CS-000:
System and Network Administration
Lecture 01 – Computer Systems & Network
Dr. Zeeshan Rafi
PhD MIS, MPhil IT, BS Software Engineering
Former Software Engineer
Former Database Administrator
Department of Computing and
Information Systems
Istanbul University, TR
KHAS University, TR
University of Gujrat, PK
University of Sargodha, PK
University of Central Punjab,PK
Lecture Outline
• Introduction about network
• Background of Network
• What is System Administration
3
What is Computer Network
4
Computer Systems & Network
overview
What is a Computer Network
Network: a system containing any combination of
computers, computer terminals, printers, audio or visual
display devices, or telephones interconnected by
telecommunication equipment or cables: used to transmit
or receive information.
5
The Network Diagram
Wired Network PC Firewall The Internet
Fiber Optic Network Cable
Router
Switch
Server Other LANS
Wireless Network
6
Types of Networks
WIDE AREA LOCAL AREA
7
Wide Area Network
• A Wide Area Network exist over a large area
• Data travels through telephone or cable lines
• Usually requires a Modem
• The world’s largest Wide Area Network is the Internet
8
Local Area Network
• A Local Area Network spans a relatively small area
• LAN are usually confined to one building or a group of buildings
• Data travel between network devices via network cables.
• The most common type of Local Area Network is called Ethernet
9
Peer to Peer Network
• Usually very small networks
• Each workstation has equivalent capabilities and responsibilities
• Does not require a switch or a hub.
• These types of networks do not perform well under heavy data
loads.
10
Switches and Hubs
Network Switches Network Hubs
• Data travels faster through switches because data is not sequenced as it
is in a hub
• The information is more secure when it passes through a switch as
opposed to a hub.
• Information travels more efficiently through a switch because travels
directly to it’s destination as opposed to being broadcast to all PC’s on
the network hub.
11
Servers
Users are connected to certain servers
which will fulfill the required request.
There are 3 Principle Types of Servers
Print Servers
Contains the name and location of all
printers that are on the Network
File Servers
Contain the location and names of the
various drives, files, and folders on a
Network
Web Servers
Contain the Programs, Files, and Internet
Web Sites
Rack of Servers
12
Definition of System Administrator
⚫ General definition of system administrator :
“one who manages computer and network systems
on behalf of another, such as an employer or a
client”.
⚫ SAs are the people who make things work and
keep it all running.
⚫ SA looks after computers, networks, and the
people who use them.
⚫ SA may look after hardware, operating systems,
software, configurations, applications, or security.
13
Philosophy of System Administration
⚫ System administration guidelines which make up the philosophy of
system administration are:
⚫ Automate everything
⚫ Document everything
⚫ Communicate as much as possible
⚫ Know your resources
⚫ Know your users
⚫ Know your business
⚫ Secure the system
⚫ Plan ahead
⚫ Expect the unexpected
14
Automate everything
⚫ Anything done more than once should be
examined as a possible candidate for automation.
⚫ Here are some commonly automated tasks:
⚫ Free disk space checking and reporting
⚫ Backups
⚫ System performance data collection
⚫ User account maintenance (creation, deletion, etc.)
⚫ Business-specific functions (pushing new data to a
Web server, running monthly/quarterly/yearly
reports, etc.)
15
Cont..
⚫ Note:
⚫ “Keep in mind that if you have a task that should be
automated, it is likely that you are not the first system
administrator to have that need. Here is where the benefits of
open source software really shine -- you may be able to
leverage someone else's work to automate the manual
procedure that is currently consuming your time. So always
make sure you search the Web before writing anything more
complex than a small Perl script.”
16
Document everything
⚫ What should you document? Here is a partial list:
⚫ Policies
⚫ Policies are written to formalize and clarify the
relationship system and network admin has with user
community. They make it clear to your users how their
requests for resources and/or assistance are handled.
The nature, style, and method of disseminating policies
to your a community varies from organization to
organization.
⚫ Procedures
⚫ Procedures are any step-by-step sequence of actions
that must be taken to accomplish a certain task.
Procedures to be documented can include backup
procedures, user account management procedures,
problem reporting procedures, and so on. Like
automation, if a procedure is followed more than once, it
is a good idea to document it.
17
Cont. ..
⚫ Changes
⚫ A large part of a system administrator's career revolves
around making changes -- configuring systems for
maximum performance, tweaking scripts, modifying
configuration files, and so on. All of these changes
should be documented in some fashion.
18
Communicate Much as Possible
⚫ The method by which you communicate with your users
can vary according to your organization. Some
organizations use email; others, an internal website.
⚫ Tell your users what you are going to do
⚫ Tell your users what you are doing
⚫ Tell your users what you have done
19
Know your Resource, Business & Users
⚫ System administration is mostly a matter of
balancing available resources against the people
and programs that use those resources.
⚫ Some of the resources are:
⚫ System resources, such as available processing power,
memory, and disk space
⚫ Network bandwidth
⚫ Available money in the IT budget
⚫ Whether system admin work for a large, multinational
corporation or a small community college, It important to
understand the nature of the business environment and
users of a system.
20
Secure organization systems & network
⚫ No matter what you might think about the environment in
which your systems are running, you cannot take security
for granted. Even standalone systems not connected to the
Internet may be at risk (although obviously the risks will be
different from a system that has connections to the outside
world).
⚫ Therefore, it is extremely important to consider the security
implications of everything you do.
