Network and System Administration - Syllabus

Course Overview and Structure

Embark on a profound academic exploration as you delve into the Network and System Administration course (NSA) within the distinguished Tribhuvan university's CSIT department. Aligned with the 2074 Syllabus, this course (CSC472) seamlessly merges theoretical frameworks with practical sessions, ensuring a comprehensive understanding of the subject. Rigorous assessment based on a 60 + 20 + 20 marks system, coupled with a challenging passing threshold of , propels students to strive for excellence, fostering a deeper grasp of the course content.

This 3 credit-hour journey unfolds as a holistic learning experience, bridging theory and application. Beyond theoretical comprehension, students actively engage in practical sessions, acquiring valuable skills for real-world scenarios. Immerse yourself in this well-structured course, where each element, from the course description to interactive sessions, is meticulously crafted to shape a well-rounded and insightful academic experience.


Course Description: The course covers different concepts of network and system administration including subjects ranging from initial installation of OS to day-to-day administrative tasks such as Network and Server Configurations, management of user accounts and disk space, and even imparting the trouble-shooting skills future system administrators will need to cope with unexpected behavior.

Course Objectives: The main objective of this course is to provide knowledge of different concepts of network and system administration, configuration, and management. 

Units

Key Topics

  • History of Networking
    NE-1.1

    This topic covers the evolution of networking from its early beginnings to the present day, including key milestones and developments.

  • Protocol Standards
    NE-1.2

    This topic explores the importance of protocol standards in networking, including the role of organizations such as the Internet Engineering Task Force (IETF) and the Institute of Electrical and Electronics Engineers (IEEE).

  • Reference Models
    NE-1.3

    This topic introduces the OSI and TCP/IP reference models, explaining their layers, functions, and importance in understanding network communication.

  • Windows and Linux Networking Basics
    NE-1.4

    This topic provides an overview of the networking fundamentals in Windows and Linux operating systems, including network configuration, protocols, and services.

  • Switching and Routing Basics
    NE-1.5

    This topic covers the basics of switching and routing in networking, including the functions of switches and routers, and how they forward data packets.

Key Topics

  • Authentication in ASP.NET Core
    SE-01

    Learn how to implement authentication in ASP.NET Core applications using ASP.NET Core Identity and configure identity services.

  • Authorization in ASP.NET Core
    SE-02

    Understand how to implement authorization in ASP.NET Core applications using roles, claims, and policies to secure access to resources.

  • Securing Controllers and Action Methods
    SE-03

    Discover how to secure controllers and action methods in ASP.NET Core applications to prevent unauthorized access.

  • Cross-site Scripting (XSS) Attacks
    SE-04

    Learn how to prevent cross-site scripting (XSS) attacks in ASP.NET Core applications by validating user input and encoding output.

  • SQL Injection Attacks
    SE-05

    Understand how to prevent SQL injection attacks in ASP.NET Core applications by using parameterized queries and input validation.

  • Cross-site Request Forgery (CSRF) Attacks
    SE-06

    Learn how to prevent cross-site request forgery (CSRF) attacks in ASP.NET Core applications by using anti-forgery tokens and validating requests.

  • Open Redirect Attacks
    SE-07

    Discover how to prevent open redirect attacks in ASP.NET Core applications by validating redirects and using secure protocols.

  • Database Server Administration
    SE-08

    This topic covers the administration of database servers, including MySQL, and database management best practices.

Key Topics

  • IPv4 and IPv6 Addressing
    NE-01

    Understanding IPv4 and IPv6 addressing schemes, including subnetting, CIDR notation, and address types.

  • Network Interface Configuration
    NE-02

    Configuring network interfaces, including setting IP addresses, subnet masks, and default gateways.

  • Diagnosing Network Startup Issues
    NE-03

    Troubleshooting common network startup issues, including identifying and resolving configuration problems.

  • Linux and Windows Firewall Configuration
    NE-04

    Configuring firewalls on Linux and Windows systems, including setting up rules and access controls.

  • Network Troubleshooting Commands
    NE-05

    Using command-line tools to troubleshoot network issues, including ping, traceroute, and nslookup.

Key Topics

  • DHCP Principle
    DY-1

    Understanding the fundamental concepts and principles of Dynamic Host Configuration Protocol (DHCP) and its role in network administration.

  • DHCP Server Configuration
    DY-2

    Configuring and setting up a DHCP server to assign IP addresses and other network settings to clients on a network.

  • DHCP Options, Scope, Reservation and Relaying
    DY-3

    Understanding and configuring DHCP options, scope, reservation, and relaying to customize and optimize DHCP services.

  • DHCP Troubleshooting
    DY-4

    Identifying and resolving common issues and problems related to DHCP configuration and operation.

Key Topics

  • DNS Principles and Operations
    NA-01

    This topic covers the fundamental concepts and workings of the Domain Name System (DNS), including its architecture, components, and communication protocols.

  • Basic Name Server and Client Configuration
    NA-02

    This topic explains how to configure a basic name server and client, including setting up DNS resolution and zone files.

  • Caching Only Name Server
    NA-03

    This topic discusses the role and configuration of caching only name servers, which temporarily store DNS query results to improve performance.

  • Primary and Slave Name Server
    NA-04

    This topic covers the configuration and synchronization of primary and slave name servers, ensuring DNS data consistency and redundancy.

  • DNS Zone Transfers
    NA-05

    This topic explains the process of DNS zone transfers, which enable the replication of DNS data between primary and slave name servers.

