CHAPTER1
CHAPTER1
& Networks
Glossary 15
Abbreviation 16
References 17
Objectives
Learn how to use and administer a network environment, plan network installation and
upgrades, and perform computer network monitoring, optimization, and maintenance.
The primary objectives typically include:
3
Paternité - Pas d'Utilisation Commerciale - Pas de Modification : http://creativecommons.org/licenses/by-nc-nd/2.0/fr/
Chapter 1: Introduction to System and Network Administration
Chapter 1: Introduction
to System and Network I
Administration
Network and system administration is a branch of engineering that is concerned with the operational
management of human–computer systems.
It is unusual as an engineering discipline in that it equally addresses the technology of computer systems and
its users.
The terms network administration and system administration exist separately and are used both variously and
inconsistently by industry and by academics.
- System administration is the term used traditionally by mainframe and Linux engineers to describe the
management of computers whether they are coupled by a network or not.
- Today, System Administration is the design, installation, configuration, operation, and support of these
servers to support the operational needs of an organization's information technology infrastructure.
Definition
- Generally, it is planning, installing, and maintaining computer systems involving servers and clients that
work together in a network environment using an operating system like Windows 2022 Server or Linux
platform.
- A system administrator, or sysadmin, is a person who is responsible for the upkeep, configuration, and
reliable operation of computer systems; especially multi‐user computers, such as servers.
3.
4
Network Administration
Definition
- Network administration means the management of network infrastructure devices (routers and
switches).
- A network administrator is an individual that is responsible for the maintenance of computer hardware
and software systems that make up a computer network, including the maintenance and monitoring of
active data network or converged infrastructure and related network equipment.
- The actual role of the network administrator will vary from place to place, but will commonly include
activities and tasks such as network address assignment, management and implementation of routing
[p.16] [p.16] [p.16]
protocols such as ISIS *
, OSPF *
, BGP *
of certain network servers: file servers, VPN gateways, intrusion detection systems, security, etc.
5
Windows Server
Network operating system refers to software that implements an operating system of some kind that is
oriented to computer networking. For example, one that runs on a server and enables the server to manage
data, users, groups, security, applications, and other networking functions. The network operating system is
designed to allow shared file and printer access among multiple computers in a network, typically a local area
network (LAN), a private network, or other networks.
Definition
Windows Server is a brand name for a group of server operating systems released by Microsoft. It includes all
Windows operating systems branded "Windows Server", but not any other Microsoft product. The first
Windows server edition to be released under that brand was Windows Server 2003. However, the first server
edition of Windows was Windows NT 3.1 Advanced Server, followed by Windows NT 3.5 Server, Windows
NT 4.0 Server, and Windows 2000 Server; the latter was the first server edition to include Active Directory,
DNS Server, DHCP Server, Group Policy, as well as many other popular features used today.
While this historical overview remains accurate, modern deployments typically use Windows Server 2019,
2022, or 2025 which offer enhanced security, hybrid cloud integration, and improved management tools
Example
Windows Server 2012 R2 is the sixth version of the Windows Server family of operating systems. It was
released on October 18, 2013. According to the Windows Server 2012 R2 datasheet published on May 31,
2013, there are four editions of this operating system: Foundation, Essentials, Standard, and Data center. Unlike
its predecessor, Windows Server 2012 can switch between "Server Core" and "Server with a GUI" installation
options without a full re-installation.
Advice
For current best practices, refer to later versions such as Windows Server 2019, 2022, or 2025, which include
additional features and security enhancements.
1.4.2. Solaris
Definition
Solaris is a Unix operating system originally developed by Sun Microsystems. It superseded their earlier SunOS
in 1993. Oracle Solaris, so named as of 2010, has been owned by Oracle Corporation since the Sun acquisition
by Oracle in January 2010.
Solaris remains in use in some legacy systems but is less common in modern new deployments compared to
Linux-based systems.
6
Mac OS X Server
Definition
- Linux Server is a high-powered variant of the Linux open-source operating system designed to handle the
more demanding needs of business applications such as network and system administration, database
management, and Web services.
- Linux servers are frequently selected over other server operating systems for their stability, security, and
flexibility advantages. Leading Linux server operating systems include CentOS, Debian, Ubuntu Server,
Slackware, and Gentoo.
