Survey
* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
Unit 1: Deploying the Chassis ...................................................................................................................... 2 Unit 2: Selecting CPUs and Motherboards ................................................................................................... 3 Unit 3: Managing the BIOS .......................................................................................................................... 4 Unit 4: Selecting Memory ............................................................................................................................. 5 Unit 5: Troubleshooting Methodology ......................................................................................................... 7 Unit 6: Installing Expansion Cards ............................................................................................................... 9 Unit 7: Installing Data Storage Devices ...................................................................................................... 14 Unit 8: Installing a Network Operating System .......................................................................................... 19 Unit 9: Networking ..................................................................................................................................... 22 Unit 10: Managing a Network Server ......................................................................................................... 26 Unit 11 Documenting and Planning ............................................................................................................ 29 Unit 12 Preparing for Disaster .................................................................................................................... 30 CompTIA Server+ Study Review Unit 1: Deploying the Chassis Topic A: Form Factors o Client Form Factors Desktop: Once popular now rare, sits on desk with monitor on top Tower: Sits upright on the floor or shelf. 20x8x18 Mid-Tower: Smaller version at 18x8x18 Mini-Tower: Even smaller at 16x8x18 Brick: cube like case Laptop o Server Form Factors Computer Rack: A Standardized mounting unit Rack Unit: measure in 10 or 20u. u is 3 holes measuring 1.75inches each o Electrical and Static Safety 1-10-100 rule: 1mA you feel 10mA you can’t let go and 100mA you die. Static Electricity: Can build up to 35k volts and computer part can be damage at 8k volts or less. Increase humidity, wear cotton, and ESD tools can prevent static electricity. o Case Features Chassis intrusion switches will not boot with open case Diagnostic LED will change color to notified a problem Expansion Bay allow you to add on devices or expansion slots Topic B: Power Supplies o Electricity Background Voltage: force of electricity cause by difference in charge Current: Flow of electrons DC: Constant flow of current in one direction AC: Varies in current in different directions Phase: Single phase used in most homes and small businesses. Use 3 conductors to deliver an AC voltage on 3 conductors that very in union with the 3rd conductor acting as a ground. Single phase use 120V was two phase uses 240V. In three-phase 3 conductors are used; each is “hot” used for factory building. Power Supply Specification: Only draws the power that is needed Voltage Regulator Module (VRM): Sends the appropriate amount of voltage to processor, reads level from VID on post. o Power Connectors Standards for Driving Power Connectors: Three common power connectors are peripheral, floppy, and serial ATA (SATA) Peripheral (Molex): used for HDD and CD/DVD. Standards for Motherboards Power Connectors: newer power connectors are keyed while older ones have dual sided connector that can be placed in backwards. Consist of 20-24 pin connectors. Topic C: Cooling Systems o CPU Cooling Fans and Air Openings: Usually is all you need for old PC Heat Sink and Cooling Fans: Absorbs and transfer heat. Shrouds: Direct air to or from the fans like a tunnel. Heat Pipes: Small tubes built into cooling fins that have small amounts of liquid. Heat vaporized the flued and heat flow away from the processor. Water Pumps: Flows water over CPU. The heat is picked up and transfer outside the case to cool down then continues back to CPU Peltier Cooler: Apply cold temperature when voltage is apply, it can be put directly on the CPU. o Area Cooling Room Cooling: make sure the air condition keep the whole room cool. Rack Cooling: a rack is placed in your cool room with fans drawing air Row Cooling: Same as rack cooling but with a row of racks. Unit 2: Selecting CPUs and Motherboards Topic A: Central Processing Unit (CPU) o Processors Control Unit: Managing the flow of programs Execution Units: Processing the instruction and data, units are built from ALU (arithmetic logic unit) and FPU (floating-point unit). ALU calculate and compares number while the FPU design to work with numbers. Cores: a core is an execution unit. Dual, Triple, Quad are # of executions. Single Core: processor order executes selectively stores in cache. Cache are registers and when full use RAM memory. Multi-core: same process but runs multiple executions at same the same time. Must have SMT (simultaneous multi-threading Technology) if not will only run one at a time. Registers: Stores data and Instructions. o CPU Performance Hyperthreading: Enable 1 processor to run 2 streams as if there are 2 processors. Reduced Instruction Set Computer (RISC): Philosophy that performance will be improve if the features of CPU is reduce, advance feature to be provided on software. Complex instruction Set Computer (CISC): opposite of RISC, hardware is faster so more complex CPU o Memory Protection Memory Protection: Marks a section of memory as non-executable or NX Topic B: Packaging and Slots o CPU Packaging CPU Packaging: a case made from material plus wire and connectors that bridge the microscopic connector to external circuitry. Topic C: Motherboards o Motherboards HID Port: Human interface device. Connect I/O devices like keyboard Daughter Boards: connect to circuit board to provide assistance with video Riser Cards: Provides additional expansions Unit 3: Managing the BIOS Topic A: The Bios and CMOS o Firmware Gray area between hardware and software. The software written on chip. o BIOS (Basic Input Output System) Shadowing and copy content of BIOS on memory o CMOS (Complementary Metal Oxide Semiconductor) CMOS Config: will need a system utility tool on BIOS or HDD CMOS Utility Access: Different key according to model. (F1,F2,Delete) o BIOS Updates Memory chip does not lose file when power off. Saves on ROM BIOS update Sources: Refer to BIOS manufactures Determined BIOS Version: Start All programs Access System tools System information. Record value listed BIOS version/Date/ o Flashing BIOS Steps: Determine correct version view PC page for BIOS file See if update is needed download file download utility close application open utility and follow reboot o BIOS Update Failures Minimize Failure: 1.Update only if you must 2.Do not power off during update 3.Use right utility 4.Follow utility exactly 5.Backup everything Recovering a failed BIOS update: use backup in utility, “boot block”, use jumper cable switch, DIP switch, new BIOS chip as last resort Topic B: The Post and Boot Processes o Power-On Self-Test (POST) Beep Codes: Number of beep determines what is wrong Common Beep Codes: 1System good, 3 long Keyboard, 8Video adapter, 9 BIOS problem, 1 long & 3 memory Numeric Code: Shows a 4 digit code, referrer to manual for error Code Error: 151 Clock Fail, 161 Bad CMOS battery, 162 Config. Mismatch, 164 Memory size mismatch, 20# memory fail 1762 HDD error o Boot Process Boot Devices: Internal HDD, optical drive, USB, network. Unit 4: Selecting Memory Topic A: Computer Memory System Analog for RAM: Card is storage Importance of RAM: Performance, having more RAM means faster computer. Software support, programs need RAM to run or will be slow o Measuring Memory Cells: The storage location on the chip Basic Memory Unit: Memory Storage = 2^#bits Name Number of Bits Number of values that can be stored in this much memory Bit 1 2 (Zero or one) Nibble 4 16 (2^4) Byte 8 256 (2^8) Word Depends on Processor (2^32) or (2^64) Larger Units Name # Values Kilobyte (KB) 2^10 bytes Megabyte (MB) 1024 KB Gigabyte (GB) 1024 MB Terabyte (TB) 1024 GB o Memory Types