System administrator
Encyclopedia
A system administrator, IT systems administrator, systems administrator, or sysadmin is a person employed to maintain and operate a computer system and/or network. System administrators may be members of an information technology (IT) or Electronics and Communication Engineering department.

The duties of a system administrator are wide-ranging, and vary widely from one organization to another. Sysadmins are usually charged with installing, supporting and maintaining server
Server (computing)
In the context of client-server architecture, a server is a computer program running to serve the requests of other programs, the "clients". Thus, the "server" performs some computational task on behalf of "clients"...

s or other computer systems, and planning for and responding to service outages and other problems. Other duties may include scripting
Scripting language
A scripting language, script language, or extension language is a programming language that allows control of one or more applications. "Scripts" are distinct from the core code of the application, as they are usually written in a different language and are often created or at least modified by the...

 or light programming
Computer programming
Computer programming is the process of designing, writing, testing, debugging, and maintaining the source code of computer programs. This source code is written in one or more programming languages. The purpose of programming is to create a program that performs specific operations or exhibits a...

, project management
Project management
Project management is the discipline of planning, organizing, securing, and managing resources to achieve specific goals. A project is a temporary endeavor with a defined beginning and end , undertaken to meet unique goals and objectives, typically to bring about beneficial change or added value...

 for systems-related projects, supervising or training computer operators, and being the consultant for computer problems beyond the knowledge of technical support
Technical support
Technical support or tech support refers to a range of services by which enterprises provide assistance to users of technology products such as mobile phones, televisions, computers, software products or other electronic or mechanical goods...

 staff. To perform his or her job well, a system administrator must demonstrate a blend of technical skills and responsibility.

Skills

Some of this section is from the Occupational Outlook Handbook, 2010-11 Edition, which is in the public domain
Public domain
Works are in the public domain if the intellectual property rights have expired, if the intellectual property rights are forfeited, or if they are not covered by intellectual property rights at all...

 as a work of the United States Government
Work of the United States Government
A work of the United States government, as defined by United States copyright law, is "a work prepared by an officer or employee of the U.S. government as part of that person's official duties." The term only applies to the work of the federal government, including the governments of "non-organized...

.

The subject matter of system administration includes computer systems and the ways people use them in an organization. This entails a knowledge of operating system
Operating system
An operating system is a set of programs that manage computer hardware resources and provide common services for application software. The operating system is the most important type of system software in a computer system...

s and applications, as well as hardware and software troubleshooting
Troubleshooting
Troubleshooting is a form of problem solving, often applied to repair failed products or processes. It is a logical, systematic search for the source of a problem so that it can be solved, and so the product or process can be made operational again. Troubleshooting is needed to develop and...

, but also knowledge of the purposes for which people in the organization use the computers.

Perhaps the most important skill for a system administrator is problem solving
Problem solving
Problem solving is a mental process and is part of the larger problem process that includes problem finding and problem shaping. Consideredthe most complex of all intellectual functions, problem solving has been defined as higher-order cognitive process that requires the modulation and control of...

 -- frequently under various sorts of constraints and stress. The sysadmin is on call when a computer system goes down or malfunctions, and must be able to quickly and correctly diagnose what is wrong and how best to fix it.

System administrators are not software engineer
Software engineer
A software engineer is an engineer who applies the principles of software engineering to the design, development, testing, and evaluation of the software and systems that make computers or anything containing software, such as computer chips, work.- Overview :...

s or developer
Software development
Software development is the development of a software product...

s. It is not usually within their duties to design or write new application software. However, sysadmins must understand the behavior of software in order to deploy it and to troubleshoot problems, and generally know several programming language
Programming language
A programming language is an artificial language designed to communicate instructions to a machine, particularly a computer. Programming languages can be used to create programs that control the behavior of a machine and/or to express algorithms precisely....

s used for scripting or automation of routine tasks.

Particularly when dealing with Internet
Internet
The Internet is a global system of interconnected computer networks that use the standard Internet protocol suite to serve billions of users worldwide...

