SlideShare a Scribd company logo
1 of 10
Administrating Your
Network
Chapter - 8
The Network Administrator - Role
The best network administrator is the one
you never see because you never have a
network problem.
– The network administrator is the individual
primarily responsible for the uninterrupted
proper operation of the network, including:
• Creating a useful network environment
• Protecting the network environment
• Managing the network environment
Creating a Network Environment
1. What network software is loaded on the server
2. How user accounts are setup
3. How group accounts are setup and how user
accounts are assigned to them
1. Network Software
– Database:
• Database files stored on the server
• Database back end run on sever
• Shared data files
• Groupware, e-mail, scheduling
• Internet connectivity
– External e-mail
– Web hosting
– Allowing web access
Creating a Network Environment
2. User Accounts:
– The Default Accounts:
• Administrative account
• Guest account
– Creating User Accounts:
• User account information
• Group membership information
• User account profile information
– Copying User Accounts: (copies these values from the template to
new user account)
• Description
• Group account memberships
• Profile settings
• User cannot change password
• Password never expired
(Windows leaves the following fields blank in the new User account)
• Username
• Full Name
• User Must Change Password at Next logon
• Account disabled
Creating a Network Environment
2. User Accounts (continued)
– Disabling and Deleting User Accounts:
• When access to account is no longer appropriate for a user,
that account should be disabled. Disabling an account
prevents it from being used but retains the account for
information for future use.
• Deleting an account removes all the user account information
from the system. If a user account has been deleted and that
user requires access again, a new account will have to be
setup with all new permissions.
– Renaming User Accounts:
• You can rename any user account in Windows, including the
Administrator and Guest default accounts, with User
Manager.
• Changing the name does not change an other properties of
the account.
Creating a Network Environment
3. Groups :
– Planning Groups:
• Organization functional units, such as marketing
• Network programs, such as word processing, graphics and so on
• Events, such as a company party
• Network resources, such as laser printer
• Location, such as Building 02
• Individual function, such as backup operator
– Built-in Groups:
• Account operators
• Administrators
• Backup Operators
• Domain Admins
• Domain Guests
• Domain Users
• Replicator
• Server operators
• Users
Creating a Network Environment
3. Groups :
– Creating Groups:
• Select New Local Group from the User menus in the User Manager window.
Than enter the group name, description and members in the New Local
Group dialog box.
Documenting the Network:
Documenting your network has three primary purposes:
– Clearly defines the network in your own mind
– Records information so others can maintain the network
– Tracks material for warranty and costing purposes
Document needs to be broken into major sections:
– Physical plant diagram, station locations, and cable test results
– Network hardware and software, which should include the following:
• Item descriptions and serial number
• Location’
• Purchase date, vendor, and warranty information
• Network name, number, or other logical value that could identify it on the network
• Documentation (or location of the documentation)
– Current network diagram/architecture/layout
– Number of software licenses for each application and location of the license
certificates
– A history of network problems and their solutions.
Protecting Your Network Environment
1. Security
• How much security enough
– What are you trying to prevent
• Accessory to copyright violation
• Accidental loss
• Unauthorized disclosure
• Malicious destruction of data
• How important is your data
• What is the risk of intrusion
• What is the probability of accidental loss
Creating a Security Plan
• External requirements
• Inherent Policy: There are two ways to implement network security:
optimistically and pessimistically.
– An optimistic policy optimizes the usability of the network by securing
only those resources that are known to require unusual security.
– A pessimistic policy optimizes security by restricting all resources and
granting access only to those individuals who are known to need access
in order to perform their work.
Protecting Your Network Environment
2. Virus Protection
3. Uninterrupted Power Supply (UPS)
4. Disaster Recovery
• In spite of all preparation, the network can still fail. You can reduce the cost of
failure of devices on your network, such as hard disk, drive or other server
components, by implementing a backup policy. You can make your system fault
tolerant by replacing, striping, or mirroring your server data.
• Backup policy – The Tape Drive
– Amount of data you will need to backup
– Speed of data drive
– Capacity of the drive
– Reliability of the drive
– Cost of the drive
– Cost of the media
– Media interchangeability
– Drivers and backup software for the operating system
– Location of the Backup System
• Replication
• Fault-tolerance
– Striping with Parity: Disk Striping with Parity or RAID level 5
– Mirroring : Disk Mirroring or RAID level 1
– Striping : Disk Striping or RAID level 0
Managing Your Network
Environment
• Monitoring Network Performance
– Performance Monitor
• Performance Monitor shows how windows server is performing. It
can present information about your system in charts, logs, and
reports so you can view the information in several ways.
– Network Monitor
• The Network Monitor can show you information such as the current
network utilization, frame per second, communicating stations on
the network and their station address, and sources of broadcasts.
– Automated Network Management
• These packages can track key parameters of your network server
and client operating systems, such as the amount of free disk space
and the peak amount of traffic on your network
• Hardware Upgrade Policy

