Server+ Study Guide
Server+ Study Guide
Study Guide
www.sybex.com
Server +TM
Study Guide
Gary Govanus
with William Heldman
Jarret Buse
www.sybex.com
www.sybex.com
Neil Edde
Associate PublisherCertification
Sybex, Inc.
www.sybex.com
SYBEX Inc.
Customer Service Department
1151 Marina Village Parkway
Alameda, CA 94501
(510) 523-8233
Fax: (510) 523-2373
e-mail: [email protected]
WEB: HTTP://WWW.SYBEX.COM
After the 90-day period, you can obtain replacement
media of identical format by sending us the defective disk,
proof of purchase, and a check or money order for $10,
payable to SYBEX.
Disclaimer
SYBEX makes no warranty or representation, either expressed or
implied, with respect to the Software or its contents, quality, performance, merchantability, or fitness for a particular purpose. In
no event will SYBEX, its distributors, or dealers be liable to you
or any other party for direct, indirect, special, incidental, consequential, or other damages arising out of the use of or inability to
use the Software or its contents even if advised of the possibility of
such damage. In the event that the Software includes an online
update feature, SYBEX further disclaims any obligation to provide this feature for any specific duration other than the initial
posting.
The exclusion of implied warranties is not permitted by some
states. Therefore, the above exclusion may not apply to you.
This warranty provides you with specific legal rights; there may
be other rights that you may have that vary from state to state.
The pricing of the book with the Software by SYBEX reflects the
allocation of risk and limitations on liability contained in this
agreement of Terms and Conditions.
Shareware Distribution
This Software may contain various programs that are distributed
as shareware. Copyright laws apply to both shareware and ordinary commercial software, and the copyright Owner(s) retains all
rights. If you try a shareware program and continue using it, you
are expected to register it. Individual programs differ on details of
trial periods, registration, and payment. Please observe the
requirements stated in appropriate files.
Copy Protection
The Software in whole or in part may or may not be copy-protected or encrypted. However, in all cases, reselling or redistributing these files without authorization is expressly forbidden
except as specifically provided for by the Owner(s) therein.
www.sybex.com
www.sybex.com
Acknowledgments
You know, this is the toughest part of the entire book to write. You may not
believe it, but it is true. So many people have done so much to get this book on
the shelf and into your hands that it is not possible for me to list them all. I also
have the task of trying to have you understand how important all of those people are to this project. Believe me, it is much easier explaining how Ethernet or
a router works than to try to explain the differences between an acquisition
and development editor, a production editor, and an editor!
Most importantly, I would like to thank my wife, Bobbi, for all her love
and understanding during this process. I have been writing for Sybex almost
continuously for two years, and she has been wonderful during the whole
time. It is a lot harder than it sounds, because when there are deadlines, or
I am trying to teach and to write at the same time, something has to give, and
usually it is the attention I pay to her. She knows how much I love doing this,
so she puts her needs on the back burner. She really is a wonderful woman,
and I am very lucky to have her in my life.
There are others who get shortchanged when I write. I sometimes have to
really work to find the time to make my daughters, Dawn and Denise, crazy.
Fortunately, they are now old enough where they have very full, successful
lives of their own. I dont get to see my grandkids nearly enough, so as soon
as I finish this thing, I am taking them to Disney World. Brandice has been
there before (several times), but CJ and Courtney havent so it will be a treat
for Poppy to see the wonder in their eyes. My parents have not had as much
of my time as they deserve either, and for that I am sorry. Finally, there is my
best friend, John Hartl. John is a quiet man, but can do a wonderful job of
laying guilt. He did it when he pointed out that seeing your best friend once
a year was not enough, and he was tired of me using the *&^% book as an
excuse. He is right!
Now for the people on the production team. This is the first book I have
done with Elizabeth Hurley. Since she approached me with this project, she
has been promoted to an acquisition and developmental editor, a position
she richly deserves. Soon she will be running the place. Her good humor and
infectious laugh always can brighten my day. I hope that this book will justify the faith she has had in me. Every time I came to her with a question, she
would say, Gary, you do what you think is best, I trust you completely.
You have no idea how close we came to changing this book into the novel I
always wanted to write!
www.sybex.com
www.sybex.com
Introduction
he Server+ certification tests are sponsored by the Computing Technology Industry Association (CompTIA) and supported by several of the
computer industrys biggest vendors (for example, Compaq, IBM, and
Microsoft). This book was written to provide you with the knowledge you
need to pass the exam for Server+ certification. Server+ certification gives
employers a benchmark for evaluating their employees knowledge. When
an applicant for a job says, Im Server+ certified, the employer can be
assured that the applicant knows the fundamental server and networking
concepts. For example, a Server+ certified technician should know the difference between the various types of hard disk subsystems and how to configure them, the differences between various server types, and the
advantages and disadvantages of different network operating systems.
This book was written at an intermediate technical level; we assume that you
already know some of the information in the A+ certification and know about
hardware basics. The exam itself covers basic server topics as well as some more
advanced issues, and it covers some topics that anyone already working as a
technician, whether with computers or not, should be familiar with. The exam
is designed to test you on these topics in order to certify that you have enough
knowledge to intelligently discuss various aspects of server operations.
Weve included review questions at the end of each chapter to give you a
taste of what its like to take the exam. If youre already working as a network
administrator, we recommend you check out these questions first to gauge
your level of knowledge. You can begin measuring your level of expertise by
completing the assessment test at the end of this Introduction. Your score will
indicate which areas need improvement. You can use the book mainly to fill
in the gaps in your current knowledge of servers.
If you can answer 80 percent or more of the review questions correctly for
a given chapter, you can probably feel safe moving on to the next chapter. If
youre unable to answer that many correctly, reread the chapter and try the
questions again. Your score should improve.
Dont just study the questions and answersthe questions on the actual
exam will be different from the practice ones included in this book and on the
CD. The exam is designed to test your knowledge of a concept or objective, so
use this book to learn the objective behind the question.
www.sybex.com
xxvi
Introduction
www.sybex.com
Introduction
xxvii
www.sybex.com
xxviii
Introduction
www.sybex.com
Introduction
xxix
It is possible to pass this test without any reference materials, but only if
you already have the knowledge and experience that come from reading
about and working with servers. Even experienced server people tend to
have what you might call a 20/80 situation with their computer knowledgethey may use 20 percent of their knowledge and skills 80 percent of
the time, and rely on manuals, guesswork, the Internet, or phone calls for the
rest. By covering all the topics that are tested by the exam, this book can help
you refresh your memory concerning topics that, until now, you seldom
used. (It can also serve to fill in gaps that, lets admit, you may have tried to
cover up for quite some time.) Further, by treating all the issues that the
exam covers, this book can serve as a general field guide, one that you may
want to keep with you as you go about your work.
In addition to reading the book, you might consider practicing these objectives
through an internship program. (After all, all theory and no practice make for a
poor technician.)
www.sybex.com
xxx
Introduction
To test your knowledge as you progress through the book, check out the
review questions at the end of each chapter. As you finish each chapter,
answer the review questions and then check to see if your answers are right
the correct answers appear on the page following the last review question.
You can go back to reread the section that deals with each question you got
wrong to ensure that you get the answer correctly the next time you are
tested on the material.
On the CD-ROM youll find two sample exams. You should test your
knowledge by taking the practice exam when you have completed the book
and feel you are ready for the Server+ exams. Take this practice exam just as
if you were actually taking the Server+ exam (i.e., without any reference
material). When you have finished the practice exam, move on to the bonus
exam to solidify your test-taking skills. If you get more than 90 percent of the
answers correct, youre ready to go ahead and take the real exam.
The CD-ROM also includes several extras you can use to bolster your
exam readiness:
Electronic flashcards You can use these 150 flashcard-style questions to
review your knowledge of Server+ concepts. They are available for PCs
and handheld devices. You can download the questions right into your
Palm device for quick and convenient reviewing anytime, anywhere
without your PC!
Test engine The CD-ROM includes all of the questions that appear in this
book: the assessment questions at the end of this introduction and all of the
chapter review questions. Additionally, it includes a practice exam and a
bonus exam. The questions appear much like they did in the book, but you
can also choose to randomize them. The randomized test will allow you to
pick a certain number of questions to be tested on, and it will simulate the
actual exam. Combined, these test engine elements will allow you to test your
readiness for the real Server+ exam.
Full text of the book in PDF If you are going to travel but still need to
study for the Server+ exam and you have a laptop with a CD-ROM drive, you
can take this entire book with you just by taking the CD-ROM. This book is
in Adobe Acrobat PDF format so it can be easily read on any computer.
www.sybex.com
Introduction
xxxi
www.sybex.com
xxxii
Introduction
Job Dimension
% of Exam (approximate)
1.0: Installation
17%
2.0: Configuration
18%
3.0: Upgrading
12%
9%
5.0: Environment
5%
27%
12%
1.0: Installation
1.1 Conduct pre-installation planning activities:
Verify that all correct components and cables have been delivered.
1.2 Install hardware using ESD best practices (boards, drives, processors,
Install UPS.
www.sybex.com
Introduction
xxxiii
2.0: Configuration
2.1 Check/upgrade BIOS/firmware levels (system board, RAID, control-
3.0: Upgrading
3.1 Perform full backup:
Verify backup.
Verify N 1 stepping.
www.sybex.com
xxxiv
Introduction
www.sybex.com
Introduction
xxxv
www.sybex.com
xxxvi
Introduction
5.0: Environment
5.1 Recognize and report on physical security issues:
www.sybex.com
Introduction
xxxvii
Interpret error logs, operating system errors, health logs, and critical
events.
Locate and effectively use hot tips (e.g., fixes, OS updates, E-support,
Web pages, CDs).
6.3 Identify bottlenecks (e.g., processor, bus transfer, I/O, disk I/O, network
I/O, memory).
6.4 Identify and correct misconfigurations and/or upgrades.
6.5 Determine if problem is hardware, software, or virus related.
www.sybex.com
xxxviii
Introduction
Use the technique of hot swap, warm swap and hot spare to
ensure availability.
Use the concepts of fault tolerance/fault recovery to create a disaster recovery plan.
7.2 Restoring.
Bring two forms of ID with you. One must be a photo ID, such as a
drivers license. The other can be a major credit card or a passport.
Both forms must have a signature.
Arrive early at the exam center so you can relax and review your study
materials, particularly tables and lists of exam-related information.
www.sybex.com
Introduction
xxxix
On form-based tests, because the hard questions will eat up the most time,
save them for last. You can move forward and backward through the
exam. When the exam becomes adaptive, this tip will not work.
For the latest pricing on the exams and updates to the registration procedures, call Prometric at (800) 755-EXAM (755-3926) or (800) 77-MICRO
(776-4276). If you have further questions about the scope of the exams or
related CompTIA programs, refer to the CompTIA site at www.comptia.org/.
www.sybex.com
Assessment Test
1. In a Fibre Channel configuration, what constitutes a point-to-point link?
A. Arbitrated loop
B. Fabric
C. A bidirectional link that connects the N_ports on two nodes
D. Two NL_ports connected to two FL_ports
2. What do you call a list of IP addresses that can be assigned by an auto-
www.sybex.com
xli
Assessment Test
wiser.
B. An error message pops up on the screen describing the error to the
end user and giving the user a chance to fix the problem.
C. An entry is made in the memory error log, but the system continues
to operate.
D. The system is halted.
8. What happens when a parity-checking memory module determines
the wiser.
B. An error message pops up on the screen describing the error to the
end user and giving the user a chance to fix the problem.
C. An entry is made in the memory error log, but the system continues
to operate.
D. The system is halted.
9. How many interrupts are available with PCI?
A. 64
B. 32
C. 16
D. 8
10. How can you configure load balancing in a PCI Bridged environment?
A. Configure one bridge as a master, and the other as a slave.
B. You will have to buy special devices to make this work.
C. You will have to purchase a special connector.
D. Load balancing is not recommended in bridged environment.
www.sybex.com
Assessment Test
www.sybex.com
xlii
xliii
Assessment Test
16. Four network cards grouped together for Load Balancing will have
check to make sure the database is getting backed up, so you try to
restore one of the files to another server. You find the file was not
backed up. What is a likely reason for this happening?
