Vous êtes sur la page 1sur 34

Unit 1: Deploying the Chassis.............................................................................................

2
Unit 2: Selecting CPUs and Motherboards.............................................................................. 4
Unit 3: Managing the BIOS................................................................................................ 4
Unit 4: Selecting Memory.................................................................................................. 5
Unit 5: Troubleshooting Methodology................................................................................... 7
Unit 6: Installing Expansion Cards..................................................................................... 10
Unit 7: Installing Data Storage Devices................................................................................14
Unit 8: Installing a Network Operating System......................................................................19
Unit 9: Networking........................................................................................................ 22
Unit 10: Managing a Network Server..................................................................................26
Unit 11 Documenting and Planning..................................................................................... 29
Unit 12 Preparing for Disaster........................................................................................... 31

CompTIA Server+
Study Review

Unit 1: Deploying the Chassis


Topic A: Form Factors

o Client Form Factors


Desktop: Once popular now rare, sits on desk with monitor on top
Tower: Sits upright on the floor or shelf. 20x8x18
Mid-Tower: Smaller version at 18x8x18
Mini-Tower: Even smaller at 16x8x18
Brick: cube like case
Laptop
o Server Form Factors
Computer Rack: A Standardized mounting unit
Rack Unit: measure in 10 or 20u. u is 3 holes measuring 1.75inches each
o Electrical and Static Safety
1-10-100 rule: 1mA you feel 10mA you cant let go and 100mA you die.
Static Electricity: Can build up to 35k volts and computer part can be
damage at 8k volts or less. Increase humidity, wear cotton, and ESD tools
can prevent static electricity.
o Case Features
Chassis intrusion switches will not boot with open case
Diagnostic LED will change color to notified a problem
Expansion Bay allow you to add on devices or expansion slots
Topic B: Power Supplies
o Electricity Background
Voltage: force of electricity cause by difference in charge
Current: Flow of electrons
DC: Constant flow of current in one direction
AC: Varies in current in different directions
Phase: Single phase used in most homes and small businesses. Use 3
conductors to deliver an AC voltage on 3 conductors that very in union
with the 3rd conductor acting as a ground. Single phase use 120V was two
phase uses 240V. In three-phase 3 conductors are used; each is hot used
for factory building.
Power Supply Specification: Only draws the power that is needed
Voltage Regulator Module (VRM): Sends the appropriate amount of
voltage to processor, reads level from VID on post.

o Power Connectors
Standards for Driving Power Connectors: Three common power
connectors are peripheral, floppy, and serial ATA (SATA) Peripheral
(Molex): used for HDD and CD/DVD.
Standards for Motherboards Power Connectors: newer power connectors
are keyed while older ones have dual sided connector that can be placed in
backwards. Consist of 20-24 pin connectors.
Topic C: Cooling Systems
o CPU Cooling
Fans and Air Openings: Usually is all you need for old PC
Heat Sink and Cooling Fans: Absorbs and transfer heat.
Shrouds: Direct air to or from the fans like a tunnel.
Heat Pipes: Small tubes built into cooling fins that have small amounts of
liquid. Heat vaporized the flued and heat flow away from the processor.
Water Pumps: Flows water over CPU. The heat is picked up and transfer
outside the case to cool down then continues back to CPU
Peltier Cooler: Apply cold temperature when voltage is apply, it can be put
directly on the CPU.
o Area Cooling
Room Cooling: make sure the air condition keep the whole room cool.
Rack Cooling: a rack is placed in your cool room with fans drawing air
Row Cooling: Same as rack cooling but with a row of racks.

Unit 2: Selecting CPUs and Motherboards


Topic A: Central Processing Unit (CPU)
o Processors
Control Unit: Managing the flow of programs
Execution Units: Processing the instruction and data, units are built from
ALU (arithmetic logic unit) and FPU (floating-point unit). ALU calculate
and compares number while the FPU design to work with numbers.
Cores: a core is an execution unit. Dual, Triple, Quad are # of executions.
Single Core: processor order executes selectively stores in
cache. Cache are registers and when full use RAM memory.
Multi-core: same process but runs multiple executions at same the
same time. Must have SMT (simultaneous multi-threading
Technology) if not will only run one at a time.
Registers: Stores data and Instructions.
o CPU Performance
Hyperthreading: Enable 1 processor to run 2 streams as if there are 2
processors.

Reduced Instruction Set Computer (RISC): Philosophy that performance


will be improve if the features of CPU is reduce, advance feature to be
provided on software.
Complex instruction Set Computer (CISC): opposite of RISC, hardware is
faster so more complex CPU
o Memory Protection
Memory Protection: Marks a section of memory as non-executable or NX
Topic B: Packaging and Slots
o CPU Packaging
CPU Packaging: a case made from material plus wire and connectors that
bridge the microscopic connector to external circuitry.
Topic C: Motherboards
o Motherboards
HID Port: Human interface device. Connect I/O devices like keyboard
Daughter Boards: connect to circuit board to provide assistance with video
Riser Cards: Provides additional expansions

Unit 3: Managing the BIOS


Topic A: The Bios and CMOS
o Firmware
Gray area between hardware and software. The software written on chip.
o BIOS (Basic Input Output System)
Shadowing and copy content of BIOS on memory
o CMOS (Complementary Metal Oxide Semiconductor)
CMOS Config: will need a system utility tool on BIOS or HDD
CMOS Utility Access: Different key according to model. (F1,F2,Delete)
o BIOS Updates
Memory chip does not lose file when power off. Saves on ROM
BIOS update Sources: Refer to BIOS manufactures
Determined BIOS Version: Start All programs Access System
tools System information. Record value listed BIOS version/Date/
o Flashing BIOS
Steps: Determine correct version view PC page for BIOS file See if
update is needed download file download utility close
application open utility and follow reboot
o BIOS Update Failures
Minimize Failure: 1.Update only if you must 2.Do not power off during
update 3.Use right utility 4.Follow utility exactly 5.Backup everything
Recovering a failed BIOS update: use backup in utility, boot block, use
jumper cable switch, DIP switch, new BIOS chip as last resort
Topic B: The Post and Boot Processes

o Power-On Self-Test (POST)


Beep Codes: Number of beep determines what is wrong
Common Beep Codes: 1System good, 3 long Keyboard, 8Video
adapter, 9 BIOS problem, 1 long & 3 memory
Numeric Code: Shows a 4 digit code, referrer to manual for error
Code Error: 151 Clock Fail, 161 Bad CMOS battery, 162 Config.
Mismatch, 164 Memory size mismatch, 20# memory fail 1762
HDD error
o Boot Process
Boot Devices: Internal HDD, optical drive, USB, network.
Unit 4: Selecting Memory
Topic A: Computer Memory System
Analog for RAM: Card is storage
Importance of RAM: Performance, having more RAM means faster
computer. Software support, programs need RAM to run or will be slow
o Measuring Memory
Cells: The storage location on the chip
Basic Memory Unit: Memory Storage = 2^#bits

Name

Number of Bits

Bit
Nibble
Byte
Word
Larger Units

1
4
8
Depends on Processor

Name
Kilobyte (KB)
Megabyte (MB)
Gigabyte (GB)
Terabyte (TB)

Number of values that c


stored in this much mem
2 (Zero or one)
16 (2^4)
256 (2^8)
(2^32) or (2^64)

# Values
2^10 bytes
1024 KB
1024 MB
1024 GB

o Memory Types
Volatile Vs Non-Volatile: Volatile losses its content when powered off
such as RAM and CMOS. Non-volatile doesnt like ROM, PROM,
EPROM, EEPROM, and Flash.
Dynamic Vs Static: Dynamic memory must refresh often in order to keep
its data when powered on. They are smaller, cheaper and harder to make.
Static dos not need to refresh to hold its content. Making it faster than
RAM but it cost more and is much larger.