More Related Content

What's hot

Setting Up a Windows Network
Setting Up a Windows NetworkSetting Up a Windows Network
Setting Up a Windows NetworkAmir Villas
 
Case study for it03 roshan
Case study for it03 roshanCase study for it03 roshan
Case study for it03 roshanrosu555
 
Networking Hardware Concepts
Networking Hardware ConceptsNetworking Hardware Concepts
Networking Hardware ConceptsAmir Villas
 
17. Computer System Configuration And Methods
17. Computer System   Configuration And Methods17. Computer System   Configuration And Methods
17. Computer System Configuration And MethodsNew Era University
 
SYSTEM ADMINISTRATION AND MAINTENANCE NOTES PERIYAR UNIVERSITY
SYSTEM ADMINISTRATION AND MAINTENANCE NOTES PERIYAR UNIVERSITYSYSTEM ADMINISTRATION AND MAINTENANCE NOTES PERIYAR UNIVERSITY
SYSTEM ADMINISTRATION AND MAINTENANCE NOTES PERIYAR UNIVERSITYGOKUL SREE
 
Chapter08 -- network operating systems and windows server 2003-based networking
Chapter08  -- network operating systems and windows server 2003-based networkingChapter08  -- network operating systems and windows server 2003-based networking
Chapter08 -- network operating systems and windows server 2003-based networkingRaja Waseem Akhtar
 
Basic components of a computer network
Basic components of a computer  network Basic components of a computer  network
Basic components of a computer network Edison Francis
 
Network servers
Network serversNetwork servers
Network serversOnline
 
System and Network Administration/ SNA
System and Network Administration/ SNASystem and Network Administration/ SNA
System and Network Administration/ SNAFaisalMashood
 
Hardware & networking
Hardware & networkingHardware & networking
Hardware & networkingAjay Mistry
 
INTRODUCTION TO NETWORK OS
INTRODUCTION TO NETWORK OSINTRODUCTION TO NETWORK OS
INTRODUCTION TO NETWORK OSkinish kumar
 
Net essentials6e ch9
Net essentials6e ch9Net essentials6e ch9
Net essentials6e ch9APSU
 
11. operating-systems-part-2
11. operating-systems-part-211. operating-systems-part-2
11. operating-systems-part-2Muhammad Ahad
 
Computer hardware and networking
Computer hardware and networkingComputer hardware and networking
Computer hardware and networkingdevendrakhairwa
 

What's hot (20)

Setting Up a Windows Network
Setting Up a Windows NetworkSetting Up a Windows Network
Setting Up a Windows Network
 
Case study for it03 roshan
Case study for it03 roshanCase study for it03 roshan
Case study for it03 roshan
 
1.4 network
1.4 network1.4 network
1.4 network
 
Networking Hardware Concepts
Networking Hardware ConceptsNetworking Hardware Concepts
Networking Hardware Concepts
 
17. Computer System Configuration And Methods
17. Computer System   Configuration And Methods17. Computer System   Configuration And Methods
17. Computer System Configuration And Methods
 
08. networking
08. networking08. networking
08. networking
 
SYSTEM ADMINISTRATION AND MAINTENANCE NOTES PERIYAR UNIVERSITY
SYSTEM ADMINISTRATION AND MAINTENANCE NOTES PERIYAR UNIVERSITYSYSTEM ADMINISTRATION AND MAINTENANCE NOTES PERIYAR UNIVERSITY
SYSTEM ADMINISTRATION AND MAINTENANCE NOTES PERIYAR UNIVERSITY
 