-facing or business-critical systems, a sysadmin must have a strong grasp of computer security
Computer security
Computer security is a branch of computer technology known as information security as applied to computers and networks. The objective of computer security includes protection of information and property from theft, corruption, or natural disaster, while allowing the information and property to...

. This includes not merely deploying software patches, but also preventing break-ins and other security problems with preventive measures. In some organizations, computer security administration is a separate role responsible for overall security and the upkeep of firewall
Firewall (computing)
A firewall is a device or set of devices designed to permit or deny network transmissions based upon a set of rules and is frequently used to protect networks from unauthorized access while permitting legitimate communications to pass....

s and intrusion detection systems, but all sysadmins are generally responsible for the security of computer systems.

Related fields

Many organizations staff other jobs related to system administration. In a larger company, these may all be separate positions within a computer support or Information Services (IS) department. In a smaller group they may be shared by a few sysadmins, or even a single person.
  • A database administrator
    Database administrator
    A database administrator is a person responsible for the design, implementation, maintenance and repair of an organization's database. They are also known by the titles Database Coordinator or Database Programmer, and is closely related to the Database Analyst, Database Modeller, Programmer...

     (DBA) maintains a database
    Database
    A database is an organized collection of data for one or more purposes, usually in digital form. The data are typically organized to model relevant aspects of reality , in a way that supports processes requiring this information...

     system, and is responsible for the integrity of the data and the efficiency and performance of the system.
  • A network administrator
    Network administrator
    A network administrator, network analyst or network engineer is a person responsible for the maintenance of computer hardware and software that comprises a computer network...

     maintains network infrastructure such as switches
    Network switch
    A network switch or switching hub is a computer networking device that connects network segments.The term commonly refers to a multi-port network bridge that processes and routes data at the data link layer of the OSI model...

     and routers, and diagnoses problems with these or with the behavior of network-attached computers.
  • A security administrator
    Computer security
    Computer security is a branch of computer technology known as information security as applied to computers and networks. The objective of computer security includes protection of information and property from theft, corruption, or natural disaster, while allowing the information and property to...

     is a specialist in computer and network security, including the administration of security devices such as firewalls, as well as consulting on general security measures.
  • A web administrator maintains web server services (such as Apache or IIS) that allow for internal or external access to web sites. Tasks include managing multiple sites, administering security, and configuring necessary components and software. Responsibilities may also include software change management
    Change management
    Change management is a structured approach to shifting/transitioning individuals, teams, and organizations from a current state to a desired future state. It is an organizational process aimed at helping employees to accept and embrace changes in their current business environment....

    .
  • Technical support
    Technical support
    Technical support or tech support refers to a range of services by which enterprises provide assistance to users of technology products such as mobile phones, televisions, computers, software products or other electronic or mechanical goods...

     staff respond to individual users' difficulties with computer systems, provide instructions and sometimes training, and diagnose and solve common problems.
  • A computer operator
    Computer operator
    A role within IT, computer operators oversee the running of computer systems, ensuring that the machines are running and physically secured. The traditional role of a computer operator was to work with mainframes which required a great deal of management day-to-day, however nowaday they often work...

     performs routine maintenance and upkeep, such as changing backup tapes or replacing failed drives in a RAID
    RAID
    RAID is a storage technology that combines multiple disk drive components into a logical unit...

    . Such tasks usually require physical presence in the room with the computer; and while less skilled than sysadmin tasks require a similar level of trust, since the operator has access to possibly sensitive data.
  • A postmaster
    Postmaster (computing)
    In computers and technology, postmaster is a term used to identify the administrator of a mail server. Nearly every domain will have the e-mail address postmaster@example.com where errors in e-mail processing are directed...

     is the administrator of a mail server.


In some organizations, a person may begin as a member of technical support staff or a computer operator, then gain experience on the job to be promoted to a sysadmin position.

Training

Unlike many other professions, there is no single path to becoming a system administrator. Many system administrators have a degree in a related field: computer science
Computer science
Computer science or computing science is the study of the theoretical foundations of information and computation and of practical techniques for their implementation and application in computer systems...

