SlideShare a Scribd company logo
1 tohttps://github.com/syaifulahdan/
Computer Network Administration
Introduction
Network Administration
 What is Network Administration
 The core management areas
 Fault management
 Master boot Record
 Configuration and Name Management
 OSI - Account Management
 OSI - Performance Management
 OSI - Security Management
 Structure of Systems and Network Management Organisation
 Corporate Networked Environments
 Network Administrators Tasks
 Tasks of a Network Administrator
 How to be a Sys/Net Admin
2 tohttps://github.com/syaifulahdan/
What is Network Administration ??
3 tohttps://github.com/syaifulahdan/
Why do we need Network
administration at first ??
4 tohttps://github.com/syaifulahdan/
The core management areas
5 to
Fault management
The facilities that enable the
 detection,
 isolation, and
 correction
of abnormal operation of the OSI
environment.
6 to
Configuration and Name Management
The services and facilities that
• control
• identify
• collect and provide data
to clients and managed objects,
so assisting in continuous operation of
interconnection services.
7 to
OSI - Account Management
The facilities that enable
charges to be established for the use
of managed objects and
costs to be identified for the use of
those managed objects.
8 to
OSI - Performance Management
The Facilities needed to evaluate
 Behaviour of managed objects
 Effectiveness of communication activities
9 to
OSI - Security Management
Address those aspects of OSI security
essential to:
 operate OSI network management
correctly and
 to protect managed objects
Definitions??
How does Network
Administration work in
Practice?
Let’s look at how Network
Management is Organised…
11 to
Network
Hardware
Applications Division of Labour
Structure of Systems and Network
Management Organisation
12 to
Corporate Networked Environments
Have team(s) of specialists in various areas
Well defined tasks
 job descriptions
In small networks usually one person
 multi-skilled and multi-tasked
In reality – often somewhere in between….
13 tohttps://github.com/syaifulahdan/
Network Administrators Tasks
14 to
Tasks of a
Network Administrator
Security Management
Performance Management
Planning for Growth
Fault Management and Recovery
Account/User Management
Networked Application Support
15 to
Security Management
Firewalls
Usernames
Password control
Resource Access Control
16 to
Performance Management
Availability
Response Time
Accuracy
17 to
Planning for Growth
A Network (or any organisation) is not
static
Growth means increased load on a
network. This must be planned for….
Systems eventually need replacement.
This must be planned for – in
advance…
18 to
Fault Management and Recovery
Monitoring
 Reporting status
Testing
 Fixes and Patches
 Updates
 Repairs
 Change Management
19 to
Account / User Management
Communication Facilities
 Connection - Rental - Charges
Hardware Usage
 Lease - Rent - Hire
Consumables Usage
 Power, Paper, Media (Diskettes, CDs…)
Software Usage
 Licensing,
 Tolls,
 Application usage
20 to
Account / User Management
Accounts are Managed for:
 Intrusion detection / prevention
 Charging for Services
 Legal protection of the Organisation
21 to
Networked Application Support
Client / Server systems support
Internet support
Server support
 Applications and Hardware
Helpdesk
 Trouble report / Bug fixes
 Printing
 eMail
22 to
How to be a Sys/Net Admin
(yet another Job Description…)
Learn Operating System basics eg Unix
Learn shell utilities and script programming
Learn how to Install and Configure OS
Learn DNS and Bind
Learn TCP/IP networking
Learn NFS and NIS (or equivalent…)
Learn about system tuning and accounting
Learn Compile and Link (eg C and make)
23 to
SAGE SysAdmin
Job Descriptions
http://www.sage-au.org.au/
http://sageweb.sage.org/jobs/thefield/j
obs-descriptions.html
24 to
Goals of System/Network Administration
Put together a network of computers
Get them running
Keep them running (despite Users….)
Provide a Service to Users
Requires skills of
 Mechanic
 Sociologist
 Researcher
Challenges of
System/Network Administration
Systems or Network Administration is
more than just installing computers or
networks.
It is about planning and designing an
efficient community of computers that
allow users to get their jobs done.
26 to
Challenges of Administration
Design Logical, Efficient networks
Easily deploy & update many machines
Decide what services are needed
 know the business tasks & customers
Plan and implement adequate security
Provide comfortable User environment
Be able to fix errors and problems
Keep track of & be able to use knowledge
27 tohttps://github.com/syaifulahdan/
Style of
Network Administration
28 to
PRACTICE
Convention or The Best Solution
PRACTICE = “How things are done here”
Have you ever wondered…
Why are things done in certain ways?
Which way is best? Usually it’s because:
Someone did it once, and everyone copied without really
thinking about it
People have thought much about it and this really is the best
way…
An arbitrary choice was made, and it is now a matter of
convention
29 to
Comparison of System/Network
Management Styles
Fire-Fighting
 Managing by responding to situations when they happen
(Reactive)
Preventative management
 Monitor network and make repairs and changes before
problems appear (Proactive)
These are two opposite extremes.
Most real managers combine both.
30 to
Fire-Fighting
Investigate the Fault or Problem
 Isolate the problem and identify/define it
 Use tests and tools to diagnose the problem
 Solve the problem and document the solution
Prioritize multiple problems
31 to
Preventative Management
The Good Circle management cycle
32 to
Preventative Management
Techniques
Capacity Planning
Simulation and Testing
 load generators
 Benchmarks
Performance Monitors and System Tuning
 Network analysis and modelling
 Load balancing
 Hardware upgrades
33 to
Management method and Cost
Information about Network
Administration
The Knowledge….
What is it? Where is it?
How do we get it?
35 to
Sources of Information for
System/Network Administrators
Manuals and Online Documentation
World Wide Web
RFCs, FYIs, IENs
News groups, Discussion lists, WebLogs
Meetings and Seminars
 SAGE/Usenix, Novell Brainshare, Microsoft
TechNet/TechEd
How-To books

