Network Administrator

In: Computers and Technology

Submitted By philoo
Words 1088
Pages 5
Security Risk Analysis of time in expansion of network
IT projects can be many times a daunting task to both the contracted IT Company and the clients. With some short deadlines, there is usually a small window of opportunity to present skills and produce positive results. As a network administrator, the pressure to deliver top notch and a robust system is a priority. U.S. industry Inc is just a young company that has both the quality and skills and knowledge to produce excellent work considering previous contracts that have been undertaken by the company. The US government department aims to expand its network infrastructure to enlarge the capacity and enable it provide quality services.

The cost estimation of the contract is approximately three $3 million dollars lasting for a period of six months. A network administrator’s roles include:

Ø setting up of the network

Ø Designing and planning of the network

Ø Expanding the network

Ø Network maintenance

Designing and planning of the network

a network administrator is tasked with identify the US government departments requirement that necessitates the kind of system to set up. The US department may require certain special specification of their particular network depending on its purpose and objectives. It marks the first phase of the contract.

Setting up a network

The second phase is where the physical is setting up, and configuration of the network begins. Hardware installation and files, data, routers and host configuration is done at this level. A systematic method is utilized designed by the administrator of how the network will work.

Maintain the network

it is usually the third phase that involves adding new machines to host the network, network security administration, network service administration and troubleshooting networking problems.

Expanding the network…...

Similar Documents


...proof of harm and public outcry, before the government will act to restrict or ban any chemical. And that is no accident. The current regulatory system allows synthetic chemicals into our lives unless proven beyond doubt to be dangerous. Terms Dioxins are not intentionally manufactured. They are unintentionally formed as byproducts of chemical processes involving chlorine, such as the manufacture of pesticides and the bleaching of paper. The manufacture and incineration of plastics such as polyvinyl chloride (PVC, commonly used in consumer product packaging and medical devices) is another major source of dioxin. Two of the most serious health effects of dioxin exposure are cancer and endocrine disruption. The endocrine system is a complex network of glands and hormones that regulate many of the body's functions including growth, development, and maturation, and the way various organs operate. The endocrine glands –- including the pituitary, thyroid, adrenal, thymus, pancreas, ovaries, and testes – release carefully-measured amounts of hormones into the bloodstream that act as natural chemical messengers, traveling to different parts of the body in order to control and adjust many life functions. An endocrine disruptor is a chemical that, when absorbed into the body, either mimics or blocks hormones and disrupts the body's normal functions. This disruption can happen through altering normal hormone levels, halting or stimulating the production of hormones, or changing the way......

Words: 2956 - Pages: 12

It Administrator

...(wait for service). In a very short time, transaction queuing causes performance to degrade at a rapid rate as depicted in the graph below. Copyright ©2010 TeamQuest Corporation. All Rights Reserved. 6 of 11 Getting Started: Implementing Capacity Management White Paper In order to more accurately predict computer system performance, Analytical Modeling or Event Simulation techniques must be employed. Event Simulation techniques are the most accurate, but are also the most time consuming. Event Simulation does what the name implies; it uses computer software to simulate the running of all the work on the infrastructure components. In order to do this work, modelers need to identify each individual transaction, process and/or network packet and enter it into the model. Depending on the size of the model, it could take weeks or months to complete the work. On the other hand, analytical modeling uses mathematical equations to predict future performance. It can be very accurate as well; results usually fall within 5% of actual conditions. Because the software has mathematical background, you can generate many more models in the same period of time. It is also much easier to run a variety of what-if scenarios. Most people who model employ analytical modeling software. Financials Capacity Management needs to be concerned with financials. You can have the best provisioning plan in the world but it is of little value if the business cannot afford to implement it. Money......