Volatile Vs Non-Volatile: Volatile losses its content when powered off such as RAM and CMOS. Non-volatile doesn’t like ROM, PROM, EPROM, EEPROM, and Flash. Dynamic Vs Static: Dynamic memory must refresh often in order to keep its data when powered on. They are smaller, cheaper and harder to make. Static dos not need to refresh to hold its content. Making it faster than RAM but it cost more and is much larger. Asynchronous and Synchronous: Asynchronous DRAM (ADRAM) isn’t synchronous to the system clock. It runs at the same speed every time. Synchronous DRAM (SDRAM) is tied to system clock making it faster because it can run at the same speed as the rest of the computer. o Memory Access DRAM, FPM, VRAM, EDO, BEDO, SDRAM, DRDRAM, DDR1-3 o Access Time Amount of time it takes between when a request is made and when the data is available on the bus. Measured in nanoseconds (ns). Memory Speed: Measure in megahertz (MHz) 1Hz = once cycle per second. So 1MHz = 1 million cycles per seconds. Divided (1/MHz)=ns Bandwidth: Amount of data that can be transferred to or from memory per second. Depends on memory speed and chip design. Speed Rating: Standard testing to find speed information Buffered Memory: Contains a register located between the memory cells and the computer’s memory controller. Helps with large memory modules. Topic B: Memory Packaging o Packaging Chips are placed on to a small circuit on memory stick. Single and Double Side Modules: Chip use to sit on one side but now on both. Number of DRAM Chips: Usually 8 chip for each byte of data Packaging Type: SIMM 30, 72 DIMM 100,168,184,240 RIMM 184. Number of pins determines on type of RAM (DDR3 or SDRAM) o Memory Error Recovery Parity: A scheme that enables the detection of an error. Some DIMMs has 9 chips so when one fails the 9th chip (parity) could replace it. ECC: Error correcting code scans the chip to determine if there is an error. If so it will know what change and how to fix it. Parity & ECC in Current PC: Used in modern computers to save money by finding memory error with software not hardware. Unit 5: Troubleshooting Methodology Topic A: Troubleshooting Models o The Troubleshooting Process Troubleshooting: The process of determining the cause of and ultimately the solution to a problem. Stages: Back up data divide and analyze Verify Research Document Inform. o CompTIA Server+ Troubleshooting Model Identify the Problem: ask questions or review log files Establish a Theory of Probable Cause: analyze the information you gather Test the Theory: look at components and see if your theory is possible Create Plan of Action: Create a plan to resolve the issue Implement the Solution: Put your plan into action Verify the Results: Is the issue fix, if so add thing to try to prevent it Root Cause Analysis: See if you fix it permanently or temporarily Document Resolution: Write down what you did for what problem o CompTIA Network+ Troubleshooting Model Identify the problem Re-create the problem Isolate the cause Formulate a correction Implement the correction Test the solution Document the problem and solution Provide feedback. o ASID Troubleshooting Model Acquire: gather information Simplify: remove components Implement: identify and implement solution Document: record findings o Gathering Information from a User The Customer’s Environment: Platform includes info about hardware Symptoms and Error Codes: Gather information and look for error codes Situation When Problem Occurred: What program was running o Identifying Hardware or Software Problems Hardware: Error code appear when POST Software: After POST could be configuration issue or for new hardware. o Information Resources Documentation: Research information from manuals, web, and tech related knowledge. Forums: Web pages where people talk about issues and solutions. Other Sources: Magazines, employees, and vendor meetings. Topic B: Troubleshooting Toolkits o The Troubleshooting Toolkit Screwdrivers, nuts, needle-nose pliers, tweezers, flashlight, containers, anti-static bags/sprays, and ESD mats/bracelets. Hardware tools: Multimeter, system board tester, voltage regulator. Software: Driver disc, antivirus software, boot disk, OS on CD/DVD. Topic C: Troubleshooting System Components o Troubleshooting Power Supplies Computer Fails to Boot: Good Power supply but getting sent at wrong time Replace power supply with better engineered one. Intermittently Stop: Electrical problem Install UPS and contact electrician for building. Limited Power Connector: Power supply not enough power Replace and use split connectors. Doesn’t boot but fan is on: Power not connected to motherboard Check connection. o Motherboard and CPU Failures Symptom Probable Cause Suggested Solution System fails to boot Power problems Replace motherboard motherboard failed Smoke from case Component like CPU Power off and replace overheating components Random Shutdown CPU cooling fan Replace CPU fan Power but fail to boot Power control circuity on Replace motherboard motherboard failed Video display error Video circuitry failed Replace motherboard No power, power light not CPU failed, backplane not Reset backplane or illuminating seated Replace CPU BSOD, memory error, reboots Motherboard failing Replace motherboard o BIOS Related Problems and Causes Symptom Probable Cause Suggested Solution Device misidentified BIOS misconfigured Reconfigured motherboard Wrong memory site BIOS misconfiguration Set up utility to reported reconfigure memory HDD inaccessible Geometric parameter are not set BIOS setup utility to right, HDD disable in BIOS reconfigure devices System won’t boot from Boot order is wrong, HDD Reconfigured Devices BIOS disable, CMOS not correct Date, Time incorrect CMOS battery is dead Replace CMOS battery o POST Related Problem and Causes Symptom Probable Cause Suggested Solution No video, 8 short beeps Failed adapter memory Replace memory modules adapter 3 long beeps Keyboard error Replace keyboard 1 long & 3 short beeps Memory problem Replace system mem. Code 162 Configure in CMOS Reconfigure in BIOS doesn’t match PC hardware Code 164 More/less memory in CMOS settings Configure correct value in BIOS o CMOS Related Problems and Causes Symptom Probable Cause Suggested Solution “non-system disk” BIOS can’t find master boot Reconfigure records “Display type mismatch” Video setting in CMOS does not Connect type of match monitor monitor “Memory size mismatch” Memory listed in CMOS doesn’t Correct memory in match actual install BIOS “CMOS check sum failure” BIOS detect memory problem in Replace CMOS battery CMOS o Computer Startup Problem Boot Error: Doesn’t boor correctly OS Startup Error: System boot, but fail when load Operating System. OS load error: System boots, OS interface does not load. Invalid Boot or Non-System Disk non bootable chip install check boot drive o Diagnosing Memory Problems Memory testing utilities: Run thousands of write/read operation on every memory location. Types= memory test 86, 86+, Microsoft memory Diagn. Memory test 86: most popular and free under GPL (Gnu Public License). o Memory Leaks Memories assign to applications but do not release it. Task Manger: Can be used to monitor performance. Consists of CPU usage, CPU history, memory, PF usage, physical memory, page file usage. Performance Monitor: Help determined memory leak status/information. o Troubleshooting Memory Symptom Probable Cause Suggested Solution 201 BIOS error Bad memory location Replace bad memory Randomly freezes Failing memory Find and replace Random Crashes Virus infection Scan PC for virus Wrong amount of memory in BIOS Failed memory module Test memory System is low on virtual memory Max out memory Add RAM Unit 6: Installing Expansion Cards Topic A: Buses o Computer Buses Bus: a communication pathway o o o o o o o Bus Type: Address transmits memory between CPU and Ram. Data transfer data between CPU & RAM. Expansion adds on adapter cards. Video transmits display information between CPU & video circuitry. Address and Data Bus: enable basic operation with CPU and memory. Expansion Bus: Information travel through expansion bus. Can add features through PCI slots. Video Bus: Generates signal sent to monitor such as VESA, AGP busses. Riser Bus: Circuit board that provide additional expansion slots. 