, information technology
Information technology
Information technology is the acquisition, processing, storage and dissemination of vocal, pictorial, textual and numerical information by a microelectronics-based combination of computing and telecommunications...

, computer engineering
Computer engineering
Computer engineering, also called computer systems engineering, is a discipline that integrates several fields of electrical engineering and computer science required to develop computer systems. Computer engineers usually have training in electronic engineering, software design, and...

, information system management, or even a trade school program. Other schools have offshoots of their Computer Science program specifically for system administration.

Some schools have started offering undergraduate degrees in System Administration. The first, Rochester Institute of Technology
Rochester Institute of Technology
The Rochester Institute of Technology is a private university, located within the town of Henrietta in metropolitan Rochester, New York, United States...

http://nssa.rit.edu/~nssa/nssa/undergrad/index.maml started in 1992. Others such as Rensselaer Polytechnic Institute
Rensselaer Polytechnic Institute
Stephen Van Rensselaer established the Rensselaer School on November 5, 1824 with a letter to the Rev. Dr. Samuel Blatchford, in which van Rensselaer asked Blatchford to serve as the first president. Within the letter he set down several orders of business. He appointed Amos Eaton as the school's...

, University of New Hampshire
University of New Hampshire
The University of New Hampshire is a public university in the University System of New Hampshire , United States. The main campus is in Durham, New Hampshire. An additional campus is located in Manchester. With over 15,000 students, UNH is the largest university in New Hampshire. The university is...

http://www.cs.unh.edu/bsit.htm, Marist College
Marist College
Marist College is a private liberal arts college on the east bank of the Hudson River near Poughkeepsie, New York. The site was established in 1905 by Marist Brothers, and the college was chartered in 1929...

, and Drexel University
Drexel University
Drexel University is a private research university with the main campus located in Philadelphia, Pennsylvania, USA. It was founded in 1891 by Anthony J. Drexel, a noted financier and philanthropist. Drexel offers 70 full-time undergraduate programs and accelerated degrees...

 have more recently offered degrees in Information Technology. Symbiosis Institute of Computer Studies and Research (SICSR)
Symbiosis Institute of Computer Studies and Research (SICSR)
Symbiosis Institute of Computer Studies and Research is an educational institute located in Pune, India. It offers postgraduate and undergraduate degrees in the fields of computer and information technology and is part of the Symbiosis Society. It was established in 1985...

 in Pune, India offers Masters degree in Computers Applications with a specialization in System Administration.

, only five U.S. universities, Rochester Institute of Technology http://nssa.rit.edu/~nssa/nssa/grad/index.maml, New York City College of Technology
New York City College of Technology
New York City College of Technology , nicknamed City Tech, is the largest four-year public college of technology in the northeastern United States, and a constituent college of the City University of New York...

, Tufts, Michigan Tech, and Florida State University
Florida State University
The Florida State University is a space-grant and sea-grant public university located in Tallahassee, Florida, United States. It is a comprehensive doctoral research university with medical programs and significant research activity as determined by the Carnegie Foundation...

 http://www.cs.fsu.edu/current/grad/cnsa_ms.php have graduate
Graduate school
A graduate school is a school that awards advanced academic degrees with the general requirement that students must have earned a previous undergraduate degree...

 programs in system administration. In Norway
Norway
Norway , officially the Kingdom of Norway, is a Nordic unitary constitutional monarchy whose territory comprises the western portion of the Scandinavian Peninsula, Jan Mayen, and the Arctic archipelago of Svalbard and Bouvet Island. Norway has a total area of and a population of about 4.9 million...

, there is a special English-taught MSc program organized by Oslo University College
Oslo University College
Oslo University College , Norwegian: Høgskolen i Oslo is the largest state university college in Norway, with more than 11,000 students and approx. 1100 employees...

 http://www.hio.no/Studietilbud/Masterstudier/Master-Programme-in-Network-and-System-Administration in cooperation with Oslo University, named "Masters programme in Network and System Administration." University of Amsterdam (UvA) offers a similar program in cooperation with Hogeschool van Amsterdam
Hogeschool van Amsterdam
The Hogeschool van Amsterdam, University of Applied Sciences , or Amsterdam University of Applied Sciences, is one of the largest institutes for higher professional education in the Netherlands. The HvA mainly offers bachelor degree programmes, but also has a number of master degree programmes...

