0% found this document useful (0 votes)
17 views

Lecture 01

Uploaded by

akonodarrick
Copyright
© © All Rights Reserved
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
17 views

Lecture 01

Uploaded by

akonodarrick
Copyright
© © All Rights Reserved
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
You are on page 1/ 21

Server and Systems

Administration
Module Code
CSC3504
---------------------
What is System
administration?

System administration refers to


the management of one or more
hardware and software systems.
Who perform System
Administration?

The task is performed by a system


administrator

who monitors system health, monitors and


allocates system resources like disk space,
performs backups, provides user access,
manages user accounts, monitors system
security and performs many other functions
What is server?

A server is a computer, a device or a


program that is dedicated to managing
network resources. A server is a computer
used in a network and which provides a
service to a client. Servers usually have
more processing power, memory and
storage than client computers.
How server look like?
P2P Network architect
P2P
Stands for "Peer to Peer." In a P2P network, the
"peers" are computer systems which are
connected to each other via the Internet.
Files can be shared directly without the need of
a central server.
P2P use a distributed architecture.
The computers or devices that are part of a
peer-to-peer network are called peers.
There are no privileged peers, and there is no
central administrator device
What do P2P (peer-to-
peer) networks do?

The primary purpose of peer-to-peer


networks is to share resources and
help computers and devices work
collaboratively, to deliver a specific
service or perform a particular task.
Security Concerns
Like client-server networks, peer-to-peer networks are
vulnerable to security attacks.

Because each device participates in communication hackers can


easily launch denial of service attacks(DoS).
P2P software acts as server and client, which makes peer-to-peer
networks more vulnerable to remote attacks than client-server
networks.
Data that is corrupt can be shared on P2P networks by modifying
files that are already on the network to introduce malicious code.
Client-Server Network
Client-Server Network

A Computer networking model where


one or more powerful computers
(servers) provide network services and
all other computers (clients) access
those services to perform user's tasks.
Client-Server Description
 A server is a specialized computer that
controls the network resources and provides
services to other computers in the network.
 A server performs all the major operations
like security and network management.
 A server is also responsible for managing all
the network resources such as files,
directories, applications & shared devices
like printer etc.
Client-Server Description
 If any of the clients wants to access
these services, it first seeks
permission from the server by
sending a request.
Advantages of Client Server
Networks
 Centralized back up is possible.
 Use of dedicated server improves the
performance of whole system.
 Security is better in these networks as all
the shared resources are centrally
administered.
 Use of dedicated servers also increases
the speed of sharing resources.
Disadvantages of Client
Server Networks
It requires specialized servers with large
memory and secondary storage. This
leads to increase in the cost.
The cost of network operating system that
manages the various clients is also high.
It requires dedicated network
administrator.
Traffic congestion is a problem in this
system.
Disadvantages of Client
Server Networks
1. User administration (setup and maintaining
account)
2. Maintaining system
3. Verify that peripherals are working properly
4. Quickly arrange repair for hardware in occasion
of hardware failure
5. Monitor system performance
6. Create file systems
7. Install software
Disadvantages of Client
Server Networks
1. Create a backup and recover policy
2. Monitor network communication
3. Update system as soon as new version
of OS and application software comes
out
4. Implement the policies for the use of the
computer system and network
5. Password and identity management
States of machines or Process Life
Cycle
States of machines or Process
Life Cycle
States of machines or Process
Life Cycle
Start: This is the initial state when a process is first
started/created.
Ready: The process is waiting to be assigned to a
processor.
Running: processor executes its instructions.
Waiting: Process moves into the waiting state if it
needs to wait for a resource, such as waiting for
user input, or waiting for a file to become available.
Terminated or Exit: the process is moved to the
terminated state where it waits to be removed from
main memory.
Thank you

You might also like