3 type of risers. Advance Communication Riser (ARC) latest and standard, Audio/Modern Riser (AMR), and Communication Network Riser (CNR). System Interaction Avoid Conflict: Gain the attention of CPU, access shared memory, extend BIOS, Transfer data on BUS. Interrupts Send a signal to get CPU attention Polling: move from device to device seeing if any command is needed. Not used in today system because it is inefficient use of CPU time. IRQs: assign which interrupts is more important than others. The lower the number the higher the priority it has. Device Manager: Shows what devices have IRQs. Can make changes. I/O Addresses Is given a hex number when reading and writing. Direct Memory Access (DMA) Acts as a processor to handle data transfer between devices and main memory. Base Memory Addresses Each device must be assigning an address so the system can see it. Historical Bus Types PC/XT Bus: 8 bit, clock speed is 4.77Hz, data transfer 1.6Mbps. PC/AT and ISA Bus: 16 bit, clock speed 8MHz, data transfer 8Mbps Peripheral Component Interconnect (PCI) Multifunction cards and max devices: allows up to 8 functions on a single card. Can add up to 40 expansion slots. PCIx: 64bit parallel capable of max data transfer of 1064MBps PCIe: express, made to replace PCIx with supports of 1-32 bus width. Topic B: Drive Adapters o Drive Adapters o o o o o o o o o o Controllers and Interfaces: controller is the adapter board that plugs into the PC expansion slots; interface is the commination standard that defines how data flows to and from the disk. PC Drive Interfaces: SCSI (Small Computer System Interface) is a parallel system bus and is most commonly used. IDE/ATA Divided into 2 types: PATA and SATA. SATA being faster. Speed Improvement Techniques: First data transfer using PIO with levels. Then CPU didn’t need to be involved with DMA which took that role. Finally they enhance DMA to Ultra DMA. 6=166MPB Cables and Connectors PATA & SATA use 3.5 & 2.5 connectors. SATA did not need an adapter. Drive Capacities LBA: Logic Block Addressing increased the size to 8.4 GB. ECHS: is another version of LBA that supports up to 8.GB disks. Interrupt 13h extensions: Beyond 8.4GB the BIOS must change. 13h change the way the BIOS reads up to 128GB Drive Identification Must set up cable with master and slaves. Newer drives set this up automatically. Primary and Secondary Channels Connect master to primary and slave to secondary SCSI Supports storage, printer, scanners, and video. Use for very high performance computer networks. Very popular and still used today’s high end PC. Device ID Every SCSI device needs an ID so it can set priority. Termination At the end of every bus is a resistor to absorb the sign so it won’t go back to bus. Passive Termination: Resistors that dampen reflected signals through nonelectronic means. Active Termination: Electronic component that dynamically tunes itself to exactly match the impedance of the cable. Differential SCSI Renamed High Voltage Differential (HVD) works better with longer cables and higher data rates. iSCSI provide location independent storage use to implement SANs o SCSI Cable and Connectors DB25, Centronics, 50-pin high, HDI-30 o USB 1.1 12Mbps, 2.0 480Mbps, 3.0 5Gbps all hot swap o IEEE 1394 Firewall at 1.6Gbps & 3.9Gbps, can transfer data faster than USB o Floppy Drives and Controllers Floppy drives cables: usually a 34 pin ribbon. 3-5 connectors. 1 for drives controllers. o Card Installation Safe Handling: Sensitive to ESD, unplug PC, ground you, static bags. Drives: Form of software that interacts with hardware to enable devices. Every expansion device and adapter needs a driver. Installation: Make sure device in compatible Shut down and open case locate empty slot and remove cover remove wires that are in the way connect wire first push card into place screw or clip connect any wires close case configure card install driver Topic C: Multimedia Expansion Devices o Video Adapters Display Characteristic: Pixel image is divided into a series of dots. Resolution # of pixel across and down the adapter. Refresh Rate the rate the image is printed/ Pixel Depth # of shaded colors Video Display Standard: the level of support for the display characteristics described in the preceding table. Ex 1024x768 o Video Buses VESA Local Bus: one of the first video cards but not used anymore. AGP: Accelerated Graphic Port known for accessing main system memory. PCI and PCIe Video: PCI is slower but great for using two screens. PCIe use to replace both AGP & PCI with speed up to 8GBps. o Connectors VGA & Super VGA: 15 pin DIN connector HDMI: video signal digital. Type A&B, B being faster with 330MHz. o Sound and Your PC Sound Card Connectors: For speakers, microphones, inline input or inline output, games (Joysticks) o Port Expansion Cards Use to add port like USB, Firewall, and Serial/parallel. Multiple on cards. o Manufacturer-Specific Adapter Fax Cards: Send fax over internet via protocols PBX Cards: enable server to provide central telephone service VoIP System: provide calling with IP network without PSTN. Camera Cards: use to capture video input/output such as security monitor. Topic D: Troubleshooting Expansion Cards o Troubleshooting Drive Controllers Symptom Probable Cause Suggested Solution IDE drive not recognized Cable not connected or Check Cables misconnected System with SCSI wont boot SCSI ID not set, or connector Configure ID, check cables IDE drive is inaccessible Master/slave is 40pin not 80 Check connectors pins Full size drive available Adapter and BISO does not Update BIOS support o Troubleshooting Video Adapter Symptom Probable Cause Suggested Solution No Video Monitor off, video card fail, Check connection/setting, cable replace card Video all over the place Resolution/refresh rate set Change setting to support wrong monitor Video flicker Refresh rate to low Change refresh rate Video blurry Monitor is failing Replace monitor Image artifacts display Software issue update video card software Freezes during video change Video drivers Update video drivers o Troubleshooting sound cards No sound: Check speakers connections To low/distorted: Volume set to low or muted/ sound too high for speakers No Audio Capture: Microphone is not connected. o Troubleshooting Modem Symptom Probable Cause Suggested Solution Picks up line but doesn’t Dial incorrectly, modem disconnected Check cable and number connect No dial tone detected Phone line not connected, bad phone Check connection line Connection Drops Noisy phone line Connect phone to line, contact phone provider Connects at low speed Noisy phone line, only connect at that Confirm modem supports speed high speed Modem doesn’t work Modem has fail, driver not installed Try another modem, install drivers Configuration error COM port conflict Device manager to check configuration o NIC Indicator Lights Flashes when sending and receiving data. When error occurs check device manager for details Hardware Compatibility: make sure your hardware is compatible with your system. Check the HCL o Data Collector Sets DCS: mechanism that logs a computers performance for review at a later time. Logs performance counter, event trace data and system configuration registry. o Viewing Data Collector Set Report Stored in the repost node under reliability and performance. Unit 7: Installing Data Storage Devices Topic A: Installing Storage Devices o Physical Installation of Internal Hard Drives ATA Drive Identification: Can connect two drive per channel, Master/slave SCSI Drive Identification: Must have a SCSI ID number. Starts at 0 and goes up. The higher the number the higher the priority. Chassis Installation: Can install on any bay, make sure power cable reach. Data Cable Connections: are keyed so you cannot install incorrectly. Power Cable Connections: has triangle corner for correct installation. SATA use different power cord but is also keyed. Hard Drive Preparation: Once install you must partition drives and format drives. o Partitions and Files Systems Partitions: Divide full drive into smaller, logical portions that are individually usable and configurable. Volume: Logical drives. Ex- 5GB HDD 2x 2.5GB HDD File System: How data is stored on the drive File System FAT FAT32 NTFS Ext3,ext4 HFS+ Primarily Used In MS-DOS, Windows 9x Windows 9x, XP XP, Vista, 7, Server Description Support by most OS like Linux & windows. Use to replace FAT, still used in older systems Adds security, large volumes, fault tolerance, still used today Linux “Extended file system” still widely used, less likely to be corrupted Mac OS X Journaled file system, store data in fork Master Boot Records (MBR): first sector on boot, holds partition information Primary and Extended Partitions: Primary are partition that are directly access by the OS as volumes. Can create 4 from Windows NT and later. o o o o o Extended partition contains one or more logical drives. Can only create 1 extended partition with 23 logical drives. Only use to boot different OS. Partitioning Utilities: DOS & Windows 9x will partition on “Fdisk” command. Anything later will be partition on Disk Management. Linux Partitions: root partition stores the OS, application, and data files. Swap partition stores virtual memory, similar to the page file system. Formatting The Directory Tree: Each directory has folder and subfolders. Ex: Local disk(c) program files Microsoft office Office16 Word. (Tree) Format and mkfs commands: For Windows you can type “format” into command line to format to FAT, 16, 32 depending on system. For Linux you will use mkfs –t filesystem_type /dev/hdX# Installation of External Drives Steps: 1st Set Jumpers. 