StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Why Do We Distinguish Between Network Administration and System Administration - Essay Example

Cite this document
Summary
System Administration and Network Administration have been mistaken to mean the same thing. Their practices draw a very thin line that makes it easy to confuse one for the other. This has made it hard for many especially them who are not in IT industry to take the description of one to mean the other…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER92% of users find it useful
Why Do We Distinguish Between Network Administration and System Administration
Read Text Preview

Extract of sample "Why Do We Distinguish Between Network Administration and System Administration"

Why Do We Distinguish Between Network Administration And Systems Administration? Introduction System Administration and Network Administration have been mistaken to mean the same thing. Their practices draw a very thin line that makes it easy to confuse one for the other. This has made it hard for many especially them who are not in IT industry to take the description of one to mean the other. To untangle the confusion that has existed in regard to system administration and network administration, there is need for keen consideration of the specific dimensions that make each one of them in terms of structure and practice.

We also need to explore the distinctions on management of networks and systems to answer the question on why we distinguish between the two. Reason for Distinction between system administration and network management According to Burgess (2004), system administration is about planning, formation and conservation of the computer systems to enhance productivity through the users of the system. Its services are well spread within responding to service problems around system software design, computer project management and operations within a company.

Network administration on the other hand includes maintenance of computer hardware and software in the entire company’s network. It focuses on ensuring that a company has prime performance in information delivery to the local users within the network as it links them with the wider network like the internet (Whirlpool, 2006). From the descriptions above, it is clear that system administration is totally different from network management. Understanding their distinctions makes it easy to define several things.

One of them is functionality and purposes of having two departments in a company that could otherwise be assumed to be one. The definitions explains that, while system administration supports servers connected to the network and database, network administration supports hardware and software that makes networks and switches within a system. The second reason is defining the roles of specialist associated with each one of them since they differ right from their names. The specialist for system administration is called system administrator while the specialist for network administration is called a network manager.

In an organization, a system administrator is in charge of “adding users and doing backups isolated to one independent computer system while a network manager places a computer on a network to interact with other systems” (Hunt, 2002, pp.1). Therefore, the diversity in functionality and specialty of each one of the two stands as a reason for distinction. It clears the confusion that many people, especially non-IT have concerning the two. The effects of the distinction on management of networks and systems Having learnt the reason for the distinction, it is important to discuss the effects that such distinctions have on management of networks and systems.

A clear distinction of network and system administration creates a clear guideline on the diversity of their management. The effect is seen in the ways both of them are handled to achieve their required purposes in IT industry. For example, a system administrator gets a distinct job description from a network manager. Systems administrators create backups that support an organization running system while network managers create a ground for growing not only the company network system but also the rest of the system the company is networked to.

For effective system management, end users serve a great deal in the success of the system. The distinction between network and system administration sets different mandates on each one of them. System administrators have the responsibility to enhance a smooth running of the system. They do this through supervising and training users on how well they can use the system to serve the purpose of the organization. On the other hand, network administrators deal with security, connectivity, and integrity and server disposition within a company.

This mandate makes the organization’s management set system administrators as consultants in computer problems while network managers stands at the top of technical support team to maintain connectivity within the company and the entire network. Their distinct mandates enhance their skills and competence in the field above every other user in the company. Conclusion Therefore, distinguishing between system administration and network administration is important for many reasons. One of them is making a clear definition of specialties and purpose of both in a company setup.

Knowing the difference between them creates a ground for understanding why one cannot serve in place of the other. Though at some point they may be depended on each other, the relationship does not make them equal. Their clear distinctions keep them unique hence dividing the roles of the specialists in each field. Referencing Burgess, M. (Eds.). (2004). Principles of Network and System Administration. West Sussex, England: John Wiley & Sons, Ltd. Hunt, C. (2002). TCP/IP Network Administration.

