0% found this document useful (0 votes)
126 views20 pages

Introduction to Network & SysAdmin

This document provides an introduction to network and system administration. It discusses the roles and responsibilities of network administrators and system administrators. Some key points include: - Network administrators are responsible for designing, implementing, and maintaining computer networks, including network infrastructure, servers, security, and troubleshooting. System administrators manage computer systems and servers to ensure reliable operation for users. - The document outlines some of the main tasks for network administration like network design, backups, documentation, authentication, and security. It also discusses managing hardware, software, security, and providing support for system administration. - The scope of network and system administration involves applying technology to meet user needs within physical and technological environments, which are constantly changing. It discusses

Uploaded by

wagari gurmessa
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
126 views20 pages

Introduction to Network & SysAdmin

This document provides an introduction to network and system administration. It discusses the roles and responsibilities of network administrators and system administrators. Some key points include: - Network administrators are responsible for designing, implementing, and maintaining computer networks, including network infrastructure, servers, security, and troubleshooting. System administrators manage computer systems and servers to ensure reliable operation for users. - The document outlines some of the main tasks for network administration like network design, backups, documentation, authentication, and security. It also discusses managing hardware, software, security, and providing support for system administration. - The scope of network and system administration involves applying technology to meet user needs within physical and technological environments, which are constantly changing. It discusses

Uploaded by

wagari gurmessa
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd

See discussions, stats, and author profiles for this publication at: [Link]

net/publication/352134611

Lecture-1: Introduction to Network and SysAdmin

Presentation · June 2021

CITATIONS READS
0 11,108

1 author:

Naol Getachew
Mattu University
27 PUBLICATIONS   0 CITATIONS   

SEE PROFILE

Some of the authors of this publication are also working on these related projects:

Free lecturing courses View project

All content following this page was uploaded by Naol Getachew on 04 June 2021.

The user has requested enhancement of the downloaded file.


Chapter 1 – Introduction to System and Network 2021
Administration
Chapter Objectives

At the end of this chapter, the students will be able to:

 Learn the foundation of network and system administration


 Know the scope, duties and responsibilities of network and system administrator
 Know the network operation system that support system administration
 Distinguish the support of each network operating system

1.1. Introduction

Networking is the technology of interconnecting computing devices of all types so information


can flow between them. This includes activities as simple as topology design to those as complex
as the configuration of services and protocols to enable an entire intranet and the support of that
environment.

While all that data eventually gets to the user, it spends most of its time on hundreds of
interconnected servers. Systems administration is the design, installation, configuration,
operation, and support of these servers. Networking professionals must be knowledgeable in
considering when to use physical or virtual servers, when to use a public or private cloud, and
other key performance, reliability, and security issues.

In today’s information-rich environment, computer systems exist at the heart of nearly every
organization and are critical to the organization's success. Upon graduation, students can work in
nearly any industry as a valuable part of the team helping to ensure their organization's products
and services are always available.

Network and system administration is a branch of engineering that concerns the operational
management of human–computer systems. It is unusual as an engineering discipline in that it
addresses both the technology of computer systems and the users of the technology on an equal
basis. It is about putting together a network of computers (workstations, PCs and
supercomputers), getting them running and then keeping them running in spite of the activities of
users who tend to cause the system to fail.

Network and System Administration By: Naol G. Computer Science Dept. @MeU Page 1
Chapter 1 – Introduction to System and Network 2021
Administration
1.2. Philosophy of System Administration and Network Administration

System Administration is the design, installation, configuration, operation, and support of these
servers to support the operation need of information technology infrastructure of an organization.
Generally it is planning, installing, and maintaining computer systems involving servers and
clients that work together in a network environment using operation system like Windows 2008
Server or Linux platform.

1.2.1. Network Administration

Network administration involves a wide array of operational tasks that help a network to run
smoothly and efficiently. Without network administration, it would be difficult for all but the
smallest networks to maintain network operations.