2nd Fix hot PnP shut down. 3rd Configure bus termination. 4th connect cable. 5th Connect power. 6th turn on device. Hot Plug and Hot Swap Considerations Physical Connections: Both ground and “Hot” connection is safe and easy. Ground wire is connect first, this is to ensure the device is grounded before apply power. Then special current limiting circuity is added. Dynamic Bus Configuration: USB specificity describes how device identify themselves and their needs. The OS use information to configure the new devices. Software Enabling and Disabling: OS uses caching, logging, and journaling to improve the performance. This must be disabling before removing. Optical Drives Internal Drives: Can be connect with IDE, SATA, SCSI. External Drives: IEE 1394 or USB, not as popular as once before. Drivers: Windows detect and load driver automatically once installed. Fire wire storages devices don’t require drivers. External Storage Technologies Network Attached Storages (NAS): is in essence a self-contained file server that you connect to your network instead of an expansion bus. Can be use as single HD or drive Array (RAID). Available through standard file shaping. Storage Area Network (SAN): System that provides block-level access to external storage. Is a self-contained external HD. SANs storage network type are AOE, SCSI, SAS, Hyper SCSI, and FLP. Tape Libraries: Device that provides more storage capacity than a single tape cartridge could hold. Automatically swap tapes when one is full, use for back up and restores. Optical Jukeboxes: same as tape libraries but use optical disk like CD/DVD instead. Use to back up archiving. WORM Drives: write once, read many devices permit you to store information permanently. Use for data that cannot be erase or change such as someone medical record. Topic B: Selecting RAID Technologies o Disk Arrays Drive Array: is a collection of two or more drives that work in unison to provide a single point of data storage. o Primary RAID Levels RAID 0: known as Stripping. Data is divided in to blocks, and blocks are distributed across the drives in the array. Improves read/write performance because it only has to read half the data. This method does not provide redundancy. Any failed data will loss data to the whole set. RAID 1: known as Mirroring. To implementation mirroring and duplexing. Both data is duplicated onto a second disk. Mirroring a single drive controller is used. Duplexing uses two controller, provides redundancy. RAID 2: Data is stripped at the bit level across all disks in array, offer high performance but not used because hard drives include hamming code. RAID 3: Called stripping with parity. Data is stripped byte by byte onto separate drives. If any drives fail, data can be recovered by examining the other blocks. Improves read/write with large data such as videos. RAID 4: Similar to Raid 3 but stripped into blocks rather than byte. Offer higher read performance than 3. Raid 4 has single parity drive. RAID 5: Stripping with distrusted parity. Data divided into even number of blocks, these blocks are divided into odd number of disks. RAID 6: Similar to RAID 5 but two parity drives are used instead of one. Allows you to recover from 2 drives instead of one. o Hybrid RAIDs RAID 0+1: Drives are stripped and then mirrored. Two stripped array and one becomes a mirror of the other. Minimum of 4 drives as well as even drives. RAID 1+0 (10): Data is both mirror and striped simultaneously, a raid is mirror and then striped to provide fault tolerance and high performance. Commonly used with four drives. RAID 5+0 (50): Data is striped at the block level across multiple raid 5 arrays. Requires 6 HDD if one drive from each RAID 5 fails the operation could continue. Has better performance. o Software vs. Hardware RAID Software Base: Typically a function of the operation system. Windows XP, vista, server RAID 0, 1, 5. Linux All RAIDs. MacOSX RAIDs 0, 1,1+0 Hardware Based: More expensive but offers more features. Read/write faster, boot on file system, hot swap, and hot spare drives. Topic C: Troubleshooting Data Storage o Hard Drive Maintenance Disk Clean Up: Remove unnecessary file from hard drive. Unnecessary files are downloaded program files, temporary internet, recycle bin, and thumbnails. Checking Disk for Error: Use chkdisk for any error on drive. If found it move data from that disk and marks it so no new information is saved. When it finds a data fragment it automatically delete, attempt to fix, and convert to file to view. o Chkdsk Command Used to search FAT and NTF disk for errors. Parameter /f /x /l:size Chkdsk drive:path\filename /f /v /r /x /i /c /l:size Description Parameter Description Parameter Description Fix any error /v Invokes verbose /r Locate bad disk found mode NTFS to /i Scale down /c Checking of dismount volume index cycles Specifies the size Path\Filename Specifies a particular file to check for errors. of a log Can use * or ? for multiple files o Disk Defragmenter Helps improve hard disk performance by reorganizing the files on the disk. Not really an issue in today system but it is still up on system utility. o Windows Monitoring Tools Resource Monitoring: Provides real time graphs and detailed information about CPU, HDD, Network, and Memory. Performance Monitor: Measures and assessing a computers performance. 1st Create a base line to compare system. 2nd Monitor system use. 3rd Locate performance. 4th Identify performance o Windows Logging Type of events: Error significant problem. Waring immediate problem could worsen. Information Success operation. Success Audit Successful security event. Failure Audit unsuccessful security event. o Linux Logging Boot.log system boot cron failure of job dmesg hardware detection last log last logon time messages daemon startup o Network File Access Use to remote into server net uses X:\\computer\share Linux use mount commands to access files. o Storage Hardware Troubleshooting Hard drives Troubleshooting Symptom Cant Access Drives Cant boot from HDD Space on Drive Doesn’t match File Corrupted Boot from HDD when restart Drive letter incorrect Can’t use fail space of drive Drive not auto detect Cannot access file Disk performance decreases Back up fail Probable Cause Cable Disconnected Boot order, non-bootable drive, corrupt boot sector Disk unit misunderstanding file system limitations Drive failing, bad cables Booting to quickly Cable connect wrong BIOS can’t support drive BIOS setting incorrect File permission, another user Files are fragmented, drive begin to fail Bad backup medium Suggested Solution Check Cables Confirm boot, set drive to bootable Misunderstood units being used. Replace cable and check connectors Disable quick boot Connect correct cable, driver BIOS update Confirm BIOS settings Test user permission Exam system logs, defragment drive. Confirm backup will fit onto medium CD/DVD drives Troubleshooting Symptom No audio play CD CD Drive not found Disk can’t be read Buffer underrun Probable Cause Volume turn down, speaker disconnected Drive disable in BIOS Disc scratch, CD instead on DVD Buffer entries before finish Write process fail Zip files are corrupted Burn CD-RW can’t be read DVD can’t play on two screen UDF formatted disc can’t be read DVD won’t play movie Data source can’t keep up Files have redundant info. CD-ROM drives not compatible