• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Network Administration

Extracts from this document...

Introduction

Network Administration I have worked as a computer network administrator for over 5 years. I have worked mostly with networks in a mixed Microsoft Windows NT and Novell Netware environment. I am a Novell Certified Novell Engineer (CNE) and I am a certified Novell GroupWise Administrator. I have taken classes in configuration of Cisco routers. In this essay, I will discuss the definition of a network administrator, the tasks and responsibilities of a network administrator and share a day in the life of a network administrator. For documentation on my credentials, I am including my certification certificates. What is a Network Administrator? A network administrator is one who maintains and troubleshoots your computer systems. Depending on the size of your organization and the complexity of your technology, a network administrator's job can range from ten hours per week to full time. There are some obvious network administration tasks, such as installing or upgrading system software and managing user accounts and disks space, so you probably have some idea of what an administrator does. The International Telecommunications Union (ITU) is a consortium of telecommunications companies worldwide who have, among other things, defined a series of recommendations that describe how a telecommunications management network (TMN) should be operated. The ITU members have adopted a model of management functions that I think is of interest to us because it provides a framework that we can use to understand the role of the network administrator. ...read more.

Middle

virus. This was a fast-spreading Internet worm and file infector in pure and original form. It arrived as an embedded attachment, README.EXE file, in an email that had an empty message body and, usually, an empty subject field. Unlike most virus, it did not require the email receiver to open the attachment for it to execute. It used a known vulnerability in Internet Explorer-based email clients to execute the file attachment automatically. It had four modes of spreading: via email, via network shared drives, via unpatched IIS (Internet Information Server) servers and via file infection. My IIS server had not been properly patched against this virus. Fortunately, the vendor of my virus protection software quickly provided an application to clear the server of the virus. That was a "sad face" day. Each server has a log file that tracks application events, system events and security events. It is very important to check these logs daily because they can be very helpful as a preventive maintenance tool. Errors seen in these logs should be investigated to see if they are symptoms of a larger problem looming in the background. As I check the logs I also check the status of the previous nights backup. Most backup software has a separate log to track the performance of the backup job. ...read more.

Conclusion

This list would include such things as specific applications, desktop settings, etc. The goal is to make the transition from old workstation to new workstation nearly transparent to the end user. If the old workstation can be put back in service elsewhere, the administrator would possibly format the drives (effectively erasing all the previous data) and reassign the workstation in a position that is less demanding than the previous one. I have found that installation of new workstations not only makes the end user more productive, but generally the task of administering the workstation is easier because of the improvement in technology i.e. newer operating system. Some administrators have found it useful to sue a procedure called "ghosting" to speed up the process of setting up multiple new workstations. When this process, a workstation is configured with general setting sufficient for most users. Special software is used to "copy" an image of that configuration. When a new workstation or workstations is needed to be configured the imaged is then copied to the hard drive. For this procedure to work, the workstation must have the same or very similar hardware as the original workstation the image was copies from. Otherwise there will be multiple errors and the administrator will spend time more correcting errors than he/she would have doing the configuration manually. This paper is the property of getfreeessays.com Copyright � 2002-2003 ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Policy, Strategy & Systems section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Policy, Strategy & Systems essays

  1. Threats to Organisations and Systems. Describe the countermeasures available to an organisation that ...

    Encryption works by taking the packets of data and giving it an outer coat, in more common terms it turns the data into a coded format so that anyone trying to hack into the system midway actually will find it possible.

  2. Computer crime can broadly be defined as criminal activity involving an information technology infrastructure, ...

    2001, Journal Article [online] [8 February 2009] HYPERLINK "http://www.lexisnexis.com:80/uk/legal/results/docview/docview.do?docLinkInd=true&risb=21_T5726117619&format=GNBFULL&sort=BOOLEAN&startDocNo=1&resultsUrlKey=29_T5726117613&cisb=22_T5726117621&treeMax=true&treeWidth=0&csi=280390&docNo=2" http://www.lexisnexis.com:80/uk/legal/results/docview/docview.do?docLinkInd=true&risb=21_T5726117619&format=GNBFULL&sort=BOOLEAN&startDocNo=1&resultsUrlKey=29_T5726117613&cisb=22_T5726117621&treeMax=true&treeWidth=0&csi=280390&docNo=2 LexisNexis 2009, Journal Article [online] [8 February 2009] HYPERLINK "http://www.lexisnexis.com:80/uk/legal/results/docview/docview.do?docLinkInd=true&risb=21_T5725943096&format=GNBFULL&sort=BOOLEAN&startDocNo=1&resultsUrlKey=29_T5725943099&cisb=22_T5725943098&treeMax=true&treeWidth=0&csi=280148&docNo=6" http://www.lexisnexis.com:80/uk/legal/results/docview/docview.do?docLinkInd=true&risb=21_T5725943096&format=GNBFULL&sort=BOOLEAN&startDocNo=1&resultsUrlKey=29_T5725943099&cisb=22_T5725943098&treeMax=true&treeWidth=0&csi=280148&docNo=6 Out-Law, 2007 [online] [3 February 2009] HYPERLINK "http://www.jisclegal.ac.uk/cybercrime/cybercrime.htm" http://www.jisclegal.ac.uk/cybercrime/cybercrime.htm Parliament Office of Science and Technology, Government Publication, 2006 [Online] [6 February 2009] HYPERLINK "http://www.parliament.uk/documents/upload/postpn271.pdf" http://www.parliament.uk/documents/upload/postpn271.pdf Commentary Whiles preparing for

  1. The new era of Offshore IT Outsourcing.

    The software parks in India house international software giants like Microsoft, Intel, and IBM etc. In these parks, the companies have created an ambience similar to that of the Silicon Valley of California or Northern Virginia. The streets there are immaculate and have gleaming, high tech buildings on both sides.

  2. Local area networks (LANs).

    The Base means it's a Baseband transmission method. Many people have heard of Broadband, where the signal is analog, well, Baseband is a digital signal. The last number represents the distance, in meters, the signal can travel without the need to be repeated. 2 stands for 200, 5 for 500, and T for 100.

  1. Computer Networks.

    A network cards main purpose is to reduce the cabling between each terminal to a single wire. File servers This manages the files on a network. File servers may be 'dedicated' in which case they may only manage files and not be used for anything else.

  2. Download services

    Shareware can separate into 2 different kind of version which is trial version and full version. Trial version is "try before buy" so it only has the basic function of software, if people would like the full function of software, they need to register or purchase it.

  1. Produce a report for the Managing Director of Animal World Magazine outlining different ways ...

    Type Maximum length 10BaseT Unshielded Twisted Pair 100 meters 100BaseT Unshielded Twisted Pair 100 meters Token Ring Computers are connected in circle so the signal travels around the network from one computer to another in a logical ring. It's called token ring because it involves token passing.

  2. Intrusions from the Unknown: Importance of Network Security in Today's Environment and Security Issues ...

    for physical damage and the use of shielded cabling would make cables harder to tap. Line tapping cannot be detected at lower levels of the ISO OSI model (physical and link layers) thus detection and prevention must be carried out higher up in the model.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work