More Related Content

What's hot

Sudo Mode (part 2): How Privilege Mistakes could Dismantle your Entire Enterp...
Sudo Mode (part 2): How Privilege Mistakes could Dismantle your Entire Enterp...Sudo Mode (part 2): How Privilege Mistakes could Dismantle your Entire Enterp...
Sudo Mode (part 2): How Privilege Mistakes could Dismantle your Entire Enterp...
BeyondTrust
 
Ecase direct servlet acess v1
Ecase direct servlet acess  v1Ecase direct servlet acess  v1
Ecase direct servlet acess v1
Damir Delija
 
System analyst
System analystSystem analyst
System analyst
returnasap
 
The Security Policy Management Maturity Model: How to Move Up the Curve
The Security Policy Management Maturity Model: How to Move Up the CurveThe Security Policy Management Maturity Model: How to Move Up the Curve
The Security Policy Management Maturity Model: How to Move Up the Curve
AlgoSec
 
Tips to Remediate your Vulnerability Management Program
Tips to Remediate your Vulnerability Management ProgramTips to Remediate your Vulnerability Management Program
Tips to Remediate your Vulnerability Management Program
BeyondTrust
 
A Complete Guide Cloud Computing
A Complete Guide Cloud ComputingA Complete Guide Cloud Computing
A Complete Guide Cloud Computing
Sripati Mahapatra
 
PRTG NETWORK MONITORING
PRTG NETWORK MONITORINGPRTG NETWORK MONITORING
PRTG NETWORK MONITORING
Fanky Christian
 
IT Network Asset Discovery & Inventory
IT Network Asset Discovery & InventoryIT Network Asset Discovery & Inventory
IT Network Asset Discovery & Inventory
ikirmer
 
Event log analyzer by me
Event log analyzer by me Event log analyzer by me
Event log analyzer by me
ER Swapnil Raut
 
Network access protection ppt
Network access protection pptNetwork access protection ppt
Network access protection ppt
Dasarathi Dash
 
Arcsight explained
Arcsight explainedArcsight explained
Arcsight explained
anilkumar484492
 
Database Security, Better Audits, Lower Costs
Database Security, Better Audits, Lower CostsDatabase Security, Better Audits, Lower Costs
Database Security, Better Audits, Lower Costs
Imperva
 
