Instituto de Transportes E Comunicações
Instituto de Transportes E Comunicações
Trainees: trainer:
Nilton Mavie Nelio Chongo
Wisly Manjate
Klerson
Waken
Kevin
One of the most important goals is to ensure network reliability and uptime. This
means making sure that all systems, devices, and services connected to the network are
operating continuously without interruptions. A reliable network allows employees,
students, or users to access the resources they need when they need them. Network
administrators work to minimize downtime by identifying and fixing issues quickly,
maintaining hardware, and applying necessary updates.
Another key goal is to support users and manage network resources effectively. This
includes managing user accounts, assigning appropriate access permissions, and
ensuring that everyone has the tools and resources they need from internet access to
shared printers and servers. When users experience issues, network administrators
provide support and solve problems promptly, helping to maintain productivity.
Looking toward the future, scalability and planning for growth are important goals of
network administration. As organizations grow, so do their networking needs. A good
network administrator designs the network to handle more users, more devices, and
higher data usage. This might involve upgrading infrastructure, adopting new
technologies, or expanding into cloud-based services.
Equally important is the goal of disaster recovery and data backup. No matter how
secure or well-maintained a network is, unexpected problems can occur such as
hardware failures, cyberattacks, or natural disasters. Network administrators prepare for
these situations by creating detailed backup and recovery plans. These plans ensure that,
in the event of data loss or network failure, systems can be restored quickly with
minimal impact on operations.
Network administration covers several important areas that work together to ensure a
reliable, secure, and efficient computer network. Each area focuses on a specific aspect
of the network and plays a critical role in the overall management of IT infrastructure.
One of the core areas is Network Configuration and Setup. This involves installing
and configuring the hardware and software needed to build the network. Network
administrators set up routers, switches, firewalls, and wireless access points. They
design the network layout (topology), assign IP addresses, and configure protocols that
allow devices to communicate. A well-configured network is the foundation for all other
operations.
Another key area is Network Monitoring and Performance Management. Once the
network is up and running, it needs constant monitoring to ensure it performs
efficiently. Administrators use specialized tools to track network traffic, bandwidth
usage, latency, and connectivity issues. By analyzing this data, they can identify
problems early, optimize traffic flow, and prevent downtime.
Network Security is a critical focus area. With cyber threats on the rise, protecting the
network is more important than ever. This includes setting up firewalls, intrusion
detection and prevention systems, antivirus tools, and secure access policies.
Administrators also manage user authentication, encryption, and security patches to
defend against hacking attempts, malware, and data breaches.
User and Resource Management is another essential part of the job. Network
administrators create and manage user accounts, assign access levels, and control
permissions for different parts of the network. They ensure users can access shared
resources like printers, file servers, applications, and the internet. Good user
management helps maintain productivity and security.
Backup and Disaster Recovery planning is another vital area. Network administrators
create regular data backups and set up systems that can recover quickly from failures.
This ensures business continuity in case of a power outage, hardware failure,
cyberattack, or other unexpected event.
Finally, Documentation and Compliance rounds out the key areas of network
administration. Accurate records of network configurations, updates, incidents, and user
access are essential. These documents help with troubleshooting, future upgrades,
audits, and meeting industry regulations.
A network administrator is a key part of any organization’s IT team. Their main job is
to make sure the company’s computer network runs smoothly, efficiently, and securely
at all times. They are responsible for setting up the network by installing and
configuring hardware like routers, switches, and firewalls, as well as connecting
computers and devices so that they can communicate with one another. Once the
network is up and running, the administrator monitors its performance daily, making
sure everything is fast and reliable, and quickly fixing any problems that come up.
Security is also a big part of the job. Network administrators protect the system from
hackers, viruses, and unauthorized access by managing firewalls, updating security
settings, and applying patches to keep everything secure. They control who can access
what on the network, set up user accounts, and help staff connect to resources like
shared files, printers, or cloud services. When issues arise like slow connections or
outages they troubleshoot and fix them as quickly as possible to avoid downtime.
In addition to keeping things running, network administrators also plan for the future.
As a business grows, its network needs to grow too. That means upgrading equipment,
adding more users or devices, and sometimes shifting to newer technologies like cloud
networks. They also handle backups and recovery plans so that important data isn't lost
if something goes wrong, like a power outage or cyberattack. On top of all that, they
keep detailed documentation of how the network is set up, so they (or others) can
troubleshoot problems more easily and stay organized.
Overall, network administrators are the ones behind the scenes who keep the digital
backbone of an organization strong, secure, and ready for anything.
Network Security
With the growing number of cyber threats, security has become a top priority. Network
administrators must deploy firewalls, Intrusion Detection and Prevention Systems
(IDS/IPS), Virtual Private Networks (VPNs), encryption methods, Multi-Factor
Authentication (MFA), and access control policies. Secure protocols (such as HTTPS,
SSH, and SNMPv3) must be implemented, along with regular security audits, incident
response planning, and user awareness training. Network security is not a one-time
setup it requires continuous monitoring, updates, and adaptation to new threats.
Regular backups of data and network configurations are essential for protecting
organizations from failures, cyberattacks, or natural disasters. Disaster recovery plans
must be tested periodically to ensure quick restoration in emergencies. Keeping
documentation up to date is equally important. This includes physical and logical
diagrams, configurations, credentials, policies, and change logs. Proper documentation
helps avoid errors, speeds up support, and facilitates employee training. Organizations
following standards such as ISO/IEC 27001 must maintain detailed records for
compliance.
VPNs and Secure Remote Access Virtual Private Networks (VPNs) allow secure
access to internal networks over public networks like the internet. VPNs use encryption
to ensure confidentiality and data integrity, especially when users connect remotely.
There are different types of VPNs:
• SSL VPNs: Provide secure access through a web browser without needing a full VPN
client.
• IPSec VPNs: Offer strong encryption and authentication for secure communication
between networks or devices. VPNs are fundamental for organizations with hybrid or
remote work environments. Proper implementation of VPNs includes selecting
appropriate protocols (e.g., OpenVPN, L2TP/IPSec), using strong encryption (AES-
256), and integrating with user authentication systems like RADIUS or LDAP.
Monitoring and logging VPN usage also helps detect anomalies and reinforce security
policies. .
Conclusion