Data Communication and System Admin
Data Communication and System Admin
May 2024
Addis Ababa,
Ethiopia
Table of Contents
CHAPTER 1: INTRODUCTION ........................................................................................................................................... 4
DATA & INFORMATION................................................................................................................................................. 4
DATA COMMUNICATION .............................................................................................................................................. 4
COMPONENTS OF DATA COMMUNICATION ............................................................................................................ 4
DATA REPRESENTATION .............................................................................................................................................. 4
DATA FLOW ..................................................................................................................................................................... 4
COMPUTER NETWORK .................................................................................................................................................. 4
CATEGORIES OF NETWORK ......................................................................................................................................... 4
PROTOCOL ....................................................................................................................................................................... 4
STANDARDS IN NETWORKING ................................................................................................................................... 4
STANDARD ORGANIZATIONS IN FIELD OF NETWORKING .................................................................................. 4
CHAPTER TWO: DATA COMMUNICATION ................................................................................................................... 5
INTRODUCTION .............................................................................................................................................................. 5
DATA & SIGNALS ............................................................................................................................................................ 5
ANALOG SIGNAL ............................................................................................................................................................ 5
CHARACTERISTICS OF AN ANALOG SIGNAL .......................................................................................................... 5
DIGITAL SIGNAL ............................................................................................................................................................. 5
TYPES OF CHANNELS .................................................................................................................................................... 6
TRANSMISSION IMPAIRMENTS & TYPES ................................................................................................................. 6
TRANSMISSION MEDIA ................................................................................................................................................. 6
Network Cables - Types ...................................................................................................................................................... 7
NETWORK TOPOLOGY .................................................................................................................................................. 7
COMPONENTS OF THE NETWORK/NETWORK DEVICES ....................................................................................... 7
TYPES OF ERRORS .......................................................................................................................................................... 8
SIGNAL ENCODING ........................................................................................................................................................ 8
CHAPTER 3: NETWORK MODELS .................................................................................................................................... 8
CONCEPT OF LAYERED TASK ..................................................................................................................................... 9
INTRODUCTION TO OSI MODEL & ITS LAYERS ...................................................................................................... 9
DESCRIPTION OF LAYERS IN THE OSI MODEL........................................................................................................ 9
TCP/IP MODEL, ADDRESSING IN TCP/IP – IPV4...................................................................................................... 10
FUNCTIONS OF THE LAYERS OF TCP/IP MODEL................................................................................................... 10
IP ADDRESSING ............................................................................................................................................................. 11
ROUTING AND ROUTING PROTOCOLS .................................................................................................................... 11
CHAPTER FOUR: SWITCHING AND MULTIPLEXING ................................................................................................ 12
SWITCHING .................................................................................................................................................................... 12
MULTIPLEXING ............................................................................................................................................................. 12
MEDIUM ACCESS CONTROL ...................................................................................................................................... 12
2|Page
MODULE II: SYSTEM AND NETWORK ADMINISTRATION ................................................................................ 12
CHAPTER 1: INTRODUCTION AND BACKGROUND .................................................................................................. 12
Computer Systems and Network overview ....................................................................................................................... 12
Philosophy of System Administration............................................................................................................................... 16
Scope of Network administration...................................................................................................................................... 16
The goal of Network administration ................................................................................................................................. 17
The challenges of system administration .......................................................................................................................... 17
The Meta principles of system administration .................................................................................................................. 17
CHAPTER 2: WINDOWS NETWORK CONCEPTS ......................................................................................................... 18
Windows workgroup ......................................................................................................................................................... 18
Windows Workgroups vs Homegroups and Domains ...................................................................................................... 18
Domain Controller ........................................................................................................................................................ 18
Microsoft HomeGroup ............................................................................................................................................... 18
Domain Controllers ....................................................................................................................................................... 19
System requirements for a Domain Controller ................................................................................................................. 19
Storage controller and disk space requirements ............................................................................................................ 20
Network adapter requirements ...................................................................................................................................... 20
LDAP & Windows Active Directory ................................................................................................................................ 20
Protocol overview ............................................................................................................................................................. 20
Windows Active Directory ................................................................................................................................................... 20
Active Directory Services ................................................................................................................................................. 20
AD Logical Structure ........................................................................................................................................................ 21
AD Physical Structure....................................................................................................................................................... 21
AD Implementation........................................................................................................................................................... 21
CHAPTER THREE: USER ADMINISTRATIONCONCEPTS & MECHANISMS ........................................................... 22
Users and capabilities........................................................................................................................................................ 22
What is File & Folder Permissions?.................................................................................................................................. 23
Assigning a Roaming Profile to a User ............................................................................................................................. 24
Advanced Concepts I ........................................................................................................................................................ 25
The Registry ...................................................................................................................................................................... 25
Registry Structure ............................................................................................................................................................. 25
Advanced Concepts II ....................................................................................................................................................... 26
Review Questions ................................................................................................................................................................. 27
CHAPTER 4: RESOURCE MONITORING &MANAGEMENT ....................................................................................... 27
Resource Monitoring & Management ............................................................................................................................... 27
System Performance Monitoring ...................................................................................................................................... 27
Remote Administration ..................................................................................................................................................... 31
Common Tasks/Services for which Remote Administration is used ................................................................................ 32
Performance ...................................................................................................................................................................... 32
Redundant Array of Inexpensive (or Independent) Disks (RAID) ............................................................................... 32
Review Questions ................................................................................................................................................................. 33
CHAPTER 5: SECURITY .................................................................................................................................................... 33
Introduction ....................................................................................................................................................................... 33
Linux Distribution ............................................................................................................................................................. 33
Unix/Linux Architecture ................................................................................................................................................... 34
Properties of Linux............................................................................................................................................................ 34
Linux Directory Structure ................................................................................................................................................. 34
3|Page
Linux Systems and Network Concepts ............................................................................................................................. 35
Network Configuration and Information........................................................................................................................... 35
Configuration of network interfaces ............................................................................................................................. 35
Network configuration files .......................................................................................................................................... 35
Network configuration commands ................................................................................................................................ 35
Review Questions ................................................................................................................................................................. 36
4|Page
COMPUTER NETWORK
CHAPTER 1: INTRODUCTION A collection of an autonomous computing devices connected
by a transmission medium. Can be measured by
DATA & INFORMATION Reliability
Security
Data refers to the raw facts that are collected while
Performance
information refers to processed data that enables us to
take decisions.