On laptop system the overlay can’t be created Latest service pack needed No software, decoders missing Suggested Solution Check cables Check BIOS setting Check CD and slot Check buffer underrun protection Record at 1x fram Check SCSI cable Check media compatibility Use only one display Install server pack Download software Unit 8: Installing a Network Operating System Topic A: Server Roles o Local Area Network (LAN) LAN: specifically designed configuration of computer and other devices located within a confine area. Node: Device that can receive and send information, computer or printers Host: is a computer, also requires a OS Resource: files, database, or printer installed o Basic Network Types Peer-to-Peer: multiple computers connected via Wi-Fi or wired cord. Used in small offices for file sharing Client/Server Network: for large peer-to-peer, can set groups and admin instead of users. Peer to Peer Authentication: must login onto their own computer with user name and password. Client/Server network authentication: logs onto the network so can see access anywhere. o Server Roles File and Print: access to files, pictures, worksheet and to inkjet or laser. Database: Use software like oracle to access customer’s information. Web Server: Can access the web or create one for private users. Messaging Server: send messages internal with users. DHCP Server: Collect IP information like IP address, subnet masks and gateway. DNS Server: Can access web with names instead of IP address Application: Allows you to share programs Update: update service packs and hot fixes. Filtering Server: Block access to websites Remote Access: Allow you to work on your server with a different computer. Topic B: Virtualization o Overview of Virtualization Technology through which one or more simulated computers runs on one actual PC. Virtual Servers: Using multiple VR on one machine Virtual Application: Share a pool of software licenses. Virtual Desktop: Can log on to a full desktop with many applications. o Server Virtualization Reduce Power & Cooling: Fewer physical computers mean less electricity and cooling. Reduce Infrastructure Cost: less PC means less maintenance wire, racks etc. Centralized Admin: Admin multiple VR on one station. Faster Deployment: Can create a new user quickly. Improve Hardware Utilization: Max the use of hardware to prevent getting more. Reduce Disposal: Using less equipment means fewer disposals. Testing Environment: Test multiple OS on a single computer. Reasons Server Virtualization Might not be Suitable: Increase Administration: Admin complexity increases meaning a more skills person is required. Single Point Failure: If the host fails all VR will fail as well Increased Data Throughput: Increase backbone network will slow response time. Reduce Performance: Running multiple VR can reduce performance on each VR. High Initial Investment: to run high end software is needed and costly. Server Virtualization Products Bare Metal Hypervisors: Software installed directly on the server hardware Host Based Hypervisors: Runs within the Operating System. o Storage Virtualization Network Attached Storage (NAS): Self-contained file server that you connect to your network and not expansion bus. Can be one drive or Array of drives. Must have a local disk to boot from. Benefits of Virtualization: Dynamic Provisioning: can increase server storage capacity. Centralized Admin: control storage with a central admin console. Reduce Infrastructure Cost: requires less disk space and fewer HD. Back-up Consolidation: easy back-up since all data is in one place. Downside of Virtualization: Increase Admin Complexity: Admin position needs to be skilled. Single Point Failure: Host drive fails, all VR on that drive fails. Increase Data Throughput: Data must pass host’s I/O. Reduce Performance: Read/write all VM on 1 disk will slow down. Topic C: Installing Linux o Linux Overview Widely use and open source. Any computer can run Linux. Distribution: Ubuntu, Red Hat Enterprise, Fedora, SUSE, and Debian o Pre-installation Tasks Must have all system information files to download, but someone created a software to do this for you. Before install must select installation type, download file, burn ISO disk. o Installation Types CD/DVD: Install Linux on CD/DVD and install on Linux PC ISO file: Download the “image” open with CD software and run. Netinst: download small file that can boot from a USB NFS: Connect network drive with Linux and install from there o Installation Files Need to download appropriate files. 32 or 64bit depending on pc. o Partitioning HDD file systems: Ext2: supports kernel but not used in HDD use in removable media Ext3: primary files system used by Linux distributions. JFS: IBM journaling file system ReiserFS: Native file system for SUSE, not commonly used XFS: For IRIX operation system to support large files Partitioning Utilities: Software you use to create and manage partitions and their files system. Built into installer and are installed auto. Linux Root Partition: Stores OS, applications, and data files Linux Swap Partition: Stores virtual memory data, similar to the pagefile.sys file on windows computers. Topic D: Installing Windows Servers o Pre-installation Tasks File Backup: Save data and restore later. Hardware Requirements: Must meet min requirement for system Partitions and Formatting: Format HD to NTFS because faster and safer. Supports FAT/32 for removable devices. Installation Methods: Fastest is CD and run program. Can also PXE o Devices and Drivers Auto Download after install, if not will go to web and download o Updating the Server Hotfixes: fix error codes in OS. Fix file with revised versions Patches: Are quick fixes Updates: use to improve security, ease of use, functions and performance. Install update automatically: Each day check for updates and installs. Download update but let me choose to install: will wait for you to install. Never Check for Updates: Windows will not check, user must search download install all updates manually. o Customizing Windows Servers Server Roles: Install server rolls like DHCP, DNS or Web Servers Features: add-on enhances server functionality. Do not need features. Remote Desktop: Can access your system program/file from any system. Windows Firewall: Comes standard in Windows OS, has port for features. o Malware Worms: Programs that replicate themselves over network, without user intervention. Attach it to files or packets. Trojan horse: Known as spam, it deletes email, copies addresses and attack the computer. Logic bomb is a hidden code in a program. Zombies and Botnets: Attacks groups of computers. Overwhelms the computer by send bogus tasks. Rootkits: Software that grants full system control to the user. o Antivirus Software Definition Files: Hold a list of type of virus to look for. When new ones are discovered then the list is updated. Antivirus Products: Norton, ESET, McFee Avast, etc. o Spyware Software install on system without you knowing. Gathers personal information, change computer configurations. Often in terms/agreement in free programs. o Server Connections Sit at the server with keyboard/mouse/monitor and log in. KVM to access multiple Servers. Easy to switch between servers. Can connect remotely with RDP. Programs allow you to do this. Unit 9: Networking Topic A: Network Essentials o Network Wiring Network can be a physical connection like wires, radio wave, infare red or wireless. o Twisted-pair Cables Earthier use UTP or STP. Each has 4 wires twisted by two pairs to eliminate EML. Cat 3: 10Mbps and 2-3 twist per foot. Cat 5/5c: Common now with 5100Mbps and 5c1Gbps. Both have 20 twists per foot. Cat 6/6c: Higher quality materials. Operate up to 2.5Gbps. Cat 7: Is emerging standard at 10+Gbps. Cat 7a may be 100Gbps. Twisted-pair Connectors: RJ-45(8wires), RJ-11(6w), Registered Jack (RJ). o Fiber Optic Cable Fastest and expensive way to move data. Use light through glass no bigger than a hair. Single-mode: Single transmission paths. Use for links longer than 300 meters. Multi-mode: Multi transmission paths. Larger diameter core for short distance under 300 meters. o Duplex Data Transmission Simplex: Data transmitted in only a single direction. Half-duplex: data transmitted across the medium in both direction, but one direction at a time. Full-duplex: data transmitted across the medium in both directions at the same time. o Ethernet 10 Gigabit Ethernet (10GbE): fastest with data rate of 10Gbps. 10x faster. 