Asynchronous and Synchronous: Asynchronous DRAM (ADRAM) isnt


synchronous to the system clock. It runs at the same speed every time.
Synchronous DRAM (SDRAM) is tied to system clock making it faster
because it can run at the same speed as the rest of the computer.
o Memory Access
DRAM, FPM, VRAM, EDO, BEDO, SDRAM, DRDRAM, DDR1-3
o Access Time
Amount of time it takes between when a request is made and when the
data is available on the bus. Measured in nanoseconds (ns).
Memory Speed: Measure in megahertz (MHz) 1Hz = once cycle per
second. So 1MHz = 1 million cycles per seconds. Divided (1/MHz)=ns
Bandwidth: Amount of data that can be transferred to or from memory per
second. Depends on memory speed and chip design.
Speed Rating: Standard testing to find speed information
Buffered Memory: Contains a register located between the memory cells
and the computers memory controller. Helps with large memory modules.
Topic B: Memory Packaging
o Packaging
Chips are placed on to a small circuit on memory stick.
Single and Double Side Modules: Chip use to sit on one side but now on
both.
Number of DRAM Chips: Usually 8 chip for each byte of data
Packaging Type: SIMM 30, 72 DIMM 100,168,184,240 RIMM
184. Number of pins determines on type of RAM (DDR3 or SDRAM)
o Memory Error Recovery
Parity: A scheme that enables the detection of an error. Some DIMMs has
9 chips so when one fails the 9th chip (parity) could replace it.
ECC: Error correcting code scans the chip to determine if there is an error.
If so it will know what change and how to fix it.
Parity & ECC in Current PC: Used in modern computers to save money
by finding memory error with software not hardware.

Unit 5: Troubleshooting Methodology


Topic A: Troubleshooting Models
o The Troubleshooting Process
Troubleshooting: The process of determining the cause of and ultimately
the solution to a problem.
Stages: Back up data divide and analyze Verify Research
Document Inform.

o CompTIA Server+ Troubleshooting Model


Identify the Problem: ask questions or review log files
Establish a Theory of Probable Cause: analyze the information you gather
Test the Theory: look at components and see if your theory is possible
Create Plan of Action: Create a plan to resolve the issue
Implement the Solution: Put your plan into action
Verify the Results: Is the issue fix, if so add thing to try to prevent it
Root Cause Analysis: See if you fix it permanently or temporarily
Document Resolution: Write down what you did for what problem
o CompTIA Network+ Troubleshooting Model
Identify the problem Re-create the problem Isolate the cause
Formulate a correction Implement the correction Test the solution
Document the problem and solution Provide feedback.
o ASID Troubleshooting Model
Acquire: gather information Simplify: remove components
Implement: identify and implement solution Document: record findings
o Gathering Information from a User
The Customers Environment: Platform includes info about hardware
Symptoms and Error Codes: Gather information and look for error codes
Situation When Problem Occurred: What program was running
o Identifying Hardware or Software Problems
Hardware: Error code appear when POST
Software: After POST could be configuration issue or for new hardware.
o Information Resources
Documentation: Research information from manuals, web, and tech
related knowledge.
Forums: Web pages where people talk about issues and solutions.
Other Sources: Magazines, employees, and vendor meetings.
Topic B: Troubleshooting Toolkits
o The Troubleshooting Toolkit
Screwdrivers, nuts, needle-nose pliers, tweezers, flashlight, containers,
anti-static bags/sprays, and ESD mats/bracelets.
Hardware tools: Multimeter, system board tester, voltage regulator.
Software: Driver disc, antivirus software, boot disk, OS on CD/DVD.
Topic C: Troubleshooting System Components
o Troubleshooting Power Supplies
Computer Fails to Boot: Good Power supply but getting sent at wrong
time Replace power supply with better engineered one.
Intermittently Stop: Electrical problem Install UPS and contact
electrician for building.
Limited Power Connector: Power supply not enough power Replace
and use split connectors.

Doesnt boot but fan is on: Power not connected to motherboard Check
connection.
o Motherboard and CPU Failures

Symptom
System fails to boot

Probable Cause
Power problems
motherboard failed
Smoke from case
Component like CPU
overheating
Random Shutdown
CPU cooling fan
Power but fail to boot
Power control circuity on
motherboard failed
Video display error
Video circuitry failed
No power, power light not
CPU failed, backplane not
illuminating
seated
BSOD, memory error, reboots Motherboard failing
o BIOS Related Problems and Causes
Symptom
Device misidentified

Probable Cause
BIOS misconfigured

Wrong memory site


reported
HDD inaccessible

BIOS misconfiguration

Geometric parameter are not set


right, HDD disable in BIOS
System wont boot from
Boot order is wrong, HDD
BIOS
disable, CMOS not correct
Date, Time incorrect
CMOS battery is dead
o POST Related Problem and Causes
Symptom
No video, 8 short beeps
3 long beeps
1 long & 3 short beeps
Code 162

Code 164

Probable Cause
Failed adapter memory
Keyboard error
Memory problem
Configure in CMOS
doesnt match PC
hardware
More/less memory in
CMOS settings

Suggested Solution
Replace motherboard
Power off and replace
components
Replace CPU fan
Replace motherboard
Replace motherboard
Reset backplane or
Replace CPU
Replace motherboard
Suggested Solution
Reconfigured
motherboard
Set up utility to
reconfigure memory
BIOS setup utility to
reconfigure devices
Reconfigured Devices
Replace CMOS battery

Suggested Solution
Replace memory modules adapter
Replace keyboard
Replace system mem.
Reconfigure in BIOS

Configure correct value in BIOS

o CMOS Related Problems and Causes


Symptom
non-system disk

Probable Cause
BIOS cant find master boot

Suggested Solution
Reconfigure

records
Display type mismatch
Video setting in CMOS does not
Connect type of
match monitor
monitor
Memory size mismatch
Memory listed in CMOS doesnt
Correct memory in
match actual install
BIOS
CMOS check sum failure
BIOS detect memory problem in
Replace CMOS battery
CMOS
o Computer Startup Problem
Boot Error: Doesnt boor correctly
OS Startup Error: System boot, but fail when load Operating System.
OS load error: System boots, OS interface does not load.
Invalid Boot or Non-System Disk non bootable chip install check
boot drive
o Diagnosing Memory Problems
Memory testing utilities: Run thousands of write/read operation on every
memory location. Types= memory test 86, 86+, Microsoft memory Diagn.
Memory test 86: most popular and free under GPL (Gnu Public License).
o Memory Leaks
Memories assign to applications but do not release it.
Task Manger: Can be used to monitor performance. Consists of CPU
usage, CPU history, memory, PF usage, physical memory, page file usage.
Performance Monitor: Help determined memory leak status/information.
o Troubleshooting Memory
Symptom
201 BIOS error
Randomly freezes
Random Crashes
Wrong amount of memory in BIOS
System is low on virtual memory

Probable Cause
Bad memory location
Failing memory
Virus infection
Failed memory module
Max out memory

Suggested Solution
Replace bad memory
Find and replace
Scan PC for virus
Test memory
Add RAM

Unit 6: Installing Expansion Cards


Topic A: Buses
o Computer Buses
Bus: a communication pathway
Bus Type: Address transmits memory between CPU and Ram. Data
transfer data between CPU & RAM. Expansion adds on adapter cards.
Video transmits display information between CPU & video circuitry.
Address and Data Bus: enable basic operation with CPU and memory.
Expansion Bus: Information travel through expansion bus. Can add
features through PCI slots.