A. The file had not been accessed that day.
B. The tape backup program cannot back up open files.
C. The tape backup program cannot back up files that big.
D. The tape backup program did not run.
www.sybex.com
Assessment Test
xliv
must be configured?
A. A DNS Server
B. A relay Agent
C. Another DHCP Server
D. SMTP
E. DMI
25. Name three ways NICs can work together.
A. Adapter Grouping
B. Adapter Fault Tolerance
C. Adapter Virtual Private Networks
D. Adapter Load Balancing
E. Adapter Teaming
www.sybex.com
xlv
Assessment Test
doing.
B. They provide a background of what has been done to a computer.
C. They provide an instruction manual for doing routine tasks.
30. What is the plenum?
A. The type of metallic shielding surrounding a fiber optic cable
B. The type of cable used in fiber optic installations
C. The air space between the ceiling and the actual roof of a building
D. Precious metal like gold
31. With which Internet standard protocol is Active Directory accessed?
A. SNMP
B. SMTP
C. LDAP
D. POP3
www.sybex.com
Assessment Test
xlvi
32. Will an ATA 100 device use the same type cable as an ATA 66 device?
A. No
B. Yes
33. A BNC connector is used on what type of Ethernet implementation?
A. ThinNet
B. Thicknet
C. UTP
D. STP
34. How many terminators are there on a ThinNet network?
A. One
B. Two
C. One for every 50 hosts
D. One for every 100 hosts
35. Which is true of fiber optics?
A. It is affected by EMI.
B. It is affected by heat.
C. The cable can be made of glass.
D. The cable is always made of copper.
www.sybex.com
xlvii
match.
4. B. You would have three 20GB drives for storage and one 20GB drive
for parity. Therefore, you would have 60GB of usable storage space.
5. A. The performance of the RISC processor depends on the code it is
executing.
6. B. Memory interleaving is a way of quickly getting access to informa-
will be detected and corrected. ECC memory can determine corruption of up to 4 bits, but with anything over 1 bit, the system is halted.
8. D. With parity, if it is determined there has been some corruption, the
system is halted.
9. C. PCI can use up to 16 interrupts.
10. D. If you are using a bridged architecture, load balancing is not rec-
ommended.
11. B, D, F. I2O is made up of three software layers: the OS Services Mod-
ule (OSM), the I2O Messaging Layer (IML), and the Hardware Device
Module (HDM).
12. A, B, D. IDE devices can be a master with no slave present, a master
IP address.
www.sybex.com
xlviii
segments.
19. C. Fault Tolerance requires at least two cards, not at least two ports.
20. B. Many tape backup programs are not capable of backing up open
chain.
22. A. A peer to peer application server would be the type that may be
used by gamers.
23. A, B. There are only two types of cache, L1 and L2.
24. B. A relay Agent must be configured.
25. B, D, E. Adapters can work together with Load Balancing, Fault Tol-
erance, or Teaming.
26. D. PIO is the abbreviation for Programmed Input/Output.
27. D. The U rating is the number of mounting holes that the device will
a computer.
30. C. The plenum is the space between the drop down ceiling and the
www.sybex.com
Chapter
Disk Subsystems
SERVER+ EXAM OBJECTIVES COVERED IN
THIS CHAPTER:
1.2 Install hardware using ESD best practices (boards, drives,
processors, memory, internal cable, etc.).
Install UPS.
www.sybex.com
Use the technique of hot swap, warm swap, and hot spare to
ensure availability.
7.2 Restoring
www.sybex.com
ont you just hate it? You buy the darn book, hoping to be
slowly and gently eased into the studying process, and in the very first chapter
the author nails you with a ton of objectives. Well, take heart, if you have
passed the Network+ test and the A+ test, about 20% of the material in this
book will be old hat! You will already know it.
The Server+ exam is designed to give you background into the inner
workings of your local server platform. Throughout this book we are going
to be talking about the different types of hardware that make up a server, the
different types of servers that can be put into your network, the different
types of server operating systems, how to care for your servers, and how to
fix them if they break. I suppose we could subtitle this book, The Care and
Feeding of Network Servers.
To make this daunting task a little easier, we are going to break it down
into chunks. As you can see, the first chunk deals with the disk subsystem of
the server. In this first chapter, we will cover four basic areas: Logical and
Physical Drives, SCSI, RAID, and hot swappable. Well spend some time
hashing out terminology, discussing strengths and weaknesses, and looking
at fault tolerances. So lets get to it.
For complete coverage of objective 1.2, please also see Chapters 6, 7, and 8. For
complete coverage of objective 3.3, please also see Chapter 2. For complete coverage of objective 3.6, please also see Chapters 2 and 10. For complete coverage
of objectives 7.1 and 7.2, please also see Chapter 12.
www.sybex.com
Chapter 1
Disk Subsystems
In this section, we are going to talk about Logical Drives and Physical
Drives and describe their functionality. We will take a look at how the people
who use the server view the disk subsystem.
Now, if your users are like all the users I have ever dealt with, 95% of
them dont care how or why the network operatesthey just want it to work
every time. Does that sound familiar? When it gets into the subject of drives,
they could care less, as long as they can store and retrieve their information.
And that is just the way it should be.
Logical Drives
Every network that I have ever worked on has had a drive letter mapped to
an area that was fondly referred to as the Users home directory. Depending
on the network operating system you are using, it may be called the Users
directory, or the mount point, or something else esoteric, but every system
has one. This is the place where your users can store their highly personal,
private user stuff. You know, like all the jokes they received via e-mail over
the weekend. Anyway, to make this drive easier for users to access, it is
assigned a drive letter; for instance, in my network it is the H: drive. Now,
users dont refer to this area as their Users home directorythey simply call
it their H: drive. Well, what exactly is their H: drive?
If you were to ask an end user that question, he would probably tell you
that somewhere, back in the deep dark reaches of the computer room, there
would be a wall. Mounted on this wall would be dozens of physical hard
drives and each one of these hard drives would have a little plastic strip on
it, with a name. So, if you wanted to find Elizabeths H: drive, you would
simply find the wall, look to the strips that handled the Es, and there, about
halfway down, would be the drive for Elizabeth. In reality, the Users home
directory is just thatit is a directory that is part of a much larger directory
structure. Using Microsoft Explorer, Figure 1.1 is a small sample of a Users
directory.
www.sybex.com
FIGURE 1.1
Now, I suppose right from the start we should get the biases out in the open.
First of all, I have been working with computers since the 80s, back when DOS
was king and GUI was something slimy. So, I have some problems that you
should know about. The first is with the interchangeable term directories and
folders. In the world of GUI, a folder represents a storage area created on a
disk for the storage and retrieval of information. In the world of DOS, the same
thing was called a directory. Being an old dog, I find it hard to learn new tricks,
so if you see the word directory, and you are more comfortable with folder, go
for it. In my world, in this context, they are interchangeable.
Depending on the network operating system you are using, these areas are
referred to as mapped drives, shares, or mount points. It all amounts to the
same thing. A drive letter has been assigned as a pointer to a particular directory or folder on a bigger physical device. It does not even have to be a network operating system. DOS will support up to 23 Logical Drives on a
www.sybex.com
Chapter 1
Disk Subsystems
system. As far as the user is concerned, it is a drive just like the C: drive in
their computer. As far as you are concerned, it is a Logical Drive, or drive letter that has been assigned as a pointer to a distinct directory or folder on a
larger physical device.
Physical Drives
If Logical Drives are pointers to directories or folders on physical devices, it
makes sense that the Physical Drive is what you can hold on to and install
into a file server. A Physical Drive can be a hard drive, a floppy drive, or even
removable storage.
These drives come in a variety of sizes, from the standard 1.44MB floppy
drive to the hard drives that can go over 30 gigabytes. The hard drives also
come in a variety of different technologies and configurations, with a wide
variety of different acronyms that you are going to have to be familiar with
things like IDE, EIDE, ATA, SCSI, RAID, hot swap, hot plug, and even hot
spare. Over the rest of this chapter and the next chapter, we will be talking
about the differences between these.
www.sybex.com
There are several limitations to the way EIDE handles devices. The major
limitations are the number of devices that can be controlled from a single paddle
card and the lack of redundancy. If one device fails, your entire subsystem is
destroyed. Small Computer System Interface (SCSI), on the other hand,
addresses those issues. SCSI is just another type of interface that is much more
extensible than IDE. Besides hard drives, SCSI will work with CD-ROMs and all
sorts of other wonderful things. Even from its early days, SCSI (pronounced
scuzzy) allowed you to have an unlimited number of devices strung together in
what is referred to as a daisy chain. SCSI was originally designed as a high-speed
system-level parallel interface. SCSI has evolved, and now there are all sorts of
different levels and speeds. We will explore each of them in this section.
Lets start with the definitions of the interfaces and how they are used.
When we start talking about synchronous and asynchronous, the term clocked
comes into play. If you are not familiar with what it means, think of your dial-up
connection to the Internet. In this case, you are using an asynchronous modem.
Communication occurs randomly, when and where you want it to. Since there is
no regularity, this is not clocked. With synchronous, whenever a communication
link is established, certain tasks are carried out at regularly timed intervals, and
therefore they are clocked.
www.sybex.com
Chapter 1
Disk Subsystems
SCSI controller
Device 1
Device 2
Device 3
Device 4
As you can see, we have a SCSI controller and four SCSI devices. These
devices could be four hard drives or three hard drives and a tape drive, or
two hard drives, a tape drive, and a CD-ROM. You get the point. Anyway,
suppose the computer sent messages to the controller to write information to
Device 1 and to Device 3. With SCSI, the controller would send a signal to
Device 1 telling it that the controller had some work for it to do. Device 1
would respond, and the controller would send the information. Device 1
would send back an acknowledgement and the controller would now go on
to the information that had to be written to Device 3. The trick here is that
the controller would do things one step at time, and could not multitask.
That was changed in SCSI-2.
So, how does the controller know which device is which? Well, just like in
the diagram, each device is assigned its own unique device number, called the
SCSI address. The entire SCSI subsystem is referred to as the SCSI bus. The
SCSI address was configured in a variety of ways, including jumpers or rocker
switches. That way, when the controller needed to send information to that
device, it just used the appropriately addressed wire. In order to keep the signals on the wire, each SCSI bus had to be terminated at both ends. We will talk
more about termination after we get through defining the types of SCSI.
Not only is SCSI flexible in the kinds of computers it can work in, SCSI
is also flexible in the kinds of devices it can work with. For example, SCSI
can work with tape drives, hard drives, and CD-ROMs, to name a few.
These devices can be internal to the computer or external, in a separate case.
If the devices were internal, they would use a 50-pin ribbon cable. If the
devices were external, they would use a very thick, shielded cable that had a
Centronics 50-pin adapter on one end and a DB-25 connector on the other.
www.sybex.com
A SCSI-2 connector
www.sybex.com
10
Chapter 1
Disk Subsystems
Now just to confuse you, when they widened the data transfer path from
8 to 16 bits, the 16-bit version of SCSI-2 was also referred to as Wide SCSI.
With the wider bus, the transfer speed climbed to 10.0 Mbytes/second; this
was referred to as Fast SCSI. With Fast SCSI, there was also some new terminologyinstead of Mbytes/second, there is Mega Transfer (MT). The MT
is a unit of measurement that refers to the rate of signals on the interface,
regardless of the width of the bus. So, as an example, if you have a 10MT
rate on a Narrow SCSI bus, the transfer rate would be 10 Mbytes/second. If,
however, you had the same 10MT rate on a Wide bus, it would result in a
20 Mbyte/second transfer rate. The developers finally took the Wide SCSI
technology and combined it with Fast SCSI, and that became Fast-Wide
SCSI, with a transfer speed of 40 Mbytes/second.