CATEGORIES OF NETWORK
Networks are categorized on the basis of their size, medium
DATA COMMUNICATION and transmission technology, Architecture …
Data Communication is a process of exchanging data or Based on size:
information LAN
1. Characteristics of Data Communications:- The MAN
effectiveness of any data communications system depends WAN
upon the following four fundamental characteristics: Based on Medium,
Delivery: The data should be delivered to the correct Wired vs Wireless
destination and correct user. Based on Architecture
Accuracy: The communication system should deliver the Clinet Server vs Peer to Peer
data accurately, without introducing any errors. Based on Transmission technology
Timeliness: Audio and Video data has to be delivered in a
Packet-switched vs Circuit switched networks
timely manner without any delay; such a data delivery is
called real time transmission of data. Based on Administration
Jitter: It is the variation in the packet arrival time. Private vs Public
5|Page
International Organization for Standardization(ISO)
6|Page
International Telecommunications Union – CHARACTERISTICS OF AN
Telecommunications Standard (ITU-T) American
National Standards Institute (ANSI) ANALOG SIGNAL
Institute of Electrical & Electronics Engineers (IEEE) Peak Amplitude
Electronic Industries Associates (EIA) The amplitude of a signal is the absolute value of its
Examples of intensity at time t
ATM Forum The peak amplitude of a signal is the absolute value of the
MPLS Forum highest intensity.
Frame Relay Forum The amplitude of a signal is proportional to the energy
Examples of Regulatory Agencies: carried by the signal
Federal Communications Committee (FCC) Frequency
2. Review question Frequency refers to the number of cycles completed by the
wave in one second.
Period refers to the time taken by the wave to complete
CHAPTER TWO: DATA one second.
COMMUNICATION Phase
Phase describes the position of the waveform with respect
to time (specifically relative to time O).Phase indicates the
INTRODUCTION forward or backward shift of the waveform from the axis
Computer networks are designed to transfer data from It is measured in degrees or radian
one point to another. During transit data is in the form The figure above shows the sine waves with same
of electromagnetic signals. amplitude and frequency but different phases
Relation between Frequency & Period
DATA & SIGNALS Frequency & Period are inverse of each other.
It is indicated by the following formula:
To be transmitted, data must be transformed to
electromagnetic signals.
Data can be Analog or Digital.
Analog data refers to information that is continuous; ex.
sounds made by a human voice
Wavelength
Digital data refers to information that has discrete states.
The wavelength of a signal refers to the relationship
Digital data take on discrete values. For example, data are
between frequency (or period) and propagation speed of
stored in computer memory in the form of 0s and 1s
the wave through a medium.
Signals can be of two types: The wavelength is the distance a signal travels in one
period.
Analog Signal: They have infinite values in a range.
It is given by
Digital Signal: They have limited number of defined
values Wavelength = Propagation Speed X Period
Periodic & Non Periodic Signals OR
Signals which repeat itself after a fixed time period are Wavelength =Propagation Speed X 1/Frequency
called Periodic Signals. It is represented by the symbol: λ (pronounced as lamda)
Signals which do not repeat itself after a fixed time It is measured in micrometers
period are called Non-Periodic Signals. It varies from one medium to another.
In data communications, we commonly use periodic Composite Signal
analog signals and non-periodic digital signals. A composite signal is a combination of two or more simple
sine waves with different frequency, phase and amplitude.
ANALOG SIGNAL
An analog signal has infinitely many levels of intensity over a DIGITAL SIGNAL
period of time.
A simple analog signal is a sine wave that cannot be further Digital Signal: Information can also be explained in the form
decomposed into simpler signals. of a digital signal. A digital signal can be explained with the
A sine wave is characterized by three parameters: help of following points:
Peak Amplitude A digital is a signal that has discrete values.
Frequency The signal will have value that is not continuous.
Phase
LEVEL
7|Page
Information in a digital signal can be represented
in theform of voltage levels.
8|Page
transmitted has frequency 10Hz.
BIT LENGTH or Bit Interval (Tb)
It is the time required to send one bit.
It is measured in seconds.
BIT RATE
It is the number of bits transmitted in one second.
It is expressed as bits per second (bps).
Relation between bit rate and bit interval can be as follows
Bit rate = 1 / Bit interval
Baud Rate
It is the rate of Signal Speed, i.e the rate at which the signal
changes.
A digital signal with two levels 0‗& 1‗will have the same
baud rate and bit rate & bit rate.
TYPES OF CHANNELS
From the point of view of transmission, there are two types of
channels:
Low pass Channel
This channel has the lowest frequency as 0 and highest
frequency as some non-zero frequency f1.
This channel can pass all the frequencies in the range 0 to
f1.
Band pass channel
This channel has the lowest frequency as some non-zero
frequency f1 and highest frequency as some non-zero
frequency f2.
This channel can pass all the frequencies in the range f1 to
f2.
Transmission of Digital signal: Digital signal can be
transmitted in the following two ways:
Baseband Transmission: The signal is transmitted
without making any change to it (i.e. Without modulation)
o In baseband transmission, the bandwidth of the signal
to be transmitted has to be less than the bandwidth of
the channel.
o Ex. Consider a Baseband channel with lower frequency
0Hz and higher frequency 100Hz, hence its bandwidth
is 100 (Bandwidth is calculated by getting the
difference between the highest and lowest frequency)
o A channel whose bandwidth is more than the bandwidth
of the signal is called Wideband channel
o A channel whose bandwidth is less than the bandwidth
of the signal is called Narrowband channel
Broadband Transmission: Given a bandpass
channel, a digital signal cannot be transmitted directly
through it
o In broadband transmission we use modulation, i.e. we
change the signal to analog signal before transmitting
it.
o The digital signal is first converted to an analog signal;
since we have a bandpass channel we cannot directly
send this signal through the available channel. Ex.