The main tasks associated with network administration include:

 Design, installation and evaluation of the network


 Execution and administration of regular backups
 Creation of precise technical documentation, such as network diagrams, network cabling
documents, etc.
 Provision for precise authentication to access network resources
 Provision for troubleshooting assistance
 Administration of network security, including intrusion detection

1.2.2. System Administration

A system administrator or sysadmin is a person who is responsible for the upkeep,


configuration and reliable operation of computer systems; especially multi-user computers, such
as servers. The system administrator seeks to ensure that the uptime, performance, resources, and
security of the computers he or she manages meet the needs of the users, without exceeding the
budget. To meet these needs, a system administrator may acquire, install, or upgrade computer
components and software; provide routine automation; maintain security policies; troubleshoot;
train and/or supervise staff; or technical support in projects.

Network and System Administration By: Naol G. Computer Science Dept. @MeU Page 2
Chapter 1 – Introduction to System and Network 2021
Administration
The terms network administration and system administration exist separately and are used both
variously and inconsistently by industry and by academics. System administration is the term
used traditionally by mainframe and UNIX engineers to describe the management of computers
whether they are coupled by a network or not. To this community, network administration means
the management of network infrastructure devices (routers and switches).

Figure 1. Computers connecting in Server using Network.

1.3. Scope, Goals and Duties


1.3.1. Applying technology in an environment

A key task of network and system administration is to build hardware configurations; another is
to configure software systems. Both of these tasks are performed for users. Each of these tasks
presents its own challenges, but neither can be viewed in isolation. Hardware has to conform to
the constraints of the physical world; it requires power, a temperate (usually indoor) climate, and
a conformance to basic standards in order to work systematically. The type of hardware limits
the kind of software that can run on it.

Network and System Administration By: Naol G. Computer Science Dept. @MeU Page 3
Chapter 1 – Introduction to System and Network 2021
Administration
Software requires hardware, a basic operating system infrastructure and a conformance to certain
standards, but is not necessarily limited by physical concerns as long as it has hardware to run
on. Modern software, in the context of a global network, needs to inter-operate and survive the
possible hostilities of incompatible or inhospitable competitors. Today the complexity of
multiple software systems sharing a common Internet space reaches almost the level of the
biological.

In older days, it was normal to find proprietary solutions, whose strategy was to lock users into
one company’s products. Today that strategy is less dominant, and even untenable, thanks to
networking. Today, there is not only a physical environment but a technological one, with a
diversity that is constantly changing. Part of the challenge is to knit apparently disparate pieces
of this community into a harmonious part.

System Administrator

A system administrator, or sysadmin, is a person who is responsible for the upkeep,


configuration, and reliable operation of computer systems; especially multi-user computers, such
as servers. The system administrator seeks to ensure that the uptime, performance, resources, and
security of the computers he or she manages meet the needs of the users, without exceeding the
budget. To meet these needs, a system administrator may acquire, install, or upgrade computer
components and software; provide routine automation; maintain security policies; troubleshoot;
train and/or supervise staff; or technical support in projects.

Network Administrator

A network administrator is an individual that is responsible for the maintenance of computer


hardware and software systems that make up a computer network including the maintenance and
monitoring of active data network or converged infrastructure and related network equipment.

Network administrators are generally mid-level support staff within an organization and do not
typically get involved directly with users. Network administrators focus upon network
components within a company's LAN/WAN infrastructure ensuring integrity. Depending on the
company and its size, the network administrator may also design and deploy networks.

Network and System Administration By: Naol G. Computer Science Dept. @MeU Page 4
Chapter 1 – Introduction to System and Network 2021
Administration
The actual role of the network administrator will vary from place to place, but will commonly
include activities and tasks such as network address assignment, management and
implementation of routing protocols such as ISIS, OSPF, BGP, routing table configurations and
certain implementations of authentication (e.g.: challenge response, etc.). It can also include
maintenance of certain network servers: file servers, VPN gateways, intrusion detection systems,
etc.

