Uploaded by sing bling

Bitf20a543

advertisement
System network &Administration
Assignment 1
Name: M.Abuzar
Roll Nu: (Bitf20a543)
System Administrator
A system administrator is an essential IT professional who is responsible for providing a reliable
work environment for an organization—from server and network performance to security and all
other areas that keep an organization’s IT systems running smoothly. System administrators must
have an in-depth understanding of computer software, hardware, and networks and are highly
skilled, valuable members of an organization.
At a high level, system administrators are responsible for system performance, design, and
reliability and the security and optimization of computer systems. The breadth of these
responsibilities is dependent upon the size and scale of an organization’s IT-related
infrastructure.
To acquire the best freelance system administrators, sign up for Field Engineer, a global
freelance marketplace for engineers. Skip the hassle, time, and money needed to search for an IT
system administrator and instead select from over 70,000 engineers all over the world.
Job Description
The system administrator’s responsibilities are diverse and involve many areas of an
organization’s technology systems. This IT professional may be responsible for some, or all the
areas listed below, depending on an organization’s structure and scope:

Design, organize, modify, and support an organization’s computer systems, including
operating systems, business applications, security tools, web servers, email systems, and
user hardware (laptops, PCs).

Quickly resolve any system failures and troubleshoots issues.

Upgrade and manage hardware and software.

Research upcoming products, service protocols, and standards in support of systems
software procurement and development efforts.

Install and configure local area networks (LANs), wide area networks (WANs), and
network segments and servers, such as file servers, VPN gateways, and intrusion
detection systems.

Ensure an uninterrupted internet connection and manages mail servers for sending and
receiving emails and file servers for saving and managing data.

Oversee system performance and report generation.

Manage user accounts, credentials, permissions, access rights, storage allocations, and
active directory administration.

Lead process improvements and modifications.

Secure system integrity from any breaches or viruses and play an essential role in riskmitigation planning, including creating backup plans, safeguards for data, user security
policies, and identity management.

Ensure high-level security and efficiency resulting in 100% output.

Develop and execute backup and recovery plan.

Maintain internal documentation through wiki.

Offer technical support and training for staff.
Educational Qualifications
After opting for system administration as your career path, it is essential that you select a
relevant bachelor’s degree. The basic requirement is a bachelor’s degree in computer science,
information system management, information technology or other related field. Other degree
programs with an emphasis on hardware, computer networks, and system administration are also
acceptable.
Certifications
The following certifications are important professional credentials and may be required for a
system administrator position:

Microsoft Certified Solutions Engineer (MCSE)

Oracle Linux System Administrator (Oracle)

Red Hat Certified System Administrator (RHCSA)

Red Hat Certified Engineer (RHCE)