Consider the bandpass channel with lower frequency
50Hz and higher frequency 80Hz, and the signal to be
9|Page
o To pass the analog signal through the bandpass Radio waves
channel, the signal is modulated using a carrier Micro waves
frequency. Ex. The analog signal (10Hz) is Infrared.
modulated by a carrier frequency of 50Hz Wireless signals can be travel or propagated in the
resulting in a signal of frequency 60Hz which can following three ways:
pass through our bandpass channel.
o The signal is demodulated and again converted
into andigital signal at the other end.
TRANSMISSION
IMPAIRMENTS &TYPES
Data is transmitted through transmission medium
which arenot perfect. These imperfection causes signal
impairment. Due to the imperfection error is
introduced in thetransmitted data i.e. the original
signal at the beginning of
the transmission is not the same as the signal at the
receiver.There are three causes of impairment:
Attenuation
Distortion
Noise
Attenuation
Attenuation results in loss of energy due to distance.
When a signal travels through a medium, it loses some
of its energy in overcoming the resistance of the
medium. The electrical energy in the signal may
convert to heat. To compensate for this loss,
amplifiers are used to amplify the signal.
Distortion
Distortion changes the shape of the signal.
Noise
Noise is any unwanted signal that is mixed or
combined with the original signal during transmission.
Due to noise the original signal is altered and signal
received is not sameas the one sent.
TRANSMISSION MEDIA
Transmission media is a means by which a
communicationsignal is carried from one system to
another
A transmission medium can be defined as anything that
cancarry information from a source to a destination. The
transmission medium is usually free space, metallic
cable orfiber optic cable. Guided and Unguided
(WIRELESS) Guided Transmission Media uses a
cabling system that guidesthe data signals along a specific
path. Out of these twisted-pair cable, coaxial cable
transport signals in the form of electricsignals and
fiber-optic cable transport signals in the form oflight.
Unguided Transmission Media transport data without
using a physical conductor. It uses wireless
electromagnetic signals to send data. Three types of
unguided media:
10 | P a g e
Repeater: A repeater is a device that operates only in the physical
Ground-wave propagation
layer. A repeater receives a signal and, before it
Sky-wave propagation
Line-of-sight propagation
Radio waves: Electromagnetic wave ranging in frequencies
between 3 KHz and 1GHz are normally called radio waves.
Radio waves are Omni-directional when an antenna transmits
radio waves they are propagated in all directions.
Microwaves: Electromagnetic waves having frequencies
between 1 and 300 GHz are called microwaves.
Microwaves are unidirectional; when an antenna transmits
microwaves they can be narrowly focused. Microwaves
propagation is line-of-sight.
Infrared: Infrared signals with frequencies ranges from 300
GHz to 400 GHz can be used for short range communication.
Infrared signals, having high frequencies, cannot penetrate
walls.
NETWORK TOPOLOGY
A network topology is a description of the layout of the region
or area covered by that network.
There are two types of connections. They are: point-to-point
and multi-point.
Point-to-point connections provide a direct link between two
devices.
Multi-point connections provide a link between three or more
devices on a network.
There are seven basic topologies in the study of network
topology:
Point-to-point topology,
Bus (point-to-multipoint) topology,
Ring topology,
Star topology,
Hybrid topology,
Mesh topology and,
Tree topology.
COMPONENTS OF THE
NETWORK/NETWORK DEVICES
11 | P a g e
becomes too weak or corrupted, regenerates the original (ISP).
bit pattern. A repeater can extend the physical length of a
LAN. BRIDGE: Connects two LANS having the same protocol –
A repeater does not actually connect two LANs; it connects (e.g. Ethernet or Token ring).
two segments of the same LAN. The segments connected
are still part of one single LAN. A repeater is not a device
that can connect two LANs of different protocols.
HUB: Passive Hubs
A passive hub is just a connector. It connects the wires
coming from different branches. In a star topology
Ethernet LAN, a passive hub is just a point where the
signals comingfrom different stations collide; the hub is
the collision point.This type of a hub is part of the
media; its location in the Internet model is below the
physical layer.
Active Hubs
An active hub is actually a multipart repeater. It is
normally used to create connections between stations in
a physical startopology.
HUB: Hubs are commonly used to connect segments
(devices)of a LAN. Hubs don‘t filter information; instead
broadcast incoming packets to all computers connected to
it. A hub contains multiple ports which support 8, 12 or
24 RJ-45 ports. Two types: Passive hub and Active hub. It
is used in star or ring topology.
SWITCH: A switch filters and forwards data packets
across anetwork.
Unlike a hub which simply replicates what it receives on
oneport onto all the other ports, a switch keeps a record
of the MAC addresses of the devices attached to it.
When the switch receives a data packet, it forwards the
packetdirectly to the recipient device by looking up the
MAC address.
Switch is intelligent and expensive than Hub
Switch is a point to point communication device
Hub is a broadcasting device
TYPES OF ERRORS
If the signal comprises of binary data there can be two types of
Analog data to analog signal conversion
Modulation: The Process of converting analog data to analog
errors which are possible during the transmission:
signal is called Modulation. Modulation is used to send an
Single bit errors: In single-bit error, a bit value of 0
information bearing signal over long distances.
changes to bit value 1 or vice versa. Single bit errors
Types of Modulation: Signal modulation can be divided into
are more likely to occur in parallel transmission.
two broad categories:
Burst Errors: In Burst error, multiple bits of the
Analog modulation and Digital modulation.
binary value changes. Burst error can change any two
Analog or digital refers to how the data is modulated
or more bits in a transmission. Burst errors are more
onto a sine wave. If analog audio data is modulated
likely to occur in serial transmission.
onto a carrier sine wave, then this is referred to as
Redundancy
analog modulation.
In order to detect and correct the errors in the data
Digital modulation is used to convert digital data to
communication we add some extra bits to the original data.
analog signal. Ex ASK, FSK, PSK.
These extra bits are nothing but the redundant bits which will
Analog Modulation can be accomplished in three ways:
be removed by the receiver after receiving the data.
Amplitude modulation (AM)
There are different techniques used for transmission error
Frequency modulation (FM)
detection and correction.
Phase modulation (PM).