In smaller organizations, network administrators may also be technically involved in the


maintenance and administration of servers, desktop computers, printers, routers, switches,
firewalls, and phones, IP Phones, personal digital assistants, smartphones, software deployment,
security updates and patches as well as a vast array of additional technologies inclusive of both
hardware and software.

Duties of a system administrator

The duties of a system administrator are wide-ranging, and vary widely from one organization to
another. Sysadmins are usually charged with installing, supporting, and maintaining servers or
other computer systems, and planning for and responding to service outages and other problems.
Other duties may include scripting or light programming, project management for systems-
related projects.

The system administrator is responsible for following things:

 User administration (setup and maintaining account)


 Maintaining system
 Verify that peripherals are working properly
 Quickly arrange repair for hardware in occasion of hardware failure
 Monitor system performance
 Create file systems
 Install software
 Create a backup and recovery policy
 Monitor network communication

Network and System Administration By: Naol G. Computer Science Dept. @MeU Page 5
Chapter 1 – Introduction to System and Network 2021
Administration
 Update system as soon as new version of OS and application software comes out
 Implement the policies for the use of the computer system and network
 Setup security policies for users. A sysadmin must have a strong grasp of computer
security (e.g. firewalls and intrusion detection systems)
 Documentation in form of internal wiki
 Password and identity management
 Install patches
 Review system logs
 Report malicious or suspicious activity on systems to ISO immediately
 Report sensitive information stored on systems to ISO
 Maintain user access administration
 Disaster recovery planning
 Physical security
 Disable unnecessary services on servers
 Generate/Retain system backups
 Identify secondary system administrator(s)
 Comply with password requirements
 Access control
 Environmental protection (i.e., protection from possible exposure to water damage,
excessive heat, etc.)
 Security training will be required every three (3) years
 System audit logging
 Maintain minimum security standards for systems
 Monitoring of system activity
 Designate a secondary administrator

Network and System Administration By: Naol G. Computer Science Dept. @MeU Page 6
Chapter 1 – Introduction to System and Network 2021
Administration
1.3.2. What is so special about the system administrator account?

The root account has full (unrestricted) access, so he/she can do anything with system. For
example, root can remove critical system files. In addition, there is no way you can recover file
except using tape backup or disk based backup systems.

Many tasks for system administration can be automated using Perl/Python or shell scripts. For
example:

 Create new users


 Resetting user passwords
 Lock/unlock user accounts
 Monitor server security
 Monitor special services etc

1.3.3. Additional skills of system and network administrator

The subject matter of system administration includes computer systems and the ways people use
them in an organization. This entails knowledge of operating systems and applications, as well as
hardware and software troubleshooting, but also knowledge of the purposes for which people in
the organization use the computers.

Perhaps the most important skill for a system administrator is problem solving frequently under
various sorts of constraints and stress. The sysadmin is on call when a computer system goes
down or malfunctions, and must be able to quickly and correctly diagnose what is wrong and
how best to fix it. They may also need to have team work and communication skills; as well as
being able to install and configure hardware and software.

System administrators are not software engineers or developers. It is not usually within their
duties to design or write new application software. However, sysadmins must understand the
behavior of software in order to deploy it and to troubleshoot problems, and generally know
several programming languages used for scripting or automation of routine tasks.

Network and System Administration By: Naol G. Computer Science Dept. @MeU Page 7
Chapter 1 – Introduction to System and Network 2021
Administration
Particularly when dealing with Internet-facing or business-critical systems, a sysadmin must
have a strong grasp of computer security. This includes not merely deploying software patches,
but also preventing break-ins and other security problems with preventive measures. In some
organizations, computer security administration is a separate role responsible for overall security
and the upkeep of firewalls and intrusion detection systems, but all sysadmins are generally
responsible for the security of computer systems.

1.3.4. Ethical issues

Because computer systems are human–computer communities, there are ethical considerations
involved in their administration. Even if certain decisions can be made objectively, e.g. for
maximizing productivity or minimizing cost, one must have a policy for the use and management
of computers and their users.

