariyal79
 
What-is-the-World-Wide-Web -- Introduction
tonifi9488
 
Unlocking the Future- AI Agents Meet Oracle Database 23ai - AIOUG Yatra 2025.pdf
Sandesh Rao
 
Research-Fundamentals-and-Topic-Development.pdf
ayesha butalia
 
The Future of Artificial Intelligence (AI)
Mukul
 
Economic Impact of Data Centres to the Malaysian Economy
flintglobalapac
 
Automating ArcGIS Content Discovery with FME: A Real World Use Case
Safe Software
 
Accelerating Oracle Database 23ai Troubleshooting with Oracle AHF Fleet Insig...
Sandesh Rao
 
NewMind AI Weekly Chronicles - July'25 - Week IV
NewMind AI
 
MASTERDECK GRAPHSUMMIT SYDNEY (Public).pdf
Neo4j
 
OFFOFFBOX™ – A New Era for African Film | Startup Presentation
ambaicciwalkerbrian
 
Google I/O Extended 2025 Baku - all ppts
HusseinMalikMammadli
 
Trying to figure out MCP by actually building an app from scratch with open s...
Julien SIMON
 
Oracle AI Vector Search- Getting Started and what's new in 2025- AIOUG Yatra ...
Sandesh Rao
 
OA presentation.pptx OA presentation.pptx
pateldhruv002338
 
Event Presentation Google Cloud Next Extended 2025
minhtrietgect
 
Get More from Fiori Automation - What’s New, What Works, and What’s Next.pdf
Precisely
 
AI Unleashed - Shaping the Future -Starting Today - AIOUG Yatra 2025 - For Co...
Sandesh Rao
 
Security features in Dell, HP, and Lenovo PC systems: A research-based compar...
Principled Technologies
 
CIFDAQ's Market Wrap : Bears Back in Control?
CIFDAQ
 

chuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuu1.pptx

  • 1. Ch1: Network & System Administration What is network & system administration?  It is about putting together a network of computers, getting them running and then keeping them running in spite of the activities of users who tend to cause the system to fail. It is a system implemented by a person or a group of persons under the supervision of knowledgeable person who is network administrator. It is a process of installing, configuring, troubleshooting and maintaining a network. It is the way to monitor the delivery of information across a network and protect the network from internal and external security threats.
  • 2. What is a system?  It is a combination or an integration of subsystems which are independent objects, having specific performances to attain the same goal. In the network system, objects that constitute a system are: Users Hardware resources Software resources Network expertise/Network administrator
  • 3. Who is system / network administrator?  It is a professional person who is responsible for the physical design, management of network & system administration.  Network/System administrators are responsible for the security and availability of the network services they manage.  Network administrators must adhere to the following universal Information Technology Policies:  Network Connection Policy  Wireless LAN Policy  Network and System Monitoring Policy  Network Security Policy  Network Access Policy
  • 4. What is network design?  It describes making various decisions regarding the architecture of a network such as:  The LAN and WAN technologies to be used  The transmission media to be used  The cable layout to create high speed backbones  The hardware equipment to be used
  • 5. General network administration tasks  These tasks are categorized into 3: 1) Managing network accounts which includes: a. Creating user accounts b. Creating group accounts c. Creating computer accounts d. Deleting user and computer accounts e. Renaming user and computer accounts f. Assigning access rights to the users 2) Managing network performance which includes  Verifying the proper working of network devices such as network cards, connectivity devices, computers, etc.
  • 6. 3) Managing network security which includes: a. Securing data stored on the network from external or unauthorized bodies. b. Retrieving data from storage in the event of data loss.  There are two types of network securities: i. Physical security – securing hardware resources such as cables, servers and others from physical damage. ii. Data security – securing network data and software resources.
  • 7.  The network administrator must include the following points as a check list in his/her network security planning:  What should be protected?  From whom it should be protected?  How likely is the occurrence of the threats or challenges?  What is the estimated financial loss due to the threats or challenges?
  • 8. The key roles of network & system administrator 1) Documenting the network and its resources: o Any modification made to the network should be documented immediately. o This document should include: Type of computer being used. The name of computer (assigned by network administrator). The IP address of computers. Operating system being used on each computer. The network design or map detailing the location of network resources.
  • 9. 2) Administering network IP addresses and sub-netting: o Grouping computers on the basis of department or functional location. o Assigning IP address and subnet masks: this can be done manually using static configuration or dynamically using DHCP server. 3) Educating (Training) network users: o It involves: • The proper use of networking and its resources. • Providing knowledge about virus threats & its solutions.
  • 10. 4) Designing a network which is logical and efficient:  Deciding what services are needed.  Planning and implementing adequate security.  Providing a comfortable environment for users.  Developing ways of fixing errors and problems which occur.
  • 11. Concepts of server based network  It is a network architecture in which client requests data from server and the server responds to the request in retrieving the required information.  It provides shared resources such as: o Software o Peripherals o Files o Storage devices  Advantages of server based networking: i. Sharing centralized resources. ii. Managing network security. iii. Backup purpose. iv. Maximizing number of clients in the network. v. High capacity to store data.
  • 12. Concepts of Active Directory & Domain Controller Active Directory (AD): Active directory is a database of computers, users, shared printers, shared folders and other network resources which enables user to find a particular resource and allows administrator to see a hierarchal view of the network.  Domain Controller (DC): It is a computer with windows server OS that provides a complete network data base or active directory. It provides the network administrator with a facility to control all objects in the network environment. End of Chapter 1