Contact Us
Sign In / Sign Up for FREE
Go to advanced search...

Why do we distinguish between network administration and systems administration - Essay Example

Comments (0) Cite this document
Today most of the IT systems thrive on the issue of linking different technologies. In doing this, therefore, we need to clearly define the roles and responsibilities of the people involved in the maintenance and troubleshooting of computer systems in general…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER92.7% of users find it useful
Why do we distinguish between network administration and systems administration
Read TextPreview

Extract of sample "Why do we distinguish between network administration and systems administration"

Download file to see previous pages However, many companies have more than one roles being performed by a single person. This is mainly due to the lack of resources, limited operations and economic reasons. However, despite all this, the roles of the different people involved in any typical IT department can easily be defined separately.
The IT director being the head of the department represents the IT in the top management team. Other three categories and/or designations are the people directly involved with workings and infrastructure of the IT of the company.
The database administrator is simply the person managing the central database server of the organization. However there are significant confusions regarding the roles of the system and network administrator(s).
The field of system administration is a broad term used to define the roles and responsibilities of the person who maintains and operate the IT infrastructure of the company as a whole. A system administrator, also known as the 'sysadmin' (Microsoft, 1999), can have a work schedule ranging from a few hours per week to a full time job depending on the size of the organization. A system administrator might not even know the CEO, but he actually acts as the liaison between the technical and the non-technical staff of the organization. Some of the basic duties performed by the system administrator(s) are (Limoncelli & Hogan, 2007);
Install and maintain the user...
Determine hardware and software pre-requisites, which patches and/or plug-ins to install, which services to provide, and which services to disable.
Plan and manage the machine room environment
Design machine room; specify cooling temperatures, cabling configurations, power connections and alternate support, and environmental controls (fire alarm, security, etc.)
Schedule downtime to perform upgrades/patches, and test devices and schedule downtime to manage devices.
Install and maintain the user accounts; develop acceptable use policy and login-name policy, rights and privileges of different users; determine password change policies; install/configure/manage name services; and manage licenses.
Determine disk quota allocation, manage disk space, and monitor log files.
Configure network services (Burgess, 2002):
Printing, file sharing, name service.
Determine file sharing needs and printing policies.
Manage security for shared resources.
Other duties of a system administrator may also include scripting, programming, project management for systems-related project of automation and/or system analysis and designing, supervising and/or training computer operators, and serving as a consultant for computer related problems beyond the ordinary knowledge of the technical support staff. A System Administrator is supposed to demonstrate a versatile blend of fine tuned technical skills and responsibility.
Larger organizations have clearly defined models while smaller organizations will be likely to consolidate functions in order to maintain the health and operational capabilities of the systems. In both cases a system administrator would be there either as part of the larger IT group or as the only IT manager responsible for every system ...Download file to see next pagesRead More
Cite this document
  • APA
  • MLA
(“Why do we distinguish between network administration and systems Essay”, n.d.)
Retrieved from
(Why Do We Distinguish Between Network Administration and Systems Essay)
“Why Do We Distinguish Between Network Administration and Systems Essay”, n.d.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF Why do we distinguish between network administration and systems administration

Network administration capstone project

...?NETWORK ADMINISTRATION CAPSTONE PROJECT Introduction The task of estimation has been going on in the present company for a while. However, in most instances, this is done either manually or by employing the use of an old DOS system. This has generally been identified to be highly ineffective as not much work as expected to be done by the department using it has always been produced. This called for the need to purchase a new system that guarantees much efficiency and effectiveness for use. But after purchasing the software, there was the need to internalize it to fit the working conditions of the department where it was going to be used. There was also the need to analyze the components and features of the software in relation...
22 Pages(5500 words)Case Study


2002). UNIX back end server support the automatic generation of enterprise java beans facilitated the development teams to develop the J2EE application more efficiently. By the UNIX fast XML proxy support, web services are developed in no time on a distributed system as compared to the previous server architecture. IBM 32 way UNIX servers were also launched in year 2001 with the code name “Regatta”. The microprocessor architecture comprises of 1 GHz 64 Bit Power 4. This UNIX server is capable of self-healing technology and to decrease system failures. The system is capable to divide into 16 virtual servers which enable the businesses to unite several machines in to one (Popovich 2001). The Client-server model of UNIX was the core...
7 Pages(1750 words)Essay

Why Do We Distinguish Between Network Administration and System Administration

...?Why Do We Distinguish Between Network Administration And Systems Administration? Introduction System Administration and Network Administration have been mistaken to mean the same thing. Their practices draw a very thin line that makes it easy to confuse one for the other. This has made it hard for many especially them who are not in IT industry to take the description of one to mean the other. To untangle the confusion that has existed in regard to system administration and network administration, there is need for keen consideration of the specific dimensions that make each one of them in terms of structure and practice. We also need to explore the distinctions on management of networks and systems to answer the question on why we...
3 Pages(750 words)Essay