Some decisions have to be made to protect the rights of individuals. A system administrator has
many responsibilities and constraints to consider. Ethically, the first responsibility must be to the
greater network community, and then to the users of our system. An administrator’s job is to
make users’ lives bearable and to empower them in the production of real work.

1.3.5. Education requirements of System and Network Administrator

Unlike many other professions, there is no single path to becoming a system and network
administrator. Many system administrators have a degree in a related field: computer science,
information technology, computer engineering, information systems, or even a trade school
program. On top of this, nowadays some companies require an IT certification. Other schools
have offshoots of their Computer Science program specifically for system administration.

1.3.7 Five reasons to consider a career in System and Network Administration

Though system and network administration isn't for everyone, it offers plenty of rewarding and
profitable challenges for those who can soak up technical knowledge and put it to practical use.
Industries across the career spectrum and around the world depend on computer networking to
keep employees connected and business flowing. And these networks need administrators -

Network and System Administration By: Naol G. Computer Science Dept. @MeU Page 8
Chapter 1 – Introduction to System and Network 2021
Administration
hardworking men and women who know their way around a computer and aren't afraid to take a
hands-on approach to troubleshooting.

Though network administration isn't for everyone, it offers plenty of rewarding and profitable
challenges for those who can soak up technical knowledge and put it to practical use. Here are
five of the biggest reasons why it could be just the career path you're looking for.

A. You'll learn as you go

Job descriptions in fields like network administration and network engineering tend to lean
heavily on buzzwords and phrases like "high-level management," "hardware evaluation," and
"network configuration." In truth, though, no two corporate networks are quite alike, and most of
a company's network procedures will have been ironed out through a long-term tailoring process.
This means that most of a particular job's specifics will be covered in on-site training, as one
company's qualifications - elaborate though they may be - aren't likely to translate directly to
another company's networking needs.

"A lot of today's networking technology is packaged under a nice user interface," says Misha
Hanin, a senior solutions architect at Compugen in Winnipeg, Canada; "but if you really want to
become an expert, you have to know what's going on under the hood - and that's where the real
fun starts." In other words, the learning curve at a new job will be steep at first - but in the end,
the most valuable traits for a network administrator are a head for analytical problem-solving and
a drive to dig into the details.

B. You'll be in demand, and demand keeps growing

The United States Bureau of Labor Statistics pegs the 2012 median annual wage for network
administrators at $74,270. But network administrators don't just pull in a wage well above the
national median - they're a necessary part of any large company, which means their hiring rate is
on an upward curve, even throughout the global recession. The U.S. Department of Labor
estimates that 96,600 new network administration posts will open up between 2010 and 2020, in
addition to more than 300,000 such jobs already out there. In short, if you're looking to break
into an industry with long-term growth potential, network administration is a solid bet.

Network and System Administration By: Naol G. Computer Science Dept. @MeU Page 9
Chapter 1 – Introduction to System and Network 2021
Administration
C. It's an inroad to nearly any industry

Networks are integral to the functioning of almost any large business, from manufacturing to
food service to science and nonprofit activism. Once you've proven yourself as a dependable
administrator, you'll be able to market yourself as a useful asset in any form of business that
sparks your curiosity. In fact, developing nations are also expressing more interest than ever at
building up their technological infrastructure - which means network administration could be
your ticket to visit exotic lands across the globe, contributing real-world impact everywhere you
go.

D. It opens up new career branches

With a few years of network administration experience under your belt, you'll be better equipped
than ever to consider becoming a freelance field technician, a systems analyst, or a network
engineer. If you like the security of regular paychecks and health benefits, there will be plenty of
needs to fill - but you may also be in a position to consider working from home, setting your own
hours, and maybe even charging a consultation fee just for providing your technological
expertise. As more businesses come to depend on networks, your options will continue to
broaden.

E. It's a challenge worthy of your skill

Though years of computer-science training aren't necessary for an entry-level network


administration position, each day offers new opportunities to bring out-of-the-box thinking to
tough problems. As you earn the right to be trusted with more responsibility, your technical skills
will continue to grow, increasing your confidence - and your value as an intellectual worker.
Besides, Hanin says, "our users are sometimes even smarter than we are - they come up with all
kinds of funny tricks we'd never have thought of.”

