What is network administration? LAN Administration

At the beginning of its history, all computers were autonomous and worked separately from each other. With the increase in the number of machines, there was a need for their joint work. In particular, this related to the work of users on one document. The solution to this problem was the use of global and local networks. The construction of networks necessitated the management of this process, as well as various tasks. Network administration has taken over these functions.

Key Network Administration Features

According to international standards, network administration has the following functions:

  • Failure Management. This includes finding, correctly identifying and resolving all problems and malfunctions in a particular network.
  • Configuration management. We are talking about the configuration of system components, including their location, network addresses, setting parameters of network operating systems, etc.
  • Network accounting. The administration of a computer network includes registration and subsequent control over the resources and devices of the network used.
  • Performance management. It is about providing statistical information about the network for a specified period of time. This is done to minimize the cost of resources and energy, as well as to plan resources for future needs.
  • Security management. The function is responsible for controlling access and maintaining the integrity of all data.

Different sets of these functions are embodied in the products of developers of tools for networks.

System Administrator Responsibilities

The administration of computer networks takes place under the control and guidance of a system administrator, which is faced with the following tasks:

Checking the health of databases.

  • Control over the smooth operation of local networks.
  • Data protection and data integrity.
  • Network protection from illegal access.
  • Adjustment of access rights of local network users to network resources.
  • Backup information.
  • The use of optimal programming methods in order to make full use of available tools and network resources.
  • Maintaining special logs on the network.
  • Implementation of training for users of the local network.
  • Control over the software used.
  • Control over the improvement of the local computer network.
  • Development of network access rights.
  • Suspension of illegal modification of software for the network.

The system administrator is also responsible for informing employees of a particular enterprise or organization about the weaknesses of the network administration system and possible ways of illegal access to it.

Features and criteria for planning systems

Before installing a computer network, you need to find answers to the following questions:

  • What tasks will be solved and what functions will the system perform?
  • How will the computer network be built? (its type, routing, etc.)
  • How many and which computers will be present on the network?
  • What network administration programs will be used?
  • What is the security policy of the organization, where the systems will be installed, etc.

Answers to these questions will allow you to create a system of criteria for a specific computer network, which will include the following items:

  • Preparation, monitoring and testing of programs that will be used daily on the network.
  • Control over the performance and performance of the computers used.
  • Preliminary preparation of system recovery procedures in case of errors or malfunctions.
  • Control over the fact that subsequent installation of the new system will not have a negative impact on the network.

For all these purposes, staff and users need to be trained.

Remote Administration Programs

If necessary, control over the system outside the organization uses remote network administration. For these purposes, special software is used that allows you to control the system and remote access via the Internet in real time. Such programs provide almost complete control over the remote elements of the local network and each computer individually. This makes it possible to remotely control the desktop of each computer on the network, copy or delete different files, work with programs and applications, etc.

There are a huge number of programs for remote access. All programs differ in their protocol and interface. As for the latter, the interface can be console or visual. Common and popular programs are, for example, Windows Remote Desktop, UltraVNC, Apple Remote Desktop, Remote Office Manager, etc.

Network Categories

A network is a combination of various hardware, software, and communication tools that are responsible for the efficient distribution of information resources. All networks can be divided into three categories:

  • Local.
  • Global.
  • Urban.

Global networks provide interaction and data exchange between users who are at great distances from each other. During the operation of such networks, slight delays in the transmission of information may occur, which is caused by a relatively low data transfer rate. The length of global computer networks can reach thousands of kilometers.

City networks operate on a smaller territory, therefore they provide information at medium and high speeds. They do not slow down data as much as global data, but they cannot transmit information over long distances. The length of such computer networks ranges from several kilometers to several hundred kilometers.

The local network provides the highest data transfer rate. Typically, a local network is located inside one or more buildings, and its length takes no more than one kilometer. Most often, a local network is built for one specific organization or enterprise.

Data transfer mechanisms in different networks

The method of transmitting information in global and local networks is different. Global computer networks are primarily connection oriented, i.e. Before transferring data between two users, you must first establish a connection between them. In local computer systems, other methods are used that do not require a preliminary connection. In this case, the information is sent to the user without receiving confirmation of his readiness.

In addition to the difference in speed, there are other differences between the indicated categories of networks. If we are talking about local networks, then here each computer has its own network adapter, which connects it to other computers. For the same purpose, special switching devices are used in urban networks, while global networks use powerful routers that are interconnected by communication channels.

Network infrastructure

A computer network consists of components that can be combined into separate groups:

  • Active network equipment.
  • Cable system.
  • Means of communication.
  • Network applications.
  • Network protocols.
  • Network services.

Each of these levels has its own sublevels and additional components. All devices that connect to an existing network must transmit data in accordance with an algorithm that will be understood by other devices in the system.

Network Administration Tasks

Network administration anticipates working with a specific system at various levels. In the presence of complex corporate networks, the following tasks are before administration:

  • Network planning. Despite the fact that the installation of the system and installation of all components is usually carried out by appropriate specialists, the network administrator often has to change the system, in particular, remove or add individual components to it.
  • Configure network nodes. Administration of local networks in this case provides for work with active network equipment, most often with a network printer.
  • Configure network services. A complex network can have an extensive set of network services, which include network infrastructure, directories, files in print, access to databases, etc.
  • Troubleshooting. Network administration foresees the ability to search for all possible malfunctions, ranging from problems with the router to problems in the settings of network protocols and services.
  • Network protocol settings. This includes such tasks as planning and subsequent configuration of network protocols, testing them and determining the optimal configuration.
  • Finding ways to improve network performance. In particular, we are talking about finding bottlenecks that require the replacement of appropriate equipment.
  • Monitoring network nodes and network traffic.
  • Providing information security. This includes backing up data, developing a security policy for user accounts, using secure communication, etc.

All these tasks must be performed in parallel and comprehensively.

Security Administration

Administration of security tools foresees work in several directions:

  • Distribution of relevant information necessary for the operation of security equipment.
  • Collection and analysis of data on the functioning of security mechanisms.

Administration of local networks in this case includes work with the information base for security management. The following tasks are the duties of the adminstrator in this matter:

  • Key generation and redistribution.
  • Configure and manage network access.
  • Manage encryption using appropriate cryptographic options.
  • Configure and manage traffic and routing.

The system administrator must also distribute information among users that is necessary for successful authentication (passwords, keys, etc.).

System Protection Against Malware

Microsoft Windows has a special Information Support Center, which is responsible for protecting the system from malicious software. In addition, the operating system also has anti-hacking features and automatic updating of all data. Despite this, the system administrator is required to perform additional tasks aimed at protecting the computer network:

  • Access to a computer using various device IDs.
  • Set a ban on recording information on removable drives.
  • Encryption of removable storage media, etc.

Network administration is an action aimed at implementing the security policy, reliability and accessibility of network information resources. For these purposes, appropriate software and hardware are used, and a number of duties and tasks are proclaimed to the system administrator.

Source: https://habr.com/ru/post/K5722/


All Articles