Note
Note that CentOS Linux has transitioned to CentOS Stream; many enterprises now consider alternatives such
as Rocky Linux or AlmaLinux for a free, RHEL-compatible platform.
Definition
- Mac OS X Server, formerly Mac OS X Server and OS X Server, is a separately sold operating system add-
on which provides additional server programs and management and administration tools for macOS.
- Before version 10.7 (Lion), OS X Server was a separate but similar Unix [3] server operating system from
Apple Inc., architecturally identical to its desktop counterpart OS X.
Note
- With the release of version 10.7 (Lion), Mac OS X and Mac OS X Server were combined into one release
and re-branded as OS X.
- In recent years, macOS Server has seen a significant reduction in functionality, with many traditional
servers features now integrated into macOS or replaced by cloud-based solutions.
Effective network administration in modern organizations depends on a well-defined division of labor. In large
and complex environments, it is impractical for a single individual to cover all aspects of network
management. Consequently, role‐based classifications are widely adopted in both practice and academic
[p.17]
literature (Limoncelli et al., 2007; Nemeth et al., 2017)1 . Below, we describe several key roles along with
*
Definition:Responsibilities:
- Infrastructure Management: Design, configure, and maintain network devices (routers, switches,
firewalls) and connectivity (LAN, WAN, VPN).
7
System Administrator
- Monitoring & Troubleshooting: Proactively monitor network performance and quickly address
connectivity or performance issues using tools based on protocols such as SNMP.
- Configuration Management: Implement firmware upgrades, software patches, and changes to network
configurations to ensure stability and security.
Extra
[p.17]
(Limoncelli et al. 2007)1 emphasize that robust network administration is built on clear operational roles
*
that focus on both proactive monitoring and rapid remediation of network issues.
Definition:Responsibilities:
- Server & OS Management: Oversee installation, configuration, and maintenance of multi-user systems
and servers, including routine patch management and system backups.
- Resource Optimization: Ensure optimal performance by balancing computing resources and handling
user access across the enterprise.
- User Account Management: Manage user accounts, permissions, and policy enforcement across the
system.
Extra
[p.17]
(Nemeth et al. (2017)2 detail best practices in system administration that stress the importance of distinct
*
roles for maintaining server reliability and user support in a scalable IT environment.
Definition:Responsibilities:
- Threat Prevention & Response: Deploy and manage security solutions such as firewalls, intrusion
detection/prevention systems, and antivirus software to protect network assets.
- Policy Enforcement: Develop and enforce security policies and procedures to mitigate unauthorized
access and data breaches.
- Risk Management: Continuously assess the network for vulnerabilities and oversee incident response to
maintain system integrity.
Extra
[p.17] [p.15]
Sandhu et al. (1996)5 describe how access control models like RBAC
*
administration by structuring permissions around well-defined roles, an approach that underpins many modern
security practices.
Definition:Responsibilities:
- Database Maintenance: Install, configure, and maintain database systems that support networked
applications.
- Data Integrity & Security: Ensure data integrity through regular backups and security measures tailored
to protect sensitive information.
8
Web Administrator
- Performance Tuning: Optimize database performance through query analysis and system configuration
adjustments.
Extra
Research in database management highlights that separating database administration from other network tasks
[p.17]
improves both performance and security (Limoncelli et al., 2007).1 *
Definition:Responsibilities:
- Web Server Management: Configure and maintain web server environments (e.g., Apache, Nginx, IIS)
to ensure high availability and responsiveness.
- Application Deployment & Security: Oversee the deployment of web applications and implement
security measures (SSL/TLS, access controls) to protect web assets.
- Performance Monitoring: Monitor website performance and troubleshoot issues that impact user
experience.
Extra
[p.16] [p.16] [p.17]
Studies on web-based administration and RBAC
*
demonstrate the benefits of structured role assignment in maintaining secure and efficient web services.
Definition:Responsibilities:
- Real-Time Monitoring: Continuously monitor the network from a centralized operations center to detect
outages or performance degradation.
- Incident Response: Serve as the first line of defense by addressing network incidents and escalating
issues as needed.
- Reporting & Documentation: Maintain logs, analyze performance trends, and produce reports to
support proactive network management.
Reminder
The importance of real-time monitoring and structured incident management in network environments is well
[p.17]
documented in the literature on network and system administration (Limoncelli et al. 2007).1 *
Definition:Responsibilities:
- Design & Planning: Develop comprehensive network blueprints that balance scalability, performance,
and security.