Network administration may not be the most glamorous job on the planet, but it offers you a
chance to prove to the world how smart you really are, in a way that brings practical benefits to
yourself and your co-workers. It's not just any field that can make that claim and back it up.

Network and System Administration By: Naol G. Computer Science Dept. @MeU Page 10
Chapter 1 – Introduction to System and Network 2021
Administration
1.4. What is a Network Operating System?

Unlike operating systems, such as Windows, which are designed for single users to control one
computer, network operating systems (NOS) coordinate the activities of multiple computers
across a network. The network operating system acts as a director to keep the network running
smoothly.

Network operating system refers to software that implements an operating system of some kind
that is oriented to computer networking. For example, one that runs on a server and enables the
server to manage data, users, groups, security, applications, and other networking functions. The
network operating system is designed to allow shared file and printer access among multiple
computers in a network, typically a local area network (LAN), a private network or to other
networks.

Network operating systems can be based on a client/server architecture in which a server enables
multiple clients to share resources. Client/server network operating systems allow the network to
centralize functions and applications in one or more dedicated file servers. The server is the
center of the system, allowing access to resources and instituting security. The network operating
system provides the mechanism to integrate all the components on a network to allow multiple
users to simultaneously share the same resources regardless of physical location.

1.4.1. The Client

The client is the end user of the network and needs to be secured the most. The client end usually
exposes data through the screen of the computer. Client connections to server should be secured
through passwords and upon leaving their workstations clients should make sure that their
connection to the server is securely cut off in order to make sure that no hackers or intruders are
able to reach the server data. Not only securing the workstations connection to the server is
important but also securing the files on the workstation (client) is important as it ensures that no
hackers are able to reach the system. Another possibility is that of introducing a virus or running
unauthorized software on the client workstation thus threatening the entire information bank at
the server (Exforsys Inc., 2007).

Network and System Administration By: Naol G. Computer Science Dept. @MeU Page 11
Chapter 1 – Introduction to System and Network 2021
Administration
The users themselves could also be a security threat if they purposely leave their IDs logged in or
use easy IDs and passwords to enable hacking. Users may also be sharing their passwords in
order to give the hackers access to confidential data (Wilson, Lin, & Craske, 1999). This can be
overcome by giving passwords to each client and regularly asking clients to change their
passwords. Also passwords should be checked for guess ability and for their strength and
uniqueness.

1.4.2. The Network

The network allows transmission of data from the clients to the server. There are several points
on the network where a hacker could eavesdrop or steal important packets of information. These
packets may contain important confidential data such as passwords or company details. It is
important that these networks are secured properly to keep unauthorized professionals away from
all the data stored on the server. This can be done by encrypting important data being sent on the
network. However, encryption may not be the only possible way of protecting networks as
hackers can work their way around encryption. Another method could be conducting security
audits regularly and ensuring identification and authorization of individuals at all points along
the network. This should discourage potential hackers (Wilson, Lin, & Craske, 1999). Making
the entire environment difficult to impersonate also makes sure that the clients are reaching the
true files and applications on the server and that the server is providing information to authorized
personnel only.

1.4.3. The Server

The server can be secured by placing all the data in a secure, centralized location that is protected
through permitting access to authorized personnel only. Virus protection should also be available
on server computers as neal vast amounts of data can be infected. Regular upgrades should be
provided to the servers as the software and the applications need to be updated. Even the entire
body of data on a server could be encrypted in order to make sure that reaching the data would
require excessive time and effort (Wilson, Neal, & Craske, 1999).

Network and System Administration By: Naol G. Computer Science Dept. @MeU Page 12
Chapter 1 – Introduction to System and Network 2021
Administration
1.5. Network Operating System Software

The following links include some of the more popular peer-to-peer and client/server network
operating systems.

