For computer networks to enter normal operation and service, the routine task of network administrators is the operation, maintenance and management of the network.
In the information society, people are not allowed to support the support of the computer network for a moment. The network administrator's responsibilities are to ensure that the network maintained 24 hours a day, 7 days a week, normal operation 365 days a year. When the network is working properly, people often don't pay attention to your work outcomes and your important role. Once the network has failed, you often become focus on focus, and Therefore, as a qualified network administrator, you need to have a wide technical background knowledge, you need to master all kinds of systems and equipment configuration and operation, need to read and mature the instructions for the various systems and equipment in the network system, so When the system or network is faulty, it is possible to quickly determine the problem, give a solution, so that the network quickly returns to normal services.
Although the daily work of the network administrator is very complicated, we believe that the main tasks of its work have seven, this is network infrastructure management, network operating system management, network application system management, network user management, network security confidential management, information storage Backup management and network computer room management. These management involve multiple fields, and management of each area has their own specific tasks.
Under the normal operation of the network, the management of the network administrator's network infrastructure mainly includes ensuring that the network communication is smooth; master the configuration of the local domain owner and the configuration parameter change, back up the configuration files of each device; The backup device is equipped with a corresponding backup device; responsible for the management of network wiring wiring frames to ensure reasonable or order of wiring; master the user-end device to access the network, so that the problem can be quickly positioned; Taking technical measures, the user needs to change the location and department in the network; master the connection configuration of the external network, supervise the network communication status, and find problems, timely contact with relevant agencies; real-time monitoring of the operation and network of the entire local area network Communication traffic; formulate, release network infrastructure use management measures and supervise the implementation.
One of the core tasks when the network administrator maintains the network operation environment is network operating system management. After the network operating system configuration is completed and put in normal operation, in order to ensure that the network operating system works normally, the network administrator should first be able to skilled the various management tool software provided by the system, the operation of the system, and timely discovery the fault sign and Treatment. During the network operation, network administrators should keep up with the network system configuration and configuration parameter change, and back up the configuration parameters. Network administrators should also do with system environmental changes, business development needs and user needs, dynamic adjustment system configuration parameters, optimize system performance. Finally, network administrators should also establish a hot backup system for critical network operating system servers and prepare disaster prevention. Because the network operating system is a network application software and network user's work platform, this network service will fall into a state of paralysis.
For ordinary users, the value of computer network is mainly reflected in the services of various network applications. Another important responsibility for network administrators daily system maintenance is to ensure the uninterruptible and working performance of these services. Any system cannot never malfunction, the key is how the loss and impact control caused by the failure will be within the minimum range. For key network applications that require uninterrupted, network administrators must establish a hot backup of the system on the hardware means in addition to the software tools, backup system configuration parameters and regular backup system services, in addition to software tools. For network application system services for users with high user access, the network application system service larger than the system load is necessary, the network administrator should also take technical measures for load balancing.
In addition to system management through software maintenance, network administrators also need to serve network users. User service and management have a large part of the network administrator's daily workload, including: user account accounting and cancellation management, user group settings and management, users use system services and resources permission management and quota management, User billing management, and user-end support services for technical support services including user desktop computers and user technical training services. The purpose of building a computer network is to provide users with services, and network administrators must adhere to the principles of people-oriented, service-oriented. The non-defense network is like opening the door, and the network administrator must pay special attention to the security and confidentiality management of the network while providing network services. Safety and confidentiality is two aspects of a problem, and safety mainly refers to the prevention of external attacks and invasions on the network, and confidentiality mainly refers to the prevention of internal information from internal information. The task of network administrators is also different depending on the level of security confidentiality requirements of the maintained computer network. For nematic networks, network administrators' tasks are mainly configured to manage system firewalls. In order to be able to find and prevent online hackers from attacking, the intrusion detection software system provides security protection for key services. For networks with high security confidentiality, network administrators should be equipped with network security vulnerability scanning systems, and the key network server takes a technical means for disaster recovery. More stringent confidential computer networks, also requires absolute isolation in physically and external public computer networks; safety measures to resettle-related network computers and network backend equipment rooms, control management personnel; Work situation should be fully monitored.