Cherry Tree Solutions on Preserv8 Unified Mail Communication Platform
Cherry Tree Solutions on Preserv8 Unified Mail Communication PlatformCherry Tree Solutions on Preserv8 Unified Mail Communication Platform
Cherry Tree Solutions on Preserv8 Unified Mail Communication Platform
lawriejanes
 
Improve Security Visibility with AlienVault USM Correlation Directives
Improve Security Visibility with AlienVault USM Correlation DirectivesImprove Security Visibility with AlienVault USM Correlation Directives
Improve Security Visibility with AlienVault USM Correlation Directives
AlienVault
 
SIEM 101: Get a Clue About IT Security Analysis
SIEM 101: Get a Clue About IT Security Analysis SIEM 101: Get a Clue About IT Security Analysis
SIEM 101: Get a Clue About IT Security Analysis
AlienVault
 
Security for cloud native workloads
Security for cloud native workloadsSecurity for cloud native workloads
Security for cloud native workloads
Runcy Oommen
 
Solera Networks
Solera NetworksSolera Networks
Solera Networks
gigamon
 
Gazzang pci v1[1]
Gazzang pci v1[1]Gazzang pci v1[1]
Gazzang pci v1[1]
Gazzang
 
Digital Forensics and Incident Response (DFIR) Training Session - January
Digital Forensics and Incident Response (DFIR) Training Session - JanuaryDigital Forensics and Incident Response (DFIR) Training Session - January
Digital Forensics and Incident Response (DFIR) Training Session - January
Infocyte
 

What's hot (20)

Sudo Mode (part 2): How Privilege Mistakes could Dismantle your Entire Enterp...
Sudo Mode (part 2): How Privilege Mistakes could Dismantle your Entire Enterp...Sudo Mode (part 2): How Privilege Mistakes could Dismantle your Entire Enterp...
Sudo Mode (part 2): How Privilege Mistakes could Dismantle your Entire Enterp...
 
Ecase direct servlet acess v1
Ecase direct servlet acess  v1Ecase direct servlet acess  v1
Ecase direct servlet acess v1
 
System analyst
System analystSystem analyst
System analyst
 
The Security Policy Management Maturity Model: How to Move Up the Curve
The Security Policy Management Maturity Model: How to Move Up the CurveThe Security Policy Management Maturity Model: How to Move Up the Curve
The Security Policy Management Maturity Model: How to Move Up the Curve
 
Tips to Remediate your Vulnerability Management Program
Tips to Remediate your Vulnerability Management ProgramTips to Remediate your Vulnerability Management Program
Tips to Remediate your Vulnerability Management Program
 
A Complete Guide Cloud Computing
A Complete Guide Cloud ComputingA Complete Guide Cloud Computing
A Complete Guide Cloud Computing
 
encase enterprise
 encase enterprise  encase enterprise
encase enterprise
 
PRTG NETWORK MONITORING
PRTG NETWORK MONITORINGPRTG NETWORK MONITORING
PRTG NETWORK MONITORING
 
IT Network Asset Discovery & Inventory
IT Network Asset Discovery & InventoryIT Network Asset Discovery & Inventory
IT Network Asset Discovery & Inventory
 
Event log analyzer by me
Event log analyzer by me Event log analyzer by me
Event log analyzer by me
 
Network access protection ppt
Network access protection pptNetwork access protection ppt
Network access protection ppt
 
Arcsight explained
Arcsight explainedArcsight explained
Arcsight explained
 
Database Security, Better Audits, Lower Costs
Database Security, Better Audits, Lower CostsDatabase Security, Better Audits, Lower Costs
Database Security, Better Audits, Lower Costs
 
Cherry Tree Solutions on Preserv8 Unified Mail Communication Platform
Cherry Tree Solutions on Preserv8 Unified Mail Communication PlatformCherry Tree Solutions on Preserv8 Unified Mail Communication Platform
Cherry Tree Solutions on Preserv8 Unified Mail Communication Platform
 
Improve Security Visibility with AlienVault USM Correlation Directives
Improve Security Visibility with AlienVault USM Correlation DirectivesImprove Security Visibility with AlienVault USM Correlation Directives
Improve Security Visibility with AlienVault USM Correlation Directives
 