Difference Between Network Administration and System Administration

... a tendency to cause the systems to stop working. An organization needs to distinguish between both the disciplines in order to run their business effectively. However, both these jobs are considered as same by the majority of business organizations. Normally, a large size firm hires both the network and system administrators while small size business organizations hire only the system administrators and give them the additional charge to manage the tasks which come under the job of network administration (Burgess, Principles of Network and System Administration, 2nd Edition, 2004, p. 1; Morgan, 2012). Before differentiating both these terms it is necessary to understand the functions of both the jobs. Basically, a system administrator...
3 Pages(750 words)Essay

Network Server Administration

... Implementing a Secure Domain Environment 2.1 Active Directory Implementation Active directory is an essential component which provides efficient and effective network administration. The first step is to prepare a domain. Active directory functions on the domain. The domain name for abc will be ‘’. Single domain model will be adopted as a forest root domain since the organization is a SME. After creating the domain, DNS configuration is required and what type of DNS version to be used; the names used for the domains, servers, and services in Active Directory; and the names of the forests and the forest root domains. The trust plan is also required which parallels the creation of the forest and domain plans, outlines any manually...
10 Pages(2500 words)Research Paper

Database systems and Administration

These three tables handle information regarding products being developed by the organization, countries in which it operates and employees that work for the organization. Since the organization sells various kinds of batteries it is evident that to maintain the record of the sales it makes it would need a sales table. The organization would also have to maintain the record of inventory and the products that are available. Finally to maintain records regarding the wages and designation of each employee a separate table of Job is created to help evaluate the position of an individual within the organizational structure. To help distinguish each entity from the other each record within each entity is assigned a unique alphanumeric c...
16 Pages(4000 words)Essay

Network Administration

Important aspects of this scenario have been underlined and will be referred to within this report.
As a junior consultant working for a company specialising in designing computer networks, you have been asked to work with a young company called to advise them on the different types of network available. You are asked to prepare a report to assist in winning the contract to design a network suitable for, so it is important that you show that you are knowledgeable about networking and have considered the different options available. Some background about the company is provided for you below: was formed by two students who had just completed their university degree...
37 Pages(9250 words)Essay

Network Technology and Network Administration

...--------------------------- --------------------------- --------------------------- --------------------------- Network Technology and Network Administration Introduction Computers and the Internet are a wonderful addition to our lives. In today's computer world almost every person is connected to computer and internet in a way or other. A person spends a large portion of his life, interacting and collaborating with people all over the world, through the use of and Internet. But that does not mean that every user know every thing about computer and internet. It can be generalized that about 80% of the knowledge is concentrated in about 20% of the people, while the other 80% of the people possess only about 20% of the total knowledge...
5 Pages(1250 words)Essay

Network Management and Systems Administration SLP

... presentation being a written article, it is informative but dull reading. Not such a good way to learn it is important to know about this, as without security on network protocols there is a good chance of hacking the system. But oh boy, it was boring in its presentation. 3. Simple Mail Transfer Protocol (SMTP) tutorial, (Kern, no date) is a series of web pages with written pieces on each page from an introduction to the writers, to in-depth work on SMTP including the animated demonstration. SMTP is very widely used as an e-mail protocol, the exchange of E-Mail using TCP/IP is performed by a message transfer agent (MTA). Users normally dont deal with the MTA. The system administrator is responsible to set up the local MTA. The SMTP...
2 Pages(500 words)Research Paper

Network Management and Systems Administration

...Network Management and Systems Administration Introduction The ials under application protocols help in understanding networkmanagement. This is done through the different layers of networking protocols. Networks can involve; enterprise WLAN, fixed switching, modular switching, and enterprise high capacity switch routers. The network system administration involves the procedure of ensuring, reliability, predictability, and security of computing workstations, networks, and services. The application protocols show how URL protocols can be developed. This can be done by invoking another application in handling the custom protocol. This is done by registering the accessible application as a URL handler. After launching the application...
2 Pages(500 words)Essay

The Distinction Between the Tort of Negligence and the Tort of Nuisance

There are many instances in which establishing a claim in private nuisance does not require proof of negligence and it, therefore, remains necessary to maintain the tort of private nuisance distinct from the tort of negligence. The discussion that follows will demonstrate the necessity by comparing and contrasting both torts.
The tort of negligence is founded on the principles enunciated in the House of Lords decision in Donoghue v Stevenson which essentially defines the duty of care and situations in which a breach of that duty will give rise to a claim in negligence. Lord Atkin explained that we are required to take all necessary precautions to prevent injury to our neighbours. He goes on to fully explain the duty of care i...
17 Pages(4250 words)Case Study

Correlation between Motivation and Efficiency

It also has many warehouses to deliver chilled and frozen food to customers. It is highly unpleasant for the workers to work in the chilled warehouses. Just five years ago, one of the warehouses in Stroke-on-Trent introduced a new technical system that transformed the attitude of the workers and their efficiency.
Though the company spent almost £ 300,000 on installing a new system, it reckoned that by cutting down the mistakes and providing a better workplace for workers it could save that much amount in the first year itself. Prior to the installation of a new communication system, workers felt much boring with the old techniques of writing the movements of goods by a bit of paper and pencils. Apart from mistakes and e...
6 Pages(1500 words)Research Paper