Video Bus: Generates signal sent to monitor such as VESA, AGP busses.
Riser Bus: Circuit board that provide additional expansion slots. 3 type of
risers. Advance Communication Riser (ARC) latest and standard,
Audio/Modern Riser (AMR), and Communication Network Riser (CNR).
System Interaction
Avoid Conflict: Gain the attention of CPU, access shared memory, extend
BIOS, Transfer data on BUS.
Interrupts
Send a signal to get CPU attention
Polling: move from device to device seeing if any command is needed.
Not used in today system because it is inefficient use of CPU time.
IRQs: assign which interrupts is more important than others. The lower the
number the higher the priority it has.
Device Manager: Shows what devices have IRQs. Can make changes.
I/O Addresses
Is given a hex number when reading and writing.
Direct Memory Access (DMA)
Acts as a processor to handle data transfer between devices and main
memory.
Base Memory Addresses
Each device must be assigning an address so the system can see it.
Historical Bus Types
PC/XT Bus: 8 bit, clock speed is 4.77Hz, data transfer 1.6Mbps.
PC/AT and ISA Bus: 16 bit, clock speed 8MHz, data transfer 8Mbps
Peripheral Component Interconnect (PCI)
Multifunction cards and max devices: allows up to 8 functions on a single
card. Can add up to 40 expansion slots.
PCIx: 64bit parallel capable of max data transfer of 1064MBps
PCIe: express, made to replace PCIx with supports of 1-32 bus width.

o
o

o
o

Topic B: Drive Adapters


o Drive Adapters
Controllers and Interfaces: controller is the adapter board that plugs into
the PC expansion slots; interface is the commination standard that defines
how data flows to and from the disk.
PC Drive Interfaces: SCSI (Small Computer System Interface) is a
parallel system bus and is most commonly used.
o IDE/ATA
Divided into 2 types: PATA and SATA. SATA being faster.
Speed Improvement Techniques: First data transfer using PIO with levels.
Then CPU didnt need to be involved with DMA which took that role.
Finally they enhance DMA to Ultra DMA. 6=166MPB

o Cables and Connectors


PATA & SATA use 3.5 & 2.5 connectors. SATA did not need an adapter.
o Drive Capacities
LBA: Logic Block Addressing increased the size to 8.4 GB.
ECHS: is another version of LBA that supports up to 8.GB disks.
Interrupt 13h extensions: Beyond 8.4GB the BIOS must change. 13h
change the way the BIOS reads up to 128GB
o Drive Identification
Must set up cable with master and slaves. Newer drives set this up
automatically.
o Primary and Secondary Channels
Connect master to primary and slave to secondary
o SCSI
Supports storage, printer, scanners, and video. Use for very high
performance computer networks. Very popular and still used todays high
end PC.
o Device ID
Every SCSI device needs an ID so it can set priority.
o Termination
At the end of every bus is a resistor to absorb the sign so it wont go back
to bus.
Passive Termination: Resistors that dampen reflected signals through nonelectronic means.
Active Termination: Electronic component that dynamically tunes itself to
exactly match the impedance of the cable.
o Differential SCSI
Renamed High Voltage Differential (HVD) works better with longer
cables and higher data rates.
o iSCSI
provide location independent storage use to implement SANs
o SCSI Cable and Connectors
DB25, Centronics, 50-pin high, HDI-30
o USB
1.1 12Mbps, 2.0 480Mbps, 3.0 5Gbps all hot swap
o IEEE 1394
Firewall at 1.6Gbps & 3.9Gbps, can transfer data faster than USB
o Floppy Drives and Controllers
Floppy drives cables: usually a 34 pin ribbon. 3-5 connectors. 1 for drives
controllers.
o Card Installation
Safe Handling: Sensitive to ESD, unplug PC, ground you, static bags.

Drives: Form of software that interacts with hardware to enable devices.


Every expansion device and adapter needs a driver.
Installation: Make sure device in compatible Shut down and open case
locate empty slot and remove cover remove wires that are in the
way connect wire first push card into place screw or clip
connect any wires close case configure card install driver
Topic C: Multimedia Expansion Devices
o Video Adapters
Display Characteristic: Pixel image is divided into a series of dots.
Resolution # of pixel across and down the adapter. Refresh Rate the
rate the image is printed/ Pixel Depth # of shaded colors
Video Display Standard: the level of support for the display characteristics
described in the preceding table. Ex 1024x768
o Video Buses
VESA Local Bus: one of the first video cards but not used anymore.
AGP: Accelerated Graphic Port known for accessing main system
memory.
PCI and PCIe Video: PCI is slower but great for using two screens. PCIe
use to replace both AGP & PCI with speed up to 8GBps.
o Connectors
VGA & Super VGA: 15 pin DIN connector
HDMI: video signal digital. Type A&B, B being faster with 330MHz.
o Sound and Your PC
Sound Card Connectors: For speakers, microphones, inline input or inline
output, games (Joysticks)
o Port Expansion Cards
Use to add port like USB, Firewall, and Serial/parallel. Multiple on cards.
o Manufacturer-Specific Adapter
Fax Cards: Send fax over internet via protocols
PBX Cards: enable server to provide central telephone service
VoIP System: provide calling with IP network without PSTN.
Camera Cards: use to capture video input/output such as security monitor.
Topic D: Troubleshooting Expansion Cards
o Troubleshooting Drive Controllers

Symptom
IDE drive not recognized
System with SCSI wont boot
IDE drive is inaccessible
Full size drive available

Probable Cause
Cable not connected or
misconnected
SCSI ID not set, or connector
Master/slave is 40pin not 80
pins
Adapter and BISO does not

Suggested Solution
Check Cables
Configure ID, check cables
Check connectors
Update BIOS

support
o Troubleshooting Video Adapter
Symptom
No Video

Probable Cause
Suggested Solution
Monitor off, video card fail,
Check connection/setting,
cable
replace card
Video all over the place
Resolution/refresh rate set
Change setting to support
wrong
monitor
Video flicker
Refresh rate to low
Change refresh rate
Video blurry
Monitor is failing
Replace monitor
Image artifacts display
Software issue
update video card software
Freezes during video change
Video drivers
Update video drivers
o Troubleshooting sound cards
No sound: Check speakers connections
To low/distorted: Volume set to low or muted/ sound too high for speakers
No Audio Capture: Microphone is not connected.
o Troubleshooting Modem
Symptom
Picks up line but doesnt
connect
No dial tone detected
Connection Drops
Connects at low speed

Probable Cause
Dial incorrectly, modem disconnected

Suggested Solution
Check cable and number

Phone line not connected, bad phone


line
Noisy phone line

Check connection

Modem doesnt work

Noisy phone line, only connect at that


speed
Modem has fail, driver not installed

Configuration error

COM port conflict

Connect phone to line,


contact phone provider
Confirm modem supports
high speed
Try another modem, install
drivers
Device manager to check
configuration

o NIC Indicator Lights


Flashes when sending and receiving data. When error occurs check device
manager for details
Hardware Compatibility: make sure your hardware is compatible with
your system. Check the HCL
o Data Collector Sets
DCS: mechanism that logs a computers performance for review at a later
time. Logs performance counter, event trace data and system configuration
registry.
o Viewing Data Collector Set Report
Stored in the repost node under reliability and performance.

