CS615 -- Aspects of System Administration

Course Overview:

In a networked environment, the need for a skilled system administrator has become increasingly obvious, but what exactly does a System Administrator do? Traditionally, the System Administrator's job has not had a precise definition; in some places they are referred to as Systems Engineers, Site Reliability Engineers, or perhaps Web Operations. Elsewhere, the boundaries between traditional "dev" and "ops" are being torn down, yielding a collaborative culture of "DevOps".

In this class, some of the most essential aspects of system administration and the rather broad skillset required in this profession will be covered, giving students the opportunity to develop the skills necessary to architect solutions for as well as analyze and troubleshoot problems arising in every day usage of complex networks and large-scale installations.

Some of the topics covered include: hardware configuration, operating system installation, shell programming, security policies, backup deployment and disaster recovery, network design, software installation and maintenance, and configuration management.

Students are expected to be comfortable operating in a UNIX-like environment on a user level and have a solid understanding of TCP/IP networking and Operating System concepts.

If you have questions about this class, please email jschauma@stevens.edu and (this is important to escape the spam filters) include "[CS615]" in the subject line.

Cloud Computing

In this class, we will make use of Amazon's Elastic Compute Cloud for all homework assignments; this will give students the chance to gain valuable experience in new technologies currently in high demand in the industry (cloud computing, IPv6) and also provide a possibility for students to gain superuser access to a number of operating systems otherwise not available at Stevens.


Time, Date & Place:

Spring 2014: Mondays, 18:15-20:45, Morton 205

Instructor:

Jan Schaumann [jschauma@stevens.edu]

Resources:


Textbooks:

This class does not have any strictly required textbooks. However, there are two books which are recommended, if only as a reference throughout the semester. These are:

Other suggested reading:

Grading:

There will (probably) be:
  • course participation
  • a number of homework assignments of varying complexity, possibly including, but not limited to: programming, OS installation, OS security, capture-the-flag-style cracking, security principles
  • a group project towards the end of the semester
  • some extracurricular activities
  • no curve
Letter grades will be given as follows:
  • 90% - 100% of total points => A
  • 80% - 89.99% => B
  • 70% - 79.99% => C
  • 0 - 69.99% points => F
Within each letter grade, there are +/- grades given at the discretion of the instructor. (Exception: there is no A+)

Plagiarism, Cheating and other ways to get an F

This really should not be necessary, but just to preempt any complains that I did not make myself clear:
Students are responsible for their own work. It is unethical (and in some cases illegal) to present as one's work the ideas, words or representations of another without the proper indication of the source. Therefore, it is the student's responsibility to give credit for any quotation, idea or data (such as statistical data or source code) borrowed from an outside source.

Failure to do so constitutes plagiarism, may imply copyright infringement and license violations and is viewed as cheating in this class, yielding a failing grade.

Homework Assignments:


Syllabus:

Lecture slides and other supporting material will be uploaded as the semester progresses.
Date Topic Suggested Reading Material Course Material
2014-01-20 Martin Luther King Day -- No class
2014-01-22 Introduction, Policies, Overview, UNIX history and basics Frisch: Preface
Nemeth et al: Chap. 1
Burgess: Chap. 1, 2, 14
Limoncelli & Hogan: Preface, 26
SAGE Job Descriptions for System Administrators
Note: Wednesday class!

Lecture 01 slides
Course Survey
HW#1
2014-01-27 Filesystems and Disks Frisch: Chap. 10
Nemeth et al: Chap. 5, 8
Lecture 02 slides
2014-02-03 Snowday - no class!
2014-02-10 Software Installation Concepts Limoncelli & Hogan: Chap. 23 (in first edition) or Chap. 28 (in second edition)
Burgess (Principles): Chap. 4.6 - 4.8
Frisch: Parts of Chap. 3
Lecture 03 slides
boot sequences for different OS
Exercise: Compare the use of pkgsrc and pkgin

HW#2
2014-02-17 President's Day -- No class
2014-02-18 Got root? Multi-user basics, politics, policies and ethics Frisch: Chap. 6
Burgess: Chap. 5
Nemeth et al: Chap. 3, 6, 27
Note: Tuesday class!

Lecture 04 slides
LISA Code of Ethics
System Administrators' Code of Ethics
Exercise: adding users
2014-02-24 Automating Administrative Tasks I / Shell Essentials Frisch: Chap. 14, Append. A
Nemeth et al: Chap. 9
Lecture 05 slides
shell basics
HW#3
2014-03-03 Automation II / Backup and Disaster Recovery Frisch: Chap. 11
Nemeth et al: Chap. 10
Burgess: Chap. 12.1 - 12.4
Limoncelli & Hogan: Chap. 8, 21
SAGE Booklet: Backups and Recovery

Frisch: Chap. 15, 16
Nemeth et al: Chap. 4, 25
Burgess: Chap. 5
Lecture 06 slides
HW#4: EC2 Backup
2014-03-10 Spring Break -- No class
2014-03-17 Networking Frisch: Chap. 5
Nemeth et al: Chap. 13, 15, 20
Burgess: Chap. 3, 10
Limoncelli & Hogan: Chap. 18
Lecture 07 slides
telnet strace
EC2 script output
EC2 binary tcpdump output
tcpdump DNS lookup over IPv6
tcpdump DNS lookup over IPv4
tcpdump ping and traceroute
tcpdump TCP port 80 over IPv6
tcpdump TCP port 80 over IPv4
2014-03-24 Popular services: DNS Frisch: Chap. 9
Nemeth et al: Chap. 16, 19, 22
Burgess: Chap. 9
Limoncelli & Hogan: Chap. 19
Lecture 08 slides
2014-03-31 Popular services: SMTP / HTTP Frisch: Chap. 9
Nemeth et al: Chap. 16, 19, 22
Burgess: Chap. 9
Limoncelli & Hogan: Chap. 19
Lecture 09 slides
2014-04-07 SNMP, Monitoring Frisch: Chap. 9
Nemeth et al: Chap. 16, 19, 22
Burgess: Chap. 9
Limoncelli & Hogan: Chap. 19
Lecture 10 slides
2014-04-14 Online Class   "Homework" 5: Use tcpdump to observe traffic flow
2014-04-21 SSL, SSH, ...   Lecture 11 slides
2014-04-28 System Security Frisch: Chap. 7
Nemeth et al: Chap. 21
Burgess: Chap. 11, 12
Limoncelli & Hogan: Chap. 7
Lecture 12 slides
2014-05-01 Capture The Flag!   instructions
Wrap-Up

Misc. Topics are done based on interest and time available. They may also be used as a presentation topic. They include: cloud computing, virtualization, IPv6 migration, heterogenous networks / multiple OS, automated installation, server room basics, cooling issues, racking etc. clustering, spam...