SIEM 101: Get a Clue About IT Security Analysis
SIEM 101: Get a Clue About IT Security Analysis SIEM 101: Get a Clue About IT Security Analysis
SIEM 101: Get a Clue About IT Security Analysis
 
Security for cloud native workloads
Security for cloud native workloadsSecurity for cloud native workloads
Security for cloud native workloads
 
Solera Networks
Solera NetworksSolera Networks
Solera Networks
 
Gazzang pci v1[1]
Gazzang pci v1[1]Gazzang pci v1[1]
Gazzang pci v1[1]
 
Digital Forensics and Incident Response (DFIR) Training Session - January
Digital Forensics and Incident Response (DFIR) Training Session - JanuaryDigital Forensics and Incident Response (DFIR) Training Session - January
Digital Forensics and Incident Response (DFIR) Training Session - January
 

Similar to Meeting 2 introdcution network administrator

INTRODUCTION.ppt
INTRODUCTION.pptINTRODUCTION.ppt
INTRODUCTION.ppt
SolomonAnab1
 
BIS Ch 4.ppt
BIS Ch 4.pptBIS Ch 4.ppt
BIS Ch 4.ppt
biruktesfaye27
 
Introduction to Network and System Administration
Introduction to Network and System AdministrationIntroduction to Network and System Administration
Introduction to Network and System Administration
Duressa Teshome
 
Short reference architecture
Short reference architectureShort reference architecture
Short reference architectureSteve Feldman
 
Rise of the machines -- Owasp israel -- June 2014 meetup
Rise of the machines -- Owasp israel -- June 2014 meetupRise of the machines -- Owasp israel -- June 2014 meetup
Rise of the machines -- Owasp israel -- June 2014 meetup
Shlomo Yona
 
Chap12 Developing Business It Solutions[1]
Chap12 Developing Business It Solutions[1]Chap12 Developing Business It Solutions[1]
Chap12 Developing Business It Solutions[1]sihamy
 
Bringing the Cloud Back to Earth
Bringing the Cloud Back to EarthBringing the Cloud Back to Earth
Bringing the Cloud Back to Earth
Sri Chalasani
 
Accel Frontline Remote Infrastructure Capabilities
Accel Frontline Remote Infrastructure CapabilitiesAccel Frontline Remote Infrastructure Capabilities
Accel Frontline Remote Infrastructure Capabilities
shaun_raghavan
 
Afl rim capabilities
Afl rim capabilitiesAfl rim capabilities
Afl rim capabilities
shaun_raghavan
 
Resove network problem.pptx
Resove network problem.pptxResove network problem.pptx
Resove network problem.pptx
TadeseBeyene
 
this is the slide design for chapter 4 of reource monitoring and mamangemnt
this is the  slide design for chapter 4 of reource monitoring and mamangemntthis is the  slide design for chapter 4 of reource monitoring and mamangemnt
this is the slide design for chapter 4 of reource monitoring and mamangemnt
haile468688
 
On the Application of AI for Failure Management: Problems, Solutions and Algo...
On the Application of AI for Failure Management: Problems, Solutions and Algo...On the Application of AI for Failure Management: Problems, Solutions and Algo...
On the Application of AI for Failure Management: Problems, Solutions and Algo...
Jorge Cardoso
 
how to become IT specialist
how to become IT specialisthow to become IT specialist
how to become IT specialist
Maher Doubiane
 
Cisco network management
Cisco network managementCisco network management
Cisco network management
IT Tech
 
Network and System Administration
Network and System AdministrationNetwork and System Administration
Network and System Administration
IgguuMuude
 
Distributed Systems in Data Engineering
Distributed Systems in Data EngineeringDistributed Systems in Data Engineering
Distributed Systems in Data Engineering
Adetimehin Oluwasegun Matthew
 
1 - AdminRole.ppt
1 - AdminRole.ppt1 - AdminRole.ppt
1 - AdminRole.ppt
TekalignTaye
 

Similar to Meeting 2 introdcution network administrator (20)

