Course Title: Administer and configure a network operating system

Part B: Course Detail

Teaching Period: Term2 2008

Course Code: COSC5777C

Course Title: Administer and configure a network operating system

School: 155T Vocational Health and Sciences

Campus: City Campus

Program: C6068 - Advanced Diploma of Computer Science

Course Contact: Dalija Beganovic

Course Contact Phone: +61 3 9925 4664

Course Contact Email:

Name and Contact Details of All Other Relevant Staff

Aleksandra Labovic
Course Contact Email:

Nominal Hours: 50

Regardless of the mode of delivery, represent a guide to the relative teaching time and student effort required to successfully achieve a particular competency/module. This may include not only scheduled classes or workplace visits but also the amount of effort required to undertake, evaluate and complete all assessment requirements, including any non-classroom activities.

Pre-requisites and Co-requisites


Course Description

This unit defines the competency required to set up and use administrative tools to manage a network and create the network configuration required by client.

National Codes, Titles, Elements and Performance Criteria

National Element Code & Title:

ICAITS120B Administer and configure a network operating system


Create an interface with existing system

Performance Criteria:

1. Organisation's policies and procedures for network use and administration are reviewed.
2. Network administration tools that can be used to enforce polices and procedures are identified.
3. Settings and parameters that should be used in order to meet policies and procedures are documented.
4. Recommendations are made to management for ways of overcoming any weaknesses in administration tools.


Manage user services

Performance Criteria:

1. Current system is identified through audits of hardware and software.
2. System interaction is determined by identifying what data is required by particular users and how often the data is accessed.
3. Existing applications are examined and are upgraded/ reconfigured to new environment.
4. Reconfiguration is tested for successful interface with existing system.


Monitor user accounts

Performance Criteria:

1. Client user network requirements are evaluated and an appropriate file and folder structure is designed.
2. File and folder structure is created using appropriate administration and system tools.
3. Security, access and sharing of file system are set to meet client user requirements.
4. Virus protection requirements are identified by the network in line with organisational procedures.
5. File system is tested to ensure that appropriate access is available to the client user groups.
6. File system that is created is documented in accordance with organisational standards.


Provide and support back-up security

Performance Criteria:

1. Client user network requirements are evaluated and an appropriate set of services that should be provided is designed.
2. Services required are implemented by using the appropriate administration and system tools.
3. Users and groups are created as required to facilitate user security and network access in accordance with client user authorisation.
4. Achievement of access by client users to authorised network data and resources is tested.


Review network policies

Performance Criteria:

1. Default user settings are modified to ensure that they match security policies.
2. Previously created user settings with more relaxed security are modified according to security and access policies.
3. Display of appropriate legal notices at log on is checked.
4. Appropriate utilities are used to check strength of passwords used.
5. Procedures are reviewed to ensure that users who leave have their accounts disabled or deleted.
6. Information services such as the Internet are accessed to identify well-known and up-to-date security gaps and these are plugged with appropriate hardware and/or software.


Set up and manage the network file system

Performance Criteria:

1. Network is checked and is ensured to be clean of viruses before back-up.
2. Security requirements are reviewed for client users and data to be stored on network.
3. Risks that data is exposed to are determined and appropriate prevention and recovery processes are provided.
4. Systems to provide back-up and ability to restore services in the event of a disaster are implemented.
5. Disaster recovery procedures are documented.

Learning Outcomes


Details of Learning Activities

Students will improve their knowledge and skills in Administer and configure network operating systems through theory and laboratory sessions.
Assessment methods have been designed to measure achievement of each competency in a flexible manner over a range of assessment tasks.

Teaching Schedule

Teaching Schedule
The study program is outlined under the topics below. Every effort will be made to adhere to this outline, but the School reserves the right to make changes as appropriate.
Semester 2, 2008

Lecture 1
Course Introduction

• Course Overview
• Introduction to Operating Systems (Windows, Unix, Linux)
• A Brief History of the UNIX and Linux Operating Systems
• GNU General Public Licence

Lecture 2
Using Unix at the Console

• Navigating Unix at the Console
• Introducing the Shell
• Configuring and Managing the Linux File System
• Understanding Permissions
• Directory and File management

Lecture 3
Managing Processes

• Processes
• Process Information
• Producer / Consumer Problem
• CPU Scheduling


Lecture 4
Working with Shells and System Variables

• Writing Basic Scripts
• Running Scripts and Programs Examples: Writing Basic Scripts

Lecture 5
Using Linux on the Desktop
Client Account Management
Installing Linux

• Working with Files and Directories
• Customising the Desktop
• Creating a User
• Changing User Priorities
• Removing a User
• Disabling a user Temporarily
• Hardware and Environmental Considerations
• Dual-Booting Issues
• Managing the GRUB Boot Loader
• Methods of Installation
• Installing Software

Lecture 6
Storage Management

• Memory Management
• Virtual Memory

Lecture 7
Parallel Processing
Mutual Exclusion

• Concurrent Processes
• Parallel Processing
• Mutual Exclusion
• Critical Section
• Deadlock

Lecture 8
Security System
Protection and Security

• Developing a Network Security Policy
• Threats to Network Security
• Implementing Security Measures

Learning Resources

Prescribed Texts

Class Notes


• Operating System Concepts – 7th Edition, Abraham Silberschatz & Peter Galvin, Hoboken, NJ :J. Wiley & Sons,c2005.