Unit 7: Installing Data Storage Devices


Topic A: Installing Storage Devices
o Physical Installation of Internal Hard Drives
ATA Drive Identification: Can connect two drive per channel,
Master/slave
SCSI Drive Identification: Must have a SCSI ID number. Starts at 0 and
goes up. The higher the number the higher the priority.
Chassis Installation: Can install on any bay, make sure power cable reach.
Data Cable Connections: are keyed so you cannot install incorrectly.
Power Cable Connections: has triangle corner for correct installation.
SATA use different power cord but is also keyed.
Hard Drive Preparation: Once install you must partition drives and format
drives.
o Partitions and Files Systems
Partitions: Divide full drive into smaller, logical portions that are
individually usable and configurable.
Volume: Logical drives. Ex- 5GB HDD 2x 2.5GB HDD
File System: How data is stored on the drive
File System
FAT
FAT32
NTFS

Primarily Used In
MS-DOS, Windows 9x
Windows 9x, XP
XP, Vista, 7, Server

Description
Support by most OS like Linux & windows.
Use to replace FAT, still used in older systems
Adds security, large volumes, fault tolerance, still used
today
Ext3,ext4
Linux
Extended file system still widely used, less likely to
be corrupted
HFS+
Mac OS X
Journaled file system, store data in fork
Master Boot Records (MBR): first sector on boot, holds partition
information
Primary and Extended Partitions: Primary are partition that are directly
access by the OS as volumes. Can create 4 from Windows NT and later.
Extended partition contains one or more logical drives. Can only create 1
extended partition with 23 logical drives. Only use to boot different OS.
Partitioning Utilities: DOS & Windows 9x will partition on Fdisk
command. Anything later will be partition on Disk Management.
Linux Partitions: root partition stores the OS, application, and data files.
Swap partition stores virtual memory, similar to the page file system.
o Formatting
The Directory Tree: Each directory has folder and subfolders. Ex: Local
disk(c) program files Microsoft office Office16 Word. (Tree)

Format and mkfs commands: For Windows you can type format into
command line to format to FAT, 16, 32 depending on system. For Linux
you will use mkfs t filesystem_type /dev/hdX#
o Installation of External Drives
Steps: 1st Set Jumpers. 2nd Fix hot PnP shut down. 3rd Configure bus
termination. 4th connect cable. 5th Connect power. 6th turn on device.
o Hot Plug and Hot Swap Considerations
Physical Connections: Both ground and Hot connection is safe and easy.
Ground wire is connect first, this is to ensure the device is grounded
before apply power. Then special current limiting circuity is added.
Dynamic Bus Configuration: USB specificity describes how device
identify themselves and their needs. The OS use information to configure
the new devices.
Software Enabling and Disabling: OS uses caching, logging, and
journaling to improve the performance. This must be disabling before
removing.
o Optical Drives
Internal Drives: Can be connect with IDE, SATA, SCSI.
External Drives: IEE 1394 or USB, not as popular as once before.
Drivers: Windows detect and load driver automatically once installed. Fire
wire storages devices dont require drivers.
o External Storage Technologies
Network Attached Storages (NAS): is in essence a self-contained file
server that you connect to your network instead of an expansion bus. Can
be use as single HD or drive Array (RAID). Available through standard
file shaping.
Storage Area Network (SAN): System that provides block-level access to
external storage. Is a self-contained external HD. SANs storage network
type are AOE, SCSI, SAS, Hyper SCSI, and FLP.
Tape Libraries: Device that provides more storage capacity than a single
tape cartridge could hold. Automatically swap tapes when one is full, use
for back up and restores.
Optical Jukeboxes: same as tape libraries but use optical disk like
CD/DVD instead. Use to back up archiving.
WORM Drives: write once, read many devices permit you to store
information permanently. Use for data that cannot be erase or change such
as someone medical record.
Topic B: Selecting RAID Technologies
o Disk Arrays
Drive Array: is a collection of two or more drives that work in unison to
provide a single point of data storage.
o Primary RAID Levels

RAID 0: known as Stripping. Data is divided in to blocks, and blocks are


distributed across the drives in the array. Improves read/write performance
because it only has to read half the data. This method does not provide
redundancy. Any failed data will loss data to the whole set.
RAID 1: known as Mirroring. To implementation mirroring and
duplexing. Both data is duplicated onto a second disk. Mirroring a single
drive controller is used. Duplexing uses two controller, provides
redundancy.
RAID 2: Data is stripped at the bit level across all disks in array, offer high
performance but not used because hard drives include hamming code.
RAID 3: Called stripping with parity. Data is stripped byte by byte onto
separate drives. If any drives fail, data can be recovered by examining the
other blocks. Improves read/write with large data such as videos.
RAID 4: Similar to Raid 3 but stripped into blocks rather than byte. Offer
higher read performance than 3. Raid 4 has single parity drive.
RAID 5: Stripping with distrusted parity. Data divided into even number
of blocks, these blocks are divided into odd number of disks.
RAID 6: Similar to RAID 5 but two parity drives are used instead of one.
Allows you to recover from 2 drives instead of one.
o Hybrid RAIDs
RAID 0+1: Drives are stripped and then mirrored. Two stripped array and
one becomes a mirror of the other. Minimum of 4 drives as well as even
drives.
RAID 1+0 (10): Data is both mirror and striped simultaneously, a raid is
mirror and then striped to provide fault tolerance and high performance.
Commonly used with four drives.
RAID 5+0 (50): Data is striped at the block level across multiple raid 5
arrays. Requires 6 HDD if one drive from each RAID 5 fails the operation
could continue. Has better performance.
o Software vs. Hardware RAID
Software Base: Typically a function of the operation system. Windows XP,
vista, server RAID 0, 1, 5. Linux All RAIDs. MacOSX RAIDs 0,
1,1+0
Hardware Based: More expensive but offers more features. Read/write
faster, boot on file system, hot swap, and hot spare drives.
Topic C: Troubleshooting Data Storage
o Hard Drive Maintenance
Disk Clean Up: Remove unnecessary file from hard drive. Unnecessary
files are downloaded program files, temporary internet, recycle bin, and
thumbnails.

Checking Disk for Error: Use chkdisk for any error on drive. If found it
move data from that disk and marks it so no new information is saved.
When it finds a data fragment it automatically delete, attempt to fix, and
convert to file to view.
o Chkdsk Command
Used to search FAT and NTF disk for errors.

Parameter
/f
/x
/l:size

Chkdsk drive:path\filename /f /v /r /x /i /c /l:size

Description
Parameter
Description
Parameter Description
Fix any error
/v
Invokes verbose
/r
Locate bad disk
found
mode
NTFS to
/i
Scale down
/c
Checking of
dismount volume
index
cycles
Specifies the size Path\Filenam Specifies a particular file to check for errors.
of a log
e
Can use * or ? for multiple files
o Disk Defragmenter
Helps improve hard disk performance by reorganizing the files on the
disk. Not really an issue in today system but it is still up on system utility.
o Windows Monitoring Tools
Resource Monitoring: Provides real time graphs and detailed information
about CPU, HDD, Network, and Memory.
Performance Monitor: Measures and assessing a computers performance.
1st Create a base line to compare system. 2nd Monitor system use. 3rd
Locate performance. 4th Identify performance
o Windows Logging
Type of events: Error significant problem. Waring immediate
problem could worsen. Information Success operation. Success Audit
Successful security event. Failure Audit unsuccessful security event.
o Linux Logging
Boot.log system boot
cron failure of job
dmesg hardware
detection
last log last logon time
messages daemon startup
o Network File Access
Use to remote into server net uses X:\\computer\share
Linux use mount commands to access files.
o Storage Hardware Troubleshooting
Hard drives Troubleshooting

Symptom
Cant Access Drives
Cant boot from HDD
Space on Drive Doesnt match

Probable Cause
Cable Disconnected
Boot order, non-bootable
drive, corrupt boot sector
Disk unit misunderstanding
file system limitations

Suggested Solution
Check Cables
Confirm boot, set drive to
bootable
Misunderstood units being used.