Words: 4975 - Pages: 20


...and Domain Consolidation 13 System Administration 15 Operating Systems 17 Email System 19 Maintenance 21 Network Security 23 Summary 25 References 26 Technology Analysis and Assessment Plan Listed below is a simple diagram of the hardware layout in Acme Gym Inc., a small local fitness company that serves the community from a single location. Following the diagram is a detailed description of the current technology available on-site and an assessment of its weaknesses. There are currently four workstation computers located across several office locations. All four workstations currently contain essentially the same hardware and software consisting of: * Microsoft Windows XP operating system * 2 GHz CPU * 2 GB RAM * 120 GB Hard drive * DVD burner drive * Built-in USB and Ethernet ports The server on-site is currently running Microsoft Windows Server 2000 operating system. It contains the following hardware: * 2 each removable 250 GB hard drives in a RAID configuration (one drive used as a ghost drive, to ensure data integrity) * 2 GHz CPU * 2 GB RAM * DVD burner drive * Built-in USB and Ethernet ports The server currently maintains all customer related databases and also serves as domain ( and email host for the company. A standalone printer is the only peripheral currently connected to the network via the six-port switch and is available to all workstations. All workstations have a single Ethernet......

Words: 5202 - Pages: 21


... goal-oriented, focused and ambitious person with Computer Hardware & Networking, and Microsoft Certified System Engineering background. I have a dedicated insight into the needs and views of others, and the ability to identify issues or crisis areas and form inventive information technology solutions. My areas of strength include; Networking and System Administration/Security Objectives I aspire to become a Network Systems Security Analyst and Database Administrator and to work in a demanding, competitive, fulfilling and an exciting environment to bring out the best in me. ------------------------------------------------- Education And Professional Qualification Certification Status | Credential | Certification / Version | | Date Achieved | | Ubiquiti airMAX & Unifi Wi-Fi Training | airMAX Certified & Unifi Wi-Fi | | April 12, 2013 | | Modules: * Understanding Wireless Communication * Active Server Pages * Link Planning and ManagementMicrosoft Certified Technology Specialist | Administrator. * Ubiquiti Protocols and Technologies * Hands-on UniFi Campus WIFI Course * RF FundamentalsMicrosoft Internet Security and Acceleration (ISA) Server 2006, Configuration | | Feb 19, 2010 | | Microsoft Certified Professional | Installing, Configuring, and Administering Windows XP Professional | | Feb 23, 2008 | Microsoft Certified System Engineering (MCSE),......

Words: 774 - Pages: 4

Administrator social media and the free-flow of conversations that the phenomenon enables and endorses (Lalwani, 2012). In just a few short years, social media has grown into a global phenomenon, with hundreds of millions of users all over the world. With so many people logging into check their accounts every day, it’s little wonder that businesses have begun to look at social media for their own marketing efforts. With the advent of social media giants like YouTube (2005), Facebook (2005), and Twitter (2007), millions of people all over the world have gained the ability to connect like never before, and more importantly, create and share content of their own without much effort and in a timely manner. Massive participation in these social networks is reflected in the countless number of videos, comments, news, and status updates that are constantly posted and discussed in social sites such as Facebook, Digg, and Twitter. The effect of this proliferation is evident from the numbers that these websites boast of as well as the global demographics that engage these services on a daily basis. We are in, what is known as, the Information Age, defined as “a period that will be characterized by the ability of individuals to transfer information freely, and to have instant access to information that would have been difficult or impossible to find previously.” And in this age, where information is readily available in mammoth quantities and types, there is a new brand of economics, which...

