1 Chapter Overview Determining Network Needs Providing Fault Tolerance Collecting Essential Information.

Slides:



Advertisements
Similar presentations
Redundant Array of Independent Disks (RAID) Striping of data across multiple media for expansion, performance and reliability.
Advertisements

Data Storage Solutions Module 1.2. Data Storage Solutions Upon completion of this module, you will be able to: List the common storage media and solutions.
RAID Oh yes Whats RAID? Redundant Array (of) Independent Disks. A scheme involving multiple disks which replicates data across multiple drives. Methods.
Communication and Networking Services Networking Services.
RAID Redundant Array of Independent Disks
Enhanced Availability With RAID CC5493/7493. RAID Redundant Array of Independent Disks RAID is implemented to improve: –IO throughput (speed) and –Availability.
1 CSC 486/586 Network Storage. 2 Objectives Familiarization with network data storage technologies Understanding of RAID concepts and RAID levels Discuss.
R.A.I.D. Copyright © 2005 by James Hug Redundant Array of Independent (or Inexpensive) Disks.
2P13 Week 11. A+ Guide to Managing and Maintaining your PC, 6e2 RAID Controllers Redundant Array of Independent (or Inexpensive) Disks Level 0 -- Striped.
Chapter 5: Server Hardware and Availability. Hardware Reliability and LAN The more reliable a component, the more expensive it is. Server hardware is.
REDUNDANT ARRAY OF INEXPENSIVE DISCS RAID. What is RAID ? RAID is an acronym for Redundant Array of Independent Drives (or Disks), also known as Redundant.
11 TROUBLESHOOTING Chapter 12. Chapter 12: TROUBLESHOOTING2 OVERVIEW  Determine whether a network communications problem is related to TCP/IP.  Understand.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 1: Introduction to Windows Server 2003.
1 Chapter Overview Introduction to Windows XP Professional Printing Setting Up Network Printers Connecting to Network Printers Configuring Network Printers.
Session 3 Windows Platform Dina Alkhoudari. Learning Objectives Understanding Server Storage Technologies Direct Attached Storage DAS Network-Attached.
2 © 2004, Cisco Systems, Inc. All rights reserved. IT Essentials I v. 3 Module 9 Advanced Hardware Fundamentals for Servers.
Data Storage Willis Kim 14 May Types of storages Direct Attached Storage – storage hardware that connects to a single server Direct Attached Storage.
CHAPTER Introduction to LANs. MODULE Purpose and Use of a Network.
Microsoft Load Balancing and Clustering. Outline Introduction Load balancing Clustering.
© 2001 by Prentice Hall7-1 Local Area Networks, 3rd Edition David A. Stamper Part 3: Software Chapter 7 LAN System Software.
Configuring File Services Lesson 6. Skills Matrix Technology SkillObjective DomainObjective # Configuring a File ServerConfigure a file server4.1 Using.
Hands-On Microsoft Windows Server 2008 Chapter 1 Introduction to Windows Server 2008.
Managing Storage Lesson 3.
LAN / WAN Business Proposal. What is a LAN or WAN? A LAN is a Local Area Network it usually connects all computers in one building or several building.
Storage and NT File System INFO333 – Lecture Mariusz Nowostawski Noria Foukia.
Module 9 Review Questions 1. The ability for a system to continue when a hardware failure occurs is A. Failure tolerance B. Hardware tolerance C. Fault.
Section 11.1 Identify customer requirements Recommend appropriate network topologies Gather data about existing equipment and software Section 11.2 Demonstrate.
Chapter 2 Chapter 2: Planning for Server Hardware.
Installing Microsoft Windows Server 2008 Lesson 2.
Redundant Array of Inexpensive Disks aka Redundant Array of Independent Disks (RAID) Modified from CCT slides.
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Copyright © 2006 by The McGraw-Hill Companies,
Guide to Linux Installation and Administration, 2e 1 Chapter 9 Preparing for Emergencies.
Local Area Networks (LAN) are small networks, with a short distance for the cables to run, typically a room, a floor, or a building. - LANs are limited.
INSTALLING MICROSOFT EXCHANGE SERVER 2003 CLUSTERS AND FRONT-END AND BACK ‑ END SERVERS Chapter 4.
Module 9: Configuring Storage
NETWORK THEORY Chapter 1 Definitions BY Mr. Clean.
1 Web Server Administration Chapter 2 Preparing For Server Installation.
Server Systems Administration. Types of Servers Small Servers –Usually are PCs –Need a PC Server Operating System (SOS) such as Microsoft Windows Server,
Chapter 2 Chapter 2: Planning for Server Hardware.
1 Administering Shared Folders Understanding Shared Folders Planning Shared Folders Sharing Folders Combining Shared Folder Permissions and NTFS Permissions.
Windows Server 2003 硬碟管理與磁碟機陣列 林寶森
Redundant Array of Independent Disks.  Many systems today need to store many terabytes of data.  Don’t want to use single, large disk  too expensive.
"1"1 Introduction to Managing Data " Describe problems associated with managing large numbers of disks " List requirements for easily managing large amounts.
Using NAS as a Gateway to SAN Dave Rosenberg Hewlett-Packard Company th Street SW Loveland, CO 80537
The concept of RAID in Databases By Junaid Ali Siddiqui.
11 CLUSTERING AND AVAILABILITY Chapter 11. Chapter 11: CLUSTERING AND AVAILABILITY2 OVERVIEW  Describe the clustering capabilities of Microsoft Windows.
Group 2 Bernard Smith Thomas Laborde Hannah Prather Fault Tolerance Environment Power Topology and Connectivity Servers Hurricane Preparedness Network.
RAID and RAS CIS 485 SAU SUJA SOLOMON TIFFANY STACIE.
CHAPTER 7 CLUSTERING SERVERS. CLUSTERING TYPES There are 2 types of clustering ; Server clusters Network Load Balancing (NLB) The difference between the.
Install, configure and test ICT Networks
Component 8/Unit 9aHealth IT Workforce Curriculum Version 1.0 Fall Installation and Maintenance of Health IT Systems Unit 9a Creating Fault Tolerant.
Computer Network Architecture Lecture 2: Fundamental of Network.
1 CEG 2400 Fall 2012 Network Servers. 2 Network Servers Critical Network servers – Contain redundant components Power supplies Fans Memory CPU Hard Drives.
Hands-On Microsoft Windows Server 2008 Chapter 7 Configuring and Managing Data Storage.
RAID Technology By: Adarsha A,S 1BY08A03. Overview What is RAID Technology? What is RAID Technology? History of RAID History of RAID Techniques/Methods.
What is raid? RAID is the term used to describe a storage systems' resilience to disk failure through the use of multiple disks and by the use of data.
Network-Attached Storage. Network-attached storage devices Attached to a local area network, generally an Ethernet-based network environment.
Networking Week #10 OBJECTIVES Chapter #6 Questions Review Chapter #8.
Configuring File Services
Introduction to Networks
Introduction to Networks
Storage Virtualization
RAID RAID Mukesh N Tekwani
An Introduction to Computer Networking
Web Server Administration
TECHNICAL SEMINAR PRESENTATION
UNIT IV RAID.
RAID RAID Mukesh N Tekwani April 23, 2019
Presentation transcript:

1 Chapter Overview Determining Network Needs Providing Fault Tolerance Collecting Essential Information

2 Why Does the Organization Want a New Network Installed? You might be providing a network for a new installation that has no existing equipment. You might be asked to network a group of existing stand-alone computers. The organization might have an existing network that it wants to upgrade to a new or different technology.

3 What Services Does the Organization Want the Network to Provide? At the most basic level, organizations usually want their users to be able to access shared drives and printers and connect to the Internet. Heads of organizations and users often know what they want in a network but do not understand the technical requirements and implementation issues. In addition to talking to the heads of organizations, it is a good idea to talk with the people who will use the network.

4 Evaluating the Installation Site A proper site evaluation helps you to choose What type of network to install What network medium to use How to install the network

5 Evaluating Distances Between Components Know the maximum distances supported by the protocols you will use. Consider the actual route that your cables will take, not just the distance between the components. Consider the obstacles between the computers that will be connected to the network. Determine where to put the back-end components, such as hubs, servers, and routers.

6 Ergonomics Planning a network includes Selecting equipment designs that are suitable for the working environment Placing equipment where it will be most useful and cause the least distraction

7 Environmental Conditions Be conscious of the climate conditions at all equipment locations and at all times of day. A data center containing a large number of computers, routers, and other heat-producing devices will probably need an independent climate control system to keep the room cool enough. Make sure a source of clean, consistent electrical power is available. Some networks are exposed to extreme environments, such as outdoors or industrial areas that expose the equipment to abnormal amounts of heat or cold, humidity, dust, electromagnetic interference, or chemical vapors. Some products enable computers to operate in extreme conditions.

