Operating Systems Administration

You are here

Credits
6
Types
Specialization compulsory (Information Technologies)
Requirements
  • Prerequisite: SO
  • Precorequisite: XC
Department
AC
This course introduces the students to the basics of operating system administration. The focus resides, among others, in solving issues such as user management, resource monitoring, and virtual machines management in corporate environments.

Teachers

Person in charge

  • René Serral Gracià ( )

Others

  • Enric Morancho Llena ( )
  • Leonidas Kosmidis ( )

Weekly hours

Theory
2
Problems
0
Laboratory
2
Guided learning
0.4
Autonomous learning
5.6

Competences

Technical Competences

Common technical competencies

  • CT2 - To use properly theories, procedures and tools in the professional development of the informatics engineering in all its fields (specification, design, implementation, deployment and products evaluation) demonstrating the comprehension of the adopted compromises in the design decisions.
    • CT2.3 - To design, develop, select and evaluate computer applications, systems and services and, at the same time, ensure its reliability, security and quality in function of ethical principles and the current legislation and normative.
    • CT2.5 - To design and evaluate person-computer interfaces which guarantee the accessibility and usability of computer systems, services and applications.
  • CT3 - To demonstrate knowledge and comprehension of the organizational, economic and legal context where her work is developed (proper knowledge about the company concept, the institutional and legal framework of the company and its organization and management)
    • CT3.6 - To demonstrate knowledge about the ethical dimension of the company: in general, the social and corporative responsibility and, concretely, the civil and professional responsibilities of the informatics engineer.
  • CT6 - To demonstrate knowledge and comprehension about the internal operation of a computer and about the operation of communications between computers.
    • CT6.1 - To demonstrate knowledge and capacity to manage and maintain computer systems, services and applications.
    • CT6.3 - To demonstrate knowledge about the characteristics, functionalities and structure of the Operating Systems allowing an adequate use, management and design, as well as the implementation of applications based on its services.
    • CT6.4 - To demonstrate knowledge and capacity to apply the characteristics, functionalities and structure of the Distributed Systems and Computer and Internet Networks guaranteeing its use and management, as well as the design and implementation of application based on them.
  • CT7 - To evaluate and select hardware and software production platforms for executing applications and computer services.
    • CT7.2 - To evaluate hardware/software systems in function of a determined criteria of quality.
    • CT7.3 - To determine the factors that affect negatively the security and reliability of a hardware/software system, and minimize its effects.
  • CT8 - To plan, conceive, deploy and manage computer projects, services and systems in every field, to lead the start-up, the continuous improvement and to value the economical and social impact.
    • CT8.4 - To elaborate the list of technical conditions for a computers installation fulfilling all the current standards and normative.

Technical Competences of each Specialization

Information technology specialization

  • CTI1 - To define, plan and manage the installation of the ICT infrastructure of the organization.
    • CTI1.1 - To demonstrate understanding the environment of an organization and its needs in the field of the information and communication technologies.
    • CTI1.2 - To select, design, deploy, integrate and manage communication networks and infrastructures in a organization.
    • CTI1.4 - To select, design, deploy, integrate, evaluate, build, manage, exploit and maintain the hardware, software and network technologies, according to the adequate cost and quality parameters.
  • CTI2 - To guarantee that the ICT systems of an organization operate adequately, are secure and adequately installed, documented, personalized, maintained, updated and substituted, and the people of the organization receive a correct ICT support.
    • CTI2.2 - To administrate and maintain applications, computer systems and computer networks (the knowledge and comprehension levels are described in the common technical competences).
  • CTI4 - To use methodologies centred on the user and the organization to develop, evaluate and manage applications and systems based on the information technologies which ensure the accessibility, ergonomics and usability of the systems.