What is the most expensive thing in a computer network? Not a device, not computer software, but data and information. Any device is damaged. Any software is over time, the equipment damage can be re-purchased, the software can be updated, the information and data are lost, and the loss will not make up. Therefore, network administrators have an important responsibility, which is to take all possible technical means and management measures to protect the banks in the network, and the smashing stools are exhausted, and they are 蟛 蟛 叩 南 低 褪 荩 畹 畹Drag ω 薅 绻芾 碓 灿 ω ω Ω Media ⒋ 娲 ⒈ 菹 菹 菹 惺 菔 菟媸 菟媸 嬖诎 氐愀 浅 浅 匾 匾 匾 匾
The network computer room is the main place of resettlement network system key devices. It is a venue for the daily work of network administrators. Depending on the network size, the function of the network computer room is also different. A regular network computer room is usually divided into network trunk equipment area, web server equipment area, system commissioning maintenance area, software development zone, and air conditioning power supply area. For the daily management of the network computer room, the network administrator's task is to control the wiring of the computer room data communication cable, ensure reasonable wiring, easy to manage, manage the power supply line arrangement, pay or decrease the equipment, pay attention to the load when it increase or decrease equipment Reasonable configuration; managing the temperature, humidity, and ventilation status of the network computer room, providing suitable working environment; ensuring normal operation of various equipment in the network machine room; ensuring that the network computer room meets fire safety requirements, the fire monitoring system is working properly, fire extinguishing measures; Measures, when external power supply accidental disruption and recovery, realize the safe operation of network equipment in unattended cases. In addition, keep the machine room clean and orderly, record the network computer room operation log, and develop the network engine room management system and supervise the implementation, and the daily basic responsibility of the network administrator.
Network configuration facade
During the construction of a computer network, the hardware installation of the network infrastructure is completed, and the network is only connected to the hardware. Support without a software environment still cannot provide any services to ordinary users. Therefore, network administrators need a series of configuration operations to the network. Network configuration can actually be divided into two types: network system configuration and network application configuration. The former is a system environment that builds a network, and the latter is the application environment for users. The network system configuration refers to the network device hardware network parameter configuration and network software configuration. When the network administrator is configured by a network system, the configuration content involved primarily includes network backbone equipment communication parameter configuration, WAN communication routing configuration, LAN operating system configuration, customer system configuration, network security configuration, and network management configuration.
The network backbone device communication parameter configuration is the first step in connecting all devices in the network. After the network main device is completed after the hardware installation is completed, the network administrator needs to use the console port on the hardware device to access a computer, and the communication parameters are configured by using its built-in management software system through the computer terminal software.
The complexity of the network's backbone device configuration is related to the size of the network, and the device type. Simple single-use devices may have been built into network communication parameters, which can be used directly. Computer networks that are hierarchically managed by multiple switches, if multiple network communication protocols and management control protocols are supported, the configuration may be more complicated. Network administrators not only need to familiarize with these devices, master the configuration operation, but also master how to save the configuration of the configured system parameters so that when the original configuration parameters are destroyed because of the reason or equipment, it can quickly Perform system recovery.
When the established computer network needs to connect to an external computer network, whether the connected network is a private data communication network or a public data communication network, the network administrator needs to make a wide area network communication configuration. Configure a variety of operations based on the ways connected to the external network and the equipment used. If you are connected to an external connection through a dedicated hardware router, you typically need to use the management system built in the router to perform parameter configuration, and the operation mode is similar to the configuration of the network switch. If it is an external connection established by software routing on a normal computer or server, the computer software system needs to be configured.
Computer networks built within a mechanism are usually used by local area network technology. Therefore, the network administrator also needs to install the selected LAN operating system after the configuration of the network backend communication device is completed. LAN operating systems are usually installed on one server. The content of the LAN operating system configuration mainly includes the server itself network parameter configuration, network use environment configuration, network management environment configuration, network system administrator and operator configuration, ordinary network user, and user group establishment and its network resource usage rights configuration, High-level network communication protocol configuration, network system resource and system service configuration, etc.