SCSI-2 was backwardly compatible with SCSI, but for maximum benefit, it
was suggested that you stick with one technology or the other, preferably
using a SCSI-2 controller with SCSI-2 devices. With both SCSI-1 and SCSI-2,
the number of peripherals that could be connected to any controller was seven.
SCSI-3
Although SCSI is maturing, it is not completely there yet. There are still some
limitations, like having no more than seven devices connected to any controller.
The next generation of SCSI, SCSI-3, takes care of some of that.
Now SCSI-3 is still a proposed ANSI standard, but there are a lot of devices
out there purporting to be SCSI-3. That is because the SCSI-3 documentation
took the very large SCSI-2 specifications (in excess of 400 pages) and split it
into smaller bite size chunks. These smaller documents cover different layers of
how the interface will be defined. For example, the following layers are
included:
physical, which covers things like the connectors, the pin assignments,
and the electrical specifications. This document is called SCSI Parallel
Interface (SPI).
protocol, which covers all the physical layer activity and how it is
organized into bus phases and packets.
www.sybex.com
11
Now, when the standards folks started working on this, they recognized
how quickly things were changing, so they layered the specifications to allow
substitution in different parts of the specifications as the technology evolves.
One example would be the standards for the SCSI Fibre Channel interface disk
drive. In this case, the physical and protocol layers would have to be replaced
with new documents, but the other three layers could remain the same.
So, since the newest features are going to show up in SCSI-3, and since
SCSI-3 will be generally higher-performing, you can expect that a SCSI3 device will exhibit better performance than its SCSI-2 brethren. One of
the first things people realized with SCSI-3 was that the number of
peripherals changed. Now, you could have a maximum of 16 devices.
Since there was the possibility of having 16 devices on the chain, the
length of the cable had to increase also. SCSI-3 also saw the added support for a serial interface and for a fiber optic interface. Data transfer
rates depended on the way the hardware was implemented, but the data
rates could actually climb to hundreds of megabytes per second.
Now it is time to get into some of the ways the SCSI-3 standards are
broken up.
Dont you wish they would come up with just one name for this stuff and
stick with it?
www.sybex.com
12
Chapter 1
Disk Subsystems
Ultra320
Ultra320 SCSI is the one that is not off the drawing board yet, but it is going
to feature data transfer rates up to 320 Mbytes/second. Ultra320 was first
defined in SPI-4.
www.sybex.com
13
If the cable is not Single Ended, it is Differential SCSI. Differential SCSI comes in
Low Voltage Differential or High Voltage Differential, and these devices are not
compatible on the same bus segment without an electronic device such as a SCSI
converter to convert between Single Ended and Differential. With rare exception,
no software (driver) modifications are necessary for conversion between Single
Ended and Differential. There are several variations of terminators developed for
use with Single Ended SCSI and Differential SCSI.
So, what this means to you the server administrator is confusion. See, the
cable that is used for Single Ended SCSI and the cable that is used for Differential SCSI look the same, even though they are electrically different. To
www.sybex.com
14
Chapter 1
Disk Subsystems
make matters worse, both Single Ended and Differential can use each of the
cable types listed in Table 1.1.
TABLE 1.1
Characteristics
Type A cable
Type B cable
Type P cable
Firewire cable
Figure 1.4 shows the different types of cable ends for different types of
SCSI devices. About the only way to tell the difference between Single Ended
Devices and Differential Devices is with the judicious use of a volt/ohm
meter.
www.sybex.com
FIGURE 1.4
15
Connector
www.sybex.com
16
Chapter 1
Disk Subsystems
Speed
Connector
SCSI-1
(AKA 8-bit or Narrow)
5 Mbytes/second
10 Mbytes/second
50-pin high-density,
used for things like
Iomega JAZ drives or
writable CD-ROMs.
Ultra SCSI
(8-bit Narrow)
20 Mbytes/second
50-pin high-density,
used for things like
Iomega JAZ drives or
writable CD-ROMs.
Wide SCSI
(16-bit Wide)
20 Mbytes/second
68-pin high-density,
used with hard disk
drives
40 Mbytes/second
Ultra 2 SCSI
(16-bit Wide)
80 Mbytes/second
68-pin high-density,
used with disk drives
Ultra160 SCSI
(16-bit Wide)
160 Mbytes/second
www.sybex.com
SCSI Termination
17
So, now that you know all about the different types of SCSI, it is time to
ask yourself why it is important. First of all, it is extensible. If you have
worked around networking for any length of time at all, you know that there
is no such thing as too much disk space. If you run out of disk space, it is nice
to know that you can add on another drive, or group of drives, without much
hassle. Cost may be another thing, but without much hassle. There wont be
much hassle as long as you understand termination.
SCSI Termination
long, long time ago, when I first started playing with hardware, the
term SCSI was sometimes enough to bring fear and trepidation into the
hearts of the best of technicians, all because of a couple of small terminating
resistors.
Earlier we mentioned that a SCSI chain has to be terminated at both ends.
That sounds really easy and simple. Sometimes, when you have a combination
of several internal devices connected to several external devices, it is not the
easiest of jobs to locate the end of a chain. In addition, a small resistor that was
plugged into the device terminated some devices, jumpers or DIP switches terminated some devices, and sometimes it was a combination of the two. Some
devices had terminating resistors, which were large and silver and difficult to
lose. So, you always had to remember the basics of SCSI troubleshooting.
Problems are usually caused by termination. When in doubt, break down the
chain and add one device at a time until you find the device that is causing the
problem, or until you get the entire chain working. It could lead to a trying
day. Things have gotten better: Some devices now are self-terminatingthey
just sense if they are at the end of the chain and terminate themselves.
SCSI termination is just the electrical circuitry, which is installed at the end
of a cable that is designed to match impedances for the purpose of preventing
the reflection of electrical signals when they reach the end of the cable. In SCSI,
this is done with a device called a terminator.
When working with any SCSI bus segment, remember there should be
two terminators and only two terminators. Not one, not three, but two
terminators. Also, the terminators must be installed at the very ends of
the SCSI cable, not at devices in the middle of the bus.
www.sybex.com
18
Chapter 1
Disk Subsystems
When you talk about SCSI termination, there are four basic types: Passive,
Active, Force Perfect Termination (FPT), and LVD (including LVD/MSE).
Lets explore them one by one:
Passive The simplest form of termination is referred to as Passive. The
terminator consists of a 220-ohm resistor that goes from the TERMPWR
to the signal line and another 330-ohm resistor that goes from the signal
line to ground. This form of termination does not cost much, but there are
disadvantages. For example, if there is a fluctuation in the TERMPWR
voltage, it will show up on the signal lines of the bus. That may be enough
to cause data errors. If your system is using SCSI-2, it is recommended
that you use Active terminators whenever possible for Single Ended SCSI.
Passive terminators are always used with differential (HVD) SCSI.
Active If the termination is not Passive, it must be taking an Active role.
Active termination is referred to as Alternative 2 in SCSI-2. Active termination was developed because of the problems with Passive termination.
To solve those problems, Active terminators have a voltage regulator.
This regulator serves to reduce the fluctuation effect down to practically
nothing. Active termination uses only a 110-ohm resistor, which is
installed from the regulator to the signal line. This provides a much closer
match to the normal impedance of a SCSI cable. This closer match means
a more stable signal, which creates less signal reflection and thus fewer
data errors.
Force Perfect Termination (FPT)
Although FPT is not recognized in
any of the SCSI specifications, it is a Single Ended termination method
that uses diode switching and biasing to make up for any impedance mismatches that exist between the SCSI cabling and the peripheral device,
whatever it may be. Since FPT is not part of the specifications, it should
not come as a surprise that there are several types of FPT and these different types may not be totally compatible. Also, by and large you can
assume that FPT only works and plays well with FPT.
Low Voltage Differential (LVD)
The terminator for LVD uses a form
of Active termination. This termination enhances the faster speeds and
lower power consumption than HVD. It works with Ultra 2 and Ultra 3
SCSI.
LVD/MSE Finally, there is what is referred to as LVD/MSE. This is
LVD that makes use of multimode transceivers. In the case of LVD/MSE,
www.sybex.com
19
it checks the voltage level appearing on the DIFFSENSE pin of the cable.
By sensing the voltage level, the terminator knows to automatically
configure itself for LVD or for Single Ended. Most new SCSI designs
include these multimode transceivers.
So, now lets see how to put it into action. Take a look at Figure 1.5.
FIGURE 1.5
As you can see, the Host adapter and the last device in the chain are terminated. But what about those things called SCSI IDs?
www.sybex.com
20
Chapter 1
Disk Subsystems
Remember, SCSI IDs must be unique on the chain. You cannot have two
device 3s on the chain.
How do you choose which address to assign to which device? Lets look at an
example. To keep this simple, lets use an old 8-bit bus because then we dont
have so many numbers to work with. Suppose that we have our controller, three
hard drives, and a CD-ROM. If we are using a regular PC SCSI, we have an ID
range of from 0 to 7. Remember, we are geeks, and all geeks start counting at 0.
In this case, the controller would be set to ID 7, because the higher the number,
the higher the priority. As far as all the rest of the devices, it really doesnt matter
as long as the IDs are unique. For simplicity, we would probably address the
hard drives as 0, 1, and 2 and make the CD-ROM device 3. In this chain, there
would be a terminator on the controller and a terminator on the CD-ROM.
Usually, set the slowest device with the highest number, which will give it the
highest priority. Also, start your numbering at 0. When you boot your system,
the SCSI controller will attempt to contact each device in the chain, starting at
the lowest number. If you have numbered everything from 6 down, you are
going to spend a lot of time waiting for the controller to decide that devices 0
and 1 are not on the chain!
So, you know how to identify the device on the SCSI chain by giving it an
address. What if the device performs different functions, and there needs to
be a way to make that happen? That is where the Logical Unit Number
(LUN) comes into play. The LUN is a value that is used to identify a logical
unit of a SCSI device. According to the SCSI-2 specifications, there can be up
to eight logical units for each SCSI device address. These logical units are
numbered from 0 to 7. To give an example of how this might be used, think
of a tape drive that has a tape changer. In that case, the entire assembly may
have a SCSI ID of 0. The tape drive may have a LUN of 0 and the changer
may have a LUN of 1. Therefore, the actual SCSI address of the tape drive
would be ID 0, LUN 0.
www.sybex.com
21
Bus Length
How long can the SCSI chain grow? As I mentioned earlier, it depends on the
level of SCSI you are using. Check out Table 1.3. It should give you a good
idea of the numbers to keep in mind when working with SCSI.
TABLE 1.3
Max
Bus
Length
in
Meters
(HVD)
Maximum
Number of
Devices
Supported
Bus Speed
MB/Sec
Maximum
Bus
Width
in Bits
Max
Bus
Length
in
Meters
(SE)
Narrow
SCSI-1
N/A
25
Narrow
Fast
10
N/A
25
Fast
Wide
20
16
N/A
25
16
Narrow
Ultra
20
1.5
N/A
25
Wide
Ultra
40
16
N/A
N/A
25
16
Wide
Ultra
40
16
N/A
N/A
Narrow
Ultra 2
40
N/A
12
25
Wide
Ultra 2
80
16
N/A
12
25
16
Ultra160
160
16
N/A
12
N/A
16
Ultra320
320
16
N/A
12
N/A
16
SCSI
Type
www.sybex.com
22
Chapter 1
Disk Subsystems
RAID
nother way that SCSI plays an important part for your server is in the
way it can be used to provide redundancy and increased performance. Much
of that is done with a technology called Redundant Array of Independent
Disks (RAID).
www.sybex.com
RAID
23
In every book I have ever written for Sybex, I have mentioned the gee-whiz factor of computers and of networking. The gee-whiz factor works like this: I understand how it works, I know why it works, I even know how to make it work, but
the fact that it works the way it does still amazes me. Now, I admit, I am easily
amused. But when I think about routing, I am truly amazed. When I think about
the elegant simplicity of Domain Name Service (DNS), I am amazed. But I am
really in awe of RAID technology. The upper levels of RAID are seriously impressive. So, this is what we are going to talk about in this section.