Detection methods:
Parity Check
Digital Modulation Types (Digital to Analog signal
Cyclic Redundancy Check
conversion)
Checksum
Digital modulation is used to convert digital data to analog
signal. It can be accomplished in the following ways:
SIGNAL ENCODING Amplitude Shift Keying(ASK)
Data can be analog or digital, so can be the signal that represents Frequency Shift keying (FSK)
it. Signal encoding is the conversion from analog/digital data to Phase Shift keying (PSK)
analog / digital signal. Analog to Digital Conversion using modulation
Digital Data to Digital Signal conversion The definition of the term modulation is described in the next
Coding methods are used to convert digital data into digital section. Here we have modulation techniques:
signals. There are two types of coding methods: Pulse Amplitude Modulation (PAM)
Line Coding Pulse Code Modulation (PCM)
Block Coding Pulse Width Modulation (PWM)
Scrambling is also one of the ways to convert digital data to
digital signals but is not used.
Line Coding: It is the process of converting Digital data into CHAPTER 3: NETWORK
digital signal.
MODELS
Classification of Line Codes Computer networks are operated by network models; most
prominently the OSI reference model and the TCP/ IP Model.
13 | P a g e
link.
CONCEPT OF LAYERED TASK
The main objective of a computer network is to be able to
transfer the data from sender to receiver. This task can be done
by breaking it into small sub tasks, each of which is well
defined.
Each subtask will have its own process or processes to do. It is
called Layers. Every task or job can be done by dividing it into
sub task or layers.
15 | P a g e
At the sending side, the transport layer receives data 2. Internet Layer
from the session layer, divides it into units called 3. Transport Layer
segments and sends it to the network layer.
To ensure process to process delivery the transport
layer makes use of port address to identify the data
from the sending and receiving process.
The data can be transported in a connection oriented
or connectionless manner.
The Transport layer is responsible for segmentation
and reassembly of the message into segments which
bear sequence numbers.
The transport layer also carries out flow control and
error control functions; but unlike data link layer
these are end to end rather than node to node.
The main responsibility of the transport layer is
process to process delivery of the entire message
Session Layer
The session layer establishes a session between the
communicating devices called dialog and
synchronizes their interaction. It is the responsibility
of the session layer to establish and synchronize the
dialogs. It is also called the network dialog
controller.
The session layer at the sending side accepts data
from the presentation layer adds checkpoints to it
called sync bits and passes the data to the transport
layer. At the receiving end the session layer receives
data from the transport layer removes the checkpoints
inserted previously and passes the data to the
presentation layer. So, the main responsibility of
session layer is dialog control and synchronization.
Presentation Layer
The communicating devices may be having different
platforms. The presentation layer performs translation,
encryption and compression of data.
The presentation layer receives the data from the
application layer adds header which contains
information related to encryption and compression and
sends it to the session layer.
So, the main responsibility of the Presentation layer is
translation, compression and encryption.
Application Layer
The application layer enables the user to communicate
its data to the receiver by providing certain services.
The main Responsibility of Application layer is to
provide the user access to network resources.
IP ADDRESSING
Packets in the IPv4 format are called datagram. An IP datagram
consists of a header part and a text part (payload).
IP addresses
Address Space
Notations used to express IP address
Classful Addressing
Subnetting
CIDR
NAT
IPv4 Header Format
18 | P a g e
Address Space: An address space is the total There are wo kinds of routing algorithms (routing
number ofaddresses used by the protocol. tables): nonadaptive (static) and adaptive (dynamic)
If a protocol uses N bits to define an address, And two kinds of protocols
the address space is 2N because each bit can o Interior routing protocols
have twodifferent values (0 or 1) and N bits o Exterior routing protocols
can have 2N values.
IPv4 uses 32-bit addresses, which means that
the address space is 232 or 4,294,967,296
(more than 4billion).
Notations: There are two notations to show an IPv4 address:
Binary notation: The IPv4 address is displayed
as 32bits. ex. 11000001 10000011 00011011
11111111
Dotted decimal notation: To make the IPv4
address easier to read, Internet addresses are
usually written in decimal form with a decimal
point (dot) separatingthe bytes. Each byte (octet)
is 8 bits hence each number in dotted-decimal
notation is a value ranging from 0 to 255. Ex.
129.11.11.239
Classful addressing : In classful addressing, the
addressspace is divided into five classes: A, B, C,
D, and E.
Netid and Hostid In classful addressing, an IP
addressin class A, B, or C is divided into netid
and hostid.
Subnetting: It allows a network to be split into several
parts for internal use but still act like a single network to
the outside world.
To implement subnetting, the router needs a
subnet mask that indicates the split between
network + subnet number and host. Ex.
255.255.252.0/22. A‖/22‖ to indicate that the
subnet mask is 22 bits long.
CIDR: A class B address is far too large for most
organizations and a class C network, with 256 addresses is
too small. This leads to granting Class B address to
organizations who do not require all. This is resulting in
depletion of Address space. A solution is CIDR (Classless
InterDomain Routing) The basic idea behind CIDR, is to
allocate the remaining IP addresses in variable-sized
blocks, without regard to the classes.
NAT (Network Address Translation): The scarcity of
network addresses in IPv4 led to the development of IPv6.
Due to this, we need to use private IP address inside the
organization and translate it to public IP address using
NAT.
IP Header: IPV4 has 32 bit header information such as
Version, IHL, total length, types of services ……
MULTIPLEXING
Whenever the bandwidth of a medium linking two devices is
greater than the bandwidth needs of the devices, the link can be
shared. Multiplexing is the set of techniques that allows the
simultaneous transmission of multiple signals across a single
data link.
Frequency division Multiplexing: Frequency-division
multiplexing (FDM) is an analog technique that can be applied
when the bandwidth of a link (in hertz) is greater than the
combined bandwidths of the signals to be transmitted.
In FDM, signals generated by each sending device modulate
different carrier frequencies.
Wavelength-division multiplexing (WDM): is designed to
use the high-data-rate capability of fiber-optic cable. The
optical fiber data rate is higher than the data rate of metallic
transmission cable. Using a fiber-optic cable for one single
20 | P a g e
Time division multiplexing: different ongoing main classes namely – system software and application
connections can use same switching path but at different software.
interleaved time intervals.). Each connection occupies a
portion of time in the link. Network Overview
a file,
a folder,
a printer,
a disk drive, or just about anything else that
exists on a computer.
