Network and System Administration - Syllabus
Embark on a profound academic exploration as you delve into the Network and System Administration course (NSA) within the distinguished Tribhuvan university's CSIT department. Aligned with the 2074 Syllabus, this course (CSC472) seamlessly merges theoretical frameworks with practical sessions, ensuring a comprehensive understanding of the subject. Rigorous assessment based on a 60 + 20 + 20 marks system, coupled with a challenging passing threshold of , propels students to strive for excellence, fostering a deeper grasp of the course content.
This 3 credit-hour journey unfolds as a holistic learning experience, bridging theory and application. Beyond theoretical comprehension, students actively engage in practical sessions, acquiring valuable skills for real-world scenarios. Immerse yourself in this well-structured course, where each element, from the course description to interactive sessions, is meticulously crafted to shape a well-rounded and insightful academic experience.
Course Description: The course covers different concepts of network and system administration including subjects ranging from initial installation of OS to day-to-day administrative tasks such as Network and Server Configurations, management of user accounts and disk space, and even imparting the trouble-shooting skills future system administrators will need to cope with unexpected behavior.
Course Objectives: The main objective of this course is to provide knowledge of different concepts of network and system administration, configuration, and management.
Units
Key Topics
-
History of Networking
NE-1.1This topic covers the evolution of networking from its early beginnings to the present day, including key milestones and developments.
-
Protocol Standards
NE-1.2This topic explores the importance of protocol standards in networking, including the role of organizations such as the Internet Engineering Task Force (IETF) and the Institute of Electrical and Electronics Engineers (IEEE).
-
Reference Models
NE-1.3This topic introduces the OSI and TCP/IP reference models, explaining their layers, functions, and importance in understanding network communication.
-
Windows and Linux Networking Basics
NE-1.4This topic provides an overview of the networking fundamentals in Windows and Linux operating systems, including network configuration, protocols, and services.
-
Switching and Routing Basics
NE-1.5This topic covers the basics of switching and routing in networking, including the functions of switches and routers, and how they forward data packets.
Key Topics
-
Authentication in ASP.NET Core
SE-01Learn how to implement authentication in ASP.NET Core applications using ASP.NET Core Identity and configure identity services.
-
Authorization in ASP.NET Core
SE-02Understand how to implement authorization in ASP.NET Core applications using roles, claims, and policies to secure access to resources.
-
Securing Controllers and Action Methods
SE-03Discover how to secure controllers and action methods in ASP.NET Core applications to prevent unauthorized access.
-
Cross-site Scripting (XSS) Attacks
SE-04Learn how to prevent cross-site scripting (XSS) attacks in ASP.NET Core applications by validating user input and encoding output.
-
SQL Injection Attacks
SE-05Understand how to prevent SQL injection attacks in ASP.NET Core applications by using parameterized queries and input validation.
-
Cross-site Request Forgery (CSRF) Attacks
SE-06Learn how to prevent cross-site request forgery (CSRF) attacks in ASP.NET Core applications by using anti-forgery tokens and validating requests.
-
Open Redirect Attacks
SE-07Discover how to prevent open redirect attacks in ASP.NET Core applications by validating redirects and using secure protocols.
-
Database Server Administration
SE-08This topic covers the administration of database servers, including MySQL, and database management best practices.
Key Topics
-
IPv4 and IPv6 Addressing
NE-01Understanding IPv4 and IPv6 addressing schemes, including subnetting, CIDR notation, and address types.
-
Network Interface Configuration
NE-02Configuring network interfaces, including setting IP addresses, subnet masks, and default gateways.
-
Diagnosing Network Startup Issues
NE-03Troubleshooting common network startup issues, including identifying and resolving configuration problems.
-
Linux and Windows Firewall Configuration
NE-04Configuring firewalls on Linux and Windows systems, including setting up rules and access controls.
-
Network Troubleshooting Commands
NE-05Using command-line tools to troubleshoot network issues, including ping, traceroute, and nslookup.
Key Topics
-
DHCP Principle
DY-1Understanding the fundamental concepts and principles of Dynamic Host Configuration Protocol (DHCP) and its role in network administration.
-
DHCP Server Configuration
DY-2Configuring and setting up a DHCP server to assign IP addresses and other network settings to clients on a network.
-
DHCP Options, Scope, Reservation and Relaying
DY-3Understanding and configuring DHCP options, scope, reservation, and relaying to customize and optimize DHCP services.
-
DHCP Troubleshooting
DY-4Identifying and resolving common issues and problems related to DHCP configuration and operation.
Key Topics
-
DNS Principles and Operations
NA-01This topic covers the fundamental concepts and workings of the Domain Name System (DNS), including its architecture, components, and communication protocols.
-
Basic Name Server and Client Configuration
NA-02This topic explains how to configure a basic name server and client, including setting up DNS resolution and zone files.
-
Caching Only Name Server
NA-03This topic discusses the role and configuration of caching only name servers, which temporarily store DNS query results to improve performance.
-
Primary and Slave Name Server
NA-04This topic covers the configuration and synchronization of primary and slave name servers, ensuring DNS data consistency and redundancy.
-
DNS Zone Transfers
NA-05This topic explains the process of DNS zone transfers, which enable the replication of DNS data between primary and slave name servers.
-
DNS Dynamic Updates
NA-06This topic discusses the mechanism of dynamic DNS updates, which allow for real-time changes to DNS records and zone files.