Definition of Terms
I know, I know, there is a whole glossary in the back of the book dedicated
to defining terms. I also know that there are terms that I am going to be
throwing out over the next several pages that we should come to some sort
of a common understanding about. Not that you would fail to take the time
to look in the back of the book to see what they meanthat would never
happen.
So, when we start talking about things like RAID, we start using terms
like high availability or fault tolerance. High availability means just what it
sounds like, making sure that the resources your server provides are available a high percentage of the time. Fault tolerance means that if something
breaks, there is something else there to pick up for the broken part, and
things go on as if nothing happened.
Another term we should look at is the phrase single point of failure. A
friend of mine says that you can tell the skill level of a network administrator
by her level of paranoia. The really paranoid ones are the ones who have
been around the block and understand that the question is not if something
is going to go wrong, but when. They also know that no matter how bad they
think it can get, it can get worse. In any computer system, there are components that can go bad. The reliability factor is getting much better, but stuff
still does happen. You are trying to increase your odds, so that when things
do go bad, you are covered. You know that certain components in a system
have a higher chance of failure than others. For example, it is much more
likely that a printer is out of paper or is offline than that the mainboard in
the printer has gone bad. So, by looking at where our single point of failure
is, we are hedging our bets.
Here is a brief example. If I provide a level of disk drive protection called
mirroring, it means that two disks are hooked to a single controller. Everything that is written to one of the disks is written to the other disk. If one of
the disks goes bad, the other disk is there to take over for it, and we have
fault tolerance and higher availability. We have, in effect, moved our single
point of failure from the hard disk back to the disk controller. You can move
Copyright 2001 SYBEX, Inc., Alameda, CA
www.sybex.com
24
Chapter 1
Disk Subsystems
the single point of failure back farther than that, but that would be stealing
my thunder for the section on duplexing.
Next, there is the subject of data striping. With data striping, instead of
taking bits of information and storing it on disk, you are taking bits of information and storing it across several disks. In this way, write heads on several
disks are being utilized and performance increases dramatically. Unfortunately, there is no fault tolerance, so if any one of the disks in the stripe set
goes bad, the entire set is dead in the water. This is not necessarily a good
thing, so there is something called striping with parity.
Finally, we get to the subject of parity. What follows is a highly simplistic
explanation of parity, but it should give you an idea of how it works. First,
take a look at Figure 1.6.
FIGURE 1.6
Disk 1:
30GB
Disk 2:
30GB
Disk 3:
30GB
Disk 4:
30GB
Disk 5:
Parity storage
Assume that each one of the first four disks is 30GB each. The fifth 30GB
drive is not used to store datait is just used to store the mathematical sum
of the information striped across the first four drives.
So, now we are going to save a file called RESUME.DOC to the striped set of
drives with parity. In this case, lets assume that the first block of data can be represented in binary as 1010. That means that a 1 would be written to Drive 1, a
0 written to Drive 2, a 1 written to Drive 3, and a 0 written to Drive 4. Finally,
the sum of 1+0+1+0 or 10 (remember, we are dealing in binary here, and in
binary 2 is represented as 10) would be written to Drive 5. Parity is defined simply as the quality of sameness or being equivalent. With RAID we are using parity not only to check to make sure things are the same, but we are also using it
to rebuild things that may have been damaged. Take a look at Figure 1.7 to see
what I mean.
www.sybex.com
RAID
FIGURE 1.7
25
10
10
Because you have instituted parity, life can go on without anyone being
the wiser. If someone wants to access the file RESUME.DOC, the system recalls
the file and loads the 1+0+1. It knows there is supposed to be something in
place of Disk 4, but since it cant find it, it reads the parity sum of 10 and
knows that all that is missing is another 0. The system can continue functioning until you get another drive installed. Hopefully, there will not be any
more thunderstorms!
So now that we have terms defined, we can talk about RAID.
www.sybex.com
26
Chapter 1
Disk Subsystems
RAID 0
This is disk striping without parity. Of all the RAID technologies, RAID 0 is
the fastest because the write heads are constantly being used with duplicate
data being written, or without any parity being figured. With this system your
server will have multiple disks and the information is striped across the disks
in blocks without parity. There is no fault tolerance in a RAID 0 system.
RAID 1
This level is commonly referred to a disk mirroring, or disk duplexing. In either
case, there are two hard disks involved and anything that is written to one of the
hard disks is written to the other. In the case of disk mirroring, there is just one
disk controller, so the controller is the single point of failure. Disk duplexing
adds a second controller to the second disk, moving the single point of failure
away from the disk subsystem to the mainboard. In RAID 1, if either disk fails,
the other disk takes over. There is no parity or error checking information
stored. If both drives fail, new drives must be installed and data restored from
backup.
The disadvantage of RAID 1 is cost per megabyte. If you have two drives
that have a published capacity of 30GB each, and they are mirrored or
duplexed, the total amount of usable disk space is 30GB, not the 60GB you
purchased. If you are using different-sized drives, the mirror will reflect the
storage capacity of the smallest drive.
RAID 5
In this case, data and parity information is striped at block level across all of
the drives in the chain. Again, RAID 5 takes advantage of the faster disk
reads and writes. The parity information for data on one disk is stored with
data on another disk, so if any one of the disks fails, it can be replaced and
the data can be rebuilt from the parity data stored on the other drives. Again,
it requires a minimum of three drives, but usually five or more disks are used.
The disadvantage here is that the controllers are becoming expensive.
Reasons to Use RAID 5
When you start talking about RAID 5 and higher levels, the hardware
controller can become something of an issue. This can cause the price
point of the implementation to climb. Obviously, you are going to use it
on mission critical servers like these:
Database servers
www.sybex.com
RAID
Intranet servers
27
RAID 0+1
Now we start getting into some of the hybrid approaches. If you look at the name,
and you understand what RAID 0 and what RAID 1 do, you have a pretty good
idea of what RAID 0+1 is. You know that RAID 0 is disk striping without parity.
You know that RAID 1 is mirroring or duplexing of disks. So, RAID 0+1 is where
an entire stripe set without parity is actually mirrored or duplexed. There will be
a giant performance improvement on disk reads, there will be some performance
hits on disk writes. Data will survive the loss of multiple disks, but the monetary
cost can be high.
Software RAID
RAID 0 and RAID 1 are usually defined at the software level. In this case, it is
the server operating system that determines the RAID level and the level of protection. In Windows NT/2000 it can be called Drive Striping, Drive Striping
with Parity, or Mirroring. In NetWare it may be called Mirroring, but the result
is same. Somewhere there is a tool or utility that will allow you to either stripe
a drive and provide parity or mirror the drives.
The advantage of using Software RAID is low cost. There are no special
controllers to buy. The operating system will recognize the drives and provide
the level of protection that you define.
www.sybex.com
28
Chapter 1
Disk Subsystems
Hardware RAID
In some of the more complex implementations of RAID, a special controller or
special disks need to be linked together. When you start mentioning the word
special, the dollar signs usually start to light up. It will be up to the controller
to define the level and type of RAID.
Because you are dealing with hardware rather than software, your
performance will increase.
ou have hot swaps, hot plugs, and hot spares. What in the world is
the difference and how do they work? It is all a matter of degree!
Hot Spare
A drive is considered a hot spare if you happen to have an extra drive sitting on
the shelf that matches the type and configuration of the drives in your server. For
example, if you have a SCSI-2 Ultra, 9GB Seagate on the shelf waiting in case of
emergency, that would be considered a hot spare. When the hot spare gets put
into play, it could be a hot plug or a hot swappable drive.
Here is an example of how a hot spare would be used. Say your server has
RAID 1level mirroring defined. The first drive in the mirrored pair has
failed, for no other reason than drives go bad, and the system has failed over
to the second drive in the mirror. In this case, the system keeps on working
like nothing has happened. You notice the fail over (the fact the first drive
failed and the second took over) and make plans to replace the failed drive
with a hot spare when the server can be taken out of service with a minimum
amount of interruption to the normal workday. When you can down the
server, you shut it off, replace the failed drive with the hot spare, and bring
the server back online. Once the server is online, you can then use the appropriate tool to reestablish the mirror, and the new drive will be mirrored to
match the old.
www.sybex.com
29
Hot Plug
With a hot plug drive, the server does not have to be brought down or taken
out of service to install a new drive. In the case of a hot pluggable drive, you
are not replacing a current drive that has failedyou are adding disk space to
the mix. In the case of a hot pluggable drive, you open a cabinet, plug the drive
into the backplane of the cabinet, and the operating system should recognize
the drive is there. Depending on the operating system, you will have to create
a partition and a volume to make the drive available.
Hot Swap
This is one of those gee whiz things we talked about earlier in the chapter.
I remember the first time I had to hot swap a drive in a RAID array with parity.
When I asked a senior tech how to do it, he smiled and said, Open, pull, push,
watch, and be amazed. I got to the client site with the drive in hand, and went
to the server room. There was a large disk array of seven drives in a cabinet
with a glass door, all sorts of flashing lights next to six of the drives, and a
series of steady red lights next to the drive that had died. It didnt take a rocket
scientist to figure out which drive had failed. So I opened the glass door and
saw the two small rocker arms holding the bad drive in place. I moved those
out of the way, grabbed the handle on the front of the bad drive, pulled, and
the drive came out in my hand. I took the new drive, pushed it gently into the
slot until I felt it lock, and then put the rocker arms back in place. Once that
was done, the lights next to new drive started going crazy, while the drive was
automatically rebuilt from the other drives in the set.
It was seriously cool! No one on the network had any clue that a drive had
ever failed! No data was lost, no time was lost, and the server was never
unavailable.
www.sybex.com
30
Chapter 1
Disk Subsystems
We probably should have gone over this earlier, but we didnt! As you read
through many of these chapters, keep in mind that there are several laws of
network computing that come into play. Some of these are documented,
some are only figments of my imagination, but they are important to remember just the same. Here are some of my favorites: Williamss Law: You can tell
the skill level of a network administrator by his level of paranoia. The really
good ones are really paranoid. Murphys Law: Anything that can go wrong,
will go wrong, at the worst possible moment. Govanuss Law: The chance of
completing any network upgrade successfully is inversely proportional to the
visibility of the project and the proximity of your annual review. If you are
about to undertake a project that will affect everyone on your network, and it
is the night before your annual review, please be sure to be carrying a copy of
your resume on a disk in your pocket. You may not make it back to your desk.
Finally, my favorite, and this one has proven true worldwide: End users lie.
Network administrators are the best end users.
www.sybex.com
Fault Tolerance
31
Fault Tolerance
Fault tolerance is the act of protecting your computing gear, whether that
gear be infrastructure-oriented as in switches and routers or computer-oriented
as in servers and disk farms. In either case the fundamental question you ask
yourself is this: How can I protect the equipment so that a fault of some kind
doesnt interrupt service? Impairment of service might be tolerable: interruption
is not.
We talk about uptime of devices and services in terms of 9s. We assume
that you want to keep your gear up 99% of the timethats a given. But as
we add 9s to the other side of the decimal point, the time that a device is
allowed to be down, including maintenance windows, becomes increasingly
smaller. Five nines uptime equates to an allowance of about 4 hours
downtime per year, including maintenance windows. Your goal with fault
tolerance methodologies is to increase the number of 9s that are on the right
side of the decimal point. Five nines is optimal, but not realistic in most situationsfour nines is a better goal. Well talk about how to realize these
goals in this chapter section.
Configuring RAID
One thing you can do is use RAID to help augment your system uptime.
Either RAID 1 (disk mirroring) or RAID 5 (disk striping with parity) will be
beneficial to you in terms of bringing fault tolerance to your servers.
