CIT 218-Systems Administration and Maintenance - Unit 2
CIT 218-Systems Administration and Maintenance - Unit 2
Objectives:
Infrastructure Services 2
At the end of the unit, the student must have:
• learned about the physical infrastructure services in an organization that make
server management easier;
• discussed what communication services are available and what you need for an
organization; and
• demonstrated how to ran a local webserver and understood how a public
webserver works.
1
2.2.1 Types of IT Infrastructure Services
There are lots of types of IT infrastructure services out there. We'll start by giving you a high
level overview of them in this lesson, then we'll dive into the nitty gritty details on how you configure
and maintain these services and later lessons. Sounds good? Let's get started.
We talked about physical infrastructure components of an IT environment in an earlier
lesson. Remember that you can set up different servers to run your services on, like a server to run
your file storage service. You can buy or rent hardware for these servers and set up and store
them either on-site, or at another location. Essentially, you manage these servers end-to-end.
There's another option. If you don't want to be responsible for managing the hardware tasks and
updating your server operating systems security patches and updates, you can use the Cloud
alternative to maintain your own infrastructure, which is called Infrastructure as a Service, or IaaS.
IaaS providers give you pre-configured virtual machines that you can use just as if you had
a physical server. Some popular IaaS providers are, Amazon Web Services and their Elastic
Compute Cloud or EC2 instances, Linode, which runs out virtual servers, Windows Azure, and
Google Compute Engine.
Your company's internal network, isn't going to be like your network at home. You're going to
have multiple computers that need to be on a certain subnet. You have to assign them IP
addresses statically or using DHCP. The networking hardware has to be set up, wireless internet
will probably need to be available, DNS needs to be working et cetera. If your company is large,
networking is usually taken care of by a dedicated team. But in smaller companies, you'll probably
be responsible for setting up the network. Network can be integrated in an IaaS provider, but in
recent years, it's also been branched off into its own Cloud service, Networking as a Service or
NaaS.
NaaS allows companies to offshore their networking services so that they don't have to deal
with the expensive networking hardware. Companies also won't have to set up their own network
security, manage their own routing, set up a WAN and private internets, and so on.
Let's talk about the software that your company might want to use. Do you need to type out
word documents, use an email client, communicate with other people, use operating systems,
process spreadsheets or have any of other software needed to run a business? I bet yes. The right
software has to be available to your company's users. You have to deal with things like licenses,
security, updates, and maintenance for each machine.
The Cloud alternative to maintaining your own software is known as Software as a Service,
or SaaS. Instead of installing a word processor on every machine, you can use Microsoft Office 365
or Google G suite. These are both services that you can purchase that allow you to edit word
documents, process spreadsheets, make presentations and more, all from a web browser.
Some companies have a product built around a software application. In this case, there is
some things that software developers need to be able to code, build and shape their software.
First, specific applications have to be installed for their programming development environment.
Then, depending on the product, they might need a database to store information. Finally, if they're
serving web content like a website, they'll need to publish their product on the internet. If you're
building this entire pipeline yourself, you may need to set up a database and a web server. The
programming development environment will also have to be installed on every machine that needs
it. If you want an all-in-one solution to building and deploying a web application, you can use
something called Platform as a Service, or PaaS. This includes an entire platform that allows you to
build code, store information in a database, and serve your application from a single platform.
Popular options for PaaS are, Heroku, Windows Azure, and Google App Engine.
The last IT infrastructure service we'll discuss is the management of users, access and
authorization. A directory service, centralizes your organizations users and computers in one location
so that you can add, update, and remove users and computers. Some popular directory services
that you can set up are Windows Active Directory, OpenLDAP, and we'll dive a little deeper into
both of these later on in this course.
Directory services can also be deployed in the Cloud using Directory as a Service, or DaaS
providers. This is a general overview of the most common IT infrastructure services you'll encounter
when handling system administration tasks. While Cloud Services are a great option, it's super
important that you understand how a service works and how to maintain before you employ the
help of a Cloud Service. Even though Cloud Service are widely used in the industry, and have a lot
of pros, there are also some cons. These include recurring cost, and the need to depend on the
2
providers service. We're going to teach you about the technical details and the implementation of
these common IT infrastructure services. We'll cover everything from setting up your own server, and
figuring out which applications you need to be productive, to how to set up the IT infrastructure, for
a small organization.
4
to let them know that when they access your website, you're keeping their interaction with you as
secure as possible. Let's say that you have an online bank account that you're logging into.
The URL will most likely begin with an HTTPS. Remember that HTTP stands for HyperText
Transfer Protocol, which is used to format and transfer web content around the Internet. When you
enter in a URL, you notice that HTTP comes before everything else. HTTPS, or Hypertext Transfer
Protocol Secure is a secure version of HTTP. It makes sure the communication your web browser
has with the website is secured through encryption. HTTPS is also referred to as HTTP over TLS or
HTTP over SSL. This is because there are two protocols that enables us to make our web servers
secure.
The first is Transport Layer Security protocol, or TLS, which is the most popular way to keep
communications secure over a network. TLS is widely used to keep web browsing secure, but it can
be used in a lot of other applications, too. We'll do a deep dive into the technical
details of TLS in a later course.
