Lecture 1 Introduction .pdf

Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...

Full Transcript

Network Administration Level 4 (IT) Prepared By: Eng. Rasha A. Al-Arasi ************************* Lecture 1: Introduction What is a computer system? An organized collaboration between humans and computers to solve a problem or...

Network Administration Level 4 (IT) Prepared By: Eng. Rasha A. Al-Arasi ************************* Lecture 1: Introduction What is a computer system? An organized collaboration between humans and computers to solve a problem or provide a service. Human–Computer system Host Network Humans computers hardware Human Computer System There are three main components in a human computer system : Humans: who use and run the fixed infrastructure, and cause most problems. Host computers: computer devices that run software. These might be in a fixed location, or mobile devices. Network hardware: This covers a variety of specialized devices including the following key components: key components of network hardware ✓ dedicated computing devices that direct traffic around the Internet. Routers talk at the IP address level, or ‘layer 3’,1 simplistically speaking. ✓ Switches: fixed hardware devices that direct traffic around local area networks. Switches talk at the level of Ethernet or ‘layer 2’ protocols, in common parlance. ✓ Cables: There are many types of cable that interconnect devices: fiber optic, cables, twisted pair cables, null-modem cables etc. Network Community The Software Is it a network component? What about Network Operating Systems ( NOS )? What About Environment? Lightning Humidity Environment Power Heat/Cold Network Network administrator Administration System System Administrator What is Network administration? Activities which directly support the operation and integrity of computer Network. Ensure Ensure that prescribed Provide the network service- support is used quality services, efficiently objectives are met. What is System administration? Activities which directly support the operation and integrity of computing systems. Systems Systems Systems are are are running running running efficiently effectively Securely Design Diagnosis and repair Installation Record keeping Net. & Sys. admin Configuration ▪ Security Management ▪ Data Policy making ▪ Performance Flow of activity ▪ User Network Administrator Network changes Layers 1-6 of OSI Model Network monitoring IDS (depends on company size) Firewall (depends on company size) Router, switch configurations Network architecture, design and troubleshooting Network Services System Administrator Setting up servers Configuring the environment for web and other servers Managing database integration (depending on size of the company) Setting up email Implementing security (also depending on company size) Data Backup Software updates Hardware and software design and troubleshooting Efficiency Keeping track of errors Upgrade Ways of fixing Chanllengs errors What services Comfortable Adequate user security environment The challenges of administration Designing a network which is logical and efficient. Deploying large numbers of machines which can be easily upgraded later. Deciding what services are needed. Planning and implementing adequate security. Providing a comfortable environment for users. Developing ways of fixing errors and problems which occur. Keeping track of and understanding how to use the enormous amount of knowledge which increases every year. The meta principles of system administration System administration begins with a policy – Policy a decision about what we want and what should be, in relation to what we can afford. Work towards a predictable system. Predictability It is the basis of reliability, hence trust and therefore security. Scalable systems are those that grow in Scalability accordance with policy. They continue to function predictably, even as they increase in size. Counter-productive practices to avoid The belief that there exists a right answer to every problem Getting fraught and upset when things do not work the way we expect Expecting that every problem has a beginning, a middle and an end Administration checklist: Look in a manual Trial and error Listen to people Write down experiences Take responsibility for your actions How new things apply to me? Administration checklist: Look for answers in manuals and newsgroups. Use controlled trial and error to locate problems. Consider all the information; listen to people who tell you that there is a problem. It might be true, even if you can’t see it yourself. Write down experiences in an A–Z so that you learn how to solve the same problem again in the future. Take responsibility for your actions. Be prepared for accidents. They are going to happen and they will be your fault. You will have to fix them. Remember tedious jobs like vacuum cleaning the hardware once a year. After learning about something new, always pose the question: how does this apply to me? Some Administration Qs? 1- What is the difference 10- What are IP Classes? between a hub and a switch? 11- What is DNS? 2- What is HTTP and what port 12- What is IPX? does it use? 13- What is Bonjour? 3- What is HTTPS and what port 14- What is Appletalk? does it use? 15- What is a Firewall? 4- What is FTP and what port does it use? 16- What is a Proxy Server? 5- What is SSH and what port 17- What are Services? does it use? 18- What is a subnet mask? 6- What is DHCP? 19- What are 127.0.0.1 and 7- What is TCP? localhost? 8- What is UDP? 20- What is the difference between a Workgroup and a 9- What is ICMP? Domain? 21- How does Tracert work and 31- What is ARP? what protocol does it use? 32- What is EFS? 22- What is Two-Factor 33- What is Boot to LAN? Authentication? 34- What are Terminal Services? 23- What is an IDS? 35- What are Shadow Copies? 24- What are the main differences between Windows Home, 36- Why would you use external Windows Pro and Windows Server? media such as Tapes or Hard Disks for Backups? 25- What is the difference between ifconfig and ipconfig? 37- What is the difference between RDP and KVM? 26- What are the differences between PowerShell, Command 38- What is the difference Prompt and Bash? between a print server and a network attached printer? 27- What is root? 39- What is /etc/passwd? 28- What is telnet? 29- What are sticky ports? 30- Why would you add local users when on a domain machine? 40- What is port forwarding? 45- What are 755 and 644 41- Why would you virtualize Unix/Linux Permissions? systems? 46- Why is it easier to maintain permissions via groups instead 42- Why would you create of individually? logon scripts? 47- What is the difference 43- What is the difference between a Forest, a Tree, and a between Single Mode and Domain? Multimode Fiber? 48- What are the differences 44- What does it mean when between Local, Global and you receive an NTFS Error: 5? Universal Groups? 49- What are Strong Password Requirements? 50- What is SNMP? Lab 1 Preparing and installing Server GUI. Explain Server Manger. Explain Services.

Use Quizgecko on...
Browser
Browser