21
Cont. ..: (Secure the systems)
⚫ While you are thinking about security, do not make the
mistake of assuming that possible intruders will only attack
your systems from outside of your company. Many times
the perpetrator is someone within the company. So the
next time you walk around the office, look at the people
around you and ask yourself this question:
⚫ What would happen if that person were to attempt to
subvert our security?
22
Plan Ahead and Expect the
Unexpected
⚫ Certainly no one can predict the future with 100%
accuracy. However, with a bit of awareness it is easy
to read the signs of many changes:
⚫ Signs of system failure
⚫ Signs of network failure
⚫ Requirement of scalability
⚫ Further security and remote administration requirements
⚫ Being able to read signs (and responding effectively
to them) makes life easier for system administrators
and users.
23
Who is a Sys admin?
In a small org, sysadmin can be entire IT staff
– Phone support
– Order and install software and hardware
– Fix anything that breaks from phones to servers
– Develop software
In a large org, sysadmin is part of large IT org
– Specialists instead of “jack of all trades”
– Database admin,
– Network admin,
– Fileserver admin,
– Help desk worker,
– Programmers,
– Logistics
What does sysadmins do?
1. Add and remove users.
2. Add and remove hardware.
3. Perform backups.
4. Install new software systems.
5. Troubleshooting.
6. System monitoring.
7. Auditing security.
8. Helping users.
User Management
• Creating user accounts
– Consistency requires automation
– Startup (dot) files
• Username and UID namespace management
• Home directory backups and quotas
• Removing user accounts
– Consistency requires automation
– Remove everything, not just homedir and passwd
Hardware Management
• Adding and removing hardware
– Configuration, cabling, etc.
– Device drivers
– Scheduling downtimes and notifying users
• Evaluation and purchase
• Capacity planning
– How many servers?
– How much bandwidth, disk space?
• Data Center management
– Power, racks, environment (cooling, fire alarm)
Backups
• Backup strategy and policies
– Scheduling: when and how often?
– Capacity planning
– Location: On-site vs off-site.
• Installing backup software
• Performing backups and restores
• Monitoring backups
– Checking logs
– Verifying media
Software Installation
• Automated consistent OS installs
• Evaluation of software
• Finding and building open source software
• Purchase of commercial software
• Managing software installations
– Distributing software to multiple hosts
– Package management
– Managing multiple versions of a software pkg
• Patching and updating software
• Scheduling downtimes and notifying users
Software Update Difficulties
No physical access
– Update process should work without physical access.
Host may not be in known state
– Prior updates may or may not have happened.
– Sysadmins or users may have reconfigured.
Hosts may not be there
– Portable computers may not be on your network when
you’re updating systems.
Host may have live users
– Some updates require no user access or reboots.
States of Machines
New
A new machine
Clean
OS installed, but not yet configured for environment.
Configured
Configured correctly for the operating environment.
Unknown
Misconfigured, broken, newly discovered, etc.
Off
Retired/surplussed
Troubleshooting
• Problem identification
– By user notification
– By log files or monitoring programs
• Tracking and visibility
– Ensure users know you’re working on problem
• Finding the root cause of problems
– Provide temporary solution if necessary
– Solve the root problem to permanently eliminate
Performance Monitoring
• Automatically monitor systems for
– Problems (disk full, error logs, security)
– Performance (CPU, mem, disk, network)
• Log rotation and backups
• Provides data for capacity planning
– Convince management of need for hardware
Slide #30
Helping Users
• Request tracking system
– Ensures that you don’t forget problems.
– Ensures users know you’re working on their problem;
reduces interruptions, status queries.
– Lets management know what you’ve done.
• User documentation and training
– Acceptable Use Policies
– Document software, hardware (printers), etc.
Administration Challenges
– Need
● Broad knowledge of hardware and software
● Balancing conflicting requirements
– Short-term vs. long-term needs
– End-user vs. organizational requirements
– Service provider vs. police model
● Working well and efficiently under pressure
● 24x7 availability
● Flexibility, tolerance, and patience
● Good communication skills
• – People think of system admins only when things don't work!
Qualities of a Successful System admin
• Customer oriented
– Ability to deal with interrupts, time pressure
– Communication skills
– Service provider, not system police
• Technical knowledge
– Hardware, network, and software knowledge
– Debugging and troubleshooting skills
• Time management
– Automate everything possible.
– Ability to prioritize tasks: urgency and importance.
Principles of SA
Simplicity
– Choose the simplest solution that solves the entire problem.
Clarity
– Choose a straightforward solution that’s easy to change,
maintain, debug, and explain to other SAs.
Generality
– Choose reusable solutions and open protocols.
Automation
– Use software to replace human effort.
Communication
– Be sure that you’re solving the right problems and that people
know what you’re doing.
Basics First
– Solve basic infrastructure problems before moving to advanced
ones.
Organizations
USENIX:Advanced Computing Systems
Association
LISA: Large Installation System
Administration
SAGE: System Administration Guild
SAGE: Goals
1. Advance status of system administration as a
profession.
2. Establish standards of professional excellence and
recognize those who attain them.
3. Develop guidelines for improving the technical and
managerial capabilities of members of the profession.
4. Promote activities that advance the state of the art or the
community.
Conclusion
⚫ SA may look after hardware, operating systems, software,
configurations, applications, or security.
⚫ Themes (guideline) which makes up philosophy of system admin
are
⚫ Automate everything
⚫ Document everything
⚫ Communicate as much as possible
⚫ Know your resources, users and business
⚫ Secure organization systems
⚫ Plan ahead and Expect the unexpected
40