File Corrupted

Drive failing, bad cables

Boot from HDD when restart


Drive letter incorrect
Cant use fail space of drive
Drive not auto detect
Cannot access file
Disk performance decreases

Booting to quickly
Cable connect wrong
BIOS cant support drive
BIOS setting incorrect
File permission, another user
Files are fragmented, drive
begin to fail
Bad backup medium

Back up fail

Replace cable and check


connectors
Disable quick boot
Connect correct cable, driver
BIOS update
Confirm BIOS settings
Test user permission
Exam system logs, defragment
drive.
Confirm backup will fit onto
medium

CD/DVD drives Troubleshooting

Symptom
No audio play CD
CD Drive not found
Disk cant be read
Buffer underrun

Probable Cause
Volume turn down, speaker disconnected
Drive disable in BIOS
Disc scratch, CD instead on DVD
Buffer entries before finish

Write process fail


Zip files are corrupted
Burn CD-RW cant be
read
DVD cant play on two
screen
UDF formatted disc cant
be read
DVD wont play movie

Data source cant keep up


Files have redundant info.
CD-ROM drives not compatible
On laptop system the overlay cant be
created
Latest service pack needed
No software, decoders missing

Suggested Solution
Check cables
Check BIOS setting
Check CD and slot
Check buffer underrun
protection
Record at 1x fram
Check SCSI cable
Check media
compatibility
Use only one display
Install server pack
Download software

Unit 8: Installing a Network Operating System


Topic A: Server Roles
o Local Area Network (LAN)
LAN: specifically designed configuration of computer and other devices
located within a confine area.
Node: Device that can receive and send information, computer or printers
Host: is a computer, also requires a OS
Resource: files, database, or printer installed
o Basic Network Types
Peer-to-Peer: multiple computers connected via Wi-Fi or wired cord. Used
in small offices for file sharing

Client/Server Network: for large peer-to-peer, can set groups and admin
instead of users.
Peer to Peer Authentication: must login onto their own computer with user
name and password.
Client/Server network authentication: logs onto the network so can see
access anywhere.
o Server Roles
File and Print: access to files, pictures, worksheet and to inkjet or laser.
Database: Use software like oracle to access customers information.
Web Server: Can access the web or create one for private users.
Messaging Server: send messages internal with users.
DHCP Server: Collect IP information like IP address, subnet masks and
gateway.
DNS Server: Can access web with names instead of IP address
Application: Allows you to share programs
Update: update service packs and hot fixes.
Filtering Server: Block access to websites
Remote Access: Allow you to work on your server with a different
computer.
Topic B: Virtualization
o Overview of Virtualization
Technology through which one or more simulated computers runs on one
actual PC.
Virtual Servers: Using multiple VR on one machine
Virtual Application: Share a pool of software licenses.
Virtual Desktop: Can log on to a full desktop with many applications.
o Server Virtualization
Reduce Power & Cooling: Fewer physical computers mean less electricity
and cooling.
Reduce Infrastructure Cost: less PC means less maintenance wire, racks
etc.
Centralized Admin: Admin multiple VR on one station.
Faster Deployment: Can create a new user quickly.
Improve Hardware Utilization: Max the use of hardware to prevent getting
more.
Reduce Disposal: Using less equipment means fewer disposals.
Testing Environment: Test multiple OS on a single computer.
Reasons Server Virtualization Might not be Suitable:
Increase Administration: Admin complexity increases meaning a
more skills person is required.
Single Point Failure: If the host fails all VR will fail as well

Increased Data Throughput: Increase backbone network will slow


response time.
Reduce Performance: Running multiple VR can reduce
performance on each VR.
High Initial Investment: to run high end software is needed and
costly.
Server Virtualization Products
Bare Metal Hypervisors: Software installed directly on the server
hardware
Host Based Hypervisors: Runs within the Operating System.
o Storage Virtualization
Network Attached Storage (NAS): Self-contained file server that you
connect to your network and not expansion bus. Can be one drive or Array
of drives. Must have a local disk to boot from.
Benefits of Virtualization:
Dynamic Provisioning: can increase server storage capacity.
Centralized Admin: control storage with a central admin console.
Reduce Infrastructure Cost: requires less disk space and fewer HD.
Back-up Consolidation: easy back-up since all data is in one place.
Downside of Virtualization:
Increase Admin Complexity: Admin position needs to be skilled.
Single Point Failure: Host drive fails, all VR on that drive fails.
Increase Data Throughput: Data must pass hosts I/O.
Reduce Performance: Read/write all VM on 1 disk will slow down.
Topic C: Installing Linux
o Linux Overview
Widely use and open source. Any computer can run Linux.
Distribution: Ubuntu, Red Hat Enterprise, Fedora, SUSE, and Debian
o Pre-installation Tasks
Must have all system information files to download, but someone created
a software to do this for you.
Before install must select installation type, download file, burn ISO disk.
o Installation Types
CD/DVD: Install Linux on CD/DVD and install on Linux PC
ISO file: Download the image open with CD software and run.
Netinst: download small file that can boot from a USB
NFS: Connect network drive with Linux and install from there
o Installation Files
Need to download appropriate files. 32 or 64bit depending on pc.
o Partitioning
HDD file systems:
Ext2: supports kernel but not used in HDD use in removable media

Ext3: primary files system used by Linux distributions.


JFS: IBM journaling file system
ReiserFS: Native file system for SUSE, not commonly used
XFS: For IRIX operation system to support large files
Partitioning Utilities: Software you use to create and manage partitions
and their files system. Built into installer and are installed auto.
Linux Root Partition: Stores OS, applications, and data files
Linux Swap Partition: Stores virtual memory data, similar to the
pagefile.sys file on windows computers.
Topic D: Installing Windows Servers
o Pre-installation Tasks
File Backup: Save data and restore later.
Hardware Requirements: Must meet min requirement for system
Partitions and Formatting: Format HD to NTFS because faster and safer.
Supports FAT/32 for removable devices.
Installation Methods: Fastest is CD and run program. Can also PXE
o Devices and Drivers
Auto Download after install, if not will go to web and download
o Updating the Server
Hotfixes: fix error codes in OS. Fix file with revised versions
Patches: Are quick fixes
Updates: use to improve security, ease of use, functions and performance.
Install update automatically: Each day check for updates and installs.
Download update but let me choose to install: will wait for you to install.
Never Check for Updates: Windows will not check, user must search
download install all updates manually.
o Customizing Windows Servers
Server Roles: Install server rolls like DHCP, DNS or Web Servers
Features: add-on enhances server functionality. Do not need features.
Remote Desktop: Can access your system program/file from any system.
Windows Firewall: Comes standard in Windows OS, has port for features.
o Malware
Worms: Programs that replicate themselves over network, without user
intervention. Attach it to files or packets.
Trojan horse: Known as spam, it deletes email, copies addresses and attack
the computer. Logic bomb is a hidden code in a program.
Zombies and Botnets: Attacks groups of computers. Overwhelms the
computer by send bogus tasks.
Rootkits: Software that grants full system control to the user.
o Antivirus Software
Definition Files: Hold a list of type of virus to look for. When new ones
are discovered then the list is updated.