INTRODUCTION.ppt
INTRODUCTION.pptINTRODUCTION.ppt
INTRODUCTION.ppt
 
BIS Ch 4.ppt
BIS Ch 4.pptBIS Ch 4.ppt
BIS Ch 4.ppt
 
Introduction to Network and System Administration
Introduction to Network and System AdministrationIntroduction to Network and System Administration
Introduction to Network and System Administration
 
Short reference architecture
Short reference architectureShort reference architecture
Short reference architecture
 
Rise of the machines -- Owasp israel -- June 2014 meetup
Rise of the machines -- Owasp israel -- June 2014 meetupRise of the machines -- Owasp israel -- June 2014 meetup
Rise of the machines -- Owasp israel -- June 2014 meetup
 
1 - Introduction.ppt
1 - Introduction.ppt1 - Introduction.ppt
1 - Introduction.ppt
 
Chap12 Developing Business It Solutions[1]
Chap12 Developing Business It Solutions[1]Chap12 Developing Business It Solutions[1]
Chap12 Developing Business It Solutions[1]
 
Bringing the Cloud Back to Earth
Bringing the Cloud Back to EarthBringing the Cloud Back to Earth
Bringing the Cloud Back to Earth
 
Ch14
Ch14Ch14
Ch14
 
Accel Frontline Remote Infrastructure Capabilities
Accel Frontline Remote Infrastructure CapabilitiesAccel Frontline Remote Infrastructure Capabilities
Accel Frontline Remote Infrastructure Capabilities
 
Afl rim capabilities
Afl rim capabilitiesAfl rim capabilities
Afl rim capabilities
 
Resove network problem.pptx
Resove network problem.pptxResove network problem.pptx
Resove network problem.pptx
 
this is the slide design for chapter 4 of reource monitoring and mamangemnt
this is the  slide design for chapter 4 of reource monitoring and mamangemntthis is the  slide design for chapter 4 of reource monitoring and mamangemnt
this is the slide design for chapter 4 of reource monitoring and mamangemnt
 
On the Application of AI for Failure Management: Problems, Solutions and Algo...
On the Application of AI for Failure Management: Problems, Solutions and Algo...On the Application of AI for Failure Management: Problems, Solutions and Algo...
On the Application of AI for Failure Management: Problems, Solutions and Algo...
 
how to become IT specialist
how to become IT specialisthow to become IT specialist
how to become IT specialist
 
Cisco network management
Cisco network managementCisco network management
Cisco network management
 
Network and System Administration
Network and System AdministrationNetwork and System Administration
Network and System Administration
 
Distributed Systems in Data Engineering
Distributed Systems in Data EngineeringDistributed Systems in Data Engineering
Distributed Systems in Data Engineering
 
1 - AdminRole.ppt
1 - AdminRole.ppt1 - AdminRole.ppt
1 - AdminRole.ppt
 
Ch24 system administration
Ch24 system administration Ch24 system administration
Ch24 system administration
 

More from Syaiful Ahdan

Sertifikat EC00202128391
 Sertifikat EC00202128391 Sertifikat EC00202128391
Sertifikat EC00202128391
Syaiful Ahdan
 
SP2JPB - Aplikasi Sistem Pelayanan Pemesanan Jasa Perbaikan Pada Bengkel Alam...
SP2JPB - Aplikasi Sistem Pelayanan Pemesanan Jasa Perbaikan Pada Bengkel Alam...SP2JPB - Aplikasi Sistem Pelayanan Pemesanan Jasa Perbaikan Pada Bengkel Alam...
SP2JPB - Aplikasi Sistem Pelayanan Pemesanan Jasa Perbaikan Pada Bengkel Alam...
Syaiful Ahdan
 
Sertifikat ec00202059774
Sertifikat ec00202059774Sertifikat ec00202059774
Sertifikat ec00202059774
Syaiful Ahdan
 
Sertifikat ec00202059775
Sertifikat ec00202059775Sertifikat ec00202059775
Sertifikat ec00202059775
Syaiful Ahdan
 
Sertifikat EC00202045078
Sertifikat EC00202045078Sertifikat EC00202045078
Sertifikat EC00202045078
Syaiful Ahdan
 
