Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
28 views6 pages

Unit 6 and 8 of Network and System Administration

The document discusses the importance of managing network services, which involves configuring, monitoring, and troubleshooting various services like DNS and DHCP to maintain a stable network infrastructure. It emphasizes the need for a proactive approach in network management, including automation of routine tasks and effective troubleshooting strategies. Additionally, it introduces analytical system administration, focusing on data analysis techniques to identify and address issues in computer systems and networks, while evaluating the effectiveness of these processes.

Uploaded by

Hani Taye
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
28 views6 pages

Unit 6 and 8 of Network and System Administration

The document discusses the importance of managing network services, which involves configuring, monitoring, and troubleshooting various services like DNS and DHCP to maintain a stable network infrastructure. It emphasizes the need for a proactive approach in network management, including automation of routine tasks and effective troubleshooting strategies. Additionally, it introduces analytical system administration, focusing on data analysis techniques to identify and address issues in computer systems and networks, while evaluating the effectiveness of these processes.

Uploaded by

Hani Taye
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 6

Unit 6: Network Services and Managing Network Services

In computer networking, a network service is an application running at the


network application layer and above, that provides data storage, manipulation, presentation,
communication or other capability which is often implemented using
a client–server or peer-to-peer architecture based on application layer network protocols.

Each service is usually provided by a server component running on one or more computers
(often a dedicated server computer offering multiple services) and accessed via a network by client
components running on other devices. However, the client and server components can both be run
on the same machine.
Section 1: Managing Network Services
Managing network services is a crucial aspect of maintaining a stable and secure network
infrastructure. It involves configuring, monitoring, and troubleshooting various network services
such as DNS, DHCP, email, file sharing, and web services [6].
1.1 Introduction to Managing Network Services:

To effectively manage network services, it is important to have a clear understanding of the


network architecture, service dependencies, and performance metrics. This can be achieved through
documentation and regular network audits.

Automating routine tasks such as software updates, backups, and security patches can also
help reduce downtime and improve network efficiency. Additionally, implementing access controls
and monitoring tools can help prevent unauthorized access and detect potential security threats.

Overall, effective management of network services requires a proactive approach that


prioritizes stability, security, and performance. By staying up-to-date with industry best practices
and leveraging the latest tools and technologies, network administrators can ensure that their
networks remain reliable and secure.
1.1.1 Maintenance Troubleshooting: Common System and Network Problems

Maintenance troubleshooting involves identifying and resolving common system and


network problems that may arise in a network. This includes issues such as slow network
performance, connectivity issues, hardware failures, software malfunctions, and security breaches.
Proper maintenance troubleshooting can help prevent these issues from occurring and ensure that
the network runs smoothly.
1.1.2 Developing General Strategies

Developing general strategies for managing network services involves creating a plan for how
to maintain and troubleshoot the network. This includes identifying potential issues, establishing
procedures for resolving them, and applying best practices for network maintenance.
1.1.3 Resolve Boot Problems, Backup and Restore Data and System Volume

Resolving boot problems, backing up and restoring data, and system volume are important
aspects of managing network services. These tasks involve ensuring that the system can boot
properly, backing up important data to prevent data loss, and restoring the system in case of a
failure.
1.1.4 How to use Event Viewer in Windows

The Event Viewer is a tool in Windows that displays detailed information about significant
events on your computer. Examples of these are programs that don't start as expected or
automatically downloaded updates. Event Viewer is especially useful for troubleshooting Windows
and application errors [7].

Event Viewer displays these types of events:


•​ Error: A significant problem, such as loss of data or loss of functionality. For example,
if a service fails to load during startup, an error will be logged.
•​ Warning: An event that is not necessarily significant, but may indicate a possible future
problem. For example, when disk space is low, a warning will be logged.
•​ Information: An event that describes the successful operation of an application, driver,
or service. For example, when a network driver loads successfully, an Information
event will be logged.
•​ Success Audit: An audited security access attempt that succeeds. For example, a user's
successful attempt to log on to the system will be logged as a Success Audit event.
•​ Failure Audit: An audited security access attempt that fails. For example, if a user tries
to access a network drive and fails, the attempt will be logged as a Failure Audit event.
•​ The Event Log service starts automatically when you start Windows. Application and
System logs can be viewed by all users, but Security logs are accessible only to
administrators.
How can the Event Viewer help in the troubleshooting process?

Event Viewer is a built-in Windows feature that uses event IDs to describe uniquely
identifiable events that your computer encounters. It displays a log of application and system
messages like errors and warnings. So, if a program has crashed, an operation has failed, or a Blue
Screen of Death (BSOD) occurs, the tool helps you identify the reason for it. There are countless
ways to view logs on a Windows computer. Let's have a look at them to ascertain the primary
causes of various issues in your PC or laptop:

Short answer Items: Give short explanation to the following questions in your own words.
1.​ What is File Service in Windows Server, and how does it help manage file sharing and storage?
2.​ What are Application Services in Windows Server, and how do they support SW applications?
3.​ Why is developing general strategies important in managing network services?
4.​ What are some tasks involved in resolving boot problems, backing up and restoring data, and
system volume?
5.​ How can Event Viewer be used to troubleshoot connectivity issues?