10. compute-part-1
10. compute-part-110. compute-part-1
10. compute-part-1
 
Chapter08 -- network operating systems and windows server 2003-based networking
Chapter08  -- network operating systems and windows server 2003-based networkingChapter08  -- network operating systems and windows server 2003-based networking
Chapter08 -- network operating systems and windows server 2003-based networking
 
Basic components of a computer network
Basic components of a computer  network Basic components of a computer  network
Basic components of a computer network
 
Network operating system
Network operating systemNetwork operating system
Network operating system
 
Network servers
Network serversNetwork servers
Network servers
 
Training ppt
Training pptTraining ppt
Training ppt
 
System and Network Administration/ SNA
System and Network Administration/ SNASystem and Network Administration/ SNA
System and Network Administration/ SNA
 
Hardware & networking
Hardware & networkingHardware & networking
Hardware & networking
 
INTRODUCTION TO NETWORK OS
INTRODUCTION TO NETWORK OSINTRODUCTION TO NETWORK OS
INTRODUCTION TO NETWORK OS
 
Net essentials6e ch9
Net essentials6e ch9Net essentials6e ch9
Net essentials6e ch9
 
Thin client
Thin clientThin client
Thin client
 
11. operating-systems-part-2
11. operating-systems-part-211. operating-systems-part-2
11. operating-systems-part-2
 
Computer hardware and networking
Computer hardware and networkingComputer hardware and networking
Computer hardware and networking
 

Viewers also liked

4 - OpenFlow Intro & Testbed by Pories Ediansyah
4 - OpenFlow Intro & Testbed by Pories Ediansyah4 - OpenFlow Intro & Testbed by Pories Ediansyah
4 - OpenFlow Intro & Testbed by Pories EdiansyahSDNRG ITB
 
5 - SDN Mininet experiments by Bagus Aditya & Hamzah Mustakim
5 - SDN Mininet experiments by Bagus Aditya & Hamzah Mustakim5 - SDN Mininet experiments by Bagus Aditya & Hamzah Mustakim
5 - SDN Mininet experiments by Bagus Aditya & Hamzah MustakimSDNRG ITB
 
7 - Introduction to OpenStack & SDN by Ady Saputra
7 - Introduction to OpenStack & SDN by Ady Saputra7 - Introduction to OpenStack & SDN by Ady Saputra
7 - Introduction to OpenStack & SDN by Ady SaputraSDNRG ITB
 
1 - SDNRG ITB, 10 minutes intro by Affan Basalamah
 1 - SDNRG ITB, 10 minutes intro by Affan Basalamah 1 - SDNRG ITB, 10 minutes intro by Affan Basalamah
1 - SDNRG ITB, 10 minutes intro by Affan BasalamahSDNRG ITB
 
Brocade Software Networking (SDN NFV Day ITB 2016)
Brocade Software Networking (SDN NFV Day ITB 2016)Brocade Software Networking (SDN NFV Day ITB 2016)
Brocade Software Networking (SDN NFV Day ITB 2016)SDNRG ITB
 
6 - Custom Mininet Topology Experiment by Dwina Fitriyandini Siswanto & Siti ...
6 - Custom Mininet Topology Experiment by Dwina Fitriyandini Siswanto & Siti ...6 - Custom Mininet Topology Experiment by Dwina Fitriyandini Siswanto & Siti ...
6 - Custom Mininet Topology Experiment by Dwina Fitriyandini Siswanto & Siti ...SDNRG ITB
 
3 - Introducing NFV by Adrie Taniwidjaja
3 - Introducing NFV by Adrie Taniwidjaja3 - Introducing NFV by Adrie Taniwidjaja
3 - Introducing NFV by Adrie TaniwidjajaSDNRG ITB
 