Words: 2805 - Pages: 12

Network Administrator

...during [1/6/2013 -2/12/2013] in [IT401-1301A] with [Kay N. Crook]." Re-use: "This task contains portions of material that were originally submitted during [8/19/2012 -9/26/2012] in [ENGL205-1203B-04] with [Carmen Kimble]." IT326-1401A-01: Network Infrastructure Administration D & S Residential Services Network Implementation Plan-2014 Titius Ivie February 3, 2014 Table of Contents Target Organization 5 Corporate Structure 5 Business Goal 5 Part 1: Proposed Network Solution 7 Network Configuration 7 Transmission Media 7 Targeted Users 8 Hardware and Software Requirements 8 Production Applications 10 External and Internal Costs 11 Personnel (External Costs) 11 Hardware and Software (Internal Costs) 12 Short Term and Long Term Benefits to the Organization 13 Part 2: Network Design 14 Physical Topology 14 Part 3: Installation and Configuration 15 Installation and Configuration Steps 15 Part 4: Maintenance and Troubleshooting 19 Maintaining servers on the network 19 Maintaining PCs on the network 19 Implementing security 20 Managing network connections 21 Unauthorized Usage 21 Proper Network Operating System 22 Training users 23 Conclusion 24 Part 5: Remote Access 26 Network Pro Prep Toolkit Screenshots 27 Screenshot of Completed Labs--Phase 1 27 Screenshot of Completed Labs--Phase 2 28 Screenshot of Completed Labs--Phase 3 32 References 35 Target Organization D & S Residential Services has been......

Words: 4303 - Pages: 18

System Administrator

...Career Choice: Network and Computer Systems Administrator Business and Writing for the IT Professional July 26, 2009 Abstract A network and systems administrator is responsible for network security, installing new applications, implementing software updates, monitoring the integrity of the system, developing management programs, and performing routine backups. As has been noted throughout my research, there has been a decline in technology majors throughout the past couple of years, thus affecting the job market. The survey that was conducted on high school seniors, as well as research done by some universities, has proven that lack of information and interest affects this type of career choice. By properly informing potential technology students and offering them resources, we can better equip our future system and network administrators to perform to their potential. Topic Proposal Author Background An interest in computers came to my attention shortly after graduating from high school. I first involved myself in working with cameras and fixing them for several customers. The satisfying knowledge that I gained came from realizing that I could take apart, fix a piece of technology and do it well. Computers as a hobby came only after my brother gave me one to fix and keep for my use. Although I was daunted at first, I took apart and drew diagrams, to remember where the components where located. I had no previous experience from computers that I had learned...

Words: 1945 - Pages: 8

Network Administrator

...Cisco Certified Network Associate (CCNA). • 2 years and 8 months of experience as Network Engineer (Windows/Linux/Network). Possess the expertise in the following: Networking • Installations, Configurations and Troubleshooting of; • Wireless local Area network (WLAN) • Local Area Network (LAN) and Wide Area Network (WAN) Security • Wimax CPE (Alvarion) for SAFARICOM and ACCESSKENYA networks • Free Space Optic link (FSO) • Mikrotik CPE and router. • Nanostation 2.4Ghz and 5Ghz • Cisco routers and switches • Firewalls rules implementation • VoIP servers using IP PABX • Network IP planning • Software and hardware Windows • Installations, Configurations and Troubleshooting of Windows (2000/2003/XP/vista and 7), DNS, DHCP, TCP/IP, Permission Management, Terminal services, and Administration of Antivirus Server, Server/Client application management, Registry Editing and analysis system, Design implementing and troubleshooting LAN, WAN as First Level Support. Linux • Installation, Management and Troubleshooting, User Administration, Monitoring, NAT, TCP/IP, kernel configuration, Proxy Server, Network File Server, Router, Firewall, DNS, DHCP and MAIL. Roles at Popote Wireless; (2008 April to Date) • Providing network......