 (HvA) named "Master System and Network Engineering". However, many other schools offer related graduate degrees in fields such as network systems and computer security.

One of the primary difficulties with teaching system administration as a formal university discipline, is that the industry and technology changes much faster than the typical textbook and coursework certification process. By the time a new textbook has spent years working through approvals and committees, the specific technology for which it is written may have changed significantly or become obsolete.

In addition, because of the practical nature of system administration and the easy availability of open-source server
Server (computing)
In the context of client-server architecture, a server is a computer program running to serve the requests of other programs, the "clients". Thus, the "server" performs some computational task on behalf of "clients"...

 software, many system administrators enter the field self-taught.

Generally, a prospective will be required to have some experience with the computer system he or she is expected to manage. In some cases, candidates are expected to possess industry certifications such as the Microsoft MCSA
MCSA
MCSA may refer to:*Mountain Club of South Africa*Moscow, Camden and San Augustine Railroad*Microsoft Certified Systems Administrator...

, MCSE, MCITP, Red Hat RHCE, Novell CNA
Certified Novell Administrator
A Certified Novell Administrator is a person that has been professionally certified by Novell to administer NetWare-based based computer networks. The test fee is $125 per attempt and is administered through Pearson VUE testing sites....

, CNE
Certified Novell Engineer
Certified Novell Engineer is a certification which is designed to show that an individual possesses in-depth knowledge and skills related to administration and troubleshooting of the Novell NetWare operating system.- Purpose :...

, Cisco CCNA
CCNA
CCNA is the certification from Cisco.CCNA certification is a second-level Cisco Career certification...

 or CompTIA
CompTIA
The Computing Technology Industry Association , a non-profit trade association, was created in 1982 as the Association of Better Computer Dealers, Inc. by representatives of five microcomputer dealerships...

's A+ or Network+, Sun Certified SCNA
SCNA
SCNA is a certification for system administrators and covers LANs and the Solaris Operating System.- Requirements :Candidates must pass a certification exam...

, Linux Professional Institute
Linux Professional Institute
The Linux Professional Institute Inc. is a non-profit organization that provides vendor-independent professional certification for Linux system administrators and programmers....

 among others.

Sometimes, almost exclusively in smaller sites, the role of system administrator may be given to a skilled user in addition to or in replacement of his or her duties. For instance, it is not unusual for a mathematics or computing teacher to serve as the system administrator of a secondary school.

Duties of a system administrator

A system administrator's responsibilities might include:
  • Analyzing system logs
    Computer data logging
    Computer data logging is the process of recording events, with an automated computer program, in a certain scope in order to provide an audit trail that can be used to understand the activity of the system and to diagnose problems....

     and identifying potential issues with computer systems.
  • Introducing and integrating new technologies into existing data center
    Data center
    A data center is a facility used to house computer systems and associated components, such as telecommunications and storage systems...

     environments.
  • Performing routine audits of systems and software.
  • Performing backup
    Backup
    In information technology, a backup or the process of backing up is making copies of data which may be used to restore the original after a data loss event. The verb form is back up in two words, whereas the noun is backup....

    s.
  • Applying operating system
    Operating system
    An operating system is a set of programs that manage computer hardware resources and provide common services for application software. The operating system is the most important type of system software in a computer system...

     updates, patches, and configuration changes.
  • Installing and configuring new hardware
    Computer hardware
    Personal computer hardware are component devices which are typically installed into or peripheral to a computer case to create a personal computer upon which system software is installed including a firmware interface such as a BIOS and an operating system which supports application software that...

     and software
    Computer software
    Computer software, or just software, is a collection of computer programs and related data that provide the instructions for telling a computer what to do and how to do it....