Sertifikat EC00202044723
 Sertifikat EC00202044723 Sertifikat EC00202044723
Sertifikat EC00202044723
Syaiful Ahdan
 
Sertifikat EC00202023523
Sertifikat EC00202023523Sertifikat EC00202023523
Sertifikat EC00202023523
Syaiful Ahdan
 
Sertifikat EC00201826309
Sertifikat EC00201826309Sertifikat EC00201826309
Sertifikat EC00201826309
Syaiful Ahdan
 
Sertifikat EC00202023149
Sertifikat EC00202023149Sertifikat EC00202023149
Sertifikat EC00202023149
Syaiful Ahdan
 
Sertifikat EC00202022868
Sertifikat EC00202022868Sertifikat EC00202022868
Sertifikat EC00202022868
Syaiful Ahdan
 
Sertifikat EC00202021343
Sertifikat EC00202021343Sertifikat EC00202021343
Sertifikat EC00202021343
Syaiful Ahdan
 
Sertifikat EC00202022755
Sertifikat EC00202022755Sertifikat EC00202022755
Sertifikat EC00202022755
Syaiful Ahdan
 
Sertifikat EC00201987196
Sertifikat EC00201987196Sertifikat EC00201987196
Sertifikat EC00201987196
Syaiful Ahdan
 
Sertifikat EC00201856484
Sertifikat EC00201856484Sertifikat EC00201856484
Sertifikat EC00201856484
Syaiful Ahdan
 
Sertifikat EC00201856352
Sertifikat EC00201856352Sertifikat EC00201856352
Sertifikat EC00201856352
Syaiful Ahdan
 
Sertifikat EC00201856994
Sertifikat EC00201856994Sertifikat EC00201856994
Sertifikat EC00201856994
Syaiful Ahdan
 
Sertifikat EC00201856895
Sertifikat EC00201856895Sertifikat EC00201856895
Sertifikat EC00201856895
Syaiful Ahdan
 
Pertemuan 5
Pertemuan 5Pertemuan 5
Pertemuan 5
Syaiful Ahdan
 
Pertemuan 4
Pertemuan 4Pertemuan 4
Pertemuan 4
Syaiful Ahdan
 
Pertemuan 3
Pertemuan 3Pertemuan 3
Pertemuan 3
Syaiful Ahdan
 

More from Syaiful Ahdan (20)

Sertifikat EC00202128391
 Sertifikat EC00202128391 Sertifikat EC00202128391
Sertifikat EC00202128391
 
SP2JPB - Aplikasi Sistem Pelayanan Pemesanan Jasa Perbaikan Pada Bengkel Alam...
SP2JPB - Aplikasi Sistem Pelayanan Pemesanan Jasa Perbaikan Pada Bengkel Alam...SP2JPB - Aplikasi Sistem Pelayanan Pemesanan Jasa Perbaikan Pada Bengkel Alam...
SP2JPB - Aplikasi Sistem Pelayanan Pemesanan Jasa Perbaikan Pada Bengkel Alam...
 
Sertifikat ec00202059774
Sertifikat ec00202059774Sertifikat ec00202059774
Sertifikat ec00202059774
 
Sertifikat ec00202059775
Sertifikat ec00202059775Sertifikat ec00202059775
Sertifikat ec00202059775
 
Sertifikat EC00202045078
Sertifikat EC00202045078Sertifikat EC00202045078
Sertifikat EC00202045078
 
Sertifikat EC00202044723
 Sertifikat EC00202044723 Sertifikat EC00202044723
Sertifikat EC00202044723
 
Sertifikat EC00202023523
Sertifikat EC00202023523Sertifikat EC00202023523
Sertifikat EC00202023523
 
Sertifikat EC00201826309
Sertifikat EC00201826309Sertifikat EC00201826309
Sertifikat EC00201826309
 
Sertifikat EC00202023149
Sertifikat EC00202023149Sertifikat EC00202023149
Sertifikat EC00202023149
 
Sertifikat EC00202022868
Sertifikat EC00202022868Sertifikat EC00202022868
Sertifikat EC00202022868
 