Therefore, a computer network is simply a collection
of computers or other hardware devices that are
connected together, either physically or logically,
using special hardware and software, to allow them to
exchange information and cooperate. Networking is
the term that describes the processes involved in
designing, implementing, upgrading, managing and
otherwise working with networks and network
technologies.
23 | P a g e
network. It has several benefits, such as: dedicated Overview of the TCP/IP Protocol suites
links between devices, robust (single link failure
don‘t affect entire network), privacy/security (direct
communication between communicating devices),
and ease of fault identification and isolation. Its
drawbacks include, installation and reconnection are
difficult (large number of cables), huge amount of
cables consumes a lot of space, and it is the most
expensive of all.
Network Protocols
Protocol is a set of rules or standards that control data
transmission and other interactions between
networks, computers, peripheral devices, and
operating systems.
24 | P a g e
The TCP/IP protocol suite was developed prior
to the OSI model. Therefore, the layers in the
TCP/IP protocol suite do not exactly match
those in the OSI model. The original TCP/IP
protocol suite was defined as having four layers:
host-to-network, Internet, transport, and
application layers. However, when TCP/IP is
compared to OSI, we can say that the host-to-
network layer is equivalent to the combination
of the physical and data link layers. The Internet
layer is equivalent to the network layer, and the
application layer is roughly doing the job of the
session, presentation, and application layers with
the transport layer in TCP/IP taking care of part
of the duties of the session layer.
25 | P a g e
the Network Access layer for delivery within the which is transported separately. Datagrams can travel along
physical network. The destination can be another different routes and can arrive out of sequence or be
host in the network, itself, or a router for further
forwarding. So the Internet layer has a view of the
entire Internetwork whereas the Network Access
layer is limited to the physical layer boundary that
is often defined by a layer 3 device such as a
router.
26 | P a g e
duplicated. IP does not keep track of the routes and delivery of a message from a process (running program)
has no facility for reordering datagrams once they to another process. A new transport layer protocol,
arrive at theirdestination. SCTP, has been devised to meet the needs of some
newer applications.
Internet Control Message Protocol (ICMP): The Transport Layer Protocol
works at the Network layer and is used by IP for Transmission Control Protocol (TCP
many different services. ICMP is a management User Datagram Protocol (UDP)
protocol and messaging service provider for IP. The Stream Control Transmission Protocol(SCTP)
following are some common events and messages The Port Numbers
that ICMP relates to:
Transport Layer
Traditionally the transport layer was represented in
TCP/IP by two protocols: TCP and UDP. IP is a
host-to- host protocol, meaning that it can deliver a
packet from one physical device to another. UDP
and TCP are transport level protocols responsible for
27 | P a g e
TCP and UDP must use port numbers to communicate them running in spite of the activities of users who tend to
with the upper layers, because they‘re what keep track of cause the systems to fail.
different conversations crossing the network
simultaneously. These port numbers identify the source
and destination application or process in the TCP
segment. There are 216 = 65,536 ports available.
TCP UDP
Ports Ports
Protocol TCP Port Protocol TCP Port
Number Number
Telnet 23 SNMP 161
SMTP 25 TFTP 69
HTTP 80 DNS 53
FTP 21 POP3 110
DNS 53 DHCP 68
HTTPS 443 NTP 123
SSH 22 RPC 530
Principle 2 (Predictability)
The highest level aim in system
administration is to work towards a
predictable system. Predictability has limits.
It is the basis of reliability, hence trust and
therefore security.
CHAPTER 2: WINDOWS
NETWORK CONCEPTS
In computer networking a workgroup is a collection of
computers on a LAN that share common resources and
responsibilities. Workgroup is Microsoft‘s term for a
peer-to-peer L. Windows WORKGROUPs can be found
in homes, schools and small businesses. Computers
running Windows OSs in the same work group may share
files, printers, or Internet connection. Workgroup
contrasts with domain, in which computers rely on
centralized authentication.
Windows workgroup
A Windows workgroup is a group of standalone
computers in a peer-to-peer network. Each computer in
the workgroup uses its own local accounts database to
authenticate resource access. The computers in a
workgroup also do not have a common authentication
process. The default-networking environment for a clean
windows load is workgroup
32 | P a g e
user must know the name of the workgroup that particularly homeowners. Instead of requiring an
computer belongs to plus the username and password administrator to manually set up shared user accounts on
of an accounton the remote computer. every PC, HomeGroup security settings can be managed
through one shared login.
The main disadvantages of workgroups are:
Microsoft HomeGroup
Microsoft introduced the Homegroup concepts in
windows 7. Homegroups are designed to simplify
the management of workgroups for administrators,
33 | P a g e
Joining a Homegroup does not remove a PC from its
Windows WORKGROUP, the two sharing methods co-
exist. Computers running versions of Windows operating
systems older than Windows 7 (like XP and vista),
however cannot be members of HomeGroups.
Domain Controllers
A domain controller (DC) is a server computer that
responds to security authentication requests within a
computer network domain. It is a network server that is
responsible for allowing end devices to access shared
domain resources. It authenticates users, stores user
account information and enforces security policy for a
Figure. Domain Controller
domain. It is most commonly implemented in Microsoft
Windows Server can be one of three kinds: Active
Windows environments (see below about Windows
Directory ―domain controllers‖ (ones that provide identity
Domain), where it is the centerpiece of the Windows
and authentication), Active Directory ―member servers‖
Active Directory service. However, non-Windows
(ones that provide complementary services such as file
domain controllers can be established via identity
repositories and schema) and Windows Workgroup
management software such as Samba (see the last
―stand-alone servers‖. The term ―Active Directory
paragraph of section 2.1).
Server‖ is sometimes used by Microsoft as synonymous
to ―Domain Controller‖ but the term is discouraged.