    .
  • Adding, removing, or updating user account information, resetting password
    Password
    A password is a secret word or string of characters that is used for authentication, to prove identity or gain access to a resource . The password should be kept secret from those not allowed access....

    s, etc.
  • Answering technical queries and dealing with often frustrated users.
  • Responsibility for security
    Computer security
    Computer security is a branch of computer technology known as information security as applied to computers and networks. The objective of computer security includes protection of information and property from theft, corruption, or natural disaster, while allowing the information and property to...

    .
  • Responsibility for documenting
    Documentation
    Documentation is a term used in several different ways. Generally, documentation refers to the process of providing evidence.Modules of Documentation are Helpful...

     the configuration of the system.
  • Troubleshooting
    Troubleshooting
    Troubleshooting is a form of problem solving, often applied to repair failed products or processes. It is a logical, systematic search for the source of a problem so that it can be solved, and so the product or process can be made operational again. Troubleshooting is needed to develop and...

     any reported problems.
  • System performance tuning
    Performance tuning
    Performance tuning is the improvement of system performance. This is typically a computer application, but the same methods can be applied to economic markets, bureaucracies or other complex systems. The motivation for such activity is called a performance problem, which can be real or anticipated....

    .
  • Ensuring that the network infrastructure is up and running.


In larger organizations, some tasks listed above may be divided among different system administrators or members of different organizational groups. For example, a dedicated individual(s) may apply all system upgrades, a Quality Assurance (QA)
Quality control
Quality control, or QC for short, is a process by which entities review the quality of all factors involved in production. This approach places an emphasis on three aspects:...

 team may perform testing and validation, and one or more technical writer
Technical writer
A technical writer is a professional writer who designs, creates, and maintains technical documentation...

s may be responsible for all technical documentation written for a company.

In smaller organizations, the system administrator can also perform any number of duties elsewhere associated with other fields:
  • Technical support
    Technical support
    Technical support or tech support refers to a range of services by which enterprises provide assistance to users of technology products such as mobile phones, televisions, computers, software products or other electronic or mechanical goods...

  • Database administrator
    Database administrator
    A database administrator is a person responsible for the design, implementation, maintenance and repair of an organization's database. They are also known by the titles Database Coordinator or Database Programmer, and is closely related to the Database Analyst, Database Modeller, Programmer...

     (DBA)
  • Network administrator
    Network administrator
    A network administrator, network analyst or network engineer is a person responsible for the maintenance of computer hardware and software that comprises a computer network...

    /analyst/specialist
  • Application analyst
    Application analyst
    In the USA, an application analyst is someone whose job is to support a given application or applications. This may entail some programming, some system administration skills, and the ability to analyse a given problem, diagnose it and find its root cause, and then either solve it or pass the...

  • Security administrator
    Computer security
    Computer security is a branch of computer technology known as information security as applied to computers and networks. The objective of computer security includes protection of information and property from theft, corruption, or natural disaster, while allowing the information and property to...

  • Programmer
    Programmer
    A programmer, computer programmer or coder is someone who writes computer software. The term computer programmer can refer to a specialist in one area of computer programming or to a generalist who writes code for many kinds of software. One who practices or professes a formal approach to...



System administrators, in larger organizations, tend not to be system architect
Systems architect
The systems architect establishes the basic structure of the system, defining the essential core design features and elements that provide the framework for all that follows, and are the hardest to change later....

s, system engineers, or system designers. However, like many roles in this field, demarcations between system administration and other technical roles often are not well defined in smaller organizations. Even in larger organizations, senior system administrators often have skills in these other areas as a result of their working experience.

In smaller organizations, IT/computing specialties are less often discerned in detail, and the term system administrator is used in a rather generic way — they are the people who know how the computer systems work and can respond when something fails.

Local System Administrator privileges

The term system administrator may also be used to describe a privilege which a computer owner must obtain on his/her own computer to perform certain actions even if the computer is not part of a larger system.