Juniper Unified SDN Technical Presentation (SDN Day ITB 2016)
Juniper  Unified SDN Technical Presentation (SDN Day ITB 2016)Juniper  Unified SDN Technical Presentation (SDN Day ITB 2016)
Juniper Unified SDN Technical Presentation (SDN Day ITB 2016)SDNRG ITB
 
How to Implement SDN Technology in ITB
How to Implement SDN Technology in ITBHow to Implement SDN Technology in ITB
How to Implement SDN Technology in ITBSDNRG ITB
 
vCloud NFV - Accelerating deployment of the Telco Cloud (SDN NFV Day ITB 2016)
vCloud NFV - Accelerating deployment of the Telco Cloud (SDN NFV Day ITB 2016)vCloud NFV - Accelerating deployment of the Telco Cloud (SDN NFV Day ITB 2016)
vCloud NFV - Accelerating deployment of the Telco Cloud (SDN NFV Day ITB 2016)SDNRG ITB
 
F5 perspective of nfv+sdn (SDN NFV Day ITB 2016)
F5 perspective of nfv+sdn (SDN NFV Day ITB 2016)F5 perspective of nfv+sdn (SDN NFV Day ITB 2016)
F5 perspective of nfv+sdn (SDN NFV Day ITB 2016)SDNRG ITB
 
Network Function Virtualization - Telkomsel Perspective (SDN NFV Day ITB 2016)
Network Function Virtualization - Telkomsel Perspective (SDN NFV Day ITB 2016)Network Function Virtualization - Telkomsel Perspective (SDN NFV Day ITB 2016)
Network Function Virtualization - Telkomsel Perspective (SDN NFV Day ITB 2016)SDNRG ITB
 
Cisco SDN/NVF Innovations (SDN NVF Day ITB 2016)
Cisco SDN/NVF Innovations (SDN NVF Day ITB 2016)Cisco SDN/NVF Innovations (SDN NVF Day ITB 2016)
Cisco SDN/NVF Innovations (SDN NVF Day ITB 2016)SDNRG ITB
 

Viewers also liked (13)

4 - OpenFlow Intro & Testbed by Pories Ediansyah
4 - OpenFlow Intro & Testbed by Pories Ediansyah4 - OpenFlow Intro & Testbed by Pories Ediansyah
4 - OpenFlow Intro & Testbed by Pories Ediansyah
 
5 - SDN Mininet experiments by Bagus Aditya & Hamzah Mustakim
5 - SDN Mininet experiments by Bagus Aditya & Hamzah Mustakim5 - SDN Mininet experiments by Bagus Aditya & Hamzah Mustakim
5 - SDN Mininet experiments by Bagus Aditya & Hamzah Mustakim
 
7 - Introduction to OpenStack & SDN by Ady Saputra
7 - Introduction to OpenStack & SDN by Ady Saputra7 - Introduction to OpenStack & SDN by Ady Saputra
7 - Introduction to OpenStack & SDN by Ady Saputra
 
1 - SDNRG ITB, 10 minutes intro by Affan Basalamah
 1 - SDNRG ITB, 10 minutes intro by Affan Basalamah 1 - SDNRG ITB, 10 minutes intro by Affan Basalamah
1 - SDNRG ITB, 10 minutes intro by Affan Basalamah
 
Brocade Software Networking (SDN NFV Day ITB 2016)
Brocade Software Networking (SDN NFV Day ITB 2016)Brocade Software Networking (SDN NFV Day ITB 2016)
Brocade Software Networking (SDN NFV Day ITB 2016)
 
6 - Custom Mininet Topology Experiment by Dwina Fitriyandini Siswanto & Siti ...
6 - Custom Mininet Topology Experiment by Dwina Fitriyandini Siswanto & Siti ...6 - Custom Mininet Topology Experiment by Dwina Fitriyandini Siswanto & Siti ...
6 - Custom Mininet Topology Experiment by Dwina Fitriyandini Siswanto & Siti ...
 