Domain controllers are typically deployed as a cluster to
ensure high-availability and maximize reliability. In a
Windows environment, one domain controller serves as
the Primary Domain Controller (PDC) and all other System requirements for a Domain
servers promoted to domain controller status in the Controller
domain server as a Backup Domain Controller (BDC). In This section outlines the minimum hardware
Unix-based environments, one machine serves as the requirements to run the latest Windows Server available
master domain controller and others serve as replica as this resource is prepared (i.e. Windows Server 2022).
domain controllers, periodically replicating database If your computer has less than the minimum
information from the main domain controller and storing requirements, you will not be able to install the server
it in a read-only format. correctly. Actual requirements will vary based on your
system configuration and the applications and features
On Microsoft Servers, a domain controller (DC) is a you install.
server computer that responds to security authentication
requests (logging in, etc.) within a Windows domain. A
Processor
Windows domain is a form of a computer network in
which all user accounts, computers, printers and other
Processor performance depends not only on the clock
security principals, are registered with a central database
frequency of the processor, but also on the number of
located on one or more clusters of central computers
processor cores and the size of the processor cache. The
known as domain controllers. A domain is a concept
following are the minimum processor requirements for
introduced in Windows NT whereby a user may be
the product:
granted access to a number of computer resources with
the use of a single username and password combination.
You must setup at least one Domain Controller in every 1.4 GHz 64-bit processor
Windows domain..
RAM
34 | P a g e
Experience installation option)
35 | P a g e
Storage controller and disk space requirements Add a new entry
Computers that run Windows Server must include a Delete an entry
storage adapter that is compliant with the PCI Express
architecture specification. Persistent storage devices on
servers classified as hard disk drives must not be PATA.
Windows Server does not allow ATA/PATA/IDE/EIDE
for boot, page, or data drives. The
estimated minimum disk space requirements for the
system partition is 32 GB
Protocol overview
A client starts an LDAP session by connecting to an
LDAP server, called a Directory System Agent (DSA), by
default on TCP and UDP port 389, or on port 636 for
LDAPS (LDAP over TLS/SSL, see below). The client
then sends an operation request to the server, and a server
sends responses in return. With some exceptions, the
client does not need to wait for a response before sending
the next request, and the server may send the responses in
any order. All information is transmitted using Basic
Encoding Rules (BER).
AD Physical Structure
Sites are physical (rather than logical) groupings
definedby one or more IP subnets. AD also holds the
definitions of connections, distinguishing low-speed
(e.g., WAN, VPN) from high-speed (e.g., LAN)
links. Site definitions are independent of the domain
and OU structure and are common across the forest.
Sites are used to control network traffic generated by
replication and also to refer clients to the nearest
domain controllers (DCs).
Replication
AD Implementation
In general, a network utilizing Active Directory has
39 | P a g e
are also ideally single-purpose for directory operations Forest trust: Applies to the entire forest. Transitive, one- or
only, and should not run any other software or role. two-way.
AD Trusting
To allow users in one domain to access resources in
another, Active Directory uses trusts. Trusts inside a
forest are automatically created when domains are
created. The forest sets the default boundaries of trust, and
implicit, transitive trust is automatic for all domains
within a forest.
Terminology
AD Management solutions
Microsoft Active Directory management tools include:
42 | P a g e
The most efficient way to assign user rights is to make the
What is File & Folder Permissions? user a member of a group that already has the right. In
some cases, however, you might want a user to have a
Permissions are a method for assigning access rights particular right but not have all the other rights of the
to specific user accounts and user groups. Through group. One way to resolve this problem is to give the user
the use of permissions, Windows defines which user
accounts and user groups can access which files and
folders, and what they can do with them. To put it
simply, permissions are the operating system‘s way
of telling you what you can or cannot do with a file
or folder.
43 | P a g e
the rights directly. Another way to resolve this is to create The Windows Registry is similarly divided to support
a special group for users that need the right. This is the roaming; there are System and Local Machine hives that
approach used with the Remote Desktop Users group,
which was created by Microsoft to grant Allow Logon
through Terminal Services to groups of users.
\\server\profiles\user_name
A roaming user profile is a file synchronization concept
in the Windows NT family of operating systems that
allows users with a computer joined to a Windows domain
to log on to any computer on the same domain and access
their documents and have a consistent desktop
experience, such as applications remembering toolbar
positions and preferences, or the desktop appearance
staying the same, while keeping all related files stored
locally, to not continuously depend on a fast and reliable
network connection to a file server.
Advanced Concepts I
The Registry
46 | P a g e
registry. The kernel, device drivers, services, security policies enforced by the system (these
Security Accounts Manager, and user interface can restrictions may be predefined by the system itself, and
all use the registry. The registry also allows access to configured by local system administrators or by domain
counters for profiling system performance. administrators). Different users, programs, services or
remote systems may only see some parts of the hierarchy
or distinct hierarchies from the same root keys.
Registry Structure
HKEY_LOCAL_MACHINE or
HKLM
HKEY_CURRENT_CONFIG or
HKCCHKEY_CLASSES_ROOT or
HKCR HKEY_CURRENT_USER
or HKCU HKEY_USERS or HKU
HKEY_PERFORMANCE_DATA (only in
WindowsNT, but invisible in the Windows Registry
Editor) HKEY_DYN_DATA (only in Windows 9x,
and visiblein the Windows Registry Editor)
Like other files and services in Windows, all registry
keys may be restricted by access control lists
(ACLs), depending on user privileges, or on security
tokens acquired by applications, or on system
47 | P a g e
depending on your use case, needs, or company policy.
Advanced Concepts II
Routing and NAT
Routing refers to establishing the routes that data packets
take on their way to a particular destination. This term can
be applied to data traveling on the Internet, over 3G or 4G
networks, or over similar networks used for telecom and
other digital communications setups. Routing can also
take place within proprietary networks.
What is a Gateway ?
Types of gateways
49 | P a g e
entire system) fail to run at all. In either case, performance
Review Questions
1. Discuss the different types of users and types of
permissions they may have on the system.
2. Discuss the seven predefined root key in
Windows registery.
3. What is routing and routing protocols? Discuss
some of well-known routing protocols.
4. What is Network Address Translation (NAT)?
Why do we need NAT in our LAN?
5. What are the benefits of NAT to an organization?
Discuss the different ways used to implement
NAT.
6. Discuss the meaning, benefit and how proxies
work.
7. Discuss the different types of gateways.
CHAPTER 4: RESOURCE
MONITORING &MANAGEMENT
Resource Monitoring & Management
As stated earlier, a great deal of system administration
revolves around resources and their efficient use. By
balancing various resources against the people and
programs that use those resources, you waste less money
and make your users as happy as possible. However, this
leaves two questions:
CPU power
Bandwidth
Memory
Storage
50 | P a g e
monitoring is normally done as the first and last utilization ever reaches 100%. If CPU utilization stays
steps of a three-step process: below 100%, no matter what the system is doing, there
is additional processing power available for more work.