See also

  • Apple certification
  • Microsoft Certified Professional
    Microsoft Certified Professional
    Microsoft Certified Professional is a program of Professional certifications awarded by Microsoft. Individual certifications are awarded upon passing of one or more exams. The MCP program itself is designed for both IT Professionals and developers. Beneath the MCP program is a variety of more...

  • Red Hat Certification Program
    Red Hat Certification Program
    The Red Hat Certification Program is Red Hat's professional certification program for Red Hat and general Linux related skills such as system administration on Red Hat Enterprise Linux.All certifications are given after passing exams...

  • Application Service Management
    Application Service Management
    Application service management is an emerging discipline within systems management that focuses on monitoring and managing the performance and quality of service of business transactions....

  • Bastard Operator From Hell
    Bastard Operator From Hell
    The Bastard Operator From Hell , a fictional character created by Simon Travaglia, is a rogue system administrator who takes out his anger on users , colleagues, bosses, and anyone else who gets in his way....

     (BOFH)
  • Forum administrator
  • LISA (conference)
    LISA (conference)
    LISA is the Large Installation System Administration Conference, co-sponsored by the computing professional organizations USENIX and SAGE.The word "large" was dropped from the title of the 6th conference in 1992 . The full acronym was restored in the title of the 2003 conference and remains in use...

  • [news:alt.sysadmin.recovery alt.sysadmin.recovery] newsgroup
  • superuser
    Superuser
    On many computer operating systems, the superuser is a special user account used for system administration. Depending on the operating system, the actual name of this account might be: root, administrator or supervisor....

  • Serverfault
  • System Administrator Appreciation Day
    System Administrator Appreciation Day
    System Administrator Appreciation Day, also known as Sysadmin Day, SysAdminDay, SAD or SAAD, was created by system administrator Ted Kekatos...

  • League of Professional System Administrators
    League of Professional System Administrators
    The League of Professional System Administrators is a non-profit organization. The organization's mission is "to advance the practice of system administration; to support, recognize, educate, and encourage its practitioners; and to serve the public through education and outreach on system...

  • SAGE (organization)
    SAGE (organization)
    SAGE is the USENIX Special Interest Group for Sysadmins, an international nonprofit professional association of system administrators.SAGE describes itself thus:Its goal is to serve the system administration community by:...

  • Sysop
    SysOp
    A sysop is an administrator of a multi-user computer system, such as a bulletin board system or an online service virtual community. It may also be used to refer to administrators of other Internet-based network services....


Further reading

  • Essential System Administration (O'Reilly), 3rd Edition, 2001, by Æleen Frisch
  • Essential Linux Administration (Cengage Press): A Comprehensive Guide for Beginners, 2011 by Chuck Easttom
  • Principles of Network and System Administration (J. Wiley & Sons), 2000,2003(2ed), by Mark Burgess
    Mark Burgess (computer scientist)
    Mark Burgess is a researcher and writer at Oslo University College in Norway, who is well known for work in computer science in the field of policy-based configuration management....

  • The Practice of System and Network Administration (Addison-Wesley), 2nd Edition (July 5, 2007), by Thomas A. Limoncelli
    Tom Limoncelli
    Tom Limoncelli is a noted system administrator, author, speaker and bisexual activist.A system administrator and network engineer since 1987, he speaks at conferences around the world on topics ranging from firewall security to time management...

    , Christine Hogan and Strata R. Chalup
  • Time Management for System Administrators (O'Reilly), 2005, by Thomas A. Limoncelli
    Tom Limoncelli
    Tom Limoncelli is a noted system administrator, author, speaker and bisexual activist.A system administrator and network engineer since 1987, he speaks at conferences around the world on topics ranging from firewall security to time management...

  • UNIX and Linux System Administration Handbook (Prentice Hall), 4th Edition, 2010, by Evi Nemeth
    Evi Nemeth
    Evi Nemeth is an internationally recognized engineer, author, and teacher known for her expertise in computer system administration and networks...

    , Garth Snyder, Trent R. Hein, Ben Whaley

External links

The source of this article is wikipedia, the free encyclopedia.  The text of this article is licensed under the GFDL.
 
x
OK