3 - Introducing NFV by Adrie Taniwidjaja
3 - Introducing NFV by Adrie Taniwidjaja3 - Introducing NFV by Adrie Taniwidjaja
3 - Introducing NFV by Adrie Taniwidjaja
 
Juniper Unified SDN Technical Presentation (SDN Day ITB 2016)
Juniper  Unified SDN Technical Presentation (SDN Day ITB 2016)Juniper  Unified SDN Technical Presentation (SDN Day ITB 2016)
Juniper Unified SDN Technical Presentation (SDN Day ITB 2016)
 
How to Implement SDN Technology in ITB
How to Implement SDN Technology in ITBHow to Implement SDN Technology in ITB
How to Implement SDN Technology in ITB
 
vCloud NFV - Accelerating deployment of the Telco Cloud (SDN NFV Day ITB 2016)
vCloud NFV - Accelerating deployment of the Telco Cloud (SDN NFV Day ITB 2016)vCloud NFV - Accelerating deployment of the Telco Cloud (SDN NFV Day ITB 2016)
vCloud NFV - Accelerating deployment of the Telco Cloud (SDN NFV Day ITB 2016)
 
F5 perspective of nfv+sdn (SDN NFV Day ITB 2016)
F5 perspective of nfv+sdn (SDN NFV Day ITB 2016)F5 perspective of nfv+sdn (SDN NFV Day ITB 2016)
F5 perspective of nfv+sdn (SDN NFV Day ITB 2016)
 
Network Function Virtualization - Telkomsel Perspective (SDN NFV Day ITB 2016)
Network Function Virtualization - Telkomsel Perspective (SDN NFV Day ITB 2016)Network Function Virtualization - Telkomsel Perspective (SDN NFV Day ITB 2016)
Network Function Virtualization - Telkomsel Perspective (SDN NFV Day ITB 2016)
 
Cisco SDN/NVF Innovations (SDN NVF Day ITB 2016)
Cisco SDN/NVF Innovations (SDN NVF Day ITB 2016)Cisco SDN/NVF Innovations (SDN NVF Day ITB 2016)
Cisco SDN/NVF Innovations (SDN NVF Day ITB 2016)
 

Similar to Administrating Your Network

Beginning Of DBMS (data base)
Beginning Of DBMS (data base)Beginning Of DBMS (data base)
Beginning Of DBMS (data base)Surya Swaroop
 
Introduction to Network and System Administration
Introduction to Network and System AdministrationIntroduction to Network and System Administration
Introduction to Network and System AdministrationDuressa Teshome
 
Data base chapter 2 | detail about the topic
Data base chapter 2 | detail about the topicData base chapter 2 | detail about the topic
Data base chapter 2 | detail about the topichoseg78377
 
Configuring and administrate server
Configuring and administrate serverConfiguring and administrate server
Configuring and administrate serverGera Paulos
 
Information Security Lesson 4 - Baselines - Eric Vanderburg
Information Security Lesson 4 - Baselines - Eric VanderburgInformation Security Lesson 4 - Baselines - Eric Vanderburg
Information Security Lesson 4 - Baselines - Eric VanderburgEric Vanderburg
 
Chapter 5-IT infrastructure(REV 2.0).pptx
Chapter 5-IT infrastructure(REV 2.0).pptxChapter 5-IT infrastructure(REV 2.0).pptx
Chapter 5-IT infrastructure(REV 2.0).pptxMohdSyaifuadJasemi
 
window configuration & Administration.pptx
window   configuration  & Administration.pptxwindow   configuration  & Administration.pptx
window configuration & Administration.pptxTadeseBeyene
 
pdf to ppt window configuration .pptx
pdf to ppt window configuration .pptxpdf to ppt window configuration .pptx
pdf to ppt window configuration .pptxTadeseBeyene
 
windows server installation procedure or
windows server installation procedure orwindows server installation procedure or
windows server installation procedure orYogeshKumar187055
 
chapter01-introductiontowindowsserver2003-090505014519-phpapp02.pdf
chapter01-introductiontowindowsserver2003-090505014519-phpapp02.pdfchapter01-introductiontowindowsserver2003-090505014519-phpapp02.pdf
chapter01-introductiontowindowsserver2003-090505014519-phpapp02.pdfKhadijaTahir29
 