Antivirus Products: Norton, ESET, McFee Avast, etc.


o Spyware
Software install on system without you knowing. Gathers personal
information, change computer configurations. Often in terms/agreement in
free programs.
o Server Connections
Sit at the server with keyboard/mouse/monitor and log in.
KVM to access multiple Servers. Easy to switch between servers.
Can connect remotely with RDP. Programs allow you to do this.
Unit 9: Networking
Topic A: Network Essentials
o Network Wiring
Network can be a physical connection like wires, radio wave, infare red or
wireless.
o Twisted-pair Cables
Earthier use UTP or STP. Each has 4 wires twisted by two pairs to
eliminate EML.
Cat 3: 10Mbps and 2-3 twist per foot.
Cat 5/5c: Common now with 5100Mbps and 5c1Gbps. Both have 20
twists per foot.
Cat 6/6c: Higher quality materials. Operate up to 2.5Gbps.
Cat 7: Is emerging standard at 10+Gbps. Cat 7a may be 100Gbps.
Twisted-pair Connectors: RJ-45(8wires), RJ-11(6w), Registered Jack (RJ).
o Fiber Optic Cable
Fastest and expensive way to move data. Use light through glass no bigger
than a hair.
Single-mode: Single transmission paths. Use for links longer than 300
meters.
Multi-mode: Multi transmission paths. Larger diameter core for short
distance under 300 meters.
o Duplex Data Transmission
Simplex: Data transmitted in only a single direction.
Half-duplex: data transmitted across the medium in both direction, but one
direction at a time.
Full-duplex: data transmitted across the medium in both directions at the
same time.
o Ethernet
10 Gigabit Ethernet (10GbE): fastest with data rate of 10Gbps. 10x faster.
1,000 Mbps Ethernet (Gigabit Ethernet): Use for high speed LAN. Few if
any home requires this.

100 Mbps Ethernet (Fast Ethernet): Operate at 100Mbps and handle data
at 10Mbps. Able to operate devices with both speeds.
Base x/R: Runs over fiber optic cable
Base w: runs over fiber optic, referred to as Wide Area Network Physical
Layer (WAN PHY)
Base T: Runs over twisted-pair cable, shielded or unshielded.
Base cx: Runs over shielded copper twisted pair cable.
o The Internet Protocol Suite
TCP: Transmission Control Protocol provides connection oriented,
acknowledged communication. Guaranteed deliver even if error occurs.
Runs data in legerity check.
IP: Internet Protocol is a routable, unreliable, connection less protocol.
Only job is the addressing and routing of packets.
UDP: User datagram protocol is used for connection less,
unacknowledged protocol.
DNS: Domain name system is a protocol that provides common naming
conversions across the internet.
NFS: Network files system is standard for UNIX and Linux. Allow
sharing to both platforms.
ICMP: Internet Control Message Protocol control and manage information
sent by TCP/IP. IF there an error can send up the protocol to get fix.
ARP and RARP: translate between IP addresses and Mac addresses.

o Identifying Addresses
MAC Address: Unique hex assign by NIC. It identifies devices on a LAN.
IPv4 Address: 32 bit that identifies a computer, printer & TCP/IP network.
IPv6 Address: 128 bit that support a much bigger pool of available
addresses than IPv4.
Character base Names: Domain, Host and NetBIOS names. Letter rather
than numbers.
Port Address: Number between 0-65,535 that identifies a program running
o MAC Addresses
MAC are absolute, MAC on a host doesnt change unless NIC does.
All hosts on LAN must communicate the MAC address.
MAC alone cant communicate between 2 computers on different LAN.
o IPv4
Binary IP Addresses: Is what the computer reads. Example of a 32-bit
address is 11001011 01110101
11110100
10101101
Dotted Decimal IP Addresses: Widely used to show IPv4 Address.
Example 208.206.88.56
Network ID: Represents the network on which the computer is located
Host ID: Represents a single computer on that network.


Class
A
B
C
D
E

o IPv6

IPv4 Classes:
IP Range
Subnet Mask
1.1.1.0 -- 126.0.0.0
255.0.0.0
128.0.0.0 191.255.0.0
255.255.0.0
192.0.0.0 223.255.255.0
255.255.255.0
224.0.0.0 239.0.0.0
Loop Back IP Address is:
240.0.0.0 255.0.0.0
127.0.0.0
CIDR: IP address will be used up. Allow to make groups for more IP.
Link Local: self-assign using neighbor discovery process. Start with fe80:
Sit Local: Private address, begin with FE and use C to F for the 3rd hex.
Global Unicast: Public addresses are identified for a single interface.
Multicast: Sends information or service to all interfaces that are defined as
a member of the group.
Any cast: New address that is a cross between Unicast and Multicast
addressing. Send information in a group to any address not just group
assign ones.

o Ports
Are numeric addresses between 0 65,535 that identifies applications.
Both the origination application and the target application are identified by
ports. Commonly used port numbers are listed in the following table.
Port #
20
21
22
23
25
53
80

Protocol & Purpose


Port # Protocol & Purpose
FTP use for transmitting data
110
POP3 incoming mail services
FTP Transmitting commands
123
NTP time synchronization service
SSH For secure login, file transfer 143
IMAP4 incoming mail services
Telnet For remote access
443
SSL secure connection over HTTP
SMTP sending emails
631
IPP networking printing services
DNS name resolution messaging
3306
MySQL Database system messaging
HTTP web server traffic
67/68 DHCP Dynamic Host Config. Prot.
o Address Assignment
DHCP (Dynamic Host Control Protocol): internet standard for assigning
IP to network.
Private IP Address: computer connects to home or office. When sending
information outside the network NAT changes IP to a public one.
APIPA: automatically generate an IP address in the given range.
o Domain Name System
DNS naming Hierarchy: Compose in 3 parts: Computer name, domain
name, and top level domain name. www
Microsoft
com
Top level domain: TLDs .combusiness .orgnonprofit origination
.edu education
TLDs Countrys: .ar Argentina .ca Canada .de Germany

o NetBIOS
16 characters 1-15 can be anything, 16 digit designate a service of function
Broadcast: A message destined for all computer on a given network.
Windows Internet Name Service: A database with all computers on a
network registers their NetBIOS names.
o DMZ Configurations
VLANs: Virtual network segment enabled by a Layer 2 compatible switch.
It is a distinct broadcast domain within larger networks, increases security
by clustering users into small groups and uses VoIP.
Virtual Private Network (VPN): a private communication network
transmitted across a public network configuration. VPN encrypt data
before sending that cannot be read by uses internet protocol security. 2
types transport encryption is the underlying data in a packed is encryption
then sent on public network. Other is tunnel encryption where the entire
packet is encrypted then pace on network.
Topic B: Networking Utilities
o Network Tools
TCP/IP Utilities: ifconfig shows IP addresses of wired connections.
Ipconfig Host IP address. Ping test connection. Route config
network routing table. Tracect trace route of packet. Nbtstat display
NetBIOS over TCP/IP. Netstat list of active computers.
o The Ipconfig Command
/release: release IPv4/6 address so that it returns to the pool of addresses,
use when computer cannot obtain an address from DHCP server.
/renew: you can specify the name of network connection to renew on
IPv4/6, use when trying to renew IP address. If cannot renew computer
will deny request and get a new one.
/flushdns: delete all DVS information
/displaydns: display content of DNS resolute cache.
/registerdns: renew all IP address leases from DHCP servers
Troubleshooting with Ipconfig or Ifconfig: if IP assigned auto with DHCP
check network card, release/renew IP address. If manually assign check IP
o PING and Basic TCP/IP Connectivity
PING: Packet Internet Group is packet sent from one computer to another.
Topic C: Troubleshooting
o Troubleshooting TCP/IP

Symptom
Destination Host
Unreachable

Scope
Single User
Multiple Users

Causes
TCP/IP misconfig, host table misconfig, gateway
misconfig, network adapter fail, bad network cable.
Host fail, DHCP misconfig, improper subnet, gateway
fail, router failed.