-
DNS Delegation
NA-07This topic covers the process of DNS delegation, which involves assigning authority over a DNS zone to a subordinate name server.
-
DNS Server Security
NA-08This topic focuses on the security aspects of DNS servers, including common threats, vulnerabilities, and best practices for securing DNS infrastructure.
-
Troubleshooting
NA-09This topic provides guidance on troubleshooting common DNS-related issues, including error diagnosis, log analysis, and problem resolution.
Key Topics
-
HTTP Server Configuration Basics
WE-1This topic covers the fundamental concepts and configuration of HTTP servers, including setting up and managing web servers.
-
Virtual Hosting
WE-2This topic explores the concept of virtual hosting, where multiple domains are hosted on a single IP address, and how to configure it.
-
HTTP Caching
WE-3This topic discusses the importance of caching in HTTP and how to configure caching mechanisms to improve web server performance.
-
Proxy Caching Server Configuration
WE-4This topic covers the configuration of proxy caching servers, including setting up and managing cache storage and retrieval.
-
Proxy ACL
WE-5This topic explains the concept of Access Control Lists (ACLs) in proxy servers and how to configure them to control access to resources.
-
Proxy-Authentication Mechanisms
WE-6This topic discusses various authentication mechanisms used in proxy servers, including username/password, Kerberos, and NTLM authentication.
-
Troubleshooting
WE-7This topic provides guidance on troubleshooting common issues and errors in web and proxy server configurations.
Key Topics
-
Samba Configuration
FT-1Learn how to configure Samba for file and print sharing. This topic covers general Samba configuration.
-
Samba SWAT
FT-2Explore Samba's built-in web-based administration tool, SWAT. Learn how to use it for Samba configuration and management.
-
NFS Configuration
FT-3Understand how to configure NFS (Network File System) and NFS clients for file sharing across a network.
-
CUPS Configuration
FT-4Learn the basics of configuring CUPS (Common Unix Printing System) for print sharing and management.
-
FTP Fundamentals
FT-5Discover the principles of FTP (File Transfer Protocol) and how it works for file transfer and sharing.
-
Anonymous FTP Server
FT-6Learn how to set up an anonymous FTP server for public file sharing and access.
-
Troubleshooting FTP and File Sharing
FT-7Develop skills to troubleshoot common issues with FTP, file sharing, and print sharing in a network environment.
Key Topics
-
Introduction to Matrices
MA-1This topic introduces the concept of matrices, including their definition, notation, and basic operations. It lays the foundation for further study of matrices and their applications.
-
Types of Matrices
MA-2This topic covers the different types of matrices, including square matrices, diagonal matrices, identity matrices, and zero matrices. It explains their properties and characteristics.
-
Equality of Matrices
MA-3This topic defines and explains the concept of equality of matrices, including the conditions for two matrices to be equal and the rules for comparing matrices.
-
Algebra of Matrices
MA-4This topic covers the basic algebraic operations of matrices, including addition, subtraction, multiplication, and scalar multiplication. It explains the rules and properties of these operations.
-
Determinants
MA-5This topic introduces the concept of determinants, including their definition, calculation, and properties. It explains the importance of determinants in matrix theory and their applications.
-
Transpose, Minors, and Cofactors of a Matrix
MA-6This topic covers the concepts of transpose, minors, and cofactors of a matrix, including their definitions, calculations, and properties. It explains their relationships and applications.
Key Topics
-
Relational Database Design Using ER-to-Relational Mapping
RE-1Learn how to design relational databases using ER-to-relational mapping, including mapping of regular entities, weak entities, relationship types, multivalued attributes, and N-ary relationships.
-
Informal Design Guidelines for Relational Schemas
RE-2Understand informal design guidelines for relational schemas, including semantics of attributes in relations, redundant information in tuples and update anomalies, NULL values in tuples, and generation of spurious tuples.
-
Functional Dependencies
RE-3Study functional dependencies, including definition, inference rules, Armstrong's axioms, attribute closure, equivalence of functional dependencies, and minimal sets of functional dependencies.
-
Normal Forms Based on Primary Keys
RE-4Explore normal forms based on primary keys, including First Normal Form, Second Normal Form, Third Normal Form, and their general definitions.
-
Boyce-Codd Normal Form
RE-5Learn about Boyce-Codd Normal Form, a higher normal form that ensures a relational schema is in a good structure.
-
Multivalued Dependency and Fourth Normal Form
RE-6Understand multivalued dependency and Fourth Normal Form, which eliminates multivalued dependencies in a relational schema.
Lab works
The laboratory work includes all the features mentioned in the course.
Samples:
1. Server/Client Installation over VMware Environment
2. Packet Analysis by using TCPDUMP and WIRESHARK 149
3. Network Practice with Packet Tracer
4. System Administration: User/Group management, File System Management ….
5. Network Configuration: Start/Stop network Service, network interface configuration
6. Firewall Configuration
7. DNS and DHCP Configuration and Troubleshooting
8. Web and Proxy Server Configuration and Troubleshooting
9. Basic Mail Server Configuration and Troubleshooting
10. SAMBA, NFS, CUPS and FTP configuration and Troubleshooting
11. SDN controller installation and client network implementation (OpenDaylight)
12. Network topology programming with Mininet and visualization