0% found this document useful (0 votes)
7 views16 pages

Word, KK

Uploaded by

yabtes186
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
7 views16 pages

Word, KK

Uploaded by

yabtes186
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 16

Provide Network System Administration

Unit One:Client access and security

This unit is developed to provide you the necessary information regarding the following content coverage and topics:
 Overview of Network System Administration
 Accounts and files privilege
 Determining access privileges
 Maintaining System integrity and security
This unit will also assist you to attain the learning outcomes stated in the cover page. Specifically, upon completion of
this learning guide, you will be able to:
 Understand Network System Administration
 Explain Accounts and files privilege
 Determine access privileges
 Maintain System integrity and security

Presented by:Kk

Basic concept of network system administration


Network system administration involves managing and maintaining the operation, security, and
performance of a network infrastructure.
Network monitoring is essential to monitor unusual traffic patterns, the health of the network
infrastructure, and devices connected to the network.
. It involves:
 Re-planning the network based on changing organizational requirements
 Implementing the network for maximum efficiency
 Configuring various networking and security protocols
 Assessing the network for weaknesses
 Network administration goals
Network administration aims to ensure a reliable, secure network conducive to business
operations. Generally, network administration goals include:
 Maintain a resilient, high-quality network
 Plan and improve network capacity to enable seamless network access and operations
 Track and document relevant changes
 Evaluate possible risks and orchestrate effective mitigations
 Prevent activities compromising or using the network as an attack vector
 1.1.1 Network administration key areas
 Networks administration consists of five key areas:
 1. Fault management: -Monitors the network infrastructure to identify and address issues
potentially affecting the network.
 2.Configuration management: -
Tracks configuration and related
changes of network components,
including switches, firewalls, hubs,
and routers.

Figure 1.1 Configuration management steps


 3. Account management: - Tracks
network utilization to bill and estimate the usage of various departments of an organization.
 4. Performance management: - Focuses on maintaining service levels needed for efficient
operations.
 5. Security management:- Aims to ensure only authorized activity and authenticated
devices and users can access the network.
 Figure 1.2 Network security management

 1.1.2. Network administrator tools and software


 Network administrators use various networking software.
1.1.3. Responsibilities of network administrator
A network administrator focuses on the day-to-day aspects of managing and maintaining a
network. The roles and responsibilities of network administrators are outlined below.
 Is responsible for managing and maintaining the network in real time
 Ensures the network is secure by blocking suspicious activity and mitigating the risk of
security breaches.
 Implements security programs based on
hardware and software
 Ensures network integrity and resilience to
maintain service levels
 Tests the network to uncover weaknesses
and mitigate them
 Monitors and tracks utilization
1.3.Determine access privileges
The following primary roles can besubdivided into additional categories if necessary to match
your organization:
 System Administrator: Responsible for configuring and maintaining the Operations
Center environment, including:
 Defining service model hierarchies, automations, and operations,
 Defining custom classes, behavior models, and property pages
 Defining calendars, schedules, and jobs
 Creating custom SQL Views
 Creating Layout views
1.1.1. System integrity
System integrity refers to the state of a computer system or network being complete,
accurate, and secure.
1.1.2. System security
The security of a computer system is a crucial task. It is a process of ensuring the
confidentiality and integrity of the OS.

The security of a system can be threatened via two violations:


Threat: A program that has the potential to cause serious damage to the system.
Attack: An attempt to break security and make unauthorized use of an asset.
Security violations affecting the system can be categorized as malicious and accidental threats.
.
Figure 1.3 Network security

Unit Two: Disseminate disaster recovery plan

This unit is developed to provide you the necessary information regarding the following content
coverage and topics:

 Basic concepts of disasterrecoveryplan


 Backupand restore
This unit will also assist you to attain the learning outcomes stated in the cover page. Specifically,
upon completion of this learning guide, you will be able to:

 Basic concepts of disasterrecoveryplan


 Backupand restore

2.1. Basic concepts of disaster recovery plan


A network disaster recovery plan includes a set of procedures required to effectively respond to a
disaster that affects a network and causes its disruption. Network disaster recovery planning
generally entails:
 Listing the steps which should be undertaken in order to restore network connectivity
 Identifying people responsible for conducting network disaster recovery
 Assessing possible consequences of a network failure
 Determining the best strategies to mitigate them
The main purpose of network disaster recovery is to ensure that business services can be
delivered to customers despite a disruption in network connectivity.
Figure 2.1 Tips for Disaster Recovery Planning

2.2. Backup and restore


2.2.1.Back up for disaster recovery
Backup is a crucial element of disaster recovery, providing a means to safeguard critical data,
applications, and systems in case of unforeseen events. . Some common types of backups
include:
1. Full Backup: A full backup involves creating a complete copy of all data and files in a
system or storage device. It captures all data, regardless of whether it has changed since
the last backup. Full backups are comprehensive but can be time-consuming and require
significant storage space.