Unit 1: Introduction to DBMS Unit 1 Complete
Unit 1: Introduction to DBMS Unit 1 CompleteUnit 1: Introduction to DBMS Unit 1 Complete
Unit 1: Introduction to DBMS Unit 1 CompleteRaj vardhan
 
Windows base servers auditing software
Windows base servers auditing softwareWindows base servers auditing software
Windows base servers auditing softwareHatem Mohsen
 
Database administration and security
Database administration and securityDatabase administration and security
Database administration and securityDhani Ahmad
 
1 Software Requirements Descriptions and specification.docx
1 Software Requirements Descriptions and specification.docx1 Software Requirements Descriptions and specification.docx
1 Software Requirements Descriptions and specification.docxjeremylockett77
 
009694598.pdf
009694598.pdf009694598.pdf
009694598.pdfEidTahir
 
RuSIEM overview (english version)
RuSIEM overview (english version)RuSIEM overview (english version)
RuSIEM overview (english version)Olesya Shelestova
 

Similar to Administrating Your Network (20)

Address book
Address bookAddress book
Address book
 
OCSP.pptx
OCSP.pptxOCSP.pptx
OCSP.pptx
 
Beginning Of DBMS (data base)
Beginning Of DBMS (data base)Beginning Of DBMS (data base)
Beginning Of DBMS (data base)
 
Introduction to Network and System Administration
Introduction to Network and System AdministrationIntroduction to Network and System Administration
Introduction to Network and System Administration
 
Data base chapter 2 | detail about the topic
Data base chapter 2 | detail about the topicData base chapter 2 | detail about the topic
Data base chapter 2 | detail about the topic
 
Configuring and administrate server
Configuring and administrate serverConfiguring and administrate server
Configuring and administrate server
 
Information Security Lesson 4 - Baselines - Eric Vanderburg
Information Security Lesson 4 - Baselines - Eric VanderburgInformation Security Lesson 4 - Baselines - Eric Vanderburg
Information Security Lesson 4 - Baselines - Eric Vanderburg
 
Chapter 5-IT infrastructure(REV 2.0).pptx
Chapter 5-IT infrastructure(REV 2.0).pptxChapter 5-IT infrastructure(REV 2.0).pptx
Chapter 5-IT infrastructure(REV 2.0).pptx
 
window configuration & Administration.pptx
window   configuration  & Administration.pptxwindow   configuration  & Administration.pptx
window configuration & Administration.pptx
 
pdf to ppt window configuration .pptx
pdf to ppt window configuration .pptxpdf to ppt window configuration .pptx
pdf to ppt window configuration .pptx
 
Ch 2
Ch 2Ch 2
Ch 2
 
windows server installation procedure or
windows server installation procedure orwindows server installation procedure or
windows server installation procedure or
 
chapter01-introductiontowindowsserver2003-090505014519-phpapp02.pdf
chapter01-introductiontowindowsserver2003-090505014519-phpapp02.pdfchapter01-introductiontowindowsserver2003-090505014519-phpapp02.pdf
chapter01-introductiontowindowsserver2003-090505014519-phpapp02.pdf
 
Unit 1: Introduction to DBMS Unit 1 Complete
Unit 1: Introduction to DBMS Unit 1 CompleteUnit 1: Introduction to DBMS Unit 1 Complete
Unit 1: Introduction to DBMS Unit 1 Complete
 
Windows base servers auditing software
Windows base servers auditing softwareWindows base servers auditing software
Windows base servers auditing software
 
Database administration and security
Database administration and securityDatabase administration and security
Database administration and security
 
1 Software Requirements Descriptions and specification.docx
1 Software Requirements Descriptions and specification.docx1 Software Requirements Descriptions and specification.docx
1 Software Requirements Descriptions and specification.docx
 
009694598.pdf
009694598.pdf009694598.pdf
009694598.pdf
 
RuSIEM overview (english version)
RuSIEM overview (english version)RuSIEM overview (english version)
RuSIEM overview (english version)
 
CV
CVCV
CV
 

More from zaisahil

The Basics of Network Troubleshooting
The Basics of Network TroubleshootingThe Basics of Network Troubleshooting
The Basics of Network Troubleshootingzaisahil
 