8 Sources of Interference For internal cable installations, examine the anticipated cable locations and routes for possible obstructions and sources of interference. Keep in mind that copper-based cables are highly susceptible to electromagnetic fields caused by fluorescent light fixtures, electric motors, and other types of electrical equipment. Use cable routes that avoid sources of interference. If proper routes are not available, you might have to use cable with additional shielding, or even fiber optic cable, which is not affected by electromagnetic interference. Be aware of local fire and building codes for cabling.

9 Selecting Hardware For a new network installation, you should select computers that can fully support the networking tasks expected of them. If networking existing computers, you should consider their age and whether you need to upgrade them by adding memory or disk space. Compatibility is crucial when working with existing equipment—either an existing network or a group of stand-alone computers. Many hardware purchasing decisions you make are based on the protocols you choose to run, especially at the data-link layer.

10 What Is Fault Tolerance? Depending on the organization, an equipment failure or other service interruption can mean lost productivity, lost revenue, and sometimes lost lives. Fault-tolerance mechanisms enable a computer or a network to continue operating despite the failure of a major component. When network functions are absolutely critical, the fault-tolerance mechanisms can be elaborate. In most cases, however, fault-tolerance mechanisms protect only a few key components from outages due to hardware or software faults.

11 Mirroring Mirroring is an arrangement in which two identical hard drives connected to a single host adapter always contain identical data. The two drives appear to users as one logical drive. Whenever users save data to the mirror set, the computer writes it to both drives simultaneously. If one hard drive unit fails, the other takes over immediately until the malfunctioning drive is replaced. Many operating systems, including Microsoft Windows 2000, Microsoft Windows NT, and Novell NetWare, support disk mirroring. Disk mirroring has two main drawbacks: The server provides only half of its available disk space to users. Although mirroring protects against a drive failure, a failure of the host adapter or the computer can still render the data unavailable.

12 Duplexing Disk duplexing provides a higher degree of data availability than mirroring because it uses duplicate host adapters as well as disk drives. Identical disk drives on separate host adapters maintain exact copies of the same data, creating a single logical drive. Duplexing allows the server to survive either a disk failure or a host adapter failure and still make its data available to users.

13 Volumes A volume is a fixed amount of data storage space on a hard drive or other storage device. On a network server, you can create Multiple volumes on a single drive A single volume from multiple drives (a technique called drive spanning) You can use drive spanning to make all storage space on multiple drives in a server appear as a single entity. The drawback of drive spanning is that if one of the hard drives containing part of the volume fails, the whole volume is lost.

14 Disk Striping Disk striping is a method in which you create a single volume by combining the storage on two or more drives and writing data alternately to each one. The computer splits each file into multiple segments and writes alternate segments to each disk. Striping speeds up data access by enabling one drive to read a segment while the other drive’s heads are moving to the next segment. If one drive in the stripe set fails, the entire volume is lost.

15 RAID Redundant array of independent disks (RAID) is a comprehensive data availability technology with various levels that provide all of the functions of mirroring, duplexing, volumes, and disk striping. Higher RAID levels store error correction information along with the data, so that even if a drive in a RAID array fails, its data still remains available from the other drives. Although RAID is available as a software product that works with standard disk drives, many high-end servers use dedicated RAID drive arrays, which Consist of multiple hard drive units in a single housing Often have hot swap capability Hot swapping is the ability to remove and replace a malfunctioning drive without shutting off the other drives in the array, so the data is continuously available to network users during the drive repair.

16 RAID Levels LevelTechnologyFunction 0Disk stripingEnhances performance by writing data to multiple disk drives, one block at a time; provides no fault tolerance. 1Disk mirroring and duplexing Provides fault tolerance by maintaining duplicate copies of all data on two drives. Disk mirroring uses two drives connected to the same host adapter, and disk duplexing uses two drives connected to different host adapters. 2Hamming error- correcting code (ECC) Ensures data integrity by writing error-correcting code to a separate disk drive; rarely implemented. 3Parallel transfer with shared parity Provides fault tolerance by striping data at the byte level across a minimum of two drives and storing parity information on a third drive. If one of the data drives fails, its data can be restored by using the parity information.

17 RAID Levels (Cont.) LevelTechnologyFunction 4Independent data disks with shared parity Identical to RAID 3, except that the data is striped across the drives at the block level. 5Independent data disks with distributed parity Provides fault tolerance by striping both data and parity across three or more drives instead of using a dedicated parity drive, as in RAID 3 and RAID 4. 6Independent disks with two- dimensional parity Provides additional fault tolerance by striping data and two complete copies of the parity information across three or more drives. 7Asynchronous RAID Proprietary hardware solution that consists of a striped data array and a separate parity drive, plus a dedicated operating system that coordinates the disk storage activities.