Words: 1141 - Pages: 5

Network Systems Administrator Tools

...DEPARTMENT ITSA 255 – Information Systems Security Assignment 4 – Network System Administrator Tools/Utilities Students are to perform independent Internet research and write a short paragraph describing the functionality and utilization for each of the following Network System Administrator Tools/Utilities: * FileZilla FileZilla is a cross platform File Transfer Protocol (FTP) application software that allows the ability to transfer multiple files over the internet. It is made up of a FileZilla client and a FileZilla server. It is available for use with Windows, Linux and MAC OSX. It supports FTP, SFTP (SSH File Transfer protocol), FTPS (FTP secure). Some of the features include support in IPv6, Drag and Drop, Filename feature, Remote file editing, FTP proxy support and much more. It includes two methods to invoke security which is the explicit method and implicit method. Many bug fixes and vulnerability patches were made over the initial release of June 22, 2001. * Nessus Nessus is a open source cross-platform network vulnerability scanner software developed by Tenable Network Security. First introduced during 1998; it was created to be used as a free remote security scanner to the internet community. It allows for various scanning which scans a computer and raises an alert if it discovers any vulnerability that hackers could use to gain access to a computer that is connected to a network. Nessus scans for a certain range of vulnerabilities. It scans......

Words: 856 - Pages: 4

Network Systems Administrator

...Police Unlawfulness in Unmarked Public Vehicles name ITT Technical Institute Author Note For additional information please -address Abstract I propose that under RCW 46.08.065 all police in publicly owned vehicles whom do not adhere this law are dealt with in a lawful manner. Police officers have been known to pull people over in unmarked vehicles which is illegal in Washington State with small exceptions. If everyday citizens are punished to the extent of the law, so should police officers. Laws in the U.S. tend to exempt a lot of public officials, this should not be ignored. Police Unlawfulness in Unmarked Public Vehicles Understanding Law enforcement officers are paid a good deal of tax money to do their job. Keeping the law enforcement officer’s honorable and honest falls to the state, city and county of which they perform their duties. By recording and fallowing through each illegal activity performed by on duty police officers including giving citations in unmarked vehicles Public Servants Police officers are considered to be by law public servants. If police are performing duties outside of the given law, they are no longer considered public servants and should be handled accordingly. Better training and knowledge of the law would help public servants acquire a better knowledge base for performing their jobs duties. Law training. It has been proven that law enforcement officers with better classroom and hands on training are more successful. If police...

Words: 654 - Pages: 3


...relevance is that these two groups (Palestinian’s and Israeli’s) have a very sensitive past. Communicating back and forth using virtual-humans is fascinating, because we want to see the difference between traditional Face-to-Face and digital contact (mimicry technology) from a distance. After a series of tests, what the reporters have found, was that using mimicry technology (technology that mimics behavior) increased the levels of empathy one showed toward each other rather than the traditional method of Face-To-Face method. This is a profound discovery because this can really influence world peace treaties worldwide and also use technology to develop third world countries simply by the new increase in demand for upgrading systems and networks globally to run the newer technology. The reason this is important to upgrade technology all over the world, is if this science truly works, we can produce more peace and less destruction over time leaving more money for construction rather than destruction. The end result was that mimicry technology works with hostile groups when it comes to communicating amongst each other more peacefully. This communication style increases empathy towards one another and therefor results in more peaceful behaviors. I personally believe it is because by communicating digitally it would not be such a treat VS. Standing in a warzone making very important life-altering decisions with armies all around. If we incorporate this technology more than we......

Words: 553 - Pages: 3

Cybersecurity Administrator

...Computer Networking Systems 6 Honor Awards: 3.5- 4.0 GPA Davidson Technologies Inc. 04/2013 – Present System Administrator * Experience with Configuration Win XP, Vista, 7 Pro, 8, 2008 R2, 2012 R2, VMware, and Linux OSs * Security wipes on HDD and reloads on HDD with new OSs for workstations. * Servers, switches, VMware, PBX, and AT&T account management on company wireless phones. * Troubleshooting, Training, setup workstations, printers on the print server, and analyzing network issues. * VOIP Phones setup and management interface for offices being occupied. * Maintain all MS Server for installing, security, backups, and updates. * Inventory and Account setup on all devices for employees. Fiscal System Inc. 7/2011 – 3/2013 IT Support Technician * Remote access to client’s terminals, and sties in a Linux Database environment. * Communications helping with solutions for other help-desk technicians. * Trouble shooting over VPN connection and resolving solutions in different sites. * Support on calls for clients, and ticketing database logging all issues. * Login into multiple sites databases on different networks for trouble shooting. * Following PCI compliance for companies running multiple credit cards. * Updates Company’s site with new updated codes when upon request. * Manage TCP/IP on network devices on companies’ sites. SCG, LLC. 2/2009 – 7/2011 IT Support Specialists * Trained others......