Transversal Competences

Autonomous learning

  • G7 [Avaluable] - To detect deficiencies in the own knowledge and overcome them through critical reflection and choosing the best actuation to extend this knowledge. Capacity for learning new methods and technologies, and versatility to adapt oneself to new situations.
    • G7.3 - Autonomous learning: capacity to plan and organize personal work. To apply the acquired knowledge when performing a task, in function of its suitability and importance, decide how to perform it and the needed time, and select the most adequate information sources. To identify the importance of establishing and maintaining contacts with students, teacher staff and professionals (networking). To identify information forums about ICT engineering, its advances and its impact in the society (IEEE, associations, etc.).

Objectives

  1. Knowledge about the system administrator, with his/her responsibilities and tasks.
    Related competences: CT3.6, CTI1.1, CTI4,
    Subcompetences:
    • Know about the ethics code of the system administrator.
    • Know about the current laws related to system administration.
  2. Plan the basic installation of the systems in an organization.
    Related competences: CTI1.2, CT6.4, CT7.2, CT8.4, CTI1.1, CTI1.4, CT2.3,
    Subcompetences:
    • Learn how to prepare a basic list of technical conditions for a computers installation.
  3. Learn to prepare an installation of the operating system, perform the installation, and the post-installation.
    Related competences: CT6.1, CTI2.2, CT6.3, CT6.4, G7.3, CTI1.4,
    Subcompetences:
    • Know the steps needed to boot the operating system.
    • Basic configuration of the network.
    • Learn how to configure the basic files of the operating system.
  4. Manage user accounts, add users, modify users, get information on users, deactivate users, and remove users.
    Related competences: CT6.1, CT2.5, CT3.6, G7.3, CTI4,
    Subcompetences:
    • Know about the structure and manage the data bases containing the information about the users of the system.
  5. Use and modify the permissions and protection mechanims offered by the operating systems on devices and files.
    Related competences: CT6.1, CT6.3, CT7.3, CT2.5, G7.3, CTI1.1, CTI4, CT2.3,
    Subcompetences:
    • Know about and use the privilege level and its support tools.
  6. Learn to install, maintain, and manage applications for the organization.
    Related competences: CT6.1, CTI2.2, CT2.5, G7.3, CTI1.4, CTI4, CT2.3,
    Subcompetences:
    • Know about the methods and support tools for the installation of applications.
    • Know methods for software distribution: source code, binary and auto-installable.
  7. Learn to monitor the operating system, users, resources, and applications.
    Related competences: CT6.1, CTI2.2, CT6.3, CT7.2, CT7.3, CTI1.4, CTI4, CT2.3,
  8. Learn to maintain the resources and the file system in a good condition, and to perform backups.
    Related competences: CT6.1, CTI2.2, CT6.3, CT7.2, CT7.3, G7.3, CTI1.4,
  9. Manage the system services, and periodic tasks
    Related competences: CT6.1, CTI1.2, CT6.4, CT2.5, G7.3, CTI1.4, CTI4, CT2.3,
    Subcompetences:
    • Configure the printer service.
    • Decide which administration tasks can be automated
  10. Learn to configure the main Internet services.
    Related competences: CT6.1, CTI1.2, CTI2.2, CT6.3, CT6.4, CT7.3, G7.3, CTI1.4, CT2.3,
  11. Configure, verify and maintain the security of the installation.
    Related competences: CT6.1, CT7.3, CT8.4, CT2.5, CT3.6, G7.3, CTI1.1, CTI1.4, CTI4, CT2.3,

Contents

  1. Introduction

    • Definition of concepts

    • Levels

    • Responsibilities

    • law and Code of Ethics Administrator

    • Security


  2. Installation of the operating system

    • Concepts

    • Preparation

    • Boot the system

    • Tools and post-configuration

    • File System Structure

  3. User Management

    • Mechanisms of identification

    • System User's database

    • Permissions and protections

    • Changing privileges

  4. Application Management

    • Installation

    • Mechanisms

    • Maintenance

  5. Monitoring

    • Resources to monitor

    • Monitoring mechanisms

    • Signals

    • Tools

  6. File System Maintenance

    • Types of filesystems

    • Journalling

    • Disk integrity

    • Filesystems management

    • Logical volumes

    • Backups

  7. Local Services management

    • Service management

    • Periodic tasks

    • Remobible devices

    • Virtualization


  8. Network Services Management
    • Network services
    • Internet Services
    • Maintenance and configuration of network services
  9. Protection and Security
    • Techniques to improve system security
    • Insecure Services
    • Common types of attacks
    • Common Solutions