 Macintosh OS X
 Microsoft Windows Server
 UNIX/Linux

1.5.1. Server Operating Systems

Overview

The primary server operating systems at Stanford are Linux (with a preference for Debian) and
Windows Server. Central IT applications all run on those two platforms. Mac OS is supported
through CRC (Computer Resource Consulting) for departmental servers. IT Services' ability to
be an effective supplier of server hosting services depends on being able to support the platforms
required by the customers; providing excellent reliability at an affordable cost.

For Linux:

Debian Lenny is the preferred operating system for Linux systems, with some Debian Etch. Red
Hat 5 is only used as needed per vendor specifications, with some remaining Red Hat 4. Ubuntu
Hardy is used for servers running the Timeshare service. Centralized build systems that are more
flexible and capable than any other on campus, and are used by other departments. IT Services
provides leadership in Puppet configuration management best practices. This work has inspired
the community and driven product improvement, and Stanford's expertise has been sought by
many other institutions.

Network and System Administration By: Naol G. Computer Science Dept. @MeU Page 13
Chapter 1 – Introduction to System and Network 2021
Administration

Figure 2. Linux Ubuntu Server Logo

For Windows:

Windows 2000 Server, Windows Server 2003, Windows Server 2003 R2, Windows Server 2008,
and Windows Server 2008 R2 are supported. Most hosting providers have moved to Windows
Server 2012 or Windows Server 2012 R2 to take advantage of improvements in server
management and scalability. The base operating system installation is fully automated, but
applications are usually installed manually. Firewalls and other critical system settings are
controlled by Group Policy.

Figure 3. Microsoft Windows Server

Network and System Administration By: Naol G. Computer Science Dept. @MeU Page 14
Chapter 1 – Introduction to System and Network 2021
Administration
For Mac OS X Server:

Servers run OS 10.4 to 10.9. A minimum of 10.5 is recommended, and upgrades are planned for
all current servers to meet this minimum recommendation. Some managed servers are part of a
central directory system, while some servers are not.

Figure 4. Mac OS X Server

Network and System Administration By: Naol G. Computer Science Dept. @MeU Page 15
Chapter 1 – Introduction to System and Network 2021
Administration
1.5.2. The difference between Windows, Linux and Macintosh

A. What is Windows?
 The Windows is a operating system. This allows people to manage files and run software
programs on desktop and laptop computers.
 The Windows operating system is developed and maintained by Microsoft, the company
founded by Bill Gates. The first version was released in 1985. Since then, it has grown
significantly, and it now dominates the market.
 Windows uses a graphical user interface (GUI) to make it easier for people to use their
computers. The primary ways that people navigate are through icons on the desktop and
the Start menu.
 Some of the popular Windows editions are Win 98, Win 2000, , Win Me, Win 2003,Win
XP, Win Vista etc.
 All Flavors of Windows Come from Microsoft.

B. What is LINUX?
 Linux stands for Linus’ Unix
 Linux is the kernel of an operating system.
 Linux was built on the Unix tradition. Linux was originally developed by Linus
Torwalds of Finland, who currently owns the Linux trademark.
 Using the open source code of the Linux kernel, people have been developing operating
systems based on the Linux kernel. These are called the “Linux distributions.” Also
known as Linux Operating System.
 The various distributions of Linux come from different companies.(i.e. LIndows,
Lycoris, Red Hat, SuSe, Mandrake, Knopping, Slackware)
 NASlite is one of version of Linux that runs off a single floppy disk and converts an old
computer into file server. This ultra-small edition of Linux is capable of networking ,
File sharing and being a web server.

Network and System Administration By: Naol G. Computer Science Dept. @MeU Page 16
Chapter 1 – Introduction to System and Network 2021
Administration

C. What is Macs?
 Mac OS is the original primary operating system of Apple Computer’s line of personal
computers.
 The first version was released with the original ―Thin‖ Macintosh (i.e., the Macintosh
128K) in 1984, and until the release of Mac OS X, the Mac OS remained Apple’s
flagship operating system.
 Mac OS is characterized by a user-friendly graphical user interface (GUI), single-
button moussing, and nearly universal plug-and-play support.
 In the spring of 2001, Apple transitioned from its original code base to Mac OS X, a
very different operating system based on Unix and the Mach microkernel. Like its
predecessor, Mac OS X maintains the traditional Mac OS ease of use, but with
substantially improved stability.