After completing the configuration of the LAN system platform, the next task of the network administrator is to configure client systems and network connections for users. The client operating system selection principle, one is to configure the user's computer hardware configuration according to the user's computer hardware configuration, and the second is to support the client system according to the network operating system platform. The main content of the network connection configuration is the configuration of the client network adapter driver, the configuration of the network communication protocol, and the configuration of the network connection parameters.
When the entire network configuration is completed, after the test can work properly, network security configuration can be performed according to network planning and design requirements. The network security configuration is dominated by the management of the communication connection of the local area network and the external network, while taking into account the user behavior inside the management bodies network. Network Security The first is the configuration of the system firewall, which may be a specialized device, which may be constructed by the router configured with the firewall function, or may be constructed from firewall software installed on a computer. Regardless of the form, you need to perform parameter configuration operations. In addition, the firewall is a device that bridges two networks. Before performing software parameter configuration, you must first make sure it works fine.
There is also a very important content in the network system configuration, which is the network management configuration. If the local area network is connected to the internet connection, in order for our networks to be an integral part of the Internet, you need to apply for Internet domain names and IP addresses over the Internet access mechanism, and establish, configure DNS domain names for the Internet. In addition, in order to facilitate network administrators to oversee the operation of the entire network system and troubleshoot communication devices in remote management, control, and operation networks, many networks have a specific network management software. It needs to be installed on the specified computer and can be used after configuration. After completing the network system configuration, the network administrator established by the network administrator can use its own user name and the obtained user network login password into the network. What services can be obtained after the user enters the network, you can use those network sharing resources, you need to further provide a network administrator. This is the network resource sharing and application configuration.
The network sharing resources is one of the main purposes of the construction network. Resource sharing can be divided into two categories of hardware resources and information resources, with information resource sharing is mainly implemented through web application systems. The network sharing of hardware devices can improve their utilization, and greatly saving investment expenses of public equipment. When considering the device sharing scheme, the network administrator needs to consider the type and layout of the shared device, and configure the use of the relevant users and user groups according to the use of different devices and the unit management regulations.
Network application systems can be divided into two categories. One is a general network application system, and the other is a dedicated network application system configuration.
General Network Application System refers to network services that usually all network users, such as email services, network information browsing services, website information publishing services, network file transfer services, remote computer system login services, etc.
If the network administrator wants to provide the user with your own email service, you must purchase the corresponding mail server software to configure a specific computer or server as a mail server. Administrators must master the configuration, run, and management technology of the mail server, manage users and services of the mail server.
If the network administrator wants to provide users with an Internet-based network information browsing service (web information browsing service), you must configure the way to access the Internet. If the network of use management agencies are not allowed to access the Internet directly from the Internet, you need to establish an access gateway. The access gateway can access the Internet to control, manage, and billing users, and can provide transparent Internet information proxy access services to users with the Internet without direct connection. Therefore, providing such Internet information access services requires network administrators to purchase dedicated software installed on a dedicated computer and can be implemented after the parameter configuration.
If you need to build your own management website information release service, the network administrator needs to establish a website server in the network, install it on the server, configure the WEB-based Internet information release system software.
As for common network information services such as network file transfer services and remote computer system login services, if you don't need to build your own servers, the default configuration of the network operating system can often meet the needs of users.
The above listed is only a common general network application system. GM usually has commercial software, or as an integral part of the network operating system, generally to be configured to provide services.
A dedicated network application system refers to a software system for a particular service for a particular business using agency for a particular application. Such systems are typically installed on a dedicated server in the network. The network administrator's responsibility is to assist the application's administrator to complete a variety of network parameters, so that these systems can serve smoothly.
[As a qualified network administrator, you need to have a wide technical background knowledge, you need to master the configuration and operation of various systems and equipment, need to read and understand various systems and equipment in network systems [/ color ]