18 RAID Levels (Cont.) LevelTechnologyFunction 10Striping of mirrored disks Combines RAID 0 and RAID 1 by striping data across mirrored pairs of disks, thus providing both fault tolerance and enhanced performance. 53Striped array of arrays Stripes data across multiple RAID 5 arrays, providing the same fault tolerance as RAID 5 with additional performance enhancement. 0+1Mirroring of striped disks Combines RAID 0 and RAID 1 in a different manner by mirroring the data stored on identical striped disk arrays.

19 NAS Network attached storage (NAS) uses a dedicated storage appliance that connects directly to the network and contains its own embedded operating system. NAS is essentially a multiplatform file server. Computers on the network can access the NAS appliance in a variety of ways.

20 SANs A Storage Area Network (SAN) is a separate network installed at a local area network (LAN) site that connects servers to disk arrays and other network storage devices. SANs make it possible to use dedicated storage hardware arrays without overloading the client network with storage-related traffic. SANs typically use the Fibre Channel protocol to communicate, but they can theoretically use any network medium and protocol.

21 Novell NetWare SFT III NetWare SFT III was one of the first commercially successful server duplication technologies. NetWare SFT III is a version of NetWare that consists of two copies of the network operating system, plus a proprietary hardware connection that links the two separate server computers. The servers run an application that synchronizes their activities. For example, when a user saves data to one server volume, the data is written to both servers at the same time. If one of the servers should malfunction for any reason, the other server instantly takes its place.

22 Novell NetWare SFT III Connects Two Servers

23 Clustering Clustering is a technique for interconnecting multiple computers to form a unified computing resource and provide fault tolerance. A cluster can also Distribute the processing load for specific tasks among the various computers Balance the processing load by allocating client requests to different computers in turn To increase the cluster’s speed and efficiency, you can connect another computer to the group to add its capabilities to those of the others. Both Microsoft and Novell support clustering. Microsoft Windows 2000 Advanced Server and Microsoft Windows NT 4.0 Enterprise Edition Novell NetWare Cluster Services for NetWare 5.1

24 Servers Connected in a Cluster

25 Network Redundancy

26 Standardizing Workstation Configurations Creating a standard workstation configuration simplifies the troubleshooting process, because all of the computers are functionally the same. A workstation configuration can include any or all of the following elements: Which applications are installed Where the applications are installed Where the users will store data files Drive letter mappings for shared network drives Local drive sharing parameters Printer connections The ideal situation is to make new workstations completely identical, except for parameters that must be unique. If several users have different requirements, you might need to create several different workstation configurations.

27 Factors in Selecting IP Addresses How many computers are there? How many network segments are there? Will you connect the network to the Internet? If you will connect the network to the Internet, how will you do it? Will your new computers interact with existing computers?

28 Additional TCP/IP Configuration Issues What routers should your workstations use as their default gateways? Which Domain Name System (DNS) servers should the workstations use? Should you run Windows Internet Name Service (WINS)?

29 Creating Accounts To assign computer names and account names, develop a formula and stick to it. You can create computer names that use codes to represent the subnet the computer is on or the physical location of the computer in the building. Do not assign computer names based on the names of their users because you do not want to change the name whenever someone new uses the computer. To assign user account names, you can combine the user’s initials and several letters of the first and last name. Set a policy for the administrative accounts for your network. Decide which groups or organizational units you want to create to administer the accounts most efficiently.

30 Chapter Summary Determining network needs Consult with both management and staff to determine what network services are required. Evaluate the site where the network will be to determine what type of hardware to install, what network medium to use, and how to install the network. Check distances between network components, environmental conditions, local building codes, and possible sources of structural and electromagnetic interference. Select network hardware carefully to ensure that all products are compatible.

31 Chapter Summary (Cont.) Providing fault tolerance Networks use a variety of data storage techniques to increase the efficiency and fault tolerance of the network storage subsystem. Creating redundant paths through the network enables communications to continue, even if a cable breaks or a router fails. Collecting essential information Creating standard workstation configurations simplifies the process of supporting the computers later. Before installing the network, you must decide what Internet Protocol (IP) addresses you will use and how you will assign them. The best way to assign computer names and user account names is to develop a formula and use it consistently.