Summary of the difference between Windows,LINUX and Macintosh

 Windows, Macintosh, and Linux are the three most popular operating systems. All three
provide a way for computers to store, launch, and organize programs and files.
 Windows it the most popular of the three operating systems. Estimates vary, but
approximately 85% to 90% of personal computers use Windows. Because of its
popularity, software and hardware add-ons for Windows computers are widely available.
 In contrast to the large market share enjoyed by Windows, Macintosh is used by fewer
people. Although the software and hardware add-ons for Macintosh computers are
limited in comparison to Windows add-ons, popular Windows applications like Microsoft
Office have Macintosh equivalents.
 Macintosh also regulates the design of software and hardware add-ons more rigidly than
Microsoft, so the software and hardware added to a Mac is less likely to fail.
 Linux is the third of the popular operating systems available. Linux is based on Unix, an
operating system used for more than three decades that now powers about 90% of Web
sites. In sharp contrast to both Windows and Macintosh, Linux is an open source project.

Network and System Administration By: Naol G. Computer Science Dept. @MeU Page 17
Chapter 1 – Introduction to System and Network 2021
Administration
 As such, anyone can modify the Linux code, and Linux is free to use and distribute.
Although Linux offers greater security and flexibility than other operating systems, it
requires some technical knowledge to install and use.
 Linux is an open source operating system that, until fairly recently, was only used on
servers. Now it is used on Mac OS X computers, and more people are starting to use it on
computers that aren’t servers.
 Linux is Customizable in a way that Windows is not.
 For desktop or home purpose, Linux is very cheap or free, Windows is expensive. For
server use, Linux is very cheap compared to [Link] allows single copy of
Windows to be used on only one computer. Starting with Windows XP, they use software
to enforce this rule (activation). In contrast, once you have purchased Linux, you can run
it on any number of computers for no additional charges.
 Every computer printer ships with drivers for the last few versions of windows (at the
time it was work. Still, this is far better situation than Linux i.e. which doesn’t support as
many printers as Windows. Home users of Linux however, will no doubt suffer from the
relatively poor support for printers.
 Windows allows programs to store user information (files and settings) anywhere. This
makes it impossibly hard for the users to backup user data files and settings and to switch
to a new computer. In contrast, Linux stores all user data in the home directory making it
much easier to migrate from an old computer to a new one. If home directories are
segregated in their own partition, you can even upgrade from one version of Linux to
another without having to migrate user data and setting.
 Linux has a reputation for fewer bugs than Windows.
 In general, Linux is very secure, efficient and flexible than Windows and Macintosh. The
software and hardware add-ons for Windows computers are widely available. The
software and hardware added to a Mac is less likely to fail. Linux requires some technical
knowledge to install and use whereas Windows doesn’t requires and Mac requires a little.
Windows supports the printers very well than Linux.

Network and System Administration By: Naol G. Computer Science Dept. @MeU Page 18
Chapter 1 – Introduction to System and Network 2021
Administration
References

1. “Principles of Network and System Administration” (2nod Edition), John Wiley and Sons
Ltd, Mark Burgess, 2004.
2. “Essential System Administration”, 3rd Edition, O’Reilly and Associates Inc., Len
Frisch, 2003.
3. “Running Linux”, (5th Edition), O’Reilly and Associates Inc., Matthias Kalle Dalheimer
and Matt Welsh, 2007.
4. [Link]
5. [Link]
6. [Link]

Network and System Administration By: Naol G. Computer Science Dept. @MeU Page 19

View publication stats

Common questions

Powered by AI

Modern software interoperation survives hostile network environments and incompatibility through the adoption of open standards, enhanced security protocols, and cross-compatible software development. Utilizing frameworks and APIs that support diverse operating systems and networking environments improves interoperation. Deploying robust security measures like encryption and regular security audits protects against vulnerabilities exploited by hostile environments . Additionally, software designed with modular architectures allows integration and adaptation, fostering resilience and continuity even when faced with legacy systems or adversarial competitive software .