Activities

Activity Evaluation act


Presentation of the course and Introduction to Systems Administration

L'estudiant participa activament durant la sessió, treballant en grup sobre les qüestions plantejades a classe i comentant les solucions a les que cada grup ha arribat a tota la classe.
  • Autonomous learning: Start searching for information, supported by the explanation given in class theory
Objectives: 1 2 11
Contents:
Theory
2h
Problems
0h
Laboratory
0h
Guided learning
0h
Autonomous learning
2h

Operating system installation

L'estudiant participa activament en la sessió de teoria, treballant en grup en les activitats proposades i comentant les solucions a les que cada grup ha arribat a tota la classe. A la sessió de laboratori, l'estudiant realitza la planificació del sistema que usarà durant la resta del curs i fa la instal.lació bàsica del sistema operatiu, incloent la post-instal.lació.
  • Theory: Operating system installation
  • Laboratory: Laboratory session on operating system installation
  • Autonomous learning: Finding information on methods for sizing the installation of the system
Objectives: 2 3 11
Contents:
Theory
2h
Problems
0h
Laboratory
4h
Guided learning
0h
Autonomous learning
4h

User management

L'estudiant participa activament a la sessió d'explicació teòrica treballant en grup els processos de donar d'alta i donar de baixa un usuari, i l'ús de les proteccions a nivell de fitxer i directori per implementar confidencialitat. Realitzarà un informe sobre les eines habituals per manipular les proteccions sobre els recursos i/o les comandes relacionades amb la gestió d'usuaris.
  • Theory: Work on user management in the operating system, and discussions about alternatives to add and remove users, and protection mechanisms to consider.
  • Laboratory: Practical application of theoretical concepts to effectively manage the users present in a system
  • Autonomous learning: The student will present a report about the usual tools for manipulating the protections on resources and / or commands relating to user management
Objectives: 1 4 5 11
Contents:
Theory
2h
Problems
0h
Laboratory
6h
Guided learning
0h
Autonomous learning
2h

Applications management

L'estudiant participa activament a la sessió d'explicació teòrica treballant en grup sobre les diferents tècniques d'instal.lació d'aplicacions en un sistema operatiu. Realitzarà un informe sobre les eines habituals que ens ajuden a compilar, instal.lar i gestionar aplicacions.
  • Theory: Work on installing applications, and discussions about the different ways of distributing software.
  • Laboratory: Install different types of applications from source code and binary. Develop scripts to support application management.
  • Guided learning: Support on the elaboration of the course reports
  • Autonomous learning: Report on the common tools that help us to compile, install and manage applications
Objectives: 1 5 6 11
Contents:
Theory
2h
Problems
0h
Laboratory
4h
Guided learning
1h
Autonomous learning
4h

Monitoring

The student participates actively in the session through group discussions, about the different monitoring techniques on system resources. Prepare a monitoring report on the monitoring support offered by operating systems.
  • Theory: Resources to monitor and techniques useful for monitoring
  • Laboratory: Use monitoring tools while performing different administration tasks
  • Guided learning: Discussion on the solution to the first partial exam
  • Autonomous learning: Find new applications for system monitoring, install them and make a report on their advantages
Objectives: 1 7
Contents:
Theory
2h
Problems
0h
Laboratory
2h
Guided learning
1h
Autonomous learning
4h

File systems maintenance

The student participates actively in the theoretical explanation session working in groups on methods for data backup and makes a report on the tools available.
  • Theory: Description on the file systems and discussions on the backup techniques
  • Laboratory: Backup techniques available
  • Autonomous learning: Making a report on equipments supporting backups
Objectives: 1 3 8 11
Contents:
Theory
2h
Problems
0h
Laboratory
4h
Guided learning
0h
Autonomous learning
2h