1,000 Mbps Ethernet (Gigabit Ethernet): Use for high speed LAN. Few if any home requires this. 100 Mbps Ethernet (Fast Ethernet): Operate at 100Mbps and handle data at 10Mbps. Able to operate devices with both speeds. Base –x/R: Runs over fiber optic cable Base w: runs over fiber optic, referred to as Wide Area Network Physical Layer (WAN PHY) Base T: Runs over twisted-pair cable, shielded or unshielded. Base cx: Runs over shielded copper twisted pair cable. o The Internet Protocol Suite TCP: Transmission Control Protocol provides connection oriented, acknowledged communication. Guaranteed deliver even if error occurs. Runs data in legerity check. IP: Internet Protocol is a routable, unreliable, connection less protocol. Only job is the addressing and routing of packets. UDP: User datagram protocol is used for connection less, unacknowledged protocol. DNS: Domain name system is a protocol that provides common naming conversions across the internet. NFS: Network files system is standard for UNIX and Linux. Allow sharing to both platforms. ICMP: Internet Control Message Protocol control and manage information sent by TCP/IP. IF there an error can send up the protocol to get fix. ARP and RARP: translate between IP addresses and Mac addresses. o Identifying Addresses MAC Address: Unique hex assign by NIC. It identifies devices on a LAN. IPv4 Address: 32 bit that identifies a computer, printer & TCP/IP network. IPv6 Address: 128 bit that support a much bigger pool of available addresses than IPv4. Character base Names: Domain, Host and NetBIOS names. Letter rather than numbers. Port Address: Number between 0-65,535 that identifies a program running o MAC Addresses MAC are absolute, MAC on a host doesn’t change unless NIC does. All hosts on LAN must communicate the MAC address. MAC alone can’t communicate between 2 computers on different LAN. o IPv4 Binary IP Addresses: Is what the computer reads. Example of a 32-bit address is 11001011 01110101 11110100 10101101 Dotted Decimal IP Addresses: Widely used to show IPv4 Address. Example 208.206.88.56 Network ID: Represents the network on which the computer is located Host ID: Represents a single computer on that network. IPv4 Classes: Class A B C D E o IPv6 IP Range Subnet Mask 1.0.0.0 -- 126.0.0.0 255.0.0.0 128.0.0.0 – 191.255.0.0 255.255.0.0 192.0.0.0 – 223.255.255.0 255.255.255.0 224.0.0.0 – 239.0.0.0 Loop Back IP Address is: 127.0.0.0 240.0.0.0 – 255.0.0.0 CIDR: IP address will be used up. Allow to make groups for more IP. Link Local: self-assign using neighbor discovery process. Start with fe80: Sit Local: Private address, begin with FE and use C to F for the 3rd hex. Global Unicast: Public addresses are identified for a single interface. Multicast: Sends information or service to all interfaces that are defined as a member of the group. Any cast: New address that is a cross between Unicast and Multicast addressing. Send information in a group to any address not just group assign ones. o Ports Are numeric addresses between 0 – 65,535 that identifies applications. Both the origination application and the target application are identified by ports. Commonly used port numbers are listed in the following table. Port # 20 21 22 23 25 53 80 Protocol & Purpose Port # Protocol & Purpose FTP use for transmitting data 110 POP3 incoming mail services FTP Transmitting commands 123 NTP time synchronization service SSH For secure login, file transfer 143 IMAP4 incoming mail services Telnet For remote access 443 SSL secure connection over HTTP SMTP sending emails 631 IPP networking printing services DNS name resolution messaging 3306 MySQL Database system messaging HTTP web server traffic 67/68 DHCP Dynamic Host Config. Prot. o Address Assignment DHCP (Dynamic Host Control Protocol): internet standard for assigning IP to network. Private IP Address: computer connects to home or office. When sending information outside the network NAT changes IP to a public one. APIPA: automatically generate an IP address in the given range. o Domain Name System DNS naming Hierarchy: Compose in 3 parts: Computer name, domain name, and top level domain name. www Microsoft com Top level domain: TLDs .combusiness .orgnonprofit origination .edu education TLDs Country’s: .ar Argentina .ca Canada .de Germany o NetBIOS 16 characters 1-15 can be anything, 16 digit designate a service of function Broadcast: A message destined for all computer on a given network. Windows Internet Name Service: A database with all computers on a network registers their NetBIOS names. o DMZ Configurations VLANs: Virtual network segment enabled by a Layer 2 compatible switch. It is a distinct broadcast domain within larger networks, increases security by clustering users into small groups and uses VoIP. Virtual Private Network (VPN): a private communication network transmitted across a public network configuration. VPN encrypt data before sending that cannot be read by uses internet protocol security. 2 types transport encryption is the underlying data in a packed is encryption then sent on public network. Other is tunnel encryption where the entire packet is encrypted then pace on network. Topic B: Networking Utilities o Network Tools TCP/IP Utilities: ifconfig shows IP addresses of wired connections. Ipconfig Host IP address. Ping test connection. Route config network routing table. Tracect trace route of packet. Nbtstat display NetBIOS over TCP/IP. Netstat list of active computers. o The Ipconfig Command /release: release IPv4/6 address so that it returns to the pool of addresses, use when computer cannot obtain an address from DHCP server. /renew: you can specify the name of network connection to renew on IPv4/6, use when trying to renew IP address. If cannot renew computer will deny request and get a new one. /flushdns: delete all DVS information /displaydns: display content of DNS resolute cache. /registerdns: renew all IP address leases from DHCP servers Troubleshooting with Ipconfig or Ifconfig: if IP assigned auto with DHCP check network card, release/renew IP address. If manually assign check IP o PING and Basic TCP/IP Connectivity PING: Packet Internet Group is packet sent from one computer to another. Topic C: Troubleshooting o Troubleshooting TCP/IP Symptom Destination Host Unreachable Scope Single User Multiple Users Resource Unavailable Single User Multiple Users Internet Connectivity fail Single User Multiple Users Causes TCP/IP misconfig, host table misconfig, gateway misconfig, network adapter fail, bad network cable. Host fail, DHCP misconfig, improper subnet, gateway fail, router failed. Permission problem, network config problem, port config, local firewall fail Service fail, port security on host blocking access, VLAN misconfig Default gateway misconfig in static IP assignments Internet service provider fail, switch fail, firewall issue Unit 10: Managing a Network Server Topic A: User Management o System Security Authentication: Positive identification of entity, that’s by password, smart card, and finger print. Authorization: a predetermined level of access is granted. Accounting: tracking what the user does when logged in. o Authentication Factors One Factor Authentication: only one line security to log in. Once factor system is UN & password, keycard, locks and keys, and pin pads. Two-factor Authentications: something you know and something you have. Example at ATM you need a card to swipe (have) and a pine (know) o o o o o o o Three factor Authentications: something you know, have, and are. Something you know like pin, have like a key, and are like bio scanner. User Accounts User information is stored by network directory services on the NOS. User Name and Passwords User Names: uniquely identifies the user to a computer network. Password: Secret codes consist of letter, numbers, characters, and length. Password Protection: Never write it down, different password for different accounts, 8 characters long, mixture of characters, change often, and do not reuse passwords. Strong Password: Multiple characters, number, letter and nothing personal Multiple Passwords: Can be hard to remember, use password management User Account Guidelines Establishing a naming convention: such as first name last initial, last name first initial, or first initial last name. Controlling password ownership: if user create password or admin assigns. Including