Figure 2.2 Full Backup

2. Incremental Backup: Incremental backups only capture and store changes made since
the last backup, whether it was a full or incremental backup. This approach is more
efficient in terms of time and storage space, as it only backs up the modified or new data.
However, recovery from incremental backups may require multiple backup sets to be
restored.

Figure 2.3 Incremental Backup

3. Differential Backup: Differential backups capture all changes made since the last
full backup. Unlike incremental backups, which only include changes since the last
backup (whether full or incremental), differential backups include changes since the last
full backup. This results in faster recovery compared to incremental backups, as only the
last full backup and the differential backup need to be restored.

Figure 2.4 Differential Backup

4. Mirror Backup: A mirror backup creates an exact replica of the source data or
system. It involves copying all files and directories to a separate
storage device or location. Mirror backups provide a straightforward
recovery process, as the backup is a direct copy of the original data.
However, they can consume significant storage space and may not
offer versioning or point-in-time recovery capabilities.
5. Snapshot Backup: Snapshot backups capture the state of a system or data at a
specific point in time.
6. Cloud Backup: Cloud backup involves storing data backups in
off-site cloud storage. It offers the advantage of scalability,
accessibility from anywhere with an internet connection, and
built-in redundancy provided by the cloud service provider.
Cloud backups can be performed using various backup methods,
such as full, incremental, or snapshot backups.
The choice of backup type depends on factors such as the data volume, frequency of changes,
recovery requirements, available storage resources, and budgetary considerations. A combination
of backup types can be employed to create a comprehensive backup strategy that meets specific
needs for data protection and recovery.

Unit Three : Monitor network performance


This unit is developed to provide you the necessary information regarding the following content
coverage and topics:

 Performingdiagnostictest
 Analyzingandrespondinginformation
 Monitoringsoftwareandfiles
 Monitoringperformance indicators
 Improvingnetworkand systems
This unit will also assist you to attain the learning outcomes stated in the cover page. Specifically,
upon completion of this learning guide, you will be able to:

 Perform diagnostictest
 Analyzeandrespondinginformation
 Monitorsoftwareandfiles
 Monitor performance indicators
 Improve networkand systems
Basic concept of monitor network performance
Monitoring network performance involves the systematic observation and analysis of a computer
network to ensure it operates efficiently, reliably, and securely.

Performing diagnostic test


Performing network diagnostic tests involves a systematic process to assess and analyze the
health, performance, and functionality of a computer network. Here are the general steps you can
follow to conduct network diagnostic tests:
 Identify the Issue:
 Begin by identifying the specific issue or symptoms that require diagnostic testing. This
could include slow network performance, connectivity problems, or unexpected outages.
 Define Testing Objectives:
 Clearly define the objectives of your diagnostic tests. Determine what aspects of the
network you need to evaluate, such as bandwidth, latency, packet loss, or device health.
 Select Appropriate Tools:
 Choose the appropriate network diagnostic tools for the specific tests you want to perform.
There are various tools available for different aspects of network analysis, including:
 Ping and Traceroute: For assessing connectivity and latency.
 Network Performance Monitoring Tools: Such as Wireshark, Nagios, or PRTG
for detailed analysis of network traffic.
 Bandwidth Testing Tools: Like Speedtest.net or iPerf for measuring available
bandwidth.
 Device Monitoring Software: To assess the health and performance of network
devices.
 Execute Diagnostic Tests:
 Perform the selected diagnostic tests. For example:
 Use ping to check connectivity and measure round-trip times.
 Conduct traceroute to identify the path and latency between your computer and a
destination.
 Run bandwidth tests to evaluate the network's capacity.
 Utilize network monitoring tools to analyze traffic patterns and identify potential
issues.
 Interpret Results:
 Analyze the results of the diagnostic tests. Look for anomalies, deviations from expected
values, or patterns that may indicate network issues. Pay attention to any packet loss,
latency spikes, or irregularities in traffic.
 Diagnose Network Issues:
 Based on the results, diagnose the root causes of identified network issues. This may
involve troubleshooting hardware, configuration settings, or addressing issues related to
network congestion.
 Implement Solutions:
 Once the issues are identified, implement appropriate solutions. This could include
adjusting network configurations, upgrading hardware, optimizing settings, or addressing
specific issues with network devices.
 Document and Report:
 Document the results of your diagnostic tests and the actions taken to address any issues.
This documentation is valuable for future reference and can help in maintaining a
proactive approach to network management.
 Continuous Monitoring:
 Establish a routine for continuous monitoring of the network. Regularly perform
diagnostic tests to identify and address potential issues before they impact network
performance.

