System and network management tools (A3)
Thomas Mortimer - Task 3 (Unit 20 - Managing and supporting systems)
System and network management tools
___________________________________________________________________________________
Section 1:
Servers and virtual PCs
Servers and virtual PCs are a vital part of any computer network. Often servers and virtual networks work together to achieve a reliable network, A virtual machine is required to run the software side of a computer network hosting and running virtual machines. The virtual machines are responsible for running multiple remote operating systems acting as computing platforms for other local hardware, these operating systems are emulated and virtualised hosting an operating system to the local hardware. The server on the other hand is responsible for the physical hardware on a network supplying a physical local storage area to which all computers on a network have access. Servers are also responsible for the local hardware which the virtual machines run off of allowing them to create multiple virtual operating systems. Finally, if not for the servers the virtual machines will not be able to emulate onto local hardware due to the physical connection between the servers and computers through switches.
However, there are a few key differences between virtual PCs and servers, one key difference is that software is similar to physical computers which run operating systems and their applications whereas, a server uses both hardware and software which provides services that are requested by other computer systems or networks.
Cloud storage
Cloud storage is another storage medium and is a good alternative for backing up vital data and for general storage for pictures, documents and other types of storage. Cloud storage uses a cloud computing model which is designed to store data on the internet through cloud computing providers like one drive and google drive sell this type of storage as a service.
Cloud storage is a great alternative storage method to server storage, Cloud storage is an on-demand service that is accessed when it is needed. However, a major downside of cloud storage is that a company or person is only renting the space to store the data it is not a permanent solution. Owning a server on the other hand allows a one-time payment and a place to store the data permanently but that data is at risk of loss or corruption.
Mobile devices
Mobile devices are small handheld devices like a smartphone, tablet or e-reader which usually connect wirelessly to computer systems and contain a small amount of storage for files and other capabilities. Mobile devices have limited system and network management capabilities but still allow them to access web-based applications like ticket support applications and team chats and other support systems allowing employees to work remotely via their mobile devices.
Laptops
Laptops are devices like desktops. Laptops use a portable design which allows them to be transported around in a compact case or in other methods. Because of a Laptops portability, it can have full access to a systems network and its management tools from any location with a network connection. Laptops also have access to a large amount of data storage.
Laptops are a great alternative for desktops and allow system administrators to remote access into a network in case of any type of network failure and allow them to troubleshoot the systems remotely, this is an excellent solution for diagnosing system errors instead of any onsite monitoring of backups or any other responsibilities.
Desktops
Finally, desktops like laptops are physical computer system which has full access to systems network management tools and can also be run as a virtual system allowing a network to run through that virtual system with all its tools and storage capabilities. However, unlike a laptop, a desktop requires a constant power source to be run instead of an onboard laptop with the tradeoff of performance.
___________________________________________________________________________________
Section 2:
Performance monitoring and management tools
As a computer network administrator there are multiple responsibilities that have to be managed to make sure a network is operating at a productive rate and is performing rate. One of these responsibilities is a performance monitoring and management tools.
Performance Monitoring and management tools are a set of processes and tools to determine how fast applications are running in the cloud. APM tools are installed by developers and infrastructure engineers. Operations teams monitor these systems that are life to make sure all systems are healthy. The industry is dedicated to measuring how well cloud applications, infrastructure, and networks perform. Performance reporting tools also include tools that are developed to monitor the functions of a network like cloud applications, log issues and trace and alert functions. This also determines how fast an application runs.
Provision of user desktop computing by various means, including server virtualisation with thin client computing and web-based applications
Another responsibility that a network administrator has to attend to is the provisioning of user desktop computing through server virtualisation using thin client computing and web-based applications. Doing this allows a network administrator to monitor and assign assets where it is most needed. Using methods like server virtualisation with thin client computing and web-based application allows a network administrator to have full access to the performance of the network.
Server Virtualisations with thin client computing is a method of provisioning user desktop computing by using a computer that runs from resources stored on a central server instead of a localized hard drive. Thin clients work by connecting remotely to a server-based computing environment where most applications, sensitive data, and memory, are stored.
A web-based application is any program that is accessed over a network connection using HTTP, rather than existing within a device’s memory. Web-based applications often run inside a web browser. However, web-based applications also may be client-based, where a small part of the program is downloaded to a user’s desktop, but processing is done over the internet on an external server.
Tools used to create and remotely deploy desktop disk images
Creating and remotely deploying desktop images are another vital responsibility that a network administrator has to take care of. A network administrator must follow some specific steps to image a copy of a operating system onto a remote system. The first step they must follow is configuring active directory permissions, configuring this will allow the admin to add permission which are needed before casting to another system. The next step is to set up a MDT production development share which will create a reference image for the production development step. And this continues on creating permissions and images to allow a system to copy an operating system.
Asset management, including software licenses
Another responsibility that a network administrator has to take care of is managing assets and software licenses. This can include licenses like adobe and office products managing the licenses and user access to those products. Asset management like ensuring the organizations assets are accounted for developed, maintained, upgraded and disposed of when neccissary.
Remote desktop access and control
The final responsibility a network administrator has to attend to is be capable of accessing any computing of a network or connected for business purposes remotely. There are many ways the a system administrator to remotely access a system. For example, a admin can use the built in windows remote desktop application which is accessible through the windows pro model of windows which is more expensive. However, there are other free applications like teamspeak and chrome remote desktop which uses a web-based application to remotely link two devices which is useful however does not come with some tools which admins like to use when remotely controlling into a system.
Comments
Post a Comment