Some network operating system software allows you to set up RAID configurations without having to purchase special hardware RAID array controller cards (theyre expensive). I have worked with software RAID and dont
think it works very well. I much prefer hardware solutions. For starters the
card has its own processor and memory and can really go a long way in offloading the central CPU from having so much work to do. With software
RAID the CPU handles everything. Also, the software solution seems to not be
as reliable as the hardware-based solutionthough it may have been my fault
configuring the software rather than how the software behaved. Whatever the
reason, Im saying that when you consider RAID implementations, you should
pay the extra $2K or so and get the RAID controller card with the system.
Another important point about hardware RAID is that there is always
some data in the cards memory. If you had an ungraceful shutdown on the
server while there was some data in that card, it would be lost. Thus its
important to purchase your RAID array controller cards with a battery
www.sybex.com
32
Chapter 1
Disk Subsystems
backup so that in the event an instantaneous down happens to the server, the
data will be safe for a time until you can bring the server back up. Keep in
mind the data is being held there by a battery, so you dont have days or anything like that, but you do have some cushion you can work with.
Youll usually opt for either a mirroring or a striping-with-parity scenario
for a given set of drives. You can have both kinds in your system without
encountering any difficulty at all. As a general rule of thumb, you usually
want your OS to be on a mirrored set of disks while your data will live on a
RAID 5 volume. Some NOS software wont work on a RAID 5 volume at all.
Youll typically configure the RAID volumes through either a BIOS
interface at the cards boot time or through a configuration CD that
comes with the server. HP, for example, includes a wizard-like interface
that you can use to configure the entire box, including the RAID array.
Watch the BIOS messages at boot time and youll be given the key
sequence to enter so that you can access the cards BIOS.
Theres also the concept of a RAID 10 where you configure two separate
drive cages with RAID 5 arrays and then mirror the arrays. Youve got
double fault tolerance because if the first array has two drive failures, you
can break the mirror and work on the second drive array until you get the
first one fixed.
Realize that just because the systems on RAID doesnt necessarily mean
itll never have to be taken down. RAID helps safeguard systems so that they
can keep working until users go home and you have a chance to down the
computer and make repairs after hours. You want to avoid downing servers
during working hours.
www.sybex.com
Fault Tolerance
33
want to configure it. Keep this in mind as you add disks to the system. You
cannot add a hard drive that is smaller than the current array is expecting
and be able to configure a volume. You must provide as large a disk or larger
in order to facilitate the addition. If you have some left over, its up to you
to configure the extra space as you see fit.
Lastly, remember the n-1 rule with RAID 5. You take the number of disks
youre going to dedicate to the RAID 5 array and subtract 1 from that number
to account for the space needed for the parity stripe. Thus if you have six
17GB hard drives youre putting in an array, youll really only wind up with
5 * 17GBs worth of data because you sacrifice one disks worth of space for the
parity stripe. Actually the stripe is usually sent across all the disks so youre really
not dedicating one disk to parity stripe, though there are RAID implementations
that will allow you to do such a thing. With RAID 5 then, more disks means that
you attain more actual disk storage space and dont sacrifice as much space to
parity striping. More is more in the case of RAID 5.
www.sybex.com
34
Chapter 1
Disk Subsystems
www.sybex.com
Fault Tolerance
35
Planning for fault tolerance is all about redundancy. You should consider
applying redundancy in any of your mission-critical servers. A little bit of
money spent now can save countless hours of downtime later on.
www.sybex.com
36
Chapter 1
Disk Subsystems
Theres one other technique thats often useda hot spare. In a hot spare
situation, you keep a spare drive in the computers drive bay. You configure
the RAID array controller to treat the drive as a spare. When data is written
to the stripe, the drive is included as a backup drive. If one of the main drives
in the array fails, you can utilize the hot spare to act as a fallback. Hot spares
are handy because you simply have to go into the RAID configuration utility
and tell it to begin using the hot spare. The downside is that you burn a hard
drive you wouldnt ordinarily have to use.
All of the above systems provide high-availability scenarios in the case of
a single drive failure. Keep in mind that two or more drives failing means the
end of one array.
One thing that should be obvious from looking at the above list is that you
cannot make DR decisions alone. Clearly youll need to solicit the advice and
interaction of others in order to facilitate a robust DR plan.
www.sybex.com
Fault Tolerance
37
Remember the basic concepts of DR: fault tolerance, the ability to gracefully recover from a fault, and redundancy. If, for example, your business
runs entirely off of Web activity, then your Web servers are of paramount
importance to you. So much so that you cannot afford for them to go down.
In such a case, a DR plan might include the following components:
Clustered computers that can allow for the failure of any one server
Hopefully you get the idea. DR means that you provide an offsite place
where a redundant copy of your operation can live in case the first instance of
your operation somehow gets annihilated. Redundancy means that you build
fault tolerance into the feature set so that you avoid annoying little failures that
have the capability of driving the entire enterprise to its knees. You put this all
down in writing in a DR plan and then you periodically test the plan to make
sure it works for todays operations.
www.sybex.com
38
Chapter 1
Disk Subsystems
Summary
o, what we have done here is give you some protection against Murphys Law, and a way to prove that you match Williamss definition of a
really good network administrator. There is more to be done on this front,
but that about takes care of the disk subsystem. First we are going to do some
review, and then in Chapter 2, IDE Devices, we will be looking at clustering, Fibre Channels, CPUs, and multiprocessing.
We also talked about fault tolerance and all of its nuances. There is one
basic notion that comes into play when we think about fault tolerance:
redundancy. The acronym RAID, for example, stands for Redundant
Array of Inexpensive (or Independent) Drives. You use redundancy to
build in high-availability. A hot spare drive is one that sits in the drive cage
and can be put into play by tweaking the RAID utility. Hot swap capability
means you can change out a hard drive without any interruption to users.
Warm swap means you can change out the drive in an array, but you have
to disrupt I/O requests long enough to get the drive replaced. You avoid the
www.sybex.com
Summary
39
Exam Essentials
Know the difference between logical drive and physical drive A physical drive can contain multiple logical drives but a logical drive will usually reside on one physical drive.
Know the different levels of raid, and what makes each level unique
RAID 0 is disk striping without parity, RAID 1 is disk mirroring or
duplexing, RAID 5 has data and parity information striped at the block
level across the drives, and RAID 0+1 is where a disk array that has been
striped without parity is also duplexed or mirrored.
Know which levels of scsi can interoperate without an adapter and which
levels will require an adapter SCSI, SCSI-2, and Ultra SCSI all use a
50-pin connector that is interchangeable. Wide SCSI, Wide Ultra SCSI,
Ultra 2, and Ultra 160 use a 68-pin connector.
Know the appropriate length of the various scsi cables SCSI is 6
meters, Fast SCSI is 3 meters, and Ultra SCSI is 1.5 meters with more than
five devices. If there are less than five devices, then the cable can also be
3 meters in length.
Be comfortable with the differences between hot plug, hot spare, and hot
swap. A hot spare is a device that is waiting to be put into the machine.
The other two choices are very close in meaning: A hot pluggable device
is one that can be installed while the computer or server is turned on, and
a hot swappable device is one where the device can be removed and
replaced and the server will experience no loss of service. For example, a
single network card can be hot pluggable. Drives in a RAID 5 array can
be hot swappable. If one of the drives fails, it can be removed and
replaced, and the data can be rebuilt on the fly without any loss of service.
Know how to configure drives. Be able to add or change drives in an
array and configure accordingly.
www.sybex.com
40
Chapter 1
Disk Subsystems
Key Terms
Before you take the exam, be certain you are familiar with the following terms:
Active
American National Standards Institute (ANSI)
asynchronous mode
data striping
disk duplexing
Domain Name Service (DNS)
Fast SCSI
Fast-Wide SCSI
fault tolerance
Force Perfect Termination (FPT)
high availability
High Voltage Differential (HVD)
hot spare
jumpers
Logical Drive
Low Voltage Differential (LVD)
LVD/MSE
Mega Transfer (MT)
mirroring
parity
Passive
Physical Drive
RAID 0
RAID 0+1
RAID 1
RAID 5
www.sybex.com
Summary
www.sybex.com
41
42
Chapter 1
Disk Subsystems
Review Questions
1. What is the width of the data transfer bus of SCSI-1?
A. A nibble
B. 4 bytes
C. 8 bytes
D. 8 bits
E. 16 bits
2. SCSI-1 is also referred to as which of the following?
A. Narrow
B. Slow
C. Fast
D. Wide
E. Ultra
F. Ultra 2
G. Narrow, Fast, and Wide
3. Choose one type of connector used in SCSI-1.
A. 9-pin serial
B. 15-pin serial
C. 25-pin Centronics
D. 50-pin Centronics
4. RAID stands for which of the following:
A. Redoubtful Array of Inexpensive Diskettes
B. Redundant Array of Inexpensive Disks
C. Redundant Array of Independent Disks
D. A SWAT team action
www.sybex.com
Review Questions
43
hard drive in one of the Web servers fails. The server is running hardware
SCSI-based RAID. What kind of drive changeout can Horace most likely
perform?
A. Cold swap
B. Warm swap
C. Hot swap
D. Hot spare
7. Ultra and Ultra 2 are examples of which of the following:
A. RAID 10
B. SCSI Bus Width
C. Physical Drives
D. SCSI Bus Speed
8. With LVD SCSI, how many wires will be dedicated to carrying the signal
www.sybex.com
44
Chapter 1
Disk Subsystems
your server. You still need to keep a device that works with normal
SCSI. Is it possible to run the SCSI device from the SCSI-2 controller?
A. No, SCSI-2 is not backwardly compatible to SCSI.
B. No, SCSI is Single Ended, and all SCSI-2 is HVD.
C. Yes, SCSI-2 is backwardly compatible with SCSI.
D. Check proper termination.
11. What is the maximum number of devices that can be part of a SCSI-3 bus?
A. 16 devices
B. 8 devices
C. 7 devices
D. 14 devices
E. 15 devices
12. What is another name for SCSI Ultra?
A. SCSI Wide
B. SCSI Fast and Wide
C. SCSI 20
D. SCSI 40
E. SCSI Fast 20
www.sybex.com
Review Questions
45
wires to carry it. One wire will carry the signal and the other wire
will carry a defining voltage.
C. For any signal that is going to be sent across the bus, there are two
wires to carry it. One wire will carry the signal and the other will
be ground.
D. For any signal that is going to be sent across the bus, there are two
www.sybex.com
46
Chapter 1
Disk Subsystems
17. You have a SCSI controller in your server and now you wish to add
with mirroring?
A. RAID 1+5
B. Hybrid RAID 5+
C. High Performance RAID
D. RAID 0+1
19. Which of the following SCSI standards can use a 68-pin connector and
www.sybex.com
Review Questions
47
20. Your boss has asked you to implement Hardware Level RAID because
performance.
B. Software Level RAID is less expensive but provides better performance
www.sybex.com
48
Chapter 1
Disk Subsystems
swap. If Horace has an extra drive sitting around (one that has the slide
rails used for his computers drive cage), all he has to do is pop the old
drive out, put the new one in, and the RAID controller should automatically take over. Some older controllers require you to manually begin
the array rebuild.
7. D. Ultra and Ultra 2 are examples of Bus Speed.
8. C. With Low Voltage Differential, any signal that is going to be sent
wires to carry it. One wire will carry the signal the other wire will be
attached to ground.
14. D. With RAID 3, the data is striped in bytes.
www.sybex.com
49
15. E. RAID 5 data is striped at block level across all of the drives in the
chain.
16. A. Whether a drive is hot swappable has nothing to do with its status
as a hot spare.
17. B. SCSI-2 was backward compatible with SCSI, but for maximum
benefit, it was suggested that you stick with one technology or the
other, preferably using a SCSI-2 controller with SCSI-2 devices.
SCSI, SCSI-2, and Ultra SCSI all use a 50-pin connector that is
interchangeable.
18. D. RAID 0+1 is a hybrid approach where an entire stripe set without
68-pin connector.