additional required attributes: can add email and number to user Determining the location for user account: when growing large a NOS’s directory is best. Client/Server Authentication: User log in info sent to NOS use authenticated user get access. Active Directory Domain Controllers: User DNS naming standards. User Properties Attributes can add: phone #, email, web page, address, group, and remote. User Privilege Escalation Escalation in Windows: user account control is design to make it convenient to follow Microsoft’s security recommendation. When logged into standard user, you can just enter login information for admin rights and continue as an admin user. Escalation in Linux: Just have to use “sudo” and type in root password and it will give admin rights for that one command and switch back to user. Permission Read: Grants access to read file but cannot add, change, or delete file. Write: Grants access to read files and add, change and delete files. Full Control: Grants access for full control of files and folders. Policies Includes: Controlling use’s computer setting, security setting, running scripts, redirect files. Topic B: Resource Management o Disk and Volume Information Volume Status Messages Fail Couldn’t start automatically or disk is damage. Failed Fault tolerance provided by RAID Redundancy Formatting Volume being formatted Disk Status Messages Audio CD Audio located in CD drive Healthy Working well Regenerating Missing disk has been reactive and is regeneration of data Resyncing Mirror volume is synchronizing information on both disk Missing No Media Unknown Online Offline Boot sector corrupted Foreign Initializing Not Initialized Designated the disk as a imported disk Converting a disk to dynamic disk Disk has been removed Indicating that CD is missing Indicates that disk has been added without a valid disk signature Disk is working Disk no longer accessible o Shadow Volumes Shadow Volume: is a read only copy on a selected volume at a particular point in time. Used to recover files that have been deleted, recover version on a file, or compare version of a file while working. Cannot select certain files the whole volume must be copied. Best Practice: Set volume on another disk, set copies on downtime, backup regularly. o Disk Quotas Advantages: Prevents users from using all disk space, encourages users to delete old files, allows admin to track disk usage, allow admin to track when user use all there space. o Printing Windows Printing: Client user sent print job, the GDI is receive from spooler. Spooler sends to a number of protocols. Printer receives job from spooler and converts to print language and prints. Linux printing: Print queue (hold jobs on temp file) job (prints) Topic C: Monitoring and Management o Monitoring Tools 3main Tools: Performance monitoring and baseline, SNMP and WBEM. o Performance Monitor and Baselining Counter: Hundreds of computers performance variable Performance object: cache, memory, paging file, disk, proc, system, thread Bottlenecks: occurs when a particular system resource cause a performance problem. % Processor Time: System consistently exceeding 75%, need to upgrade processor or memory. Thread Count: Help identify memory leaks in applications Real time monitoring: View System in real time, update every second. o SNMP Simple Network Management Protocol: Standard technology for managing devices connected to network. Message Integrity: Detect messages that are tampered within route. Authentication: recognize each other before sending data. Encryption: support packet encryption to throw hackers who use protocol analyzers to read “raw” data off the network. MIB’s: management information base is a hierarchical database of information manages by agent. Traps: hen application fail you can send info to yourself instead of manager. o WBEM and WMI (Windows Management Instrumentation) Web base Enterprise Management: Standard base architecture for application and system management. Microsoft version is WMI CIM: Common information model are represented as programming object. CIM is divided into name spaces. Each name space corresponds to a management area like active directory, internet information service. Scripting: Critical to understand difference between classes and instances classes is a type or category and instance is a specific item in a class. Unit 11 Documenting and Planning Documenting the IT Environment o System Documentation Characteristics of Good Doc: Written details, up to date, easy access, secured. Typical Contents of Doc: List of servers and applications, lists of keys client workstation, diagrams (network, server, and racks), contact information, vendor doc such as manuals and warranty, details for local laws and regulations, purchase records and repair logs. Service Level Agreements: a contract between a service provider and the end user. Non documentation records: Doc the environment, rack and cable labels. o Documentation Tools Logging Software: Can run scripts when files are scan important details are extracted. Provisioning System: Software tools that enable you to quickly clone or setup new computers. Inventory Software: hardware information saved and is pulled when system runs scans. Topic B: Planning and Implementing Changes o Change Management Benefits of a formal Change: ensure everything is examined before the change is made. Change Doc: records of patches, modifications, and modification dates. o Disposal of Electronics Methods of Disposal: local electronic equipment recycling services. Topic C: Managing Physical Access and Security o Physical Access Control Physical token: Device that contain microprocessor and OS, smartcards/USB reader. Locks: best first line of defense, deadbolt can be added for more security. Man trap: interlock doors that only allow one person in at a time, no tailgating. o Surveillance Security Guards and cameras. Logging: keep track of all activity on user’s computers. o Biometrics Fingerprint Scanners: uses fingerprint to gain access to building Hand Geometry scanner: scans the entire hand for identification Eye scanner: Scans retina to obtain blood vessel patterns. Other: Voice verification, signature verification and DNA scans. Pros and Cons: It requires an individual feature to grant access ensuring the right person get access. Gives false reading sometimes, stores all information unencrypted which make is variable. Unit 12 Preparing for Disaster Topic A: Backing Up Data o Importance of Backups Must keep files in case one is damage or erase. Windows Backup: Scheduling backups, restoring active directory, ARS. o Tape Formats Tape Drives are generally the most popular server backup devices. QIC (Quarter-inch Cartridge): tape is belt driven instead of the tape attached to the reels. Tape needs to be re-tensioning (winding the tape end o o o o o o to end and then rewinding it in a single operation). QIC storage 400MB10GB. DDS (Digital Data Storage): Has two read and write heads for error correction. Last 10 years but requires frequently cleaning. Up to 2GB DLT (Digital Linear tape): Uses Linear serpentine recording with multiple tracks on 12.6mm wide tapes. Storage range from 15GB-1200GB. LTO (Linear Tape Open): open format comes in two formats. Accelis and Ultrium. Accelis use an 8mm tape and a dual reel cartridge. No longer available. Ultrium uses .5” tape and a single reel carriage. It is the high capacity version of LTO. The lasts version holds up to 800GB and transfer rate of 80 to 160Mbps. AIT & SAIT (Advance Intelligent Tape) (SuperAIT): uses helical-scan recording in which the head is tilted and data recording in diagonal stripes across the head. AIT uses 8mm tape in 3.5” drive, storage range from 20GB to 400GB. SAIT uses .5” tape and storage is from 500GB to 1TB. Data rate range from 30Mbps to 78Mbps. Uses memory in cassette (MIC) a 64KB memory chip used to store the cartridge system log and files search. Has a Plug and Play feature. Optical Media Types: CD recordable, DVD, Blue-ray USB Flash Drive Supports hot swappable, is a controller with USB interface, use encryption Floppy Disk Storage Capacities depends on number of tracks and sector on each track Disk to Disk Back-ups Advantages: multiple backup and recovery operation can access them simultaneously, backup and recovery is shorter, restore specifics files faster. Managing Backups Eliminating Human Error: for large company use automatic tape system