Sertifikat EC00202021343
Sertifikat EC00202021343Sertifikat EC00202021343
Sertifikat EC00202021343
 
Sertifikat EC00202022755
Sertifikat EC00202022755Sertifikat EC00202022755
Sertifikat EC00202022755
 
Sertifikat EC00201987196
Sertifikat EC00201987196Sertifikat EC00201987196
Sertifikat EC00201987196
 
Sertifikat EC00201856484
Sertifikat EC00201856484Sertifikat EC00201856484
Sertifikat EC00201856484
 
Sertifikat EC00201856352
Sertifikat EC00201856352Sertifikat EC00201856352
Sertifikat EC00201856352
 
Sertifikat EC00201856994
Sertifikat EC00201856994Sertifikat EC00201856994
Sertifikat EC00201856994
 
Sertifikat EC00201856895
Sertifikat EC00201856895Sertifikat EC00201856895
Sertifikat EC00201856895
 
Pertemuan 5
Pertemuan 5Pertemuan 5
Pertemuan 5
 
Pertemuan 4
Pertemuan 4Pertemuan 4
Pertemuan 4
 
Pertemuan 3
Pertemuan 3Pertemuan 3
Pertemuan 3
 

Recently uploaded

special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
Special education needs
 
Normal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of LabourNormal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of Labour
Wasim Ak
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
tarandeep35
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
Jean Carlos Nunes Paixão
 
Group Presentation 2 Economics.Ariana Buscigliopptx
Group Presentation 2 Economics.Ariana BuscigliopptxGroup Presentation 2 Economics.Ariana Buscigliopptx
Group Presentation 2 Economics.Ariana Buscigliopptx
ArianaBusciglio
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
Peter Windle
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
SACHIN R KONDAGURI
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
Sandy Millin
 
Multithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race conditionMultithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race condition
Mohammed Sikander
 
Best Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDABest Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDA
deeptiverma2406
 
Marketing internship report file for MBA
Marketing internship report file for MBAMarketing internship report file for MBA
Marketing internship report file for MBA
gb193092
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
Vivekanand Anglo Vedic Academy
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
EduSkills OECD
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
DeeptiGupta154
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
MysoreMuleSoftMeetup
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Thiyagu K
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
Nguyen Thanh Tu Collection
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
Peter Windle
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
Vikramjit Singh
 

Recently uploaded (20)

special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
 
Normal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of LabourNormal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of Labour
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
 
Group Presentation 2 Economics.Ariana Buscigliopptx
Group Presentation 2 Economics.Ariana BuscigliopptxGroup Presentation 2 Economics.Ariana Buscigliopptx
Group Presentation 2 Economics.Ariana Buscigliopptx
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
 
Multithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race conditionMultithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race condition
 
Best Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDABest Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDA
 
Marketing internship report file for MBA
Marketing internship report file for MBAMarketing internship report file for MBA
Marketing internship report file for MBA
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
 