- Strategic Infrastructure: Evaluate organizational requirements and design network architectures that
integrate emerging technologies (e.g., SDN, cloud networking).
- Project Leadership: Lead large-scale network deployment projects, coordinate with vendors, and guide
infrastructure upgrades.
9
Cloud Network Administrator / Virtualization Specialist
Extra
Academic research on network design underscores the value of specialized roles in planning robust network
[p.17]
architectures that meet long-term organizational goals (Nemeth et al., 2017).2 *
Definition:Responsibilities:
- Cloud Infrastructure Management: Deploy and manage virtual network resources on cloud platforms
[p.16]
(AWS, Azure, GCP ) and integrate them with on-premises systems.
*
Note
Recent academic work has addressed the challenges of cloud networking and virtualization, highlighting the
[p.17]
need for specialized roles to manage hybrid environments efficiently (Limoncelli et al., 2007).1 *
Definition:Responsibilities:
- Localized Management: In large, distributed networks, local administrators manage specific segments or
branches of the network while aligning with central policies.
- Rapid Troubleshooting: Address issues within their designated segments swiftly to minimize downtime.
- Policy Coordination: Work in coordination with central IT teams to ensure consistency in security
policies and configurations across the organization.
Note
The delegation of administrative tasks has been identified as a key strategy for scaling network management in
[p.17]
large enterprises (Nemeth et al., 2017).2 *
10
Diverse Role and Scope
- Network Troubleshooting & Maintenance: Handling day-to-day issues, performing regular system
checks, and ensuring that connectivity is seamless.
- Adaptability: Recognizing that responsibilities can vary greatly across organizations—even within the
same company, roles can differ significantly.
- Design and Deploy Networks: Plan and implement network infrastructure, including routers, switches,
and cabling, in a way that is both scalable and secure.
- Maintain Integration: Ensure that the network integrates smoothly with other IT components, reflecting
the notion of a “computer-human system” where technology supports broader organizational goals.
- Security First: Implement firewalls, intrusion detection systems, and routine security audits to guard
against breaches.
- Resilience and Recovery: Establish robust protocols for fault diagnosis and recovery—paralleling case
studies like the /dev/null bug—to minimize downtime and protect data integrity.
- Diverse Expertise: From hardware assembly and cabling to software troubleshooting and network
protocol management, a network administrator must juggle multiple skills simultaneously.
- Ongoing Professional Development: Given the dynamic nature of technology, staying updated with
emerging trends and new tools is a constant expectation. This mirrors the field's evolution from
informal practices to a more structured, professional discipline.
- System Design Principles: Emphasizing scalability, security, and simplicity (as highlighted by the
“Three Pillars of System Design”), network administrators must plan for future growth while
maintaining a streamlined, secure network environment.
- Documentation and Standards: Clear documentation of configurations, policies, and troubleshooting
procedures is vital. This practice ensures consistency and helps guide future network improvements.
11
IT Network Administration Decision-Making Levels
- Stewardship of the Digital Ecosystem: Network administrators are not only technical experts but also
custodians of an organization's digital communications. Their work ensures that information flows
efficiently and securely—safeguarding both organizational goals and user trust.
- Bridging Technology and Humanity: Their responsibilities underscore the importance of managing
complex computer-human systems, ensuring that technical decisions are aligned with broader societal
and ethical considerations.
Extra
In essence, the expectations of a Computer Network Administrator are to blend technical mastery with strategic
vision and ethical stewardship. They are tasked with building and maintaining a resilient, secure network
environment that not only meets today's operational demands but is also agile enough to adapt to future
challenges.
12
IT Network Administration Decision-Making Levels
In IT network administration, decision-making is organized into a hierarchical framework that aligns technical
actions with business objectives. This framework is divided into three distinct levels: strategic, tactical, and
operational. Together, these levels ensure that technical decisions support the overall goals of the organization
while maintaining clear communication between management and technical teams, and providing a
[p.15][p.15] [p.15] [p.15]
road * *
map *
for scalability *
Fundamental
At the strategic level, decisions are made with a long-term vision in mind. This level sets the overall goals and
policies for the network by focusing on:
- Long-Term Planning: Anticipating future needs such as cloud integration or the implementation of
[p.15]
SD-WAN . *
- Policy and Governance: Establishing security policies and disaster recovery plans that guide the
network's evolution.