The second protocol is Secure Socket Layer protocol, or SSL. It's a way of securing
communication between a web server and client. But it's pretty old and insecure, so it's been
deprecated in favor of TLS. You may still see it today being used over the TLS protocol like
SSL/TLS. The two protocols are often used interchangeably. In fact, SSL version 3.0,
was essentially TLS version 1.0. But TLS's new features and updates have made it more secure
than SSL. So if you're managing an organization's website on a server, how do you enable TLS on
the server so that the site can be using HTTPS?
Well, you need to get a digital certificate of trust from an entity called a certificate authority.
The certificate authority grants a certificate to your website saying that it trusts that you control the
web server. And verifies that you are who you say you are. Once it does that, you can install
the certificate on your web server. That way, when users visit your site, they'll see the HTTPS in
the URL instead of just HTTP. For now, think of certificates as a way to verify that something is
trustworthy.
Security is an integral part of IT, and it's not just the responsibility of security engineers.
Everyone should be thinking about security. And all layers of your infrastructure should have a layer
of security built upon them. There are lots of other security software that you can add to your IT
infrastructure, which we'll dive into in the last course. For now, it's a good idea to know the basics
of keeping a web server secure with HTTPS.
6
Cloud, in that case you want to synchronize your data to another location in case something
happens to your device.
Maybe you remember from an earlier discussion how each app on your mobile device has a
specific location where it's allowed to store data. Well IOS and Android both supports backing up
this app data to the Cloud. Not only will these mobile OSs backup app data but also your devices'
accounts and settings, too. Want to know more about how to set up device backup to the Cloud?
Then check it out on google. :)
When you are in service that operates on the web, you need to have a web server that serves
web pages that clients are requested, like we just covered. But you may also need to store
information. Have you ever thought about what happens to your information when you create an
account online for a website? Where do they store that info? Do they print a folder on a web
server? If they do, you need to stop using that service immediately.
Customer information, like news articles, videos, large amounts of text, image or audio files
generally get stored in a database. Databases allow us to store query, filter, and manage large
amounts of data. When you build a web product, you'll probably store the data in a database.
Database servers consist of database software that's running that you're able to read and write
from. Common database systems like MySQL and PostgreSQL are widely used in application and
web development and data analytics. These database systems usually require a knowledge of
special languages or syntaxes to be able to parse and filter through the large amounts of data.
Administrating and managing a database can be incredibly complex. Losing precious data could
cost the company dearly. There's actually an entire job specialization within IT that deals with
databases just like that called database administrators. We won't talk about their role in this
program, but if you're interested in learning more, you should know where to look.
Key-Term Quiz
1. What are some communication services you can utilize in your organization? Choose all that
apply.
a. Email b. Chat Applications c. DNS d. Phones
2. What’s the difference between POP3 and IMAP? Choose all that apply.
a. POP3 can only download email to one local device.
b. IMAP can only download email to multiple devices.
c. POP3 is used for sending emails.
d. IMAP can download emails onto multiple devices.
9
3. True or False: Commercial-use and Personal-use software licenses are essentially the same
thing. ___________.
4. What are the differences between TLS and SSL? Choose all that apply.
a. TLS is the successor to SSL.
b. TLS is more secure than SSL
c. SSL is more secure than TLS
d. SSL is the successor to TLS
5. What are the benefits of setting up an NFS server? Choose all that apply.
a. Connecting to printers
b. Storing files on a network drive
c. Enabling files to be shared over a network
d. Serving web content
6. What methods could you use to set up printing in an organization? Choose all that apply.
a. Directly connecting a printer
b. Setting up a print server
c. Using a cloud service to set up printers
d. Setting up an NFS server
7. When you have a web server, what service is used to enable HTTP requests to be
processed?
a. An HTTP server b. The web server c. HTTP status codes d. A database server
8. You can use a(n)_____________ to store large amounts of customer data for a website.
a. NFS server
b. HTTP server
c. Database server
d. DNS server
9. HTTP status codes that begin with 4xx, like 404, indicate errors on:
a. The client-side
b. The server-side
c. Nowhere; these codes are successful
d. Redirections
10. HTTP status codes that begin 5xx, like 501, indicate errors on:
a. The client-side
b. The server-side
c. Nowhere; these codes are successful
d. Redirections
A consulting project involved a credit card “bottom feeder” (let’s call it Credit Wonder). This
company bought credit card accounts that were written off as uncollectable debts by major banks.
Credit Wonder would buy the write-off accounts for 1 or 2 percent of their value and then would call
the owners of the written-off accounts and “offer a deal” to the credit card account holders.
Credit Wonder wanted a database for these accounts. Legally, it did own them and so could
contact the people who had owed the money—but as prescribed in credit law. For example, Credit
Wonder could call only during certain hours and no more than once a week, and they had to speak
to the actual account holder. Any amount collected over the 1 to 2 percent of the original debt
would be considered a gain. In its database, Credit Wonder wanted a history of what settlement
was offered, the date the account holder was contacted, and additional notes.
10
QUESTIONS:
1. How might a systems analyst manage such a system project?
2. Who would the systems analyst need to interview to get the system requirements?
3. How would a database analyst help in structuring the database requirements?
11