Public Relations and School Administration: The Jena Six Story

The infamous Juvenile Correctional Centre for Youth is located in Jena, with the institution closing after merely 2 years of its opening. The closing of the institution was owed to prevalent brutality and racism. One of the scandals they were involved in was the choking of black juveniles during a meeting with a lawyer. The guards also paid inmates for them to wrestle and fight with each other for their entertainment and also laughed at teenagers who are trying to commit suicide inside the jails (Witt, 2007).
At one time, district boundaries lines had been drawn to establish or maintain white-non white separation. It was in the last 20 or so years that nonwhites had begun to move into several areas; Jena for one, previously p...
11 Pages(2750 words)Term Paper

The Relationship Between Security, Risk and Health in a Large Organisation

...The relationship between Security & Risk and Health & Safety in a large organisation "Assess the relationship between Security & Risk and Health & Safety in the context of a large organisation. Are they complimentary or the demands of one conflict with or inhibit the realisation of the other? Identify and discuss the implications of your assessment for the roles of the security manager". 1. Introduction The development of commercial activities worldwide has been extremely rapid; firms operating in various industrial sectors need to confront a series of challenges in order to ensure the limitation of risk related with their strategic initiatives. Within this context, the issues of security, risk, health and safety are very likely to appear...
9 Pages(2250 words)Coursework

Relationship between Money Supply and Inflation in Saudi Arabia

Over the recent past, the effects of money supply, debt and inflation have become contentious issues for debate. Furthermore, frequent cautions concerning the risk of very large budgetary deficits aver that this would send up the upcoming state debt and capital rate as indicated by the rates (interests). As a nation, Saudi Arabia has a bi and enduring budgetary deficit over the past two decades and the government has been forced to go into the market so as to have loan access and to make up for the deficits. Given the impact of this on inflation and other economic variables, it's imperative and of great alarm for strategy architects (strategists) to understand how microeconomics has an effect on money supply, financial plan defici...
10 Pages(2500 words)Speech or Presentation

Evaluation of Children with Visual Impairment between Ages 4-12

A visually impaired child may suffer from incomplete sight, reduced vision, total blindness as well as legal sightlessness (Kelley and Gale p 45). It is a condition that may become severe in a child, thereby affecting its growth and development. The impact is usually dependent on the kind of loss, age at which it occurs, as well as the general body functioning of the child. The normal interest that is usually evident amongst children on seeing attractive items in their surroundings lacks in a visually impaired child. This may interfere with the child’s learning capabilities unless he/she is assisted to learn. The development of social behavior in children usually depends on the ability to see parents or those in charge of ca...
6 Pages(1500 words)Coursework

Accounting systems and Assurance

The allocation of resources is dependent on the information regarding the financial condition of the firm. Here comes the role of accounting, which provides all the required financial information to the investors through several financial reports. There There are two classifications of accounting 1) financial accounting and 2) management accounting. Financial accounting is the one which furnishes all the financial information to the investors and management accounting is used at the micro-level where the internal allocation of the funds takes place. Accounting is one of the most crucial components of any organization as it provides all those financial information that is used to make the economic and financing decision making.&nbs...
9 Pages(2250 words)Coursework

Business Information Systems

... much for children, young professional, college students, tourists, and business travelers. As we talk about the environment of Club IT that is designed in a very good way with High ceilings, live music, dance floor and energy lighting. Here we can eat and drink watch move and lot of other entertainment (Case Study). Current Technology Structure of Club IT This section is about the present technology structure at Club IT. In the present structure they have small computer based database system, a small Internet, security system and small other IT based structures. They have main IT equipments that comprise a Computer and a printer, Software, Modem, Photocopier, Fax Machine, Postage Scale and Meter and Paper Shredder. The communication...
8 Pages(2000 words)Case Study

Business Administration

... members in their research endeavours. I speak several languages (mention them here) and that will allow me to perform research using primary sources in the native language. I will be in a position to not only translate the documents literally, but I will be able to use the elements herein mentioned (culture, traditions, history, idiomatic terms, non-verbal communication). We do not want to commit fatal mistakes as the Coca-Cola slogan translated into Thai – We will return your ancestors. Given the oriental respect for the elders, they did not want them to return. They wanted their ancestors to rest in peace. Another example was trying to sell Nestlé’s powdered milk in Africa (marketing and publicity negligence). Their instructions were...
6 Pages(1500 words)Essay

Conflict Between Researh and Ethics on the Tuskegee Syphilis Study

...Opinion paper The Declaration of Helsinki by the WHO clearly s that in clinical trials involving humans the wellbeing of the should be of prime importance than the interest of science or society. This has been stated because at times in order to achieve the objectives of a study the investigators might overlook the welfare of the trial subjects thus jeopardizing their health in the process. According to ethical rules while comparing two treatment options the control group of the study must receive the best known treatment available while the study subjects are given a potential newer treatment. Only when there is no effective treatment available a placebo-controlled group can be used for the study. There have been several trials... paper The...
7 Pages(1750 words)Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Essay on topic Why do we distinguish between network administration and systems administration for FREE!

Contact Us