20. A, C. Hardware RAID costs more because of the special controller
www.sybex.com
Chapter
IDE Devices
SERVER+ EXAM OBJECTIVES COVERED IN
THIS CHAPTER:
3.3 Add hard drives.
www.sybex.com
t wasnt that long ago that SCSI drives were selling for about
$1,000 a gigabyte and memory was selling for $100 a megabyte. Maybe it
wasnt that long ago by the calendar, but in computer terms, it was eons
ago. In the late 1980s, Integrated Drive Electronics (IDE) drives were introduced as a lower-price-point alternative to SCSI drives, or some of the
other high-priced, low-performance alternatives. Since the 80s IDE drives
have come a long way, to the point where they are being shipped in an estimated 90% of all systems sold. Lets take an in-depth look at the history
of IDE drives, how they have overcome some of the barrier limitations
imposed by the technology, and where IDE technology is today. We can
then take a look at the types of cabling and connectors required to install
IDE devices, and some of the differences between IDE and SCSI.
For complete coverage of objective 3.3, please also see Chapter 1. For complete
coverage of objective 3.6, please also see Chapters 1 and 10.
s you remember from taking the A+ exam, disk subsystems are made
up of the hard disk, the cabling, and the disk controller. Last chapter, in our
discussion of SCSI, you saw how the controller had to be matched to the type
of SCSI technology, and how the controller played an active part in moving
data and instructions. Disk controllers can be integrated into the mainboard,
or they can be on a board that plugs directly into the mainboard. Sometimes
these are called controllers, but you may also see the terms paddle cards or
even paddleboards.
www.sybex.com
53
Like many of the computer industry acronyms, IDE has picked up several
definitions. Depending on the book you read, it may be Integrated Device
Electronics, or it may be referred to as Integrated Drive Electronics. This falls
under the tomato (toe-may-toe)/tomato (toe-mah-toe) argument; it really
doesnt matter much where the acronym came from as long as you know
what it is referring to and the darn things work.
Since the drive was controlled by electronics on the drive, the drive
manufacturers could encourage enhancements, because there were no
pesky controller compatibility issues to contend with. Each manufacturer
was free to include some new techniques that would increase capacity,
speed, and the average time that the drive could operate without failure,
called the Mean Time Between Failure (MTBF). Some of these advances
included error checking, or the ability to automatically move contents
from blocks that were failing to blocks that were specifically set aside for
the purpose, or generating higher disk rotation speeds to ensure faster
data access, and even giving the user the opportunity to re-map the drive
geometry if desired. Lets take a look at the history of IDE to track where
it has been until today.
IDE hard drives, but those are by no means the only devices that take advantage of IDE technology. There are also things like IDE tape devices and IDE CDROMs.
www.sybex.com
54
Chapter 2
IDE Devices
As we mentioned above, IDE was originally designed so the disk controller was integrated into the drive itself. This meant that the drive no longer
had to rely on a stand-alone controller board for instructions as all of the
other types of drives did. This integration brought the cost down. It also
made the drives firmware implementations easier to manage for the manufacturer. This meant you had a device that didnt cost very much, and was
exceptionally easy to install. People loved it and the boom of the disk drive
industry was on.
ATA History
When ATA was introduced in the late 80s, it was a hard drive only type of
technology. At the time the ATA standard was approved, applications and
operating systems came on diskettes and only the real computer aficionado
had a CD-ROM device. Most CD-ROMs at the time were SCSI based and
expensive. Since there werent many, if any, things being distributed on CDs,
the CD-ROM was not a necessity for most folks.
As applications and operating systems grew, diskette distribution
became unwieldy, not to mention expensive. There had to be a better
way, and that better way was to distribute software on CDs. After all,
CDs were very inexpensive and could hold almost 700MB of data. CDs
were relatively impervious to end users. For an end user to do something
to damage a CD, they had to work pretty hard.
Now it became imperative that a reliable, low cost method be made available to distribute CD-ROM drives to the masses. The designers of the ATA
specifications suddenly needed to come up with a way to attach things like the
CD and the various tape drives or other storage devices on the existing disk
subsystem. Using the same ATA controller card to manage two devices would
be infinitely more viable than having to put yet another controller card in an
already crowded computer bus. So, the designers came up with something
called the ATA Packet Interface (ATAPI). ATAPI is a fancy name for an extension of the ATA interface. The extension is designed to allow several other
types of devices to plug into an everyday, ordinary old ATA 40-pin cable.
There are some differences in the way ATA supports hard drives and the way
it supports other devices. The hard drives receive support through the system
BIOS. It is up to the BIOS to define the geometry of the drive. These other devices
required a special device driver to support them. So, for example, if you had
installed an early version of the SuperWhizBang 8 X CD-ROM, you would originally need a driver from SuperWhizBang so the system would recognize the fact
that the drive was there. Back in the old DOS days, this required editing the
AUTOEXEC.BAT and CONFIG.SYS files to make sure everything worked just the
www.sybex.com
55
way it was supposed to. Depending on the operating system you are using, there
may still need to be some manual configuration of devices.
The standards continued to mature, and CD-ROM manufacturers started
working together to provide support for ATAPI. As ATAPI drives became
more standardized, operating systems, and in many cases the BIOS, were
able to recognize the CD-ROM. If the O/S or the BIOS could recognize the
drive, it could immediately load the driver, and if the BIOS can recognize the
CD-ROM, the CD can even be used as a bootable device. This eventually led
to some new advances that we take for granted today, with things like CDROMs that will autorun programs to start installations.
Back to the good-ol-days. When CD-ROMs became viable, it brought up
another shortcoming of the early ATA standard: That was the number of
devices you could have in an ATA chain. With the early drives, you could have
a maximum of two drives connected to a paddleboard and there could only be
one paddleboard in the computer. As you will see, the later implementations
of the standard increased the number of ATA channels in any machine to two,
so you can now have up to four ATA devices in a system. We will discuss how
to configure those four devices a little later in the chapter, in the section on
master/slave/cable select.
Rate
3.3 MBytes/sec
5.2 MBytes/sec
8.3 MBytes/sec
www.sybex.com
56
Chapter 2
IDE Devices
TABLE 2.1
Rate
11.1 MBytes/sec
16.6 MBytes/sec
As the need for speed increased, the PIO standard couldnt keep pace. That
was when DMA came into being. Instead of the device sending information
through the processor, now the information was written directly to memory.
Because the information is written directly to memory, the Central Processing
Unit (CPU) doesnt have to do anything with it, so the overall performance of
the computer is increased. DMA and Ultra DMA can increase processing
speeds to 100 MBytes/second, but we are getting ahead of ourselves.
Back to ATA 2. In addition to the different methods of handling data,
there were many other under-the-hood kinds of things that the average user
probably wouldnt be aware of. These included things like some powerful
drive commands, like the Identify Drive command. This command was a
godsend to technicians everywhere. Prior to the standardization of the
Identify Drive command, the technician who installed the drive had to
know some exact information on the way the drive was configured. That
usually wasnt a problem if it was the original installation of the drive and
you had all the documentation right there, but if the drive were ever
moved, or pulled out of one machine to be used in another, the configuration information tended to get lost. (Not that something like that would
ever happen to menope, never happen, because I always write the drive
specifications on the outside of the drive with a permanent marker. And if
you believe that, let me know, I have a great bridge to sell you just outside
of McCausland, Iowa.) Then you had to search for the documentation in
your exceptional filing system or call the manufacturer.
Anyway, that problem went away with the updated drives and updated
BIOS. If the drive was an ATA 2 device, when the drive was installed in a
computer, you simply had to install the drive and turn the computer on.
The BIOS would go out and discover the drive automatically. The drive
tells the BIOS how it is built and then the BIOS makes sure the rest of the
computer knows how to address the drive and how much viable space there
is. It is a wonderful thing. It is really one of the first instances of Plug and
Play, only this installation happened well before the operating system even
started to load.
www.sybex.com
57
Another advance was the way the drives handled the data transfer. Instead
of moving the information bit by bit, or even byte by byte, ATA 2 began to
allow block data transfers, called block transfer mode. Think of it this way:
Imagine you have just gotten back from the grocery store after buying one
months worth of groceries for a family of four. Further imagine that all you
could carry into the house was one item at a time. That would take you a really
long time to get everything into the house. That is the way it was before block
transfer mode came into play. Now, with block transfer mode, compare how
much more efficient it is to carry the groceries in one or two sacks at a time.
It may still take you a while to move all the stuff into the house, but not as long
as the other way. Block transfer mode just moved more information in a single
operation.
These block transfers were made possible by a new way of defining and
addressing the sectors on the hard drive. This was done using a process called
Logical Block Addressing (LBA). LBA had an additional benefit, because it
managed to overcome the early IDE size limit of 528MB.
ATA 2 maintained its backward compatibility with ATA drives. It used
the same 40-pin physical connector used by ATA, and an ATA 2 drive could
be used in conjunction with an ATA drive.
There are some other ways that ATA 2 may be described. For example,
you will hear terms like Enhanced IDE (EIDE) or Fast-ATA. Each of these
is not a standard, but just a different implementation of the ATA 2 standard.
EIDE, which started out as a particular manufacturers implementation, has
become so popular that EIDE has become more or less a generic term.
ATA 2 also introduced the capability of having two channels of two
devices per paddleboard. This meant that the total number of IDE devices
that were possible in a system had climbed to four. The channels were
referred to as the primary channel and the secondary channel.
ATA 3
The next standard is ATA 3. ATA 3 does not do anything for the faster transfer modes, but it does provide for password-based security and better power
management. It also has a technology called Self-Monitoring Analysis and
Report Technology (SMART). SMART will tell you when a drive is going
bad before it exhibits any symptoms that you may be aware of.
If you sometimes wonder why your computer takes a long time to respond
after you have let it sit for a while, ATA 2 may be part of the reason. You see,
it also added some sophisticated power management features that would put
the drive to sleep after it hadnt had anything to do for a while. ATA 3 is also
backwardly compatible with ATA 2, ATAPI, and ATA devices. You may also
www.sybex.com
58
Chapter 2
IDE Devices
see the term EIDE applied to ATA 3 devices, since there has been no significant
improvement in data transfer.
The system has excessive signal noise caused by multiple drives, a dual
power supply, or even an integrated Cathode Ray Tube (CRT).
The system has been put in overclocking mode, or has been set beyond
the manufacturers specifications.
ATA 66
Well, if ATA 33 moved data at 33 MBytes/second DMA, you will never guess
what rate ATA 66 moves data. You got it. It uses even faster high-performance
bus mastering for a 66 MBytes/seconds DMA data transfer rate. This can also
be called Ultra DMA-66 or just UDMA-66.
If you are going to install an ATA 66 drive, you will need the appropriate
drive, controller, and BIOS. Again, it is fully backwardly compatible with the
previous ATA standards, but the cabling has changed. The change was necessary because the transfer rates became so high that there needed to be more
protection against things like crosstalk and electromagnetic interference
www.sybex.com
59
Make sure you have the right cable. You can tell you are using a
40-pin/80-conductor cable because it will have a black connector
on one end and a blue connector on the other end, with a gray
connector in the middle. The blue connector goes to the motherboard, the gray connector is for the slave device, and the black
connector is for the master drive. In addition, the cable has something you probably wont be able to see: Pin 34 should be notched
or cut. The reason will become plain in the next bullet.
The motherboard or mainboard controller must be capable of supporting the ATA 66 standard. A compatible controller has a detect circuit that can recognize the fact that line 34 is not present on the cable.
If the detect circuit is missing, the motherboard may be able to detect
the presence of an ATA 66 cable, but may try to configure the device
for a higher transfer rate.
Some controllers may not be able to handle the ATA 66 on both the
primary and secondary channels. If you are having problems installing
the device on the secondary controller channel, you may want to move
it to the primary channel and see if that solves the problem.
Make sure you have the right controller card driver. Make sure the
BIOS is upgraded, and any patches that need to be applied to the
motherboard have been taken care of.
Be sure you are using a DMA-capable operating system and that the
DMA mode has been activated.