Wide Area Network
Wide Area NetworkWide Area Network
Wide Area Networkzaisahil
 
Expending Networking
Expending NetworkingExpending Networking
Expending Networkingzaisahil
 
Remote Access
Remote AccessRemote Access
Remote Accesszaisahil
 
Designing Local Area Network
Designing Local Area NetworkDesigning Local Area Network
Designing Local Area Networkzaisahil
 
Real-World Networks
Real-World NetworksReal-World Networks
Real-World Networkszaisahil
 
The Theoretical Network
The Theoretical NetworkThe Theoretical Network
The Theoretical Networkzaisahil
 
Network Components
Network ComponentsNetwork Components
Network Componentszaisahil
 
Introduction to Networks & Networking Concepts
Introduction to Networks & Networking ConceptsIntroduction to Networks & Networking Concepts
Introduction to Networks & Networking Conceptszaisahil
 

More from zaisahil (9)

The Basics of Network Troubleshooting
The Basics of Network TroubleshootingThe Basics of Network Troubleshooting
The Basics of Network Troubleshooting
 
Wide Area Network
Wide Area NetworkWide Area Network
Wide Area Network
 
Expending Networking
Expending NetworkingExpending Networking
Expending Networking
 
Remote Access
Remote AccessRemote Access
Remote Access
 
Designing Local Area Network
Designing Local Area NetworkDesigning Local Area Network
Designing Local Area Network
 
Real-World Networks
Real-World NetworksReal-World Networks
Real-World Networks
 
The Theoretical Network
The Theoretical NetworkThe Theoretical Network
The Theoretical Network
 
Network Components
Network ComponentsNetwork Components
Network Components
 
Introduction to Networks & Networking Concepts
Introduction to Networks & Networking ConceptsIntroduction to Networks & Networking Concepts
Introduction to Networks & Networking Concepts
 

Recently uploaded

Quarter 4 Peace-education.pptx Catch Up Friday
Quarter 4 Peace-education.pptx Catch Up FridayQuarter 4 Peace-education.pptx Catch Up Friday
Quarter 4 Peace-education.pptx Catch Up FridayMakMakNepo
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxGrade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxChelloAnnAsuncion2
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPCeline George
 
Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxDr.Ibrahim Hassaan
 
Planning a health career 4th Quarter.pptx
Planning a health career 4th Quarter.pptxPlanning a health career 4th Quarter.pptx
Planning a health career 4th Quarter.pptxLigayaBacuel1
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...JhezDiaz1
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
Atmosphere science 7 quarter 4 .........
Atmosphere science 7 quarter 4 .........Atmosphere science 7 quarter 4 .........
Atmosphere science 7 quarter 4 .........LeaCamillePacle
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...Nguyen Thanh Tu Collection
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptxSherlyMaeNeri
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Celine George
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceSamikshaHamane
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxAnupkumar Sharma
 

Recently uploaded (20)

Quarter 4 Peace-education.pptx Catch Up Friday
Quarter 4 Peace-education.pptx Catch Up FridayQuarter 4 Peace-education.pptx Catch Up Friday
Quarter 4 Peace-education.pptx Catch Up Friday
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxGrade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERP
 
Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptx
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Planning a health career 4th Quarter.pptx
Planning a health career 4th Quarter.pptxPlanning a health career 4th Quarter.pptx
Planning a health career 4th Quarter.pptx
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
Atmosphere science 7 quarter 4 .........
Atmosphere science 7 quarter 4 .........Atmosphere science 7 quarter 4 .........
Atmosphere science 7 quarter 4 .........
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptx
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in Pharmacovigilance
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
 