Unit 8: Analytical System Administration

Analytical system administration is a process that involves using data analysis techniques to
identify and address issues in computer systems and networks. It involves collecting and analyzing
data from various sources, such as system logs, network traffic, and user behavior, to gain insights
into system performance, security, and usability. This approach helps administrators proactively
identify and address potential issues before they can cause significant problems [12].
Section 1: Analytical system administration
In the ever-evolving world of information technology, effective system administration has
become a crucial element for any organization seeking to maximize their technological investments.
Among various levels of system administration, analytical system administration stands out due to
its emphasis on data analysis, optimization, and strategic decision making.
1.1 Science vs technology
Most of the research which is presently undertaken in system administration is of an applied
nature. In most cases, it involves the construction of a tool which solves a specific local problem, a
one-off solution to a general problem, i.e. a demonstration of possibility. A minority of authors has
attempted to collect the lessons learned from these pursuits and distill their essence into a general
technology of more permanent value. This is partly the nature of technological research. Science, on
the other hand, deals in abstraction. The aim of science is to regard the full horror of reality and
condense it into a few themes which capture its essence, without undue complication. We say that
scientific knowledge has increased if we are able to perform this extraction of the foundations in
some study and if that knowledge empowers with some increased understanding of the problem.
1.2 Studying complex systems
There are many issues to be studied in system administration. Some issues are of a technical
nature, while others are of a human nature. System administration confronts the human–machine
interaction as few other branches of computer science do.
Science proceeds as a dialogue between theory and experiment. We need theory to interpret
results of observations and we need observations to back up theory. Any conclusions must be a
consistent mixture of the two.
1.3 The purpose of observation
In technology the act of observation has two objective goals:
1.​ To gather information about a problem in order to motivate the design and construction of
a technology which solves it, and
2.​ To determine whether or not the resulting technology fulfills its design goals. If the latter
is not fulfilled in a technological context, the system may be described as faulty, whereas
in natural science there is no right or wrong.
The problem with technological disciplines is that what constitutes an evaluation of success
or failure is often far from clear. This is because both goals and assisting technologies can be
dominated by invested interests and dogged by the difficulty of constructing objective experiments
with clear metrics. System administration is an example where these problems are particularly acute.
Section 2: Evaluating the effectiveness and efficiency of analytical
system administration
Evaluating the effectiveness and efficiency of analytical system administration requires a
systematic approach that focuses on measurable outcomes and identifies potential challenges. By
being aware of these challenges and adopting effective evaluation methods, organizations can
successfully navigate the complexities of analytical system administration, ultimately driving
business growth through improved operational efficiencies and enhanced user experiences [13].
2.1 Evaluation Methods and Problems
The simplest and potentially most objective way to test a model of system administration is
to combine heuristic experience with repeatable simulations.
Experienced system administrators have the pulse of their system and can evaluate their
performance in a way that only humans can. Their knowledge can be used to define repeatable
benchmarks or criteria for different aspects of the problem. But even this approach is not without its
difficulties. Many of the administrators’ impressions would be very difficult to gauge numerically.
2.2 Evaluating a Hierarchical System
Evaluating a model of system administration is a little bit like evaluating the concept of a
bridge. Clearly a bridge is a structure with many components each of which contributes to the whole.
The bridge either fulfills its purpose in carrying traffic past obstacles or it does not.
There might be many different designs each with slightly different goals. Can one bridge be
deemed better than another on the basis of objective measurement? Perhaps only the bridge’s
maintainer is in a position to gain a feeling for which bridge is the most successful, but the success
criterion might be rather vague: a collection of small differences which make the perceptible
performance of the bridge optimal, but with no measurably significant data to support the conclusion.
2.3 Deterministic and Stochastic Behavior
Abstraction is one of the most valuable assets of the human mind: it enables us to build
simple models of complex phenomena, eliminating details which are only of peripheral or doubtful
importance. But abstraction is a double-edged sword: on the one hand, abstracting a problem can
show us how that problem is really the same as a lot of other problems which we know more about;
conversely, unless done with certain clarity, it can merely plant a covering over our senses, confusing
rather than assisting the truth. Our aim in this section is to think of computers as abstract dynamical
systems, such as those which are routinely analyses in physics and statistical analysis. Although this
will not be to every working system administrator’s taste, it is an important viewpoint in the pursuit
of system administration as a scientific discipline.
Short answer Items: Give short explanation to the following questions in your own words.
1.​ What are the best practices of system administrator for analytical system administrator?
2.​ What is the difference between deterministic and stochastic behavior in the context of
analytical system administration?
3.​ What is meant by a scientific approach to system administration?
4.​ What factors should be considered when evaluating the effectiveness and efficiency of
analytical system administration?
5.​ How do we measure the performance of an analytical system administration process?
6.​ Which tools or techniques can be used to evaluate the effectiveness and efficiency of
analytical system administration processes?
7.​ Discuss common challenges when implementing a hierarchical system in System Admin.
8.​ Describe the benefits of using a hierarchical system in System Administration.
9.​ Explain the main features of a hierarchical system in System Administration.
10.​What challenges might arise when attempting to evaluate the effectiveness and efficiency
of analytical system administration processes?

You might also like