System administrators enhance a company's IT infrastructure robustness by implementing routine automation, which minimizes manual errors, increases efficiency, and ensures consistent performance of routine tasks . They maintain security policies by regularly updating patches, monitoring security protocols, and configuring authentication measures to protect against unauthorized access . This combined focus on automation and security fortifies network resilience, upholds data integrity, and ensures system reliability, thereby supporting the organization's operational efficiency and security posture .

Choosing a server operating system involves strategic considerations such as compatibility with existing systems, security needs, required performance, cost constraints, and administrative expertise. Organizations often favor Linux for its open-source flexibility, strong community support, and cost-effectiveness. Linux is favorable for customizing based on specific needs and can be more secure than proprietary systems like Windows, which offers ease of use and compatibility with a wide range of software and hardware, making it appealing for businesses that rely on Microsoft products . The choice ultimately depends on balancing these factors to meet unique organizational goals and constraints .

In smaller organizations, network and system administrators often have overlapping responsibilities due to resource constraints, requiring them to handle a broader range of tasks. Network administrators may assume duties such as server maintenance, desktop computer support, security updates, and software deployment. Meanwhile, system administrators might engage in network infrastructure tasks such as routing protocol management and network monitoring . This overlap necessitates a diverse skill set and ability to handle multiple roles efficiently to maintain both network integrity and system operability within limited resources .

The primary responsibilities of a network administrator include maintaining computer hardware and software systems that compose the organization's network, ensuring the integrity of the company's LAN/WAN infrastructure, and designing and deploying networks when necessary. They manage network address assignments, implement routing protocols, maintain network servers, and oversee security measures like intrusion detection systems . These tasks ensure the smooth operation, reliability, and security of network operations, contributing significantly to the IT infrastructure by enabling connectivity and communication across the organization .

Linux, unlike Windows, is an open-source operating system allowing users to modify and distribute the code freely, resulting in greater security and flexibility . Linux is traditionally used on servers, but with its Unix-based stability, it's now on Mac OS X and increasingly popular for personal computers . Windows, developed by Microsoft, uses a graphical user interface and retains the largest market share among operating systems due to its widespread commercial software and hardware support . While Linux is less expensive, Windows requires a purchased license and is often more user-friendly for average consumers .

A strong understanding of computer security is critical for system administrators because they are responsible for ensuring their systems are protected against potential breaches, which can jeopardize entire networks and data integrity. They should implement measures such as deploying software patches routinely, maintaining updated antivirus software, enforcing strict access controls, and monitoring intrusion detection systems . Ensuring security prevents unauthorized access and potential data breaches, safeguarding both the systems and users' data .

Ethical considerations in system administration impact the balance between maximizing productivity and protecting individual rights. System administrators must navigate decisions concerning user privacy and security, often prioritizing the broader network community's security while also ensuring user empowerment and rights protection . Administrators are tasked with implementing policies that reflect ethical standards, maintaining system integrity and security, which can pose ethical dilemmas in prioritizing tasks that can affect user data and access .

Historically, software strategies involved proprietary solutions to lock users into a company's products. However, the rise of network technology and the need for software interoperation in a global network environment have made such strategies less dominant and even untenable . Factors influencing this shift include the complexity of multiple software systems sharing internet space, the need for compatibility, and the growth of open-source solutions like Linux, which promote greater flexibility and customization .

Problem-solving is a major role in system administration as sysadmins need to diagnose and fix issues quickly under constraints and stress to maintain system uptime and performance . Additional crucial skills include knowledge of operating systems and applications, hardware and software troubleshooting, security management, and communication skills. Sysadmins must understand software behavior for deployment and troubleshooting and use programming languages for task automation .

You might also like