Monitoring to identify the nature and scope of the
resource shortages that are causing the performance
problems.
What to Monitor?
As stated earlier, the resources present in every
system are CPU power, bandwidth, memory, and
storage. At first glance, it would seem that
monitoring would need only consist of examining
these four different things.
Monitoring Bandwidth
Bytes received/sent
Interface counts and rates
Transfers per Second
Monitoring Memory
52 | P a g e
Monitoring storage normally takes place at two they occur. Monitoring tools help you spot errors and
different levels: service failures before they start to impactusers.
Free Space
File System-Related Statistics
Transfers per Second
Reads/Writes per Second
Monitoring Tools
As your organization grows, so does the number of
servers, devices, and services you depend on. The
term system covers all of the computing resources of
your organization. Each element in the system
infrastructure relies on underlying services or
provides services to components that are closer to
user.
53 | P a g e
Knowing whether a computer has issues is fairly More sophisticated system monitoring package
straightforward when the computer is right in front of you. provides a much broader range of capabilities,
Knowing what’s causing the problem? That’s harder. such as:
But a computer sitting by itself is not as useful as it could Monitoring multiple servers. Handling servers
be. Even the smallest small-office/home-office network from various vendors running various operating
has multiple nodes: laptops, desktops, tablets, WiFi systems. Monitoring servers at multiple sites and
access points, Internet gateway, smartphones, file servers in cloud environments.
and/or media servers, printers, and so on. That means you Monitoring a range of server metrics: availability,
are in charge of ―infrastructure‖ rather than just CPU usage, memory usage, disk space, response
―equipment.‖ Any component might start misbehaving time, and upload/download rates. Monitoring
and could cause issues for the others. CPU temperature and power supply voltages.
Monitoring applications. Using deep knowledge
Bandwidth monitoring tools and NetFlow and sFlow
of common applications and services to monitor
based traffic analyzers help you stay aware of the activity,
key server processes, including web servers,
capacity, and health of your network. They allow you to
database servers, and application stacks.
watch traffic as it flows through routers and switches, or
Automatically alerting you of problems, such as
arrive at and leaves hosts.
servers or network devices that are overloaded or
System Monitoring Software Essentials down, or worrisome trends. Customized alerts
that can use multiple methods to contact you –
In order to keep your system fit for purpose, your email, SMS text messages, pager, etc.
monitoring activities need to cover the following Triggering actions in response to alerts, to handle
priorities: certain classes of problems automatically.
Collecting historical data about server and device
Acceptable delivery speeds
health and behavior.
Constant availability
Displaying data. Crunching the data and
Preventative maintenance
analyzing trends to display illuminating
Software version monitoring and patching visualizations of the data.
Intrusion detection Reports. Besides displays, generating useful
Data integrity predefined reports that help with tasks like
Security monitoring forecasting capacity, optimizing resource usage,
Attack mitigation and predicting needs for maintenance and
Virus prevention and detection upgrades.
Customizable reporting. A facility to help you
Lack of funding may cause you to compromise on
create custom reports.
monitoring completeness. The expense of monitoring can
Easy configurability, using methods like auto-
be justified because of it:
discovery and knowledge of server and
reduces user/customer support costs application types.
prevents loss of income caused by system outages Non-intrusive: imposing a low overhead on your
or attack vulnerability production machines and services. Making smart
prevents data leakage leading to litigation use of agents to offload monitoring where
prevents hardware damage and loss of business- appropriate.
critical data Scalability: Able to grow with your business,
from a small or medium business (SMB) to a
Minimum system monitoring software large enterprise.
capabilities
Windows Task Manager
54 | P a g e
Task Manager (old name Windows Task Manager) is a Performance
task manager, system monitor, and startup manager App History
included with all versions of Microsoft Windows since
Windows NT 4.0 and Windows 2000.
Processes
55 | P a g e
Startup
Users
Details
Services
56 | P a g e
Figure: Opening Resource Monitor from Task Bandwidth describes the maximum data transfer rate of a
Manager network. It measures how much data can be sent over a
specific connection in a given amount of time. For
The Resource Monitor interface looks the same on example, a gigabit Ethernet connection has a bandwidth
Windows 7, 8.1 and 10. The program uses tabs to of 1,000 Mbps (125 megabytes per second). An Internet
separate data, it loads an overview when you start it, connection via cable modem may provide 25 Mbps of
and including CPU, Memory, Disk, and Network are bandwidth.
the five tabs of the program including all the
processes that use the resources. The most common Internet bottleneck is your connection
to your ISP.
The sidebar displays graphs that highlight the CPU,
Disk, Network, and Memory use over a period of 60 Bandwidth vs. Speed
seconds.
Internet speed is a major vice to any Internet user. Even
Monitor CPU Usage with Resource Monitor though Internet speed and data transfer mostly revolve
around bandwidth, your Internet speed can also be
You need to switch to the CPU tab if you want to monitor different from the Internet bandwidth expectations. What
CPU utilization in detail. You find the processes listing of tends to make it complicated is that the terms bandwidth,
the overview page there, and also the three new listings speed, and bandwidth speed are used interchangeably,
Services, Associated Handles and Associated Modules. but they are actually different things. Most people refer
to speed as how long it takes to upload and download
Memory in Resource Monitor files, videos, livestreams, and other content.
The memory tab lists processes just like the CPU tab Network bandwidth
does, but with a focus on memory usage. It features a
physical memory view on top of that that visualizes the Use of bandwidth can also be monitored by a network
distribution of memory on the Windows machine. bandwidth monitor. Network bandwidth is a fixed
commodity. There are several ways to use network
If this is your first time accessing the information, you bandwidth. First, you can control the data flow in your
may be surprised that quite a bit of memory may be Internet connection. That is you can streamline data from
hardware reserved. The graphs highlight the used one point to another point. Next, you can also optimize
physical memory, the commit charge, and the hard faults data so that it consumes less bandwidth from what is
per second. Each process is listed with its name and allocated.
process ID, the hard faults, and various memory related
information. Network Printers
Commit: Amount of virtual memory reserved by the Network printing allows us to efficiently use printing
operating system for the process. resources. With network printing we first connect all of
Working Set: Amount of physical memory currently in our work stations to a network and then we implement a
use by the process. network printer. In general there are two ways this can be
Shareable: Amount of physical memory in use by the done.
process that can be shared with other processes.