Meeting 2 introdcution network administrator

  • 1. 1 tohttps://github.com/syaifulahdan/ Computer Network Administration Introduction Network Administration  What is Network Administration  The core management areas  Fault management  Master boot Record  Configuration and Name Management  OSI - Account Management  OSI - Performance Management  OSI - Security Management  Structure of Systems and Network Management Organisation  Corporate Networked Environments  Network Administrators Tasks  Tasks of a Network Administrator  How to be a Sys/Net Admin
  • 3. 3 tohttps://github.com/syaifulahdan/ Why do we need Network administration at first ??
  • 5. 5 to Fault management The facilities that enable the  detection,  isolation, and  correction of abnormal operation of the OSI environment.
  • 6. 6 to Configuration and Name Management The services and facilities that • control • identify • collect and provide data to clients and managed objects, so assisting in continuous operation of interconnection services.
  • 7. 7 to OSI - Account Management The facilities that enable charges to be established for the use of managed objects and costs to be identified for the use of those managed objects.
  • 8. 8 to OSI - Performance Management The Facilities needed to evaluate  Behaviour of managed objects  Effectiveness of communication activities
  • 9. 9 to OSI - Security Management Address those aspects of OSI security essential to:  operate OSI network management correctly and  to protect managed objects
  • 10. Definitions?? How does Network Administration work in Practice? Let’s look at how Network Management is Organised…
  • 11. 11 to Network Hardware Applications Division of Labour Structure of Systems and Network Management Organisation
  • 12. 12 to Corporate Networked Environments Have team(s) of specialists in various areas Well defined tasks  job descriptions In small networks usually one person  multi-skilled and multi-tasked In reality – often somewhere in between….
  • 14. 14 to Tasks of a Network Administrator Security Management Performance Management Planning for Growth Fault Management and Recovery Account/User Management Networked Application Support
  • 17. 17 to Planning for Growth A Network (or any organisation) is not static Growth means increased load on a network. This must be planned for…. Systems eventually need replacement. This must be planned for – in advance…
  • 18. 18 to Fault Management and Recovery Monitoring  Reporting status Testing  Fixes and Patches  Updates  Repairs  Change Management
  • 19. 19 to Account / User Management Communication Facilities  Connection - Rental - Charges Hardware Usage  Lease - Rent - Hire Consumables Usage  Power, Paper, Media (Diskettes, CDs…) Software Usage  Licensing,  Tolls,  Application usage
  • 20. 20 to Account / User Management Accounts are Managed for:  Intrusion detection / prevention  Charging for Services  Legal protection of the Organisation
  • 21. 21 to Networked Application Support Client / Server systems support Internet support Server support  Applications and Hardware Helpdesk  Trouble report / Bug fixes  Printing  eMail
  • 22. 22 to How to be a Sys/Net Admin (yet another Job Description…) Learn Operating System basics eg Unix Learn shell utilities and script programming Learn how to Install and Configure OS Learn DNS and Bind Learn TCP/IP networking Learn NFS and NIS (or equivalent…) Learn about system tuning and accounting Learn Compile and Link (eg C and make)
  • 23. 23 to SAGE SysAdmin Job Descriptions http://www.sage-au.org.au/ http://sageweb.sage.org/jobs/thefield/j obs-descriptions.html
  • 24. 24 to Goals of System/Network Administration Put together a network of computers Get them running Keep them running (despite Users….) Provide a Service to Users Requires skills of  Mechanic  Sociologist  Researcher
  • 25. Challenges of System/Network Administration Systems or Network Administration is more than just installing computers or networks. It is about planning and designing an efficient community of computers that allow users to get their jobs done.
  • 26. 26 to Challenges of Administration Design Logical, Efficient networks Easily deploy & update many machines Decide what services are needed  know the business tasks & customers Plan and implement adequate security Provide comfortable User environment Be able to fix errors and problems Keep track of & be able to use knowledge
  • 28. 28 to PRACTICE Convention or The Best Solution PRACTICE = “How things are done here” Have you ever wondered… Why are things done in certain ways? Which way is best? Usually it’s because: Someone did it once, and everyone copied without really thinking about it People have thought much about it and this really is the best way… An arbitrary choice was made, and it is now a matter of convention
  • 29. 29 to Comparison of System/Network Management Styles Fire-Fighting  Managing by responding to situations when they happen (Reactive) Preventative management  Monitor network and make repairs and changes before problems appear (Proactive) These are two opposite extremes. Most real managers combine both.
  • 30. 30 to Fire-Fighting Investigate the Fault or Problem  Isolate the problem and identify/define it  Use tests and tools to diagnose the problem  Solve the problem and document the solution Prioritize multiple problems
  • 31. 31 to Preventative Management The Good Circle management cycle
  • 32. 32 to Preventative Management Techniques Capacity Planning Simulation and Testing  load generators  Benchmarks Performance Monitors and System Tuning  Network analysis and modelling  Load balancing  Hardware upgrades
  • 34. Information about Network Administration The Knowledge…. What is it? Where is it? How do we get it?
  • 35. 35 to Sources of Information for System/Network Administrators Manuals and Online Documentation World Wide Web RFCs, FYIs, IENs News groups, Discussion lists, WebLogs Meetings and Seminars  SAGE/Usenix, Novell Brainshare, Microsoft TechNet/TechEd How-To books