- Business Alignment: Ensuring that network strategies directly support and enhance business goals.
Example
A practical example is the transition from an on-premises system to a hybrid cloud model, a change that reflects
both a forward-looking strategy and a commitment to scalability.
Fundamental
The tactical level translates the strategic vision into actionable plans. It involves decisions that include:
- Resource Allocation: Evaluating available technologies and budgeting appropriately to meet the
network's needs.
- Network Design: Implementing specific network topologies and configuration standards.
- Integration: Coordinating with system administrators to select and implement authentication methods
and other supporting technologies.
Example
For instance, deploying a secure remote access solution such as multifactor authentication illustrates how
tactical decisions are used to address immediate technical requirements while staying aligned with broader
strategic goals.
13
Integration with System Administration
Fundamental
At the operational level, the focus is on day-to-day management and maintenance. This includes:
- Real-Time Monitoring: Utilizing tools like SNMP, NetFlow, and SIEM systems to continuously track
network performance.
- Configuration Management: Performing routine updates and patch management to ensure the network
remains secure and efficient.
- Incident Response: Activating predefined protocols during outages or breaches, such as mitigating a
DDoS attack by limiting traffic and isolating affected segments.
Example
This level addresses the immediate challenges of network administration, ensuring that systems run smoothly
daily.
Method
Effective network administration requires integrating these decision-making levels with broader system
administration practices. This integration is achieved by:
Automation tools, such as Ansible or Terraform, support this integrated approach by promoting consistency and
efficiency, while ongoing learning keeps administrators updated with evolving protocols and frameworks.
This integrated approach ensures that technical decisions support the organization's objectives, enhancing
resilience, security, and scalability. It also establishes a clear pathway for continuous
14
Glossary
Glossary
Authentication
is the process of verifying the identity of a user, device, or system before granting access to resources. It
ensures that only authorized entities can access a network, application, or data.
RBAC (Role-Based Access Control) is a widely used access control mechanism for managing user
permissions to system resources. The core idea of RBAC is to assign permissions through roles rather than
directly assigning them to users. This approach simplifies permission management and enhances system
security and maintainability.
roadmap
roadmap: is a strategic plan that outlines the steps, tools, and milestones needed to manage, maintain, and
improve an organization's IT infrastructure. It helps sysadmins prioritize tasks, allocate resources, and ensure
systems are secure, efficient, and scalable.
Scalability
Scalability: refers to the ability of a system, network, or process to handle growth—whether it's an increase
in users, data, workload, or complexity—without compromising performance or reliability. In the context of
IT and system administration, scalability ensures that infrastructure can adapt to growing demands efficiently.
SD-WAN (Software-Defined Wide Area Network) is a technology that simplifies the management and
operation of a WAN by decoupling the networking hardware from its control mechanism. It uses software to
intelligently route traffic across the WAN, improving performance, reducing costs, and enhancing security.
15
Paternité - Pas d'Utilisation Commerciale - Pas de Modification : http://creativecommons.org/licenses/by-nc-nd/2.0/fr/
Abbreviations meaning
Abbreviation
BGP : Border Gateway Protocol
16
Paternité - Pas d'Utilisation Commerciale - Pas de Modification : http://creativecommons.org/licenses/by-nc-nd/2.0/fr/
References
References
1
Limoncelli, T. A., Hogan, C., & Chalup, S. R. (2007). The Practice of System and Network Administration.
Addison-Wesley Professional.
2
Nemeth, E., Snyder, G., Hein, T. R., Whaley, B., & Mackin, D. (2017). UNIX and Linux System Administration
Handbook (5th ed.). Prentice Hall.
4
Ferraiolo, D. F., Kuhn, D. R., & Sandhu, R. (2003). Role-Based Access Control: Policy Specification, Modeling,
and Analysis. IEEE Computer, 36(9), 40–47.
5
Sandhu, R., & Samarati, P. (1996). Authentication, access control, and audit. ACM Computing Surveys (CSUR),
28(1), 241-243.
17
Paternité - Pas d'Utilisation Commerciale - Pas de Modification : http://creativecommons.org/licenses/by-nc-nd/2.0/fr/