System & Network Admin
A network combines several systems within a group together, to operate in unison of each other, and also provides resource sharing and centralized data for all the users apart from providing easy access and data security. A Network consists of servers, PCs, workstations, printers, switches, routers and other objects connected to allow easy access to information and resource sharing.

The network has to be designed to allow optimal usage of the existing facilities and allowing a smooth transition to the new technologies.

Some of the critical items that need to be considered while the network is designed are:

  • Designing Network Topology depending on the requirements.

  • Bandwidth

  • Analyzing and finding out the potential bottlenecks in the network

  • Systems and the network should be available with the least possible downtime

  • System configuration, user access, user rights, security polices, Security issues, Network Firewall , Backup and restore of data.

Spry has expertise in:


  • Designing and Implementing Network layout. Implementing Heterogonous Networks.

  • Designing and implementing network consisting of Windows NT Server, Windows NT Workstation, Proxy Server and Firewall.

  • Implementing Unix.

  • Implementing Security policies.

  • Planning backup strategies.

  • Implementation of LAN/MAN/WAN based networks.

  • Studying the Hardware requirement over a period of time.

  • Ensuring the smooth working of different applications.

Performing physical Network activities like:


  • Ensuring smooth network flow

  • Identifying the bottlenecks in the network at Switch, router level

  • Implementing RAID 5

  • Optimizing the Systems for CPU, Memory, Disk and Network utilization.

  • Setting up thresholds for memory usage, available Disk space

  • Compressing the file size

  • Backing up data using various techniques, live backup, dumping, mirroring, replication, exporting etc. The backed data is also validated periodically

  • Validating the Trust relationship between different domains

  • Securing the data by implementing Security policy according to organizations requirements

  • Securing the Network from outside users by Implementing Firewall.

  • Auditing the File and Object access to check the usage of resources and Security

  • Monitoring Server utilization for Performance

  • Monitoring Network bandwidth utilization for Performance

  • Clearing the log file.