Private: Amount of physical memory in use by the Remote Administration
process that cannot be used by other processes.
Remote administration is an approach being followed to
Network Activity in Resource Monitor control either a computer system or a network or an
application or all three from a remote location. Simply
The Network tab lists network activity, TCP connections put, Remote administration refers to any method of
and listening ports. It lists network activity of any running controlling a computer from a remote location. A remote
process in detail. It is useful, as it tells you right away if location may refer to a computer in the next room or one
processes connect to the Internet. on the other side of the world. It may also refer to both
legal and illegal remote administration. Generally, remote
Bandwidth
administration is essentially adopted when it is difficult or
57 | P a g e
impractical to a person to be physically present and do compromise the system. It is advised that remote
administration on a system‘s terminal. administration to be used only in emergency or essential
Internet connection
Connecting
Hacking
Remote Desktop Solutions
Controlling one‘s own computer from a remote
location
ICT Infrastructure Management
58 | P a g e
situations only to do administration remotely. In Thus, any read request can be serviced by any drive in
normal situations, it is ideal to block the ports to the set. If a request is broadcast to every drive in the set,
it can be serviced by the drive that accesses the data first
avoid remote administration.
(depending on its seek time and rotational latency),
Performance
Redundant Array of Inexpensive (or Independent) Disks (RAID)
RAID is a data storage virtualization technology that
combines multiple physical disk drive components
intoone or more logical units for the purposes of
dataredundancy, performance improvement, or both.
This wasin contrast to the previous concept of highly
reliablemainframe disk drives referred to as Single
LargeExpensive Disk (SLED).
Standard levels
Originally, there were five standard levels of RAID,
but many variations have evolved, including several
nested levels and many non-standard levels (mostly
proprietary). RAID levels and their associated data
formats are standardized by the Storage Networking
Industry Association (SNIA) in the Common RAID
Disk Drive Format (DDF) standard:
60 | P a g e
manufacturers, it is possible to mitigate most of the Redhat
problems associated with RAID 5. The larger the Kubuntu
drive capacities and the larger the array size, the Debian
more important it becomes to choose RAID 6
instead of RAID
5. RAID 10 also minimizes these problems.
Review Questions
1. Discuss why we need resource monitoring in
our infrastructure, and what are the resources
that weare going to monitor.
2. Discuss the different kinds of resource
monitoring tools that are already available in
Windows operating systems.
3. Besides the free and already available
resource monitoring and management tools
mentioned above, discuss some of other well-
known free and commercial tools available
for system administrators.
4. Why remote administration is needed? Explain.
5. List the different network clients.
6. What are the different remote administration
tools?
CHAPTER 5: SECURITY
Introduction
What is Unix/Linux?
The Unix OS is a set of programs that act as a link
between the computer and the user. The computer
program that allocates the system resources and
coordinates all the details of the computer‘s internals
is called the operating system or the kernel. Users
communicate with the kernel through a program
known as the shell. The shell is a command line
interpreter; it translates commands entered by the
user and converts them into a language that is
understood by the kernel.
Linux Distribution
Linux distribution is an operating system that is
made up of a collection of software based on Linux
kernel or you can say distribution contains the Linux
kernel and supporting libraries and software. Around
600+ Linux Distributions are available and some of
the popular Linuxdistributions are:
Linux Mint
Ubuntu
Solus
Fedora
OpenSUSE
61 | P a g e
implementations, you will find a lot of similarities in the
Unix/Linux Architecture different distributions. Linux may appear different
Kernel
Shell
Commands and Utilities
Properties of Linux
Linux Pros
Linux is free
Linux is portable to any hardware platform
Linux was made to keep on running
Linux is secure and versatile
Linux is scalable
The Linux OS and most Linux applications have
very short debug-times
Linux Cons
62 | P a g e
depending on the distribution, your hardware and
personal taste, but the fundamentals on which all
graphical and other interfaces are built, remain the
same. The Linux system is based on GNU tools
(Gnu‘s Not UNIX), which provide a set of standard
ways to handle and use the system.
Sorts of Files
63 | P a g e
/etc: Most important system configuration files are in communications network. The protocols used by the
/etc, this directory contains data similar to those in the machines are organized in different layers or levels, in
Control Panel in Windows.
/home Home directories of the common users.
/lib: Library files, includes files for all kinds of
programs needed by the system and the users.
/lost+found: Every partition has a lost+found for files
that were saved during failures are here.
/misc: For miscellaneous purposes.
/mnt: Standard mount point for external file systems,
e.g. a CD-ROM or a digital camera.
/opt: Typically contains extra and third party software.
/proc: Virtual file system containing system resources
information. You can type man proc command on
terminal to see more information about the meaning of the
files in proc.
/root: The administrative user‘s home directory. Mind
the difference between /, the root directory and /root, the
home directory of the root user.
/sbin: Programs for use by the system and the system
administrator.
/tmp : Temporary space to be used by the system, and
its contents will be cleaned upon reboot, so don‘t use this
for saving any work!
/usr: Programs, libraries, documentation etc. for all user-
related programs.
/var: Storage for all variable and temporary files
created by users, such as log files, temporary files
downloaded from the Internet, or to keep an image of a
CD before burning it.
64 | P a g e
such a way that: each layer offers services to a networking configuration. The ip command is used for
higher level, and each layer is supported by services assigning IP addresses to interfaces, for setting up routes
offered by a lower level Each level in a machine to the Internet and to other networks, for displaying
―talks with‖ his twin in another. The rules governing TCP/IP
this ―conversation‖ form the protocol of that level
(layer).
/etc/hosts
Review Questions
1. Discuss the history, controversy, war … between open-
source and closed sources software.
2. What are advantages and disadvantages of Linux.
3. Discuss what makes Linux and GNU different from each
other, and what makes them one.
4. Can we say Linux and Unix are the same? If they are, then
how? If they are not, then why?
66 | P a g e