CompTIA Server+

VMware Certified Professional 6- Data Center Virtualization
Q2:
Single sign-on (SSO) is a mechanism that allows users to authenticate themselves once and access
multiple applications or services without having to re-enter their credentials for each individual
application. There are several types of single sign-on:
1. Federated SSO: This type of SSO involves the use of a third-party identity provider (IdP) to
authenticate users across multiple applications or services. The identity provider acts as a trusted
intermediary between the user and the service provider, issuing authentication tokens that allow
users to access the various services without having to re-enter their credentials.
2. Social login: Social login is a form of SSO that allows users to log in to applications or services
using their social media credentials, such as their Facebook or Twitter account. This type of SSO
is convenient for users, as they don't have to remember yet another username and password.
3. Enterprise SSO: Enterprise SSO is a type of SSO that is used within an organization to allow
employees to access multiple applications and services using their corporate credentials. This
type of SSO is often used in large organizations where employees need access to a variety of
applications and services to do their jobs.
4. Biometric SSO: Biometric SSO involves the use of biometric data, such as fingerprint or facial
recognition, to authenticate users across multiple applications or services. This type of SSO is
becoming more popular as biometric technology becomes more prevalent and reliable.
5. Password Manager SSO: Password manager SSO involves using a password manager
application to store and manage all of a user's login credentials for multiple applications or
services. The user only needs to remember one master password to access all of their stored
credentials, providing a convenient SSO experience.
6. Federated Identity Management (FIM)
7. OAuth (specifically OAuth 2.0 nowadays)
8. OpenID Connect (OIDC)
9. Security Access Markup Language (SAML)
10. Same Sign On (SSO)
-----------------------------------------------------------------------------------------------------------------------------
Q3:
Boot management is the process of starting a computer and loading its operating system into memory.
The boot process involves several stages that ensure that the system is configured correctly and that the
operating system is loaded properly.
Here are the basic stages of the boot process:
1. Power-On Self-Test (POST): When the computer is turned on, it performs a Power-On Self-Test
(POST) to check the hardware components, such as the CPU, memory, and hard drive, to ensure
that they are functioning correctly.
2. BIOS/UEFI initialization: Once the hardware components have been checked, the Basic
Input/Output System (BIOS) or Unified Extensible Firmware Interface (UEFI) firmware
initializes. This firmware is responsible for configuring the hardware, setting up the boot devices,
and checking for any errors.
3. Boot loader: The boot loader is a small program that loads the operating system into memory. It is
typically located on the hard drive or on an external boot device, such as a USB drive.
4. Kernel initialization: After the boot loader has loaded the operating system, the kernel initializes.
The kernel is the core component of the operating system and is responsible for managing system
resources and providing services to applications.
5. System initialization: Once the kernel is loaded, the operating system begins to initialize. This
involves setting up system services, such as network connectivity, and loading drivers for
hardware components.
6. Login: Finally, the user is presented with a login screen, where they can enter their username and
password to access the operating system.
Overall, the boot process is a critical part of starting a computer, and understanding the stages involved
can help troubleshoot any issues that may arise.
-------------------------------------------------------------------------------------------------------------------------
Q4:
The hierarchy of internet access on a computer typically involves the following components:
1. Physical network interface: The physical network interface is the hardware component that
enables the computer to connect to a local network or the internet. This can be a wired Ethernet
interface, a wireless Wi-Fi interface, or a cellular data modem. The network interface
communicates with the network using a specific type of protocol, such as Ethernet or Wi-Fi.
2. Network protocols: Network protocols are a set of rules and procedures that govern how data is
transmitted and received over the network. There are many different network protocols, but some
of the most commonly used include TCP/IP, HTTP, FTP, and DNS. Each protocol is responsible
for handling a specific aspect of network communication, such as establishing connections,
transmitting data, or resolving domain names.
3. Network stack: The network stack is the software layer that implements the network protocols
and manages the network communication. The network stack consists of multiple layers,
including the physical layer, data link layer, network layer, transport layer, and application layer.
Each layer has a specific function, such as converting data into packets, routing packets to their
destination, or establishing connections between applications.
4. Network drivers: Network drivers are software components that interface with the physical
network interface and provide communication between the network stack and the hardware.
Network drivers are specific to the type of hardware interface and the operating system used.
They are responsible for translating network packets into data that the operating system can
understand, and vice versa.
5. Internet service provider (ISP): An internet service provider (ISP) is the organization that
provides internet connectivity to the computer. ISPs can be wired or wireless, and they may
provide different types of services, such as dial-up, DSL, cable, or fiber. When a computer
connects to an ISP, it is assigned an IP address that uniquely identifies it on the internet.
6. Domain name system (DNS): The domain name system (DNS) is the system that translates
human-readable domain names (e.g., www.example.com) into IP addresses that can be used by
the network protocols. DNS servers are typically provided by the ISP or by a third-party DNS
service. When a user types a domain name into their web browser, the DNS system resolves the
domain name to the corresponding IP address, allowing the browser to connect to the web server.
7. Web browser: A web browser is a software application that allows the user to access and interact
with websites on the internet. Web browsers use the network stack to communicate with web
servers and display the content of web pages to the user. The browser sends requests to the web
server using HTTP or HTTPS protocols, and receives responses containing HTML, CSS, and
JavaScript code, which it then renders into a graphical user interface.
Download