• Linux Administration , Steve Shah & Wale Soyinka, McGraw-Hill/Osbourne, c2005

• Unix Shells by Example – 4th Edition, Ellie Quigley, Pearson Education Inc., c2005

Other Resources

Overview of Assessment

The student must demonstrate an understanding of all elements of a particular competency to be deemed competent. Assessment methods have been designed to measure achievement of each competency in a flexible manner over a range of assessment tasks.
Assessment will incorporate a variety of methods including technical requirements documentation, homework and in class exercises, written tests, practical problem solving exercises, presentations and practical tests. Students are advised that they are likely to be asked to personally demonstrate their assessment work to their teacher to ensure that the relevant competency standards are being met.

Assessment will consist of Labs & Quizzes , Two Projects, and Two Tests.

Assessment Tasks

Marking scheme:
• Project – 20%
• 2 Quizzes – 10%
• 4 Labs – 20%
• Mid-Semester Exam – 25%
• Final Exam – 25%


All the tasks listed below are to be completed to a satisfactory level.

1. Theoretical knowledge (Final Exam, Mid-Semester Exam, Quizzes)
You need to pass all the above assessments satisfactory (score of 50% or better).

2. Labs
There will be a series of labs throughout the course. You MUST complete all labs.

3. Project
A practical assessment at the end of the course that measures lab techniques and knowledge. You MUST complete the Project.

RMIT Numerical Grading
< 50 % NN
50 – 59 PA
60 – 69 CR
70 – 79 DI
80 – 100 HD

Assessment Matrix

A student must demonstrate an understanding of all elements of a particular competency to be deemed competent. Assessment methods have been designed to measure achievement of each competency in a flexible manner over a range of assessment tasks.
Assessment will incorporate a variety of methods including class exercises, quizzes, written tests, and practical exercises. Students are advised that they are likely to be asked to personally demonstrate their assessment work to their teacher to ensure that the relevant competency standards are being met.

For a student based at the RMIT City campus in Melbourne, Australia in Semester 2, 2008 the assessment will be:


ICAITS120B/ COSC5777C Administer and Configure a Network Operating System     Lab1       Lab2        Lab3          Lab4         Project          Quizzes/Exams
Element 1                                                                                                                                                         Yes                              Yes          Yes                     Yes
Element 2                                                                                                                                                          Yes                             Yes          Yes                     Yes
Element 3                                                                                                                                                          Yes         Yes             Yes           Yes                     Yes
Element 4                                                                                                                                        Yes           Yes         Yes              Yes          Yes
Element 5                                                                                                                                        Yes                           Yes              Yes           Yes
Element 6                                                                                                                                                                                               Yes           Yes                    Yes

Other Information

Students are advised to access the RMIT University web at for a range of useful information relating to their studies at RMIT. Such information includes:
• Generic statement of student rights and responsibilities
• Links to the Learning Support Unit & other support (eg counselling, disability, etc)
• Link to the Student Union web site
• Link to the Student Policy web site

ICT access. To successfully participate in the activities of this course students require access to:
• Computers
• The Internet for the purpose of collecting information
• RMIT student email for the purpose of communicating with staff and students within the course.
RMIT student/staff email is the official medium of formal communication between RMIT staff and students.
• RMIT staff will only accept email communication through the official email medium
• UNIX account (“minke”)

Special Consideration
Any student who, because of illness or other circumstances beyond their control, has been prevented from any form of assessment or whose performance in a test was affected, by illness or other circumstances beyond their control, may apply for special consideration. This must be done within 48 hours of the missed assessment/assignment by lodging the appropriate form with medical certificate or other supporting documentation with the School administration office.

Note: It is the policy of the School of Life and Physical Sciences NOT to AUTOMATICALLY PROVIDE EXTENSIONS for ASSESSMENT SUBMISSION or SUPPLEMENTARY OR DEFERRED EXAMS/TESTS. You will be advised on the outcome of your application for Special Consideration.

Recognition of Prior Learning/Recognition of Current Competence
If you have already gained skills and knowledge relevant to this course through previous study, work experience or general life experience you may be eligible to have your learning recognised. General information and the University’s policy on Recognition of Prior Learning (RPL) and Credit Transfer can be accessed at (You will need to be logged in to view these documents).
Students should check the ‘Advanced Diploma of Computer Science’ website for details.

Presentation of Work.
Word processed presentation of written assessment tasks is required, except where specifically exempted as part of the assessment task specification. Comprehensive assessment task specifications will be issued separately on commencement of the course.

University Plagiarism Statement
Students are reminded that cheating, whether by fabrication, falsification of data, or plagiarism, is an offence subject to University disciplinary procedures. Plagiarism in oral, written or visual presentations is the presentation of the work, idea or creation of another person, without appropriate referencing, as though it is one’s own. Plagiarism is not acceptable. The use of another person’s work or ideas must be acknowledged. Failure to do so may result in charges of academic misconduct, which carry a range of penalties including cancellation of results and exclusion from your course.
Students are responsible for ensuring that their work is kept in a secure place. It is also a disciplinary offence for students to allow their work to be plagiarised by another student. Students should be aware of their rights and responsibilities regarding the use of copyright material.

Feedback/Evaluation Forms
Course evaluation forms will provide students with the opportunity to give feedback on the learning and assessment experience.

Occupational Health and Safety.
Students are required to participate in the OH&S induction program for this course and at all times follow the occupational health and safety policies and procedures demonstrating appropriate behaviours to ensure the safety of self and others.

Course Overview: Access Course Overview