SoFunction
Updated on 2025-04-09

A good article about getting started with network administrators and basic technical articles on page 2/2


Here, you will become extremely busy, and all kinds of weird client problems often cause you a headache, and the server you manage will often have some strange situations. In the first month, you were almost fighting a war with them, and there were always problems you couldn't solve. Reinstalling the system and reconfiguring it has become commonplace. But you will also gradually find that the problems that can stump you are gradually becoming fewer, the server seems to be getting better, and the client's fault resolution is easy to find. After your operation training, colleagues have fewer inquiries. Your next goal should be how to further improve the performance of the server and provide more network services.
Going to a higher level
If you want to become a network engineer at the company's headquarters, you will face complex networks scattered across the country. The problems you need to solve include planning and designing the network structure of the entire company, connections between branches, connections with the headquarters, how each branch communicates with each other, how to ensure the safe operation of the entire network, how to allocate the power and functions of the bosses and network administrators of each branch, how to control the security of the company's data, etc.
Of course, network control, such as monitoring network intrusion, how to automatically install necessary software on the computer, how to remotely control computers of each branch at the headquarters, how to completely control computers of employees, etc., will also become daily work content.
Key points of network administrator knowledge
The above are some suggestions for work and study. The following lists different knowledge points that need to be mastered in each period for your reference.
Network environment of about 1, 5 computers
◆Basic knowledge of the network: including understanding of network understanding, classification and topological structure;
◆Network construction: network cable production and connection of network equipment, how to make network cables, precautions for wiring and interconnection of equipment in the network;
◆Network planning: How to design network, engineering budget and planning according to the enterprise's environment and requirements;
◆Proficient in using and selecting commonly used network equipment: network cards, network cables, hubs;
◆How to install the Windows operating system;
◆Installing and configuring network protocols: Understand the TCP/IP protocol and its installation and configuration methods, understand the classification of IP addresses, subnet masks, etc., and know how to interconnect with the NWlink protocol and the Apple protocol;
◆Implement network connection sharing service;
◆ Common methods for diagnosing and troubleshooting computer hardware and software failures.
2. The network of about 50 computers
◆ Server installation and configuration, client installation and configuration;
◆What is a domain, its implementation method, and how to manage it;
◆The basic ideas of AD service and their main installation and configuration methods;
◆Object creation and management: functions, creation and management methods of user accounts and group accounts;
◆DHCP installation and configuration: Understand the working principle, function, scope creation and management, IP address retention, client settings, etc.;
◆Know how to add the commonly used clients to the domain;
◆The establishment and management of DNS servers, the installation and management of WINS services;
◆Using network functions and common management operations;
◆The establishment of shared resources and the use of DFS: the method of establishing shared resources, how to set permission settings, encryption and understanding of DFS;
◆Installation and use of network printers;
◆ Backup and restore of data, install and configure mail servers to realize mail sending and receiving;
◆Group Policy and its applications: How to install, configure and use remote desktops, such as PC Anywhere, etc.;
◆ Network monitoring and troubleshooting, proficient in using event viewers and some common tools to troubleshoot network failures, to control and monitor network behavior;
◆Proficient in configuring various connection methods to connect to the Internet: be able to configure virtual private network (VPN), and be able to use various methods to achieve shared network connections, know how to configure routing and remote access, configure NAT to access the Internet through dial-up connection, ADSL or ISDN, or use various proxy software, such as ISA, etc. to realize the function of enterprise sharing Internet access;
◆Understand the concept of firewalls and proficient in installing and configuring firewall systems such as Proxy and ISA.
3. Senior Network Engineer
◆A deeper understanding of the network, including understanding of network understanding, classification and topological structure; a deeper understanding of network protocols requires a deeper understanding of network equipment at each layer;
◆Master network architecture knowledge, be able to handle network problems caused by various factors, be predictive of the problems that will occur, and take various preventive measures in advance.
American network administrators begin to learn anti-hacking technology
Faced with the increasingly rampant hacking attacks, network administrators of some American companies have begun to learn the technology to prevent hackers. A four-day hacker prevention research meeting was recently held at a state university in SAN FRANCISCO. The purpose of this meeting was to let about 40 network administrators in the city learn how to manage the network to prevent hackers' attacks.
On the first day, administrators first learned the necessary knowledge for hackers, such as routing tracing techniques, and learned how to map networks and get information from the Internet. As one teacher said, these are techniques used by hackers when using "denial of service" attack methods. These students, including network administrators, security consultants, and government employees, learn the purpose of hacker attacks to better defend attacks from hackers, so the university allows its own network to be used to simulate attacks.
The teachers all come from a professional cybersecurity company that usually looks for vulnerabilities in the client's network system and notifies the client in a timely manner. A vice president of the company said that the company does everything it does for the purpose of protecting customers, and the company will teach customers what it knows and how to prevent it. He hopes that after the meeting, the trainees will gain more understanding of the hackers and better defend their respective networks.
A trainee from a real estate company reported that the first day of study opened his eyes and made him understand that the weaknesses of the network system made it very vulnerable to attacks and stolen information. He admitted that his company's network has been attacked many times by hackers and viruses such as Melissa and 'ILOVEYOU' worm. In this regard, he said non-technical companies like him are most vulnerable because they only regard the network as a tool without paying attention to its security. Such companies generally rarely care about the confidentiality of information, and the network administrators hired by companies usually do not have a strong network security background. He hopes that after knowing how the hacker does it, he can better prevent his attacks.
Students generally don’t want to disclose their names and the names of their companies because they are worried that once they are told, the company will soon become the target of hackers. A student from a large online content service company said that as soon as the online company becomes famous, he will become the target of hackers, and he has to remain vigilant every day to prevent hackers' attacks. But even so, he was still very worried that one day the company's network would be paralyzed and unable to provide services to customers.
A cybersecurity expert said that although these students will learn a lot of anti-hacking knowledge, most other companies' network administrators are still not aware of the seriousness of the cybersecurity problem.
Previous page12Read the full text