Analyze and respond information


Analyzing and responding to information in a network involves monitoring network traffic,
identifying potential issues or anomalies, and taking appropriate actions to ensure network
security, performance, and reliability.
Unit Four : Migrate to New Technology
This unit is developed to provide you the necessary information regarding the following content
coverage and topics:
 Developingnewskills.
 Upgraded technologyskills
 Identifyingupgradedequipment.
 Sourcesofinformation for new orupgradedequipment
 Usingneworupgradedequipment
This unit will also assist you to attain the learning outcomes stated in the cover page. Specifically,
upon completion of this learning guide, you will be able to:
 Developnewskills.
 Upgraded technologyskills
 Identifyupgradedequipment.
 Understand Sourcesofinformation for new orupgradedequipment
 Useneworupgradedequipment

Basic concept ofMigrating to new technology


Migrating to new technology involves the strategic transition from existing technological
systems to advanced solutions.

Upgraded technologyskills
Upgrading technology skills is an ongoing process that requires dedication, perseverance, and a
commitment to lifelong learning.
To upgrade your technology skills, you can follow these one:
 Identify Areas for Improvement:
 Set Clear Goals
 Create a Learning Plan:
 Engage in Practical Projects:
 Stay Updated and Practice Continuously
 Seek Feedback and Networking

Identifyupgradedequipment.
Upgraded equipment refers to the improved or advanced versions of technological devices or
tools used in various domains.
1. Computers:
 High-performance desktop computers
with advanced processors, increased
RAM, and faster storage options like
solid-state drives (SSDs).
 Laptops with improved battery life, higher
screen resolutions, and enhanced graphics
capabilities.
 Workstations designed for intensive tasks
such as video editing, 3D rendering, or
figure 1. 4 upgraded computer scientific simulations, featuring powerful
processors, ample RAM, and dedicated graphics cards.

2. Smartphones:
 Flagship smartphones with faster processors, larger RAM capacity, and improved
camera technologies.
 Devices with 5Gconnectivity for faster internet speeds and lower latency.
 Smartphones equipped with advanced biometric authentication methods like facial
recognition or under-display fingerprint sensors.
Figure 4.1 upgraded smartphone

3. Networking:
 Upgraded routers with the latest Wi-Fi standards (such as Wi-Fi 6 or Wi-Fi 6E)
offering faster speeds and better network performance.
 Network switches with higher port densities, increased bandwidth, and support for
advanced features like Power over Ethernet (PoE) or Quality of Service (QoS).
 Firewall appliances with enhanced security capabilities, such as intrusion prevention
systems (IPS), deep packet inspection (DPI), or advanced threat protection (ATP).

Figure 4.2 History of network

4. Cameras and Photography:


 Digital cameras with higher megapixel counts, improved low-light performance, and
advanced autofocus systems.
 Mirrorless cameras with faster burst shooting rates, improved image stabilization, and
high-resolution electronic viewfinders.
 Drones equipped with high-resolution cameras, obstacle avoidance sensors, and
intelligent flight modes for aerial photography and videography.

Figure 4.3 History of camera

5. Virtual Reality (VR) and Augmented Reality (AR):


 VR headsets with higher display resolutions, wider field of view, and improved
tracking accuracy.
 AR glasses with lightweight designs, better transparent display technology, and
enhanced gesture recognition.
 Controllers and haptic devices that provide more precise and immersive interactions
within virtual environments.

Usenew orupgradedequipment
Here is a general guide:
1. Read the Manual:- Start by thoroughly reading the user manual or any accompanying
documentation that comes with the equipment. This will provide you with a detailed
understanding of its features, functionalities, and proper usage.

Figure 4.4 User manual of printer


2. Familiarize Yourself: Take some time to get familiar with the equipment. Explore its
buttons, controls, and settings. Understand how to power it on/off, adjust settings, and
navigate through different menus or options.
3. Practice Hands-On: Engage in hands-on practice with the equipment. Start with simple
tasks or basic functions to gain confidence and gradually progress to more complex
operations. Experiment with different settings and features to understand their impact and
functionality.
4. Seek Training or Tutorials: If available, attend training sessions or workshops related to the
equipment. Alternatively, search for online tutorials, video guides, or forums where you can
learn from others' experiences and expertise.
5. Troubleshooting and Maintenance: Familiarize yourself with common troubleshooting
techniques specific to the equipment. Learn how to identify and resolve common issues that
may arise during usage.

Figure 4.5Troubleshooting and Maintenance

You might also like