Text
Principles of network and system administration
A single, comprehensive resource that responds to the high demand for specialists who can provide advice to users and handle day-to-day administration, maintenance, and support of computer systems and networks Author approaches both network and system administration from the perspective of the principles that do not change on a day-to-day basis Shows how to discover customer needs and then use that information to identify, interpret, and evaluate system and network requirements New coverage includes Java services and Ipv6
Contents
1 Introduction
1.1 What is network and system administration?
1.2 Applying technology in an environment 16
1.3 The human role in systems 17
1.4 Ethical issues 17
1.5 Is system administration a discipline? 17
1.6 The challenges of system administration 18
1.7 Common practice and good practice 19
1.8 Bugs and emergent phenomena 20
1.9 The meta principles of system administration 20
1.10 Knowledge is a jigsaw puzzle 21
1.11 To the student 22
1.12 Some road-maps 23
2 System components 25
2.1 What is `the system'? 25
2.1.2 Computers 26
2.2 Handling hardware 27
2.3 Operating systems 30
2.4 Filesystems 37
2.5 Processes and job control 55
2.6 Networks 58
2.7 IPv4 networks 67
2.8 Address space in IPv4 76
2.9 IPv6 networks 80
3 Networked communities 89
3.6 Host identities and name services 94
3.7 Common network sharing models 96
3.8 Local Network orientation and analysis 100
4 Host management 123
4.1 Global view, local action 123
4.2 Physical considerations of server room 123
4.3 Computer start-up and shutdown 125
4.4 Configuring and personalizing workstations 128
4.5 Installing a Unix disk 135
4.6 Installation of the operating system 138
4.7 Software Installation 145
4.8 Kernel customization 154
5 User management 161
5.1 Issues 161
5.2 User registration 161
5.3 Account policy 167
5.4 Login environment 168
5.5 User support services 175
5.6 Controlling user resources 177
5.7 Online user services 182
5.8 User well-being 185
5.9 Ethical Conduct of Administrators and Users 187
5.10 Computer Usage Policy 200
6 Models of network and system administration 209
6.1 Information Models and Directory Services 210
6.2 System infra-structure organization 215
6.3 Network administration models 221
6.4 Network management technologies 227
6.5 Creating infra-structure 233
6.6 System maintainence models 238
6.7 Competition, immunity and convergence 240
6.8 Policy and configuration automation 241
6.9 Integrating Multiple OS's 242
7 Configuration and maintenance 249
7.1 System configuration policy 250
7.2 Methods: controlling causes and symptoms 251
7.3 Change management 253
7.4 Declarative languages 254
7.5 Policy configuration and its ethical usage 254
7.6 Common assumptions: clock synchronization 255
7.7 Human-computer job scheduling 256
7.8 Automation of host configuration 263
7.9 Preventative host maintenance 266
7.10 SNMP tools 270
7.11 Cfengine 272
7.12 Database configuration management 283
8 Diagnostics, fault and change management 297
8.1 Fault tolerance and propagation 297
8.2 Networks and small worlds 299
8.3 Causality and dependency 301
8.4 Defining the system 303
8.5 Faults 304
8.6 Cause trees 314
8.7 Probabilistic fault trees 315
8.8 Change management revisited 320
8.9 Game theoretical strategy selection 321
8.10 Monitoring 330
8.11 System performance tuning 332
8.12 Principles of quality assurance 341
9 Application Level Services 349
9.1 Application level services 349
9.2 Proxies and agents 350
9.3 Installing a new service 351
9.5 Setting up the DNS nameservice 356
9.6 Setting up a WWW server 372
9.7 E-mail configuration 384
9.8 OpenLDAP directory service 393
9.9 Mounting NFS disks 394
9.10 Samba 397
9.11 The printer service 398
9.12 Java web and enterprise services 402
10 Network Level Services 411
10.1 The Internet 411
10.2 A recap' of networking concepts 412
10.3 Getting traffic to its destination 413
10.4 Alternative Network Transport technologies 417
10.5 Alternative network connection technologies 420
10.6 IP routing and forwarding 421
10.7 Multi-Protocol Label Switching (MPLS) 427
10.8 Quality of Service 428
10.9 Competition or cooperation for service? 433
10.10 Service Level Agreements 436
11 Principles of security 443
11.1 Four independent issues 444
11.2 Physical security 446
11.3 Trust relationships 447
11.4 Security policy and definition of security 447
11.5 RFC 2196 and BS/ISO 17799 450
11.6 System failure modes 452
11.7 Preventing and minimizing failure modes 460
11.8 Some well-known attacks 465
12 Security implementation 473
12.1 System design and normalization 473
12.2 The recovery plan 474
12.3 Data Integrity and Protection 475
12.4 Authentication methods 484
12.5 Analyzing network security 489
12.6 VPNs: Secure shell and FreeS/WAN 497
12.7 Role based security and capabilities 498
12.8 WWW security 499
12.9 IPSec - secure IP 500
12.10 Ordered access control and policy conflicts 503
12.11 IP filtering for firewalls 505
12.12 Firewalls 506
12.13 Intrusion detection and forensics 511
12.14 Compromised machines 512
13 Analytical system administration 519
13.1 Science vs technology 519
13.2 Studying complex systems 520
13.3 The purpose of observation 522
13.4 Evaluation methods and problems 523
13.5 Evaluating a hierarchical system 524
13.6 Deterministic and stochastic behaviour 538
13.7 Observational errors 548
13.8 Strategic analyses 557
13.9 Summary 558
14 Summary and Outlook 561
14.1 Information management in the future 562
14.2 Collaboration with software engineering 562
14.3 Pervasive computing 563
14.4 The future of system administration 563
A Some useful Unix commands 565
B Programming and compiling 571
B.1 Make 571
B.2 Perl 575
B.3 WWW and CGI programming 597
C Example telnet session 605
D Glossary 615
E Recommended reading 621
No other version available