Administrating Your Network

  • 2. The Network Administrator - Role The best network administrator is the one you never see because you never have a network problem. – The network administrator is the individual primarily responsible for the uninterrupted proper operation of the network, including: • Creating a useful network environment • Protecting the network environment • Managing the network environment
  • 3. Creating a Network Environment 1. What network software is loaded on the server 2. How user accounts are setup 3. How group accounts are setup and how user accounts are assigned to them 1. Network Software – Database: • Database files stored on the server • Database back end run on sever • Shared data files • Groupware, e-mail, scheduling • Internet connectivity – External e-mail – Web hosting – Allowing web access
  • 4. Creating a Network Environment 2. User Accounts: – The Default Accounts: • Administrative account • Guest account – Creating User Accounts: • User account information • Group membership information • User account profile information – Copying User Accounts: (copies these values from the template to new user account) • Description • Group account memberships • Profile settings • User cannot change password • Password never expired (Windows leaves the following fields blank in the new User account) • Username • Full Name • User Must Change Password at Next logon • Account disabled
  • 5. Creating a Network Environment 2. User Accounts (continued) – Disabling and Deleting User Accounts: • When access to account is no longer appropriate for a user, that account should be disabled. Disabling an account prevents it from being used but retains the account for information for future use. • Deleting an account removes all the user account information from the system. If a user account has been deleted and that user requires access again, a new account will have to be setup with all new permissions. – Renaming User Accounts: • You can rename any user account in Windows, including the Administrator and Guest default accounts, with User Manager. • Changing the name does not change an other properties of the account.
  • 6. Creating a Network Environment 3. Groups : – Planning Groups: • Organization functional units, such as marketing • Network programs, such as word processing, graphics and so on • Events, such as a company party • Network resources, such as laser printer • Location, such as Building 02 • Individual function, such as backup operator – Built-in Groups: • Account operators • Administrators • Backup Operators • Domain Admins • Domain Guests • Domain Users • Replicator • Server operators • Users
  • 7. Creating a Network Environment 3. Groups : – Creating Groups: • Select New Local Group from the User menus in the User Manager window. Than enter the group name, description and members in the New Local Group dialog box. Documenting the Network: Documenting your network has three primary purposes: – Clearly defines the network in your own mind – Records information so others can maintain the network – Tracks material for warranty and costing purposes Document needs to be broken into major sections: – Physical plant diagram, station locations, and cable test results – Network hardware and software, which should include the following: • Item descriptions and serial number • Location’ • Purchase date, vendor, and warranty information • Network name, number, or other logical value that could identify it on the network • Documentation (or location of the documentation) – Current network diagram/architecture/layout – Number of software licenses for each application and location of the license certificates – A history of network problems and their solutions.
  • 8. Protecting Your Network Environment 1. Security • How much security enough – What are you trying to prevent • Accessory to copyright violation • Accidental loss • Unauthorized disclosure • Malicious destruction of data • How important is your data • What is the risk of intrusion • What is the probability of accidental loss Creating a Security Plan • External requirements • Inherent Policy: There are two ways to implement network security: optimistically and pessimistically. – An optimistic policy optimizes the usability of the network by securing only those resources that are known to require unusual security. – A pessimistic policy optimizes security by restricting all resources and granting access only to those individuals who are known to need access in order to perform their work.
  • 9. Protecting Your Network Environment 2. Virus Protection 3. Uninterrupted Power Supply (UPS) 4. Disaster Recovery • In spite of all preparation, the network can still fail. You can reduce the cost of failure of devices on your network, such as hard disk, drive or other server components, by implementing a backup policy. You can make your system fault tolerant by replacing, striping, or mirroring your server data. • Backup policy – The Tape Drive – Amount of data you will need to backup – Speed of data drive – Capacity of the drive – Reliability of the drive – Cost of the drive – Cost of the media – Media interchangeability – Drivers and backup software for the operating system – Location of the Backup System • Replication • Fault-tolerance – Striping with Parity: Disk Striping with Parity or RAID level 5 – Mirroring : Disk Mirroring or RAID level 1 – Striping : Disk Striping or RAID level 0
  • 10. Managing Your Network Environment • Monitoring Network Performance – Performance Monitor • Performance Monitor shows how windows server is performing. It can present information about your system in charts, logs, and reports so you can view the information in several ways. – Network Monitor • The Network Monitor can show you information such as the current network utilization, frame per second, communicating stations on the network and their station address, and sources of broadcasts. – Automated Network Management • These packages can track key parameters of your network server and client operating systems, such as the amount of free disk space and the peak amount of traffic on your network • Hardware Upgrade Policy