  • DNS Dynamic Updates
    NA-06

    This topic discusses the mechanism of dynamic DNS updates, which allow for real-time changes to DNS records and zone files.

  • DNS Delegation
    NA-07

    This topic covers the process of DNS delegation, which involves assigning authority over a DNS zone to a subordinate name server.

  • DNS Server Security
    NA-08

    This topic focuses on the security aspects of DNS servers, including common threats, vulnerabilities, and best practices for securing DNS infrastructure.

  • Troubleshooting
    NA-09

    This topic provides guidance on troubleshooting common DNS-related issues, including error diagnosis, log analysis, and problem resolution.

Key Topics

  • HTTP Server Configuration Basics
    WE-1

    This topic covers the fundamental concepts and configuration of HTTP servers, including setting up and managing web servers.

  • Virtual Hosting
    WE-2

    This topic explores the concept of virtual hosting, where multiple domains are hosted on a single IP address, and how to configure it.

  • HTTP Caching
    WE-3

    This topic discusses the importance of caching in HTTP and how to configure caching mechanisms to improve web server performance.

  • Proxy Caching Server Configuration
    WE-4

    This topic covers the configuration of proxy caching servers, including setting up and managing cache storage and retrieval.

  • Proxy ACL
    WE-5

    This topic explains the concept of Access Control Lists (ACLs) in proxy servers and how to configure them to control access to resources.

  • Proxy-Authentication Mechanisms
    WE-6

    This topic discusses various authentication mechanisms used in proxy servers, including username/password, Kerberos, and NTLM authentication.

  • Troubleshooting
    WE-7

    This topic provides guidance on troubleshooting common issues and errors in web and proxy server configurations.

Key Topics

  • Samba Configuration
    FT-1

    Learn how to configure Samba for file and print sharing. This topic covers general Samba configuration.

  • Samba SWAT
    FT-2

    Explore Samba's built-in web-based administration tool, SWAT. Learn how to use it for Samba configuration and management.

  • NFS Configuration
    FT-3

    Understand how to configure NFS (Network File System) and NFS clients for file sharing across a network.

  • CUPS Configuration
    FT-4

    Learn the basics of configuring CUPS (Common Unix Printing System) for print sharing and management.

  • FTP Fundamentals
    FT-5

    Discover the principles of FTP (File Transfer Protocol) and how it works for file transfer and sharing.

  • Anonymous FTP Server
    FT-6

    Learn how to set up an anonymous FTP server for public file sharing and access.

  • Troubleshooting FTP and File Sharing
    FT-7

    Develop skills to troubleshoot common issues with FTP, file sharing, and print sharing in a network environment.

Key Topics

  • Introduction to Matrices
    MA-1

    This topic introduces the concept of matrices, including their definition, notation, and basic operations. It lays the foundation for further study of matrices and their applications.

  • Types of Matrices
    MA-2

    This topic covers the different types of matrices, including square matrices, diagonal matrices, identity matrices, and zero matrices. It explains their properties and characteristics.

  • Equality of Matrices
    MA-3

    This topic defines and explains the concept of equality of matrices, including the conditions for two matrices to be equal and the rules for comparing matrices.

  • Algebra of Matrices
    MA-4

    This topic covers the basic algebraic operations of matrices, including addition, subtraction, multiplication, and scalar multiplication. It explains the rules and properties of these operations.

  • Determinants
    MA-5

    This topic introduces the concept of determinants, including their definition, calculation, and properties. It explains the importance of determinants in matrix theory and their applications.

  • Transpose, Minors, and Cofactors of a Matrix
    MA-6

    This topic covers the concepts of transpose, minors, and cofactors of a matrix, including their definitions, calculations, and properties. It explains their relationships and applications.

Key Topics

  • Relational Database Design Using ER-to-Relational Mapping
    RE-1

    Learn how to design relational databases using ER-to-relational mapping, including mapping of regular entities, weak entities, relationship types, multivalued attributes, and N-ary relationships.

  • Informal Design Guidelines for Relational Schemas
    RE-2

    Understand informal design guidelines for relational schemas, including semantics of attributes in relations, redundant information in tuples and update anomalies, NULL values in tuples, and generation of spurious tuples.

  • Functional Dependencies
    RE-3

    Study functional dependencies, including definition, inference rules, Armstrong's axioms, attribute closure, equivalence of functional dependencies, and minimal sets of functional dependencies.

  • Normal Forms Based on Primary Keys
    RE-4

    Explore normal forms based on primary keys, including First Normal Form, Second Normal Form, Third Normal Form, and their general definitions.

  • Boyce-Codd Normal Form
    RE-5

    Learn about Boyce-Codd Normal Form, a higher normal form that ensures a relational schema is in a good structure.

  • Multivalued Dependency and Fourth Normal Form
    RE-6

    Understand multivalued dependency and Fourth Normal Form, which eliminates multivalued dependencies in a relational schema.

Lab works

The laboratory work includes all the features mentioned in the course.

Samples:

1. Server/Client Installation over VMware Environment

2. Packet Analysis by using TCPDUMP and WIRESHARK 149

3. Network Practice with Packet Tracer

4. System Administration: User/Group management, File System Management ….

5. Network Configuration: Start/Stop network Service, network interface configuration

6. Firewall Configuration

7. DNS and DHCP Configuration and Troubleshooting

8. Web and Proxy Server Configuration and Troubleshooting

9. Basic Mail Server Configuration and Troubleshooting

10. SAMBA, NFS, CUPS and FTP configuration and Troubleshooting

11. SDN controller installation and client network implementation (OpenDaylight)

12. Network topology programming with Mininet and visualization