UNIT 1 and 2 SysAdmin Lecture Manual
UNIT 1 and 2 SysAdmin Lecture Manual
Know the scope, duties, and responsibilities of network and system administrator
1. Overview
The terms network administration and system administration exist separately and are used
both variously and inconsistently by industry and by academics.
2. System Administration
System administration is the term used traditionally by mainframe and Linux engineers to
describe the management of computers whether they are coupled by a network or not.
Generally it is planning, installing, and maintaining computer systems involving servers and
clients that works together in a network environment using operation system like Windows
2012 Server or Linux platform.
2. Maintaining system
7. Install software
10. Update system as soon as new version of OS and application software comes out
11. Implement the policies for the use of the computer system and network
12. Setup security policies for users. A sysadmin must have a strong grasp of computer security
(e.g. firewalls and intrusion detection systems)
25. Environmental protection (i.e., protection from possible exposure to water damage,
excessive heat, etc.)
3. Network Administration
a computer network including the maintenance and monitoring of active data network or converged
infrastructure and related network equipment
The actual role of the network administrator will vary from place to place, but will commonly
include activities and tasks such as network address assignment, management and
implementation of routing protocols such as ISIS, OSPF, BGP, routing table configurations
and certain implementations of authentication (e.g.: challenge response, etc.).
It can also include maintenance of certain network servers: file servers,VPN gateways,
intrusion detection systems, security, etc.
Even if certain decisions can be made objectively, e.g. for maximizing productivity or
minimizing cost, one must have a policy for the use and management of computers and their
users.
Network operating system refers to software that implements an operating system of some
kind that is oriented to computer networking.
For example, one that runs on a server and enables the server to manage data, users,
groups, security, applications, and other networking functions.
The network operating system is designed to allow shared file and printer access among
multiple computers in a network, typically a local area network (LAN), a private network or
to other networks
Windows Server
Windows Server is a brand name for a group of server operating systems released by
Microsoft.
It includes all Windows operating systems branded "Windows Server", but not any other
Microsoft product.
The first Windows server edition to be released under that brand was Windows Server 2003.
However, the first server edition of Windows was Windows NT 3.1Advanced Server,
followed by Windows NT 3.5 Server,Windows NT 4.0 Server, and Windows 2000 Server;
The latter was the first server edition to include Active Directory, DNS Server, DHCP Server,
Group Policy, as well as many other popular features used today.
Windows Server
Windows Server is a brand name for a group of server operating systems released by
Microsoft.
It includes all Windows operating systems branded "Windows Server", but not any other
Microsoft product.
The first Windows server edition to be released under that brand was Windows Server 2003.
However, the first server edition of Windows was Windows NT 3.1Advanced Server,
followed by Windows NT 3.5 Server,Windows NT 4.0 Server, and Windows 2000 Server;
The latter was the first server edition to include Active Directory, DNS Server, DHCP Server,
Group Policy, as well as many other popular features used today.
Solaris
It superseded their earlier SunOS in 1993. Oracle Solaris, so named as of 2010, has been
owned by Oracle Corporation since the Sun acquisition by Oracle in January 2010
Linux Server
A Linux server is a high-powered variant of the Linux open source operating system that's
designed to handle the more demanding needs of business applications such as network
and system administration, database management and Web services.
Linux servers are frequently selected over other server operating systems for their stability,
security and flexibility advantages. Leading Linux server operating systems include CentOS,
Debian,Ubuntu Server, Slackware and Gentoo.
UNIT 2
Uunderstand the user registration, account policy and user support services
Demonstrate user and group registration and administration in Linux Server and Windows
2012 Server
User Management
Without users, there would be few challenges in system administration
System administrators must cater to all needs, and ensure the stability and security of the
system.
Users can be registered at a centralized location by the system manager, and made available
to all the hosts in the network by some sharing mechanism, such as a login server,
distributed authentication service or by direct copying of the data.
For larger organizations, with many departments, user registration is much more
complicated. The need for centralization is often in conflict with the need for delegation of
responsibility.
It is convenient for autonomous departments to be able to register their own users, but it is
also important for all users to be registered under the umbrella of the organization, to
ensure unique identities for the users and flexibility of access to different parts of the
organization.
With a local account, a user has permission to use only the local host.
With a network account, the user can use any host which belongs to a network domain.
They will need access to system resources wherever they are. It follows that they need
distributed accounts.
Account policy
Most organizations need a strict policy for assigning accounts and opening the system for
users.
Users are the foremost danger to a computing system, so there responsibility of owning an
account should not be dealt out lightly
2. Specifications of what mandatory enforcement users can expect, e.g. tidying of garbage files.
3. Any account policy should contain a clause about weak passwords. If weak passwords are
discovered, it must be understood by users that their account can be closed immediately.
Types of Users
Passive users utilize the system often minimally, quietly accepting the choices which have been
made for them.
Active users, on the other hand, follow every detail of system development. They frequently find
every error in the system and contact system administrators frequently, demanding upgrades of
their favourite programs.
Disk quotas: Place fixed limits on the amount of disk space which can be used per user. The
advantage of this is that the user cannot use more storage than this limit
CPU time limit: Some faulty software packages leave processes running which consume
valuable CPU cycles to no purpose.
Policy decisions: Users collect garbage. To limit the amount of it, one can specify a system
policy which includes items of the form.
When disk partitions become full, it is necessary to move users from old partitions to new
ones. Moving users is a straightforward operation, but it should be done with some caution.
A user who is being moved should not be logged in while the move is taking place, or files
could be copied incorrectly.
Users who leave an organization eventually need to be deleted from the system. For the
sake of certainty, it is often advisable to keep old accounts for a time in case the user
returns, or wishes to transfer data to a new location.
• Personal files.
Let us formulate a generic policy for computer users, the like of which one might expect company
employees to agree to
Information Technology Policy Documents are becoming more widely used. Their practice must be
recommended, if only to make it clear to everyone involved what is considered acceptable
behaviour. Such documents could save organizations real money in law-suits. The policy should
include:
Chapter 3
Swap
Determining Disk Usage With df and du
Storage Models
Disk Interfaces
Partitions
RAID
Device formatting