Resource
Unavailable

Single User
Multiple Users

Internet
Connectivity fail

Single User
Multiple Users

Permission problem, network config problem, port


config, local firewall fail
Service fail, port security on host blocking access, VLAN
misconfig
Default gateway misconfig in static IP assignments
Internet service provider fail, switch fail, firewall issue

Unit 10: Managing a Network Server


Topic A: User Management
o System Security
Authentication: Positive identification of entity, thats by password, smart
card, and finger print.
Authorization: a predetermined level of access is granted.
Accounting: tracking what the user does when logged in.
o Authentication Factors
One Factor Authentication: only one line security to log in. Once factor
system is UN & password, keycard, locks and keys, and pin pads.
Two-factor Authentications: something you know and something you
have. Example at ATM you need a card to swipe (have) and a pine (know)
Three factor Authentications: something you know, have, and are.
Something you know like pin, have like a key, and are like bio scanner.
o User Accounts
User information is stored by network directory services on the NOS.
o User Name and Passwords
User Names: uniquely identifies the user to a computer network.
Password: Secret codes consist of letter, numbers, characters, and length.
Password Protection: Never write it down, different password for different
accounts, 8 characters long, mixture of characters, change often, and do
not reuse passwords.
Strong Password: Multiple characters, number, letter and nothing personal
Multiple Passwords: Can be hard to remember, use password management
o User Account Guidelines
Establishing a naming convention: such as first name last initial, last name
first initial, or first initial last name.
Controlling password ownership: if user create password or admin assigns.
Including additional required attributes: can add email and number to user
Determining the location for user account: when growing large a NOSs
directory is best.
Client/Server Authentication: User log in info sent to NOS use
authenticated user get access.

o
o

Active Directory Domain Controllers: User DNS naming standards.


User Properties
Attributes can add: phone #, email, web page, address, group, and remote.
User Privilege Escalation
Escalation in Windows: user account control is design to make it
convenient to follow Microsofts security recommendation. When logged
into standard user, you can just enter login information for admin rights
and continue as an admin user.
Escalation in Linux: Just have to use sudo and type in root password and
it will give admin rights for that one command and switch back to user.
Permission
Read: Grants access to read file but cannot add, change, or delete file.
Write: Grants access to read files and add, change and delete files.
Full Control: Grants access for full control of files and folders.
Policies
Includes: Controlling uses computer setting, security setting, running
scripts, redirect files.

Topic B: Resource Management


o Disk and Volume Information

Volume Status Messages


Fail
Couldnt start automatically or
disk is damage.
Failed
Fault tolerance provided by RAID
Redundancy
Formatting
Volume being formatted

Disk Status Messages


Audio CD
Audio located in CD drive

Healthy
Regeneratin
g
Resyncing

Working well
Missing disk has been reactive and
is regeneration of data
Mirror volume is synchronizing
information on both disk

Missing
No Media

Unknown

Boot sector corrupted

Online
Offline

Foreign
Initializing

Not
Initialized

Designated the disk as a


imported disk
Converting a disk to
dynamic disk
Disk has been removed
Indicating that CD is
missing
Indicates that disk has been
added without a valid disk
signature
Disk is working
Disk no longer accessible

o Shadow Volumes
Shadow Volume: is a read only copy on a selected volume at a particular
point in time. Used to recover files that have been deleted, recover version
on a file, or compare version of a file while working. Cannot select certain
files the whole volume must be copied.

Best Practice: Set volume on another disk, set copies on downtime,


backup regularly.
o Disk Quotas
Advantages: Prevents users from using all disk space, encourages users to
delete old files, allows admin to track disk usage, allow admin to track
when user use all there space.
o Printing
Windows Printing: Client user sent print job, the GDI is receive from
spooler. Spooler sends to a number of protocols. Printer receives job
from spooler and converts to print language and prints.
Linux printing: Print queue (hold jobs on temp file) job (prints)
Topic C: Monitoring and Management
o Monitoring Tools
3main Tools: Performance monitoring and baseline, SNMP and WBEM.
o Performance Monitor and Baselining
Counter: Hundreds of computers performance variable
Performance object: cache, memory, paging file, disk, proc, system, thread
Bottlenecks: occurs when a particular system resource cause a
performance problem.
% Processor Time: System consistently exceeding 75%, need to upgrade
processor or memory.
Thread Count: Help identify memory leaks in applications
Real time monitoring: View System in real time, update every second.
o SNMP
Simple Network Management Protocol: Standard technology for
managing devices connected to network.
Message Integrity: Detect messages that are tampered within route.
Authentication: recognize each other before sending data.
Encryption: support packet encryption to throw hackers who use protocol
analyzers to read raw data off the network.
MIBs: management information base is a hierarchical database of
information manages by agent.
Traps: hen application fail you can send info to yourself instead of
manager.
o WBEM and WMI (Windows Management Instrumentation)
Web base Enterprise Management: Standard base architecture for
application and system management. Microsoft version is WMI
CIM: Common information model are represented as programming object.
CIM is divided into name spaces. Each name space corresponds to a
management area like active directory, internet information service.
Scripting: Critical to understand difference between classes and instances
classes is a type or category and instance is a specific item in a class.

Unit 11 Documenting and Planning


Documenting the IT Environment
o System Documentation
Characteristics of Good Doc: Written details, up to date, easy access,
secured.
Typical Contents of Doc: List of servers and applications, lists of keys
client workstation, diagrams (network, server, and racks), contact
information, vendor doc such as manuals and warranty, details for local
laws and regulations, purchase records and repair logs.
Service Level Agreements: a contract between a service provider and the
end user.
Non documentation records: Doc the environment, rack and cable labels.
o Documentation Tools
Logging Software: Can run scripts when files are scan important details
are extracted.
Provisioning System: Software tools that enable you to quickly clone or
setup new computers.
Inventory Software: hardware information saved and is pulled when
system runs scans.
Topic B: Planning and Implementing Changes
o Change Management
Benefits of a formal Change: ensure everything is examined before the
change is made.
Change Doc: records of patches, modifications, and modification dates.
o Disposal of Electronics
Methods of Disposal: local electronic equipment recycling services.
Topic C: Managing Physical Access and Security
o Physical Access Control
Physical token: Device that contain microprocessor and OS,
smartcards/USB reader.
Locks: best first line of defense, deadbolt can be added for more security.
Man trap: interlock doors that only allow one person in at a time, no
tailgating.
o Surveillance
Security Guards and cameras.
Logging: keep track of all activity on users computers.
o Biometrics
Fingerprint Scanners: uses fingerprint to gain access to building
Hand Geometry scanner: scans the entire hand for identification
Eye scanner: Scans retina to obtain blood vessel patterns.
Other: Voice verification, signature verification and DNA scans.

Pros and Cons: It requires an individual feature to grant access ensuring


the right person get access. Gives false reading sometimes, stores all
information unencrypted which make is variable.

Unit 12 Preparing for Disaster


Topic A: Backing Up Data
o Importance of Backups
Must keep files in case one is damage or erase.
Windows Backup: Scheduling backups, restoring active directory, ARS.
o Tape Formats
Tape Drives are generally the most popular server backup devices.
QIC (Quarter-inch Cartridge): tape is belt driven instead of the tape
attached to the reels. Tape needs to be re-tensioning (winding the tape end
to end and then rewinding it in a single operation). QIC storage 400MB10GB.
DDS (Digital Data Storage): Has two read and write heads for error
correction. Last 10 years but requires frequently cleaning. Up to 2GB
DLT (Digital Linear tape): Uses Linear serpentine recording with multiple
tracks on 12.6mm wide tapes. Storage range from 15GB-1200GB.
LTO (Linear Tape Open): open format comes in two formats. Accelis and
Ultrium. Accelis use an 8mm tape and a dual reel cartridge. No longer
available. Ultrium uses .5 tape and a single reel carriage. It is the high
capacity version of LTO. The lasts version holds up to 800GB and transfer
rate of 80 to 160Mbps.
AIT & SAIT (Advance Intelligent Tape) (SuperAIT): uses helical-scan
recording in which the head is tilted and data recording in diagonal stripes
across the head. AIT uses 8mm tape in 3.5 drive, storage range from
20GB to 400GB. SAIT uses .5 tape and storage is from 500GB to 1TB.
Data rate range from 30Mbps to 78Mbps. Uses memory in cassette (MIC)
a 64KB memory chip used to store the cartridge system log and files
search. Has a Plug and Play feature.
o Optical Media
Types: CD recordable, DVD, Blue-ray
o USB Flash Drive
Supports hot swappable, is a controller with USB interface, use encryption
o Floppy Disk Storage
Capacities depends on number of tracks and sector on each track
o Disk to Disk Back-ups
Advantages: multiple backup and recovery operation can access them
simultaneously, backup and recovery is shorter, restore specifics files
faster.