Words: 710 - Pages: 3

Network Administrator

...convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction. This cloud model promotes availability and is composed of five essential characteristics, three service models, and four deployment models.” Cloud Essential Characteristics • On-demand self-service. A consumer can unilaterally provision computing capabilities, such as server time and network storage, as needed automatically without requiring human interaction with each service’s provider. • Broad network access. Capabilities are available over the network and accessed through standard mechanisms that promote use by heterogeneous thin or thick client platforms (e.g., mobile phones, laptops, and PDAs). • Resource pooling. The provider’s computing resources are pooled to serve multiple consumers using a multi-tenant model, with different physical and virtual resources dynamically assigned and reassigned according to consumer demand. There is a sense of location independence in that the customer generally has no control or knowledge over the exact location of the provided resources but may be able to specify location at a higher level of abstraction (e.g., country, state, or datacenter). Examples of resources include storage, processing, memory, network bandwidth, and......

Words: 1499 - Pages: 6

Health Administrator

...Care Administration Health care administrators have wide-ranging influence within the world of medicine. The leadership that these professionals provide sets the future course not only for the facilities they manage but also for the health care system as a whole. A health care administrator is responsible for establishing health care standards, making strategic policy decisions and implementing the personnel management procedures necessary to support his/her vision. In addition to the internal leadership they provide, health care administrators are leaders within the greater community as well. They partner with other health care organizations, comply with government regulations, advocate and testify on behalf of health care policies, and maintain campuses that are significant to communities. (Bureau of Labor Statistics, 2012-13) A bachelor’s degree is the typical entry-level preparation needed for health care administration jobs. Some employers, however, will promote from within or hire other professionals with related experience, such as nurses, who are ideal for an administrative role because of their direct health care knowledge. For high-level executive positions, a graduate education is usually the starting point. This means attaining an MBA, or a different type of master’s degree, or a doctorate in health administration. In most areas of health care administration, a license is not needed. One notable exception is for administrators of long-term care nursing......

Words: 292 - Pages: 2

Network Administrator

...trained professional seeking a challenging position in the information technology field with an opportunity to utilize my experiences and networking skills. EDUCATION Associate of Applied Science Degree in Computer Network Systems ITT Technical Institute, Orland Park Chicago (June 2010 - JUNE 2012) ACADEMIC FOCUS * Computer hardware * Python (Programming) * Windows Server 2008/Active Directory * Linux System Administration * Database Development * Network Standards and Protocols * Network Application Services and Security * Network Technology and Service Integration * Fundamental of Information System and Security SUMMARY OF QUALIFICATIONS * Operating Systems: DOS, Fedora LINUX. Windows NT,Windows Server 2008, Windows XP/7 * Implementing and Supporting the Functions and Administration of Network Information Systems: Included planning, configuring and Installing file server, work station and print servers in the local area environment. Configured and installed Active Directory (Parent/Child DC, RODC, OUs, Group Policy, User Groups, DNS, DHCP) Configured and installed Fedora Linux (Create, Add or Delete users, Web Server, SAMBA Server, DHCP, IP Tables) * Network Background:Peer-to-Peer and server-based network connections using NetBEUI, TCP/IP Configuredand installed Cisco Routers: ( 1700, 2600, 3600)and Cisco Switches (2950, 2960 series and 2948-GL3) Configured and installed communication Radio and WIFI System s......

Words: 317 - Pages: 2