StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...

Why do we distinguish between network administration and systems administration - Essay Example

Cite this document
Summary
Today most of the IT systems thrive on the issue of linking different technologies. In doing this, therefore, we need to clearly define the roles and responsibilities of the people involved in the maintenance and troubleshooting of computer systems in general…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER94.4% of users find it useful
Why do we distinguish between network administration and systems administration
Read Text Preview

Extract of sample "Why do we distinguish between network administration and systems administration"

Download file to see previous pages

However, many companies have more than one roles being performed by a single person. This is mainly due to the lack of resources, limited operations and economic reasons. However, despite all this, the roles of the different people involved in any typical IT department can easily be defined separately. The IT director being the head of the department represents the IT in the top management team. Other three categories and/or designations are the people directly involved with workings and infrastructure of the IT of the company.

The database administrator is simply the person managing the central database server of the organization. However there are significant confusions regarding the roles of the system and network administrator(s). The field of system administration is a broad term used to define the roles and responsibilities of the person who maintains and operate the IT infrastructure of the company as a whole. A system administrator, also known as the 'sysadmin' (Microsoft, 1999), can have a work schedule ranging from a few hours per week to a full time job depending on the size of the organization.

A system administrator might not even know the CEO, but he actually acts as the liaison between the technical and the non-technical staff of the organization. Some of the basic duties performed by the system administrator(s) are (Limoncelli & Hogan, 2007); Install and maintain the user. Determine hardware and software pre-requisites, which patches and/or plug-ins to install, which services to provide, and which services to disable.Plan and manage the machine room environment Design machine room; specify cooling temperatures, cabling configurations, power connections and alternate support, and environmental controls (fire alarm, security, etc.)Schedule downtime to perform upgrades/patches, and test devices and schedule downtime to manage devices.

Install and maintain the user accounts; develop acceptable use policy and login-name policy, rights and privileges of different users; determine password change policies; install/configure/manage name services; and manage licenses.Determine disk quota allocation, manage disk space, and monitor log files.Configure network services (Burgess, 2002):Printing, file sharing, name service.Determine file sharing needs and printing policies.Manage security for shared resources.Other duties of a system administrator may also include scripting, programming, project management for systems-related project of automation and/or system analysis and designing, supervising and/or training computer operators, and serving as a consultant for computer related problems beyond the ordinary knowledge of the technical support staff.

A System Administrator is supposed to demonstrate a versatile blend of fine tuned technical skills and responsibility.Larger organizations have clearly defined models while smaller organizations will be likely to consolidate functions in order to maintain the health and operational capabilities of the systems. In both cases a system administrator would be there either as part of the larger IT group or as the only IT manager responsible for every system

...Download file to see next pages Read More
Tags
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Why do we distinguish between network administration and systems Essay”, n.d.)
Retrieved from https://studentshare.org/miscellaneous/1507920-why-do-we-distinguish-between-network-administration-and-systems-administration
(Why Do We Distinguish Between Network Administration and Systems Essay)
https://studentshare.org/miscellaneous/1507920-why-do-we-distinguish-between-network-administration-and-systems-administration.
“Why Do We Distinguish Between Network Administration and Systems Essay”, n.d. https://studentshare.org/miscellaneous/1507920-why-do-we-distinguish-between-network-administration-and-systems-administration.
  • Cited: 0 times

CHECK THESE SAMPLES OF Why do we distinguish between network administration and systems administration

Why Do We Distinguish Between Network Administration and System Administration

hellip; Why do we distinguish between network administration and systems administration?... Why do we distinguish between network administration and systems administration?... We also need to explore the distinctions on management of networks and systems to answer the question on why we distinguish between the two.... The effects of the distinction on management of networks and systems Having learnt the reason for the distinction, it is important to discuss the effects that such distinctions have on management of networks and systems....
3 Pages (750 words) Essay

Difference Between Network Administration and System Administration

THE DIFFERENCE between network administration and SYSTEM ADMINISTRATION The Difference between network administration and System Administration Author Author Affiliation Date Both the system and network administration is a branch of engineering that deals with the management of functional aspects of human–computer systems.... As discussed above, both the terms system administration and network administration exist independently and are utilized both commonly and disconnectedly by business organizations and by researchers....
3 Pages (750 words) Essay

Global Business Vodafone in Emerging Regions Thailand

They now work in more than 30 nations and join forces with systems in over 50 more.... The potential changes required may identify, for example, to dialect, society, purchasing propensities, inventory network modernity, administrative situations, and accessible transport base and value affectability inside each one market.... (Dunning, 1993) To overcome poor logistics foundations and regularly quite divided supply chains, the utilization of remote track-and-follow results can permit producers and retailers to accompany their merchandise all around the inventory network....
14 Pages (3500 words) Essay

A Network Intrusion Detection System and Security Attacks

Presently, computers may constitute, distributed systems and networked systems.... Intrusion detection systems (IDS) can effectively provide network security by preventing, detecting, and possibly fighting attacks.... Such systems monitor sources of activities while employing various security techniques.... etwork Intrusion Detection systems monitor networks for intrusions or attacks, reporting them to the administrator for necessary activity....
7 Pages (1750 words) Assignment

XEN - Penetration Testing Documentation

The accomplishment of this methodology urged us to take a gander at applying this engineering to the educating of machine systems (Infs6230).... We needed our people to have the capacity to distinguish and comprehend information units at each level.... we needed each learner to get mindful of the powerlessness of the framework doled out to her/him, and this happened.... we were, then again, unable to actualize the sum of our objectives and set three characteristics aside for consequent emphases of the course: (1) giving mysql and ACID to help people examine the information caught, (2) having Snort sent email cautions in regards to specific sorts of endeavors, and (3) firewall setup utilizing iptables....
8 Pages (2000 words) Case Study

Information Technology Security

New demands for Spiderweb will be put together by client administration to the information or framework manager for endorsement and handling.... This paper ''Information Technology Security'' tells that Methodology for information ought to be controlled through a method that ensures the client access rights for Spiderweb which reflect characterized and employment prerequisites....
12 Pages (3000 words) Essay

Highly Available Directory Domain Services

Associations that have systems with their own DNS servers can make areas for their inward utilization.... he Domain Name System is focused around the idea of name determination that is a key capacity of TCP/IP systems.... Such systems are utilizing IP addresses as a part of the request to recognize the beginning and objective of system transmissions.... If a distributed denial-of-service threat attacks a website, the traffic can be routed from the other available locations on a different network segment....
16 Pages (4000 words) Assignment

The Meaning and Different Aspects of Development

The paper “The Meaning and Different Aspects of Development” looks at development as a subject matter and a very broad and even complex concept.... It is a multi-dimensional process involving the reorganization and reorientation of the entire economy.... hellip; The author states that it is important to understand that the essential concept of development does not only mean the aggregate development of an area but also the development of the people living in this area....
15 Pages (3750 words) Research Paper
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us