o Managing Backups
Eliminating Human Error: for large company use automatic tape system
for backups. It will replace the fail data with a new tape and restore data
without user interference.
Assigning Backup Permission: less people assign the better. Usually only
admin, backup operator, and server operators.
Online Retention Period (OLRP): is the period in which data can be
restored from tape without manual intervention. No need to look for tapes
just uses the library software.
o Backup Software
Hard Disk Imaging: ability to restore hard disk in its entirely without your
need to reinstall OS manually.
Virtual Hard Disk: ability to treat a backup tape as a virtual hard disk,
albeit a very slow one, easy to backup.
Data Compression: built in data compression capability you can use if
your drive doesnt include its own hardware data compression capabilities.
Virus Scan: Scan for virus during backups and restore operation.
Tape Management: ability to tell you when to replace tape or sap them.
Account Access Management: the ability to create an account for you to
have access to backup all data regardless ownership.
Unattended Backup: preform backup unattended, software schedule the
backup.
Command line Functions: enable you to run commands before and after
the backup.
o Backup Types
The Archive Bit: is set to 1 when needs to be backed up. When changes
are made will change to 0 until you change the file. Full = reset all files,
Incremental = Reset on any backed up files, Differential, Daily, Copy =
Not reset.
Full Backups: Most common, backup all files and folders selected. It also
clears their Archive Attribute. This help work with other methods of
backups. When backup it ignore the Archive state, that is it will copies all
files regardless if any changes were made.
Incremental Backup: Only backup those files that have change since the
last normal or incremental backup. Also clears the Archive Attribute
associated with any files and folders that are backed up. Main purpose is
to save space and time of backup. Usually performed the next day after a
normal backup. Only copy files that have been changed. Although its
most efficient the restore process is longer. If Thursday file is deleted, you
must restore full back up from Monday then incremental backup form
Tuesday and Wednesday.

Differential Backup: Similar to incremental backup but it does not clear


the Archive Attribute. Each time the differential backup runs, it will back
up all files that have been change since the full backup, even if theyve
been included in a previous differential backup. This makes the restore
process simpler because you only restore Monday and Wednesday if
Thursday failed. It does require more storage.
Daily Backups: Saves only files and folders that have been created or
change since the last backup. Does not change Archive Attribute so it does
not interfere with other backups.
Copy Backups: same as full backup but does not change the Archive
Attribute. Purpose being to save a full back up on a tape offsite without
interfering with any other backups.
o Unique Backup Situations
Snapshot: a read only copy of the data, frozen at a point of time.
Cold Backup: a database is closed or locked and is not available to users
during backups.
Hot Backup: is a database made with the snapshot method, while the
database is still available to users.
o Developing a backup Strategy
Grandfather, Father, Son Backup (GFS): most common backup strategy
uses 3 set of tapes for daily, weekly and monthly backup sets. 12 tapes
Backup the son: label 4 tapes as M-Thu. These son tapes are
used for daily incremental backup during the week.
Backup the Father: Label 5 tapes week 1-5. These father tapes
are used for weekly backup on Friday. Store tapes locally, backup
is preformed he day Son is not.
Backup the Grandfather: No standard label could add months but
is performed on the last business day of the month. Valid for 3
months then reused.
The Six Cartridge Backup: Better for smaller business. Only uses 6 disks
but can only hold 7 weeks of data.
Label six cartridges Friday 1, Friday 2, Monday, Tuesday,
Wednesday, and Thursday.
Full back up using Friday 1 tape. Store the tape offsite.
Monday perform an incremental backup store onsite.
Repeat incremental backup using Tuesday, Wednesday, &
Thursday tapes.
2nd full back up using Friday 2 tape, this completes the backup
cycle.
The Tower of Hanoi: uses 5 tapes that rotate. You will always have a daily
history extending back 32 days.

Day 1: backup to A. Reuse the A tape every other day.


Day 2: backup to B. Reuse the B tape every 4 days.
Day 4: backup to C. Reuse the C tape every 8 days.
Day 8: backup to D. Reuse the D tape every 16 days.
Day 16: backup to E. Reuse the E tape every 32 days.

Topic B: Server Redundancy and Other Disaster Precautions


o Clustering
Cluster improves the availability of the client/server application by
increasing the availability of server resources.
Active Cluster: All nodes perform normal, active function and then
perform additional function for fail member of the cluster.
Passive Cluster: Server with identical service as its failover, partner would
remain in an idle node state until the primary node fails.
Failover: is the process of having cluster resources migrate from an
unavailable node to an available node. Automatically initiates when node
fails.
Spare Parts: Keep a set of spare parts will save time when something goes
down.
Spare Drives: Two types of spare parts methods.
Cold Spare: HDD fails you must shut down system to replace.
Host Spare: Can replace HDD without the need to shut down the
system. Drive is automatically brought back online.
o Server Management and Maintenance
Server Management Software: usually include software that provides basic
system monitoring function, these utilities usually found in BIOS and
CMOS settings. Features include:
Failure Detection: Detects temp & voltage change, fan speed
change and fail, disk drive problem or failure, power supply
failure, processor status, and ECC memory error.
Software Monitoring: Detect hung application, can use
management software to shut down or reboot.
Event Log: stores events in NVRAM so if no power record remain.
Emergency Management Port: Allows you to power on/off reset
server and view logs remotely.
Security Monitoring: Uses a jumper setting to enable chassis
intrusion detection.
o Physical Care and Maintenance
Two primary factors to hardware devices and computer peripheral failures
are dirt and heat.

Hard drive Failures: are prone to fail in high heat environments. Stacks
servers disks inside a single computer without ventilation and heat can
cause electrical issues. If data is lost then must pull information from disk
themselves and could be pricey.
Most common maintenance issue for servers is planned downtime to blow
out dust.
Topic C: Developing a Disaster Recovery Plan
o The Disaster Recovery Plan
DRP: large enterprise can amount to hundreds of pages with thousands of
contingencies. Tells you what action needs to be taken, in what order, after
the destructive event. Steps usually consist of: Using appropriate fire
suppressant, evacuating, appropriate notification sequence for team leader
and backups, establish temp business recovery, assess damage.
o Alternate Sites
Hot Sites: Is a facility shared with a number of subscribers from various
geographic locations, each of which shares in the cost of maintaining the
fully operational center. Is a site to site mirroring, cost a lot but in case of
disaster can be running in hours.
Cold Site: A facility designed to receive computer equipment. It has all the
equipment needed for housing a computer center. If home site takes too
long to repair they can purchase space, rent, or lease a cold site until the
home site is available. Simply available space, lease expensive but
considerably longer to get your system online then a hot site.
Warm Site: a compromise between a hot site and cold site. Typically has
computer system, although on a smaller scale. Home backup on hand to
imminent, although could be old.
o Site Management
Plan: have a set of step in line for when a disaster happens. Should have
what order to take depends on the amount of damage, eta the site is down.
o Troubleshooting Backup and Restore
Should check back up by putting them in test room if fail then fix.
Step: Verified application setting program is running update or
patches needs to be update check online enable BIOS check SCSI
ID check backup devices physically.

Vous aimerez peut-être aussi