North Sebastopol, CA: O’Reilly Media, Inc. Whirlpool. (2006). Network Vs. System Administration. Whirlpool forums. Retrieved from: http://forums.whirlpool.net.au/archive/541633

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Why Do We Distinguish Between Network Administration and System Essay”, n.d.)
Retrieved from https://studentshare.org/information-technology/1445032-network-management-and-systems-administration
(Why Do We Distinguish Between Network Administration and System Essay)
https://studentshare.org/information-technology/1445032-network-management-and-systems-administration.
“Why Do We Distinguish Between Network Administration and System Essay”, n.d. https://studentshare.org/information-technology/1445032-network-management-and-systems-administration.
  • Cited: 0 times

CHECK THESE SAMPLES OF Why Do We Distinguish Between Network Administration and System Administration

Why do we distinguish between network administration and systems administration

The field of system administration is a broad term used to define the roles and responsibilities of the person who maintains and operate the IT infrastructure of the company as a whole.... hellip; The basic idea is to have a diversified IT department. In case of a large company, the different roles of such a department would comprise of a proper system administrator, network administrator, database administrator and in many cases a separate person as the head of the department (Frisch, 2001) or IT manager/director....
3 Pages (750 words) Essay

The Concept of Bureaucracy

Is it an undesirable and nonviable form of administration developed in a legalistic and authoritarian society and now inevitably withering away because it is incompatible with complex,… Are, therefore, the term bureaucracy and the theoretical ideas and empirical observations associated with it, irrelevant or deceptive when it comes to making sense of public administration and government in contemporary democracies? Or are the ilization of anti-bureaucratic sentiments and the claim that it is time to say good-bye to bureaucracies and bureaucrats just another round in a perennial debate and ideological struggle over what desirable forms of administration and government are--that is, a contest for control of the size, agenda, organization, competences, moral foundations, staffing, resources, and outcomes of the public sector?...
21 Pages (5250 words) Essay

Public Administration Theories

This document discusses public administration theories that have evolved over time, embracing each other's ideas, criticizing, and rejecting to form newer perspectives according to changes in the environment based on social, economic, and political aspects.... Public… It has been divided into three branches namely; classical public administration, post modern public administration, and new public management theories, all However, new public management (NPM) overrides the earlier new public administration (NPA) and develops to cover wide areas of management functions....
12 Pages (3000 words) Research Paper

A Network Intrusion Detection System and Security Attacks

The paper "A Network Intrusion Detection system and Security Attacks" gives detailed information about the mark IDS technique, a system based interruption recognition framework.... It tracks bundles streaming over the whole system by indiscriminate operation mode.... A Network Intrusion Detection system monitors networks for intrusions and attacks reporting any anomalies to the administrator.... Threats can be individuals or groups that wish to compromise a computer system such as disgruntled employees, rival companies, or even foreign governments and their attacks can be devastating on the network systems....
7 Pages (1750 words) Assignment

XEN - Penetration Testing Documentation

hellip; The Xen show of virtual machines offered our understudies server autonomy giving every learner control of a neighborhood arrangement and of a remarkable IP address on the "virtual" system for each one server so that people could work in groups, incorporating in separation taking in circumstances, and this office subsequently could be utilized either as a part of the showing space.... We needed our people to have the capacity to distinguish and comprehend information units at each level....
8 Pages (2000 words) Case Study

Information Technology Security

New demands for Spiderweb will be put together by client administration to the information or framework manager for endorsement and handling.... Once approved, access will be configured by the data custodians or system administrators (Tolone et al.... The provisioning methodology ought to incorporate an effective system for informing the allowing power when a client's status or part changes (Tolone et al.... To focus on the requirement of Spiderweb for this approach, the association ought to perform an appraisal system for the specific access need....
12 Pages (3000 words) Essay

Highly Available Directory Domain Services

he Domain Name system is focused around the idea of name determination that is a key capacity of TCP/IP systems.... Such systems are utilizing IP addresses as a part of the request to recognize the beginning and objective of system transmissions.... An IP location figures out where a datagram is sent and is extraordinary for the particular system area.... It is important to secure a more compelling framework for clients to distinguish the location of a system area....
16 Pages (4000 words) Assignment

Enhanced Sensor-Based Intrusion Detection System

ccording to the network dictionary, IDS is characterized as an "Intrusion detection system (IDS) is a sort of security administration system for PCs and systems.... This report "Enhanced Sensor-Based Intrusion Detection system" exhibits the usefulness of Anomaly and Signature-based IDS alongside its favorable circumstances and inconveniences.... Anomaly-based intrusion detection system, a Signature-based intrusion detection system, a Flexible Intrusion Detection, and Response Framework for Active Networks (FIDRAN) are suggested to give superior security....
15 Pages (3750 words) Report
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us