for backups. It will replace the fail data with a new tape and restore data without user interference. Assigning Backup Permission: less people assign the better. Usually only admin, backup operator, and server operators. Online Retention Period (OLRP): is the period in which data can be restored from tape without manual intervention. No need to look for tapes just uses the library software. Backup Software Hard Disk Imaging: ability to restore hard disk in it’s entirely without your need to reinstall OS manually. Virtual Hard Disk: ability to treat a backup tape as a virtual hard disk, albeit a very slow one, easy to backup. Data Compression: built in data compression capability you can use if your drive doesn’t include its own hardware data compression capabilities. Virus Scan: Scan for virus during backups and restore operation. Tape Management: ability to tell you when to replace tape or sap them. Account Access Management: the ability to create an account for you to have access to backup all data regardless ownership. Unattended Backup: preform backup unattended, software schedule the backup. Command line Functions: enable you to run commands before and after the backup. o Backup Types The Archive Bit: is set to 1 when needs to be backed up. When changes are made will change to 0 until you change the file. Full = reset all files, Incremental = Reset on any backed up files, Differential, Daily, Copy = Not reset. Full Backups: Most common, backup all files and folders selected. It also clears their Archive Attribute. This help work with other methods of backups. When backup it ignore the Archive state, that is it will copies all files regardless if any changes were made. Incremental Backup: Only backup those files that have change since the last normal or incremental backup. Also clears the Archive Attribute associated with any files and folders that are backed up. Main purpose is to save space and time of backup. Usually performed the next day after a normal backup. Only copy files that have been changed. Although it’s most efficient the restore process is longer. If Thursday file is deleted, you must restore full back up from Monday then incremental backup form Tuesday and Wednesday. Differential Backup: Similar to incremental backup but it does not clear the Archive Attribute. Each time the differential backup runs, it will back up all files that have been change since the full backup, even if they’ve been included in a previous differential backup. This makes the restore process simpler because you only restore Monday and Wednesday if Thursday failed. It does require more storage. Daily Backups: Saves only files and folders that have been created or change since the last backup. Does not change Archive Attribute so it does not interfere with other backups. Copy Backups: same as full backup but does not change the Archive Attribute. Purpose being to save a full back up on a tape offsite without interfering with any other backups. o Unique Backup Situations Snapshot: a read only copy of the data, frozen at a point of time. Cold Backup: a database is closed or locked and is not available to users during backups. Hot Backup: is a database made with the snapshot method, while the database is still available to users. o Developing a backup Strategy Grandfather, Father, Son Backup (GFS): most common backup strategy uses 3 set of tapes for daily, weekly and monthly backup sets. 12 tapes Backup the “son”: label 4 tapes as M-Thu. These son tapes are used for daily incremental backup during the week. Backup the “Father”: Label 5 tapes week 1-5. These father tapes are used for weekly backup on Friday. Store tapes locally, backup is preformed he day “Son” is not. Backup the “Grandfather”: No standard label could add months but is performed on the last business day of the month. Valid for 3 months then reused. The Six Cartridge Backup: Better for smaller business. Only uses 6 disks but can only hold 7 weeks of data. Label six cartridges Friday 1, Friday 2, Monday, Tuesday, Wednesday, and Thursday. Full back up using Friday 1 tape. Store the tape offsite. Monday perform an incremental backup store onsite. Repeat incremental backup using Tuesday, Wednesday, & Thursday tapes. 2nd full back up using Friday 2 tape, this completes the backup cycle. The Tower of Hanoi: uses 5 tapes that rotate. You will always have a daily history extending back 32 days. Day 1: backup to “A”. Reuse the “A” tape every other day. Day 2: backup to “B”. Reuse the “B” tape every 4 days. Day 4: backup to “C”. Reuse the “C” tape every 8 days. Day 8: backup to “D”. Reuse the “D” tape every 16 days. Day 16: backup to “E”. Reuse the “E” tape every 32 days. Topic B: Server Redundancy and Other Disaster Precautions o Clustering Cluster improves the availability of the client/server application by increasing the availability of server resources. Active Cluster: All nodes perform normal, active function and then perform additional function for fail member of the cluster. Passive Cluster: Server with identical service as its failover, partner would remain in an idle node state until the primary node fails. Failover: is the process of having cluster resources migrate from an unavailable node to an available node. Automatically initiates when node fails. Spare Parts: Keep a set of spare parts will save time when something goes down. Spare Drives: Two types of spare parts methods. Cold Spare: HDD fails you must shut down system to replace. Host Spare: Can replace HDD without the need to shut down the system. Drive is automatically brought back online. o Server Management and Maintenance Server Management Software: usually include software that provides basic system monitoring function, these utilities usually found in BIOS and CMOS settings. Features include: Failure Detection: Detects temp & voltage change, fan speed change and fail, disk drive problem or failure, power supply failure, processor status, and ECC memory error. Software Monitoring: Detect hung application, can use management software to shut down or reboot. Event Log: stores events in NVRAM so if no power record remain. Emergency Management Port: Allows you to power on/off reset server and view logs remotely. Security Monitoring: Uses a jumper setting to enable chassis intrusion detection. o Physical Care and Maintenance Two primary factors to hardware devices and computer peripheral failures are dirt and heat. Hard drive Failures: are prone to fail in high heat environments. Stacks servers disks inside a single computer without ventilation and heat can cause electrical issues. If data is lost then must pull information from disk themselves and could be pricey. Most common maintenance issue for servers is planned downtime to blow out dust. Topic C: Developing a Disaster Recovery Plan o The Disaster Recovery Plan DRP: large enterprise can amount to hundreds of pages with thousands of contingencies. Tells you what action needs to be taken, in what order, after the destructive event. Steps usually consist of: Using appropriate fire suppressant, evacuating, appropriate notification sequence for team leader and backups, establish temp business recovery, assess damage. o Alternate Sites Hot Sites: Is a facility shared with a number of subscribers from various geographic locations, each of which shares in the cost of maintaining the fully operational center. Is a site to site mirroring, cost a lot but in case of disaster can be running in hours. Cold Site: A facility designed to receive computer equipment. It has all the equipment needed for housing a computer center. If home site takes too long to repair they can purchase space, rent, or lease a cold site until the home site is available. Simply available space, lease expensive but considerably longer to get your system online then a hot site. Warm Site: a compromise between a hot site and cold site. Typically has computer system, although on a smaller scale. Home backup on hand to imminent, although could be old. o Site Management Plan: have a set of step in line for when a disaster happens. Should have what order to take depends on the amount of damage, eta the site is down. o Troubleshooting Backup and Restore Should check back up by putting them in test room if fail then fix. Step: Verified application setting program is running update or patches needs to be update check online enable BIOS check SCSI ID check backup devices physically.