Local services management

The student participates actively in the session working in groups regarding the appropriate tasks to be performed periodically and techniques available to schedule them. He/she writes a report on systems to support virtualization.
  • Theory: Work on local services and virtualization
  • Laboratory: Scheduling periodic tasks
  • Guided learning: Visit to the Marenostrum supercomputer, focussing on installation and administration of the machine
  • Autonomous learning: Installation of virtualized operating systems
Objectives: 1 9 11
Contents:
Theory
2h
Problems
0h
Laboratory
2h
Guided learning
2h
Autonomous learning
4h

First partial exam

This test assesses the knowledge and practice acquired in the first nine weeks of the course, including topics 1 to 7.
Objectives: 1 2 4 5 3 6 7 8 9
Week: 10
Type: theory exam
Theory
2h
Problems
0h
Laboratory
0h
Guided learning
0h
Autonomous learning
10h

Management of network services

The student participates actively in group discussions on the proper configuration of network services. He/she writes a report on the available servers for a number of proposed services and the advantages that each one offers.
  • Theory: Network services
  • Laboratory: Configuration of network services
  • Guided learning: Discussion on the solution to the second partial exam
  • Autonomous learning: Installation of network servers, and writing of the report on advantages of each one
Objectives: 1 10 11
Contents:
Theory
6h
Problems
0h
Laboratory
6h
Guided learning
1h
Autonomous learning
6h

Protection and security

The student participates actively in discussions on security and defense against attacks. He/she writes a report on monitoring tools, network analysis and intrusion detection.
  • Theory: Protection and security
  • Guided learning: Discussion on the solution to the third partial exam
  • Autonomous learning: Installation and evaluation of network analysis tools and intrussion detection
Objectives: 1 2 10 11
Contents:
Theory
4h
Problems
0h
Laboratory
0h
Guided learning
1h
Autonomous learning
6h

Second partial exam

This partial exam evaluates the knowledge and practice acquired during the course.
Objectives: 1 2 4 5 3 6 7 8 9 10 11
Week: 14
Type: theory exam
Theory
2h
Problems
0h
Laboratory
0h
Guided learning
0h
Autonomous learning
10h

Laboratory exam

In this exam, students solve practical problems related with all course subjects, individually. You can have books and notes.
Objectives: 1 2 4 5 3 6 7 8 9 10 11
Week: 14
Type: lab exam
Theory
0h
Problems
0h
Laboratory
2h
Guided learning
0h
Autonomous learning
8h

Final exam

For those students that would need to reach the minimum level of the course or those that want to raise their marks, this examination will be hold after the period of the classes
Objectives: 1 2 4 5 3 6 7 8 9 10 11
Week: 15 (Outside class hours)
Type: theory exam
Theory
2h
Problems
0h
Laboratory
0h
Guided learning
0h
Autonomous learning
22h

Teaching methodology

The teacher explains the basic issues in the theory sessions, while opens discussions among and with the students on various topics. Each theory session includes the proposal of several issues related to the class, for students to work on them independently on their own.

The laboratory sessions follow an evolving line, based on the installation of the operating system and applications for users on it. The lab sessions are based on the well-defined lab book, and the teacher performs the necessary support to students, which functions similar to a senior manager training to novel and junior administrators.

Evaluation methodology

The autonomous learning competence is evaluated based on the reports delivered by the student during the course. Its weight is 10% on the final mark.

The technical competences are evaluated based on the theory (40%) and the laboratory exam (50%).

The theory gets evaluated based on the partial and the final exams. The mark of the 2 partial exams is computed as the averaged mean of the 2 tests, with the following weights: 40 and 60%. If this mark is equal or larger than 5.0, attending the final exam is optional.

In case a student attends the final exam, his/her theory mark will be the highest between the mark obtained in the final exam and the averaged mean of the partial exams.

Bibliography

Basic:

Web links

Previous capacities

- Resources, components and basic architecture of computers
- Basics of operating systems
- Basics of the user-level environment of the operating system: shell commands and basic graphical environment
- elements that make up the network environment
- Basic network protocols and their relationship with the operating system