Make sure the drive has been configured to run at ATA 66 transfer
rates. Some drives ship with the higher transfer rate disabled by
default; enabling the higher transfer rate is done with either a jumper
switch or with a software setting.
www.sybex.com
60
Chapter 2
IDE Devices
ATA 100
The most recent advance in the world of ATA/IDE is the release of the ATA
100 interface. As you can tell from the name, the ATA 100 specifications
allow for the transfer of data at a rate of 100 MBytes/second. This is the
transfer from the host-to-drive bus. The new interface does maintain some of
its history, using the same 40-pin, 80-conductor cable as the ATA 66. This
means that like all the other devices we have talked about so far, the ATA
100 cable can be used with other, slower drives. These can include things like
hard disks, removable media disks, CD-ROM drives, CD-R/RW drives,
ATA tape drives, and DVD-ROM drives.
There are other advances made with ATA 100. One is something that has
been around the computer world for a while: Cyclic Redundancy Check
(CRC). The CRC is a very-high-level method of checking to make sure the
transferred data actually made it through the transfer process without
becoming corrupted. It is just a data reliability check.
It works like this. When the device that is transferring the data gets ready to
send it, it attaches an extra set of bits to every frame of data. These extra bits are
called the Frame Check Sequence (FCS), which acts as a type of verification that
is attached to each frame. When the frame is received, the receiver does the math
and checks to make sure the answer is what it expects. If it does, all is good. If
it doesnt, the frame has been corrupted and it needs to be retransmitted.
Lets look at a really simple example. Remember when you were kids and
had those really cheesy secret decoder rings that came in cereal boxes? That
way you could send messages to your friends, and if the teacher intercepted
them, she couldnt read them out loud. Well, the basis of that was usually
some kind of mathematical formula. We will assume that the sender is going
to multiply everything by 3 and that the receiver knows that. So, we take a
look at a simple four-bit frame:
1101
Now, since we are working with a frame, that is a binary number, not
a decimal number, so 1101 translated from binary to decimal is 13. Since
we agreed we are going to multiply everything by 3, our 13 becomes 39.
Converting that to binary, we have this result:
100111
Now, we are going to make another assumption, and we are going to
assume that our packet is made up of two parts; the first contains the answer,
and the second part contains a sequence of three sets of 10 and then the data.
www.sybex.com
61
www.sybex.com
62
Chapter 2
IDE Devices
This group is shooting for a new interface that will increase throughput to at
least 160 MBytes/second, with later versions reaching 528 MBytes/second. In
order to do this, the cable design is going to have to be radically altered. Instead
of the current 40/80 cable that allows for only four attachments, the new cable
will be much smaller, with only four signal pins and a few more pins for power
and electrical ground. What is this going to do to the current technology?
According to the Frequently Asked Questions (FAQ) at the Serial ATA
Working Groups Web site (www.serialata.org), the new implementation is
going to be designed so that it will drop into a PC and be compatible with the
software, meaning it will run without modification to your current computer
(other than the appropriate controller and devices). Since the cable will be
smaller, they will be easier to route and easier to install.
What about all your old stuff? It is anticipated that there will be a period
where both the old parallel standard and the new serial standard are available.
Now, this could cause a problem. Since both types of devices are going to show
up in the same machine, and since each will have its own interface, the Serial
ATA group expects that there are going to be some adapters to adapt the serial
cable to be able to handle the old 40/80 devices.
Serial ATA is going to support all the normal ATA and ATAPI devices,
including CDs, DVDs, tape devices, high capacity removable devices, and
Zip drives. One of the other goals is to make the devices easier to upgrade,
because the Serial ATA group is planning on eliminating jumper settings for
defining the devices role.
For more information on jumper settings and drive roles, see Master/Slave/
Cable Select and Jumper Settings later in this chapter.
www.sybex.com
63
Now if you look closely, you can notice several things. The first is the
thickness of the conductor channel. With the 40-pin connector, the channel
is much thicker than it is with the 40/80 connector.
FIGURE 2.1
ATA/33 cable
40 conductors
ATA/66 cable
80 conductors
The next thing I would like you to notice is that there is a dark line down
the right side of each cable. This line indicates the location of Pin 1. That will
become important in just a few seconds. Each of these cables, although you
cannot see it, has two other similar connectors on it. One of those connectors
would attach to the controller and the second connector would attach to
another ATA device.
You may be asking yourself why there is only one extra connector. Remember
that with IDE, unlike SCSI, there can only be two devices in a chain; SCSI can
have seven. Depending on the IDE controller, there can be up to two IDE chains
in any computer, for a total of four devices. Also, SCSI can handle external
devices, while ATA cannot.
Lets talk about installation. First of all, take all the usual precautions.
Turn the computer off, and unplug it. Always work with an antistatic mat
and an antistatic wrist strap. The antistatic mat is made of a conductive
material that is set on the top of your worktable, and then the computer or
other component is set on the mat. When the antistatic wrist strap is fastened
to the mat, the electrostatic charge level of anything placed on the mat will
www.sybex.com
64
Chapter 2
IDE Devices
become equalized with the charge level of the mat, and these will become
equalized with the charge level of your body. After the charges have been
equalized, electrostatic discharge (ESD) sparks will not occur. Now, lets
assume that you are installing a device that has the controller for both channels built right into the motherboard. We will also assume that you have
already mounted the device in the case. The first thing you have to do is
attach the cabling to the motherboard. Remember that colored stripethis
is where it comes into play. Since we are going to be adding another device
to the system (yes, this is another assumption), you locate the connector for
the second IDE channel. It should be marked on the motherboard with something really creative like IDE-2. Then, looking very carefully at the motherboard, you will see a small 1 near the end of one of the connectors. That
shows you where Pin 1 is on the motherboard. Now, Pin 1 on the motherboard has to match Pin 1 on the cable or things just will not work. Once you
have located Pin 1 on the motherboard, carefully line up the holes on the
connector with the pins on the motherboard, keeping the 1s together. Push
down gently until the cable is snug to the motherboard.
Here are a couple of tips. First off all, be careful to make sure that the pins are
all lined up with the holes on the connector before pressing down too hard. If
you should happen to bend or break one of the pins, it will probably ruin your
day. That is especially true if the controller is embedded in the motherboard.
That would mean replacing the motherboard, usually an expensive proposition. Secondly, once the cable is firmly attached to the mainboard, take a permanent marker and mark the channel in big bold numbers, so the next time
you have to add something to the IDE chain, you can immediately know which
channel you are dealing with. The channel information is silkscreened on the
motherboard, but I usually need a flashlight and a magnifying glass to read it.
This way is just simpler.
Once the cable is attached to the motherboard, you can attach the cable
to the device you are going to install. Again, check to find Pin 1. If you cant
find Pin 1, look closely at the male connectors on the drive. There will usually be either a space without a pin, or there will be a notch in the plastic connector sleeve. Check the end of the cable, and you may see one of the
pinholes blocked, and you may also see a notch on the cable. Line those up,
plug the cable in, and seat it firmly. Plug the power from the power supply
into the device and you should be ready to power up the computer. The
ATA-66 cable is keyed. Remember the blue keyed end attaches to the
motherboard. If the standard ATA cable is installed in Reverse Pin 1 to Pin
40, the hard drive LED will stay on continuously.
Copyright 2001 SYBEX, Inc., Alameda, CA
www.sybex.com
65
How do you know if it is there? Well, depending on the computer you are
using, watch what happens when the system boots. Some BIOS implementations will show you the devices they find as they go through Power On Self
Test (POST). Otherwise, you may have to access the BIOS to see if the device
has been recognized, or, depending on the operating system, the new device
may be visible through something like Windows Explorer.
ll through this chapter, we have been mentioning the fact that there
can be two devices, and only two devices, in an ATA subsystem. When you
start examining the advantages and disadvantages of IDE versus SCSI, that
is just one of the areas where IDE falls short. The other area is in the way the
two devices are linked together.
As you know by now, IDE stands for Integrated Drive Electronics. All of the
drives intelligence is on board every single drive. That is a great thing if you
have only one drive on the subsystem, but when there are two drives hooked
together and both want to be the brains of the operation, things dont work well.
With IDE devices, you have to relegate one of the drives from being the brains
of the operation to being the go-fer. It is called designating one of the drives to
being the master, and one of the drives to be the slave.
So, there are two ways a single channel of IDE components can be strung
together. Take a look at Figure 2.2.
www.sybex.com
66
Chapter 2
IDE Devices
FIGURE 2.2
www.sybex.com
67
As you can see, in the top part of the diagram there is a single drive
attached to the IDE host adapter. In the bottom part of the drawing, there
are two devices taking orders from the same host adapter.
Defining the master and the slave is done with jumpers. Now, there are
three possible settings:
Jumper Settings
Figure 2.3 shows what the business end of an ATA device looks like. If you
look closely at the picture, you will see that there are three sets of pins circled.
FIGURE 2.3
You will also notice that there is a small piece of plastic covering two of the
pins. This very small but very powerful tool is called a jumper. You see, each
set of pins represents a channel that the information signal can take from the
controller to the electronics on the drive. The presence or lack thereof of the
jumper completes a circuit that defines the path the electrical impulses will
take. For example, if there were no jumpers present, the information would
follow the path so the drive would be configured as a master, with no slave
device present. Look closely at Figure 2.4 to see the different types of settings.
www.sybex.com
68
Chapter 2
IDE Devices
FIGURE 2.4
In Figure 2.4, the master slave selection switch is designated as J8. If there
were no jumpers present, the drive would be configured as a master, with no
slave device present. Having a jumper covering Pins 3 and 4 of Switch J8 may
designate the drive as being the master with a slave present. The other drive in
the chain would then have to have a jumper covering Pins 5 and 6, indicating
that it would be the slave device, taking all of its instructions from the master.
Now it would be a wonderful thing if I could tell you that each set of pins
for the master/slave relationship was labeled J8, and that in each and every
case, no jumpers indicated master, jumpers across 1 and 2 indicated master
with slave present, and jumpers across 3 and 4 indicated slave with master
present. It would be a wonderful thing, but it would not be the real world.
Now, while it is generally true that the absence of a jumper usually indicates
a master with no slave present, in the real world, things just may not be what
they seem. When you are configuring any ATA devices, be sure to check the
Copyright 2001 SYBEX, Inc., Alameda, CA
www.sybex.com
69
appropriate documentation. If you cant find it, check the Web. Be sure to
check the documentation before you start removing jumpers and putting
jumpers back on again. Trust me, it will make your whole life a lot easier.
If you have installed multiple ATA devices, and one of them is recognized by the
system and the other isnt, or if neither of them is recognized by the system, shut
the machine off and start over. Your jumpers are in the wrong place. If you get
things really flummoxed, you may want to go back to the beginningin other
words, install the first device as a master with no slave. Check to make sure it is
recognized. Remove the first device, and install the second device as a master
with no slave; check to make sure that it is recognized. Once that has been done,
you know both your devices are good. Then configure one as the master and the
other as the slave and install them. Check to make sure they are both recognized.
If not, check to make sure the cable is tight. If the cable is tight and one (or both)
of the devices is still not being recognized, and you are absolutely positively certain the jumpers are 100% correct, replace the cable. Make sure you replace the
cable with the right type cable for the most advanced type of ATA device in the
chain. In other words, if you have an ATA 66 device in the chain, you should be
using a 40/80 cable. In this scenario, the potential problem areas are the jumper
settings and the cable. As a last resort, replace the jumpers. Sometimes they lose
the metal sleeve that covers one of the pins, and contact is not made.
Cable Select
Now, if you have been really sharp, you will have noticed that there were three
sets of pins shown in Figure 2.3, and up until now, only two sets of those pins
had a reason to be jumpered. The third set is for cable select (CSEL), which
does just what it says, it lets the controller decide which drive will be the master
and which drive will be the slave. CSEL is one of those features of the ATA
specifications that have been around for a while, but you may have never had
an opportunity to work with it. There were some problems with the original
specifications. Look at Figure 2.5, which shows that CSEL has one drive
added, and it has been assigned the drive letter C:.
www.sybex.com
70
Chapter 2
IDE Devices
FIGURE 2.5
Drive 1
C:
Look at Figure 2.6 to see what happens when you add a second drive.
FIGURE 2.6
Drive 0
C:
Drive 1
D:
You will see that the cable select has automatically assigned the letter D: to
the second drive. Now, if you have completely used all of the space on the first
drive for C: and the second device is a CD-ROM, all is fine. What happens if
you havent? Say you have created a drive and assigned the letter D:. Now you
have chaos.
Some controller manufacturers have done serious work to solve the problem,
but for the most part, especially in a server implementation, you may want to be
really sure and just take matters into your own hands and configure the settings
yourself.
www.sybex.com
71
www.sybex.com
72
Chapter 2
IDE Devices
If you are installing new devices into a computer, and things are not working
as planned, the first thing to check is the configuration of master and slave.
After that, check to make sure the cables are plugged in properly.
Oh, yeah, one other thing. Dont be like me. I tried for about 15 minutes to
get an IDE CD-ROM to be recognized by the system before I noticed that
while the master/slave was right, and the cable was in the right way, having
a power cord connected should have also been a priority. There are times
we all do really dumb stuff, and I think I hold the record!
The term AT Attachment (ATA) is synonymous with IDE. ATA has gone
through several version iterationsmostly due to increased computer bus
speeds. Visit www.webopedia.com and perform a search on the keyword ATA
for more information.
The easiest way to tell the two apart is to simply look at the connector
cables for each. IDE uses a 40-pin connector and SCSI uses anywhere from
Centronics and DB25 (for SCSI I) to a 50-pin connector for SCSI II and a 68pin connector for SCSI III. Theres no mistaking an IDE cable for a SCSI
cable. So, when in doubt, even if the hard drive doesnt have a label or a cable
www.sybex.com
73
you can count the number of pins it will accept and youll know what kind
of drive youre dealing with.
Note that its possible to mix IDE hard drives with SCSI drives in a system.
Normally I dont like to do that because it can be very confusing to try to figure
things out. Simple is better. But keep in mind that drive mixing can be done.
Another interesting thing that you might get into, though its not as common today, is the need to know the number of cylinders and heads that an IDE
hard drive comes with. In computers with an older system BIOS, the computer
didnt recognize the IDE hard drive until you keyed in the number of cylinders
and heads the drive was using. Then the BIOS would (most times) recognize
the drive configuration and bless it as usable. Today the system BIOS autodetects the hard drives heads and cylinders and you dont have to go through
that rigmarole. The problem with the cylinders/heads scenario is that some
hard drives didnt come with that information stamped on them! You had to
go to a book or get on the Web (or on a BBS in the old days) to download a
schematic for the drive so you knew what to plug into the system BIOS.
SCSI is much easier to set up because you dont have to worry about getting
master/slave relationships right, nor do you have to be concerned about the
BIOS and whether it detected the drives heads and cylinders correctly. On top
of that, you can string several SCSI devices together (up to 7 for SCSI I, 14 for
SCSI II and III) so you can have a veritable Christmas tree of SCSI hard drives.
You have two or three issues to be concerned about with SCSI drives
though. First of all you need to be worried about properly cradling the drives
and getting adequate cooling to them. Its not a wise idea to cram bunches
of SCSI hard drives into a clone towers drive bay just because itll accept
them. Please be cognizant of the heat that a hard drive can put out and the
potential for burning up all hard drives in the system if you dont account for
cooling.
Also, youll have to make sure your SCSI IDs are correct. This is usually
quite easy to do. Most internal SCSI hard drives use jumper pins and youll
simply have to read your drives documentation to tell how to set it to the SCSI
ID youre interested in using. Typically you wont use ID 7. Thats most often
reserved for the SCSI adapter itself, hence the seven-drive SCSI I limitation.
I like to set it up so that in, say, a three-drive system, I set my boot disk
for ID 0, and the next two for ID 1 and ID 2. If you have a SCSI CD-ROM
youre hanging off the system (a pretty rare occurrence), you could set it at
ID 3. Ditto for other SCSI gear.
www.sybex.com
74
Chapter 2
IDE Devices
Finally, its important to match the speed of the drives. Older SCSI drives
operate at 7500 RPM but todays SCSI drives run at 10,000 RPM. Its not
a wise idea to hang a 10,000 RPM drive in a system with other 7500 RPM
drives. I dont think itll break anything, but youll see variations in I/O and
could experience some funny activity with the machine.
Some older cards search the hard drives counting down in SCSI ID order.
Thus, in a configuration with a hard drive at ID 0 and one at ID 4, the system
would be trying to boot to ID 4 first. This can be, as you might imagine, very
confusing. Future Domain, a SCSI card company that was purchased by
Adaptec, operated this way. Watch out for this unusual behavior!
Youll need to be cautious of SCSI I, SCSI II, and SCSI III relative to the
cabling youll have to do both internally and externally. If youve got a SCSI III
adapter in the computer but the hard drive youre trying to connect to is SCSI I,
then youll need a cable that either has an adapter on one side or is SCSI Ito
SCSI III in design. This cable rule holds true for external devices connecting to
the external SCSI port as well. You can buy cables that are specially matched like
this, or you can simply buy an adapter. It might be a good idea to shy away from
adapters if you can, though in some circumstances you may not be able to.
www.sybex.com
75
two IDE hard drives into a computer, youd still be faced with making one
hard drive the master, one the slave. Generally, in situations such as this,
the OS will live on the master hard drive and the second hard drive will be
used for data. Both of the above IDE configurations are quite common.
What happens if you need two IDE hard drives, an IDE CD-ROM, and an
IDE CD writer? Well, then youre stuck with buying a second IDE controller
card or opting for an EIDE scenario. Todays motherboards typically include
IDE connections right on the board. No matter how you connect your hardware, one device will be master, one will be slave.
When setting master/slave relationships, youll almost always have to
adjust a jumper pin on the drive itself. These are clearly labeled. Read your
drives documentation.
www.sybex.com
76
Chapter 2
IDE Devices
Summary
Between Chapter 1 and Chapter 2, you should have your disk subsystems
covered. If you are asked which is right for your implementation, you will have
a lot to think about, but you should be able to make an informed decision. As
far as the exam goes, make sure you are able to keep each of the ATA specifications straight. Fortunately, they make it relatively easy for you, just with the
naming convention. You should pay attention to things like when the 40/80
cable came into being, and how to choose a master or a slave device.
This chapter describes adding or changing hard drives in a system. You
essentially have two flavors of drives to consider: ATA/IDE or SCSI. There are
constant improvements and upgrades to each category and so you might wind
up changing out a SCSI I drive to a SCSI III that will result in I/O performance
enhancement. Telling the two types apart is easylook at the end of the drive
and count the pins. ATA/IDE is a 40-pin setup, SCSI varies from 50- to 68-pin
depending on the type of SCSI. Youll need to be aware of cabling issues with
SCSIsome installations may require a SCSI ItoSCSI III cable, for example.
Youll also have to keep in mind termination issues with SCSI. Generally
the SCSI adapter (ID 7) will be terminated and you may have to terminate the
other end of the chain as well. External devices use an external terminator,
while internal devices use jumpers for termination.
Modern servers use drive cages and ready-made slide-in devices that allow
for easy removal and upgrade of drives. These slide-in devices are proprietary,
so if youve got a slider for a Compaq computer it probably wont work in a
Dell and vice-versa.
Exam Essentials
Know that ATA and IDE are synonymous ATA is the official standard
defined term for IDE devices, though you will usually hear these devices
referred to as just IDE.
Know that IDE devices have the controller integrated into the drive
Unlike SCSI devices, which use an actual controller, the IDE controlling
device is contained as part of the drive. That is why it is referred to as
integrated.
Know the characteristics of each type of ATA device ATA was the first
type of IDE device, and was very limited in speed, addressable hard drive
size, and number of devices on the IDE chain. ATA-2 used DMA channels
www.sybex.com
Summary
77
www.sybex.com
78
Chapter 2
IDE Devices
Key Terms
Before you take the exam, be certain you are familiar with the following terms:
AT Attachment (ATA)
ATA Packet Interface (ATAPI)
ATA 100
ATA 2
ATA 3
ATA Packet Interface
block transfer mode
cable select (CSEL)
Cyclic Redundancy Check (CRC)
Direct Memory Access (DMA)
electromagnetic interference (EMI)
Enhanced IDE (EIDE)
Fast-ATA
Frame Check Sequence (FCS)
Identify Drive
Integrated Drive Electronics (IDE)
jumper
Logical Block Addressing (LBA)
master
Mean Time Between Failure (MTBF)
paddleboards
Parallel ATA
Programmed Input/Output (PIO)
Self-Monitoring Analysis and Report Technology (SMART)
Serial ATA
slave
Ultra DMA 33
Copyright 2001 SYBEX, Inc., Alameda, CA
www.sybex.com
Review Questions
79
Review Questions
1. What does IDE stand for?
A. Integrated Device Electronics
B. Integrated DMA Efficiency
C. Integral Drive Economics
D. Integrated Drive Electronics
E. Interior Device Efficiency
2. What is ATA?
A. The name of an airline.
B. The actual standard that defines IDE.
C. IDE is the standard that defines ATA.
D. A type of burst mode DMA data transfer.
3. How does PIO work?
A. With PIO the input/output (I/O) goes directly to the processor.
B. With PIO the I/O is sent directly to memory.
C. With PIO the I/O bypasses the memory and the processor.
D. With PIO the I/O is sent simultaneously to the processor and to the
memory.
4. With DMA, where does the I/O go?
A. Directly to the processor.
B. Directly to memory.
C. The I/O bypasses the memory and the processor.
D. The I/O is sent simultaneously to the processor and to the memory.
www.sybex.com
80
Chapter 2
IDE Devices
www.sybex.com
Review Questions
81
upgrading the hard drives in an older server that has been running for two
years now. There is little documentation available for this server. What is
the first thing Monica must determine before she can go forward with her
hard drive replacement?
A. How many drives are in system
B. The type of hard drives
C. The SCSI IDs of all the hard drives
D. The master/slave relationship
E. What type of hard drives are in the computer
10. What is one of the reasons the ATA specifications are getting away
up, causing the electrons to go faster. This can cause the cable to
overheat, causing fires.
C. The cable can become twisted.
D. The cable can block airflow from the fan, causing excess heat
www.sybex.com
82
Chapter 2
IDE Devices
12. Which two of the following choices describe how devices that are part
slave relationships?
A. There are usually two sets of three pins.
B. There are usually three sets of two pins.
C. There are normally six sets of two pins.
D. It varies.
15. What is the name of the device that connects the two pins to create an
I/O path?
A. Pin connector
B. Rocker switch
C. Bipolar DIP switch
D. Jumper
www.sybex.com
Review Questions
83
16. You have just been given a new IDE hard drive. When you check to see
one but you cant seem to get the hard drive to come up and be recognized. There is an IDE CD-ROM in the system as well. What could be
the problem?
A. BIOS doesnt recognize the correct cylinders and heads.
B. CD-ROM is set to be master.
C. CD-ROM and hard drive are both set to be slave.
D. Termination jumper on hard drive isnt set.
18. What is the rated data throughput for an ATA 66 device?
A. 33 MBytes/second
B. 44 GBytes/second
C. 66 MBbytes/second
D. 66 KBytes/second
E. 66 GBytes/second
19. What is another name for an ATA 66 device?
A. Ultra 66
B. Supra 66
C. DMA 66
D. EMA 66
www.sybex.com
84
Chapter 2
IDE Devices
www.sybex.com
85
called Integrated Device Electronics and in others it is called Integrated Drive Electronics.
2. B. AT Attachment (ATA) is the actual standard that defines IDE.
3. A. With PIO, all I/O goes through the processor.
4. B. With DMA, I/O is sent directly to memory.
5. B. DMA is first used in the ATA 2 specification.
6. C. In the early ATA specifications, the cable had 40 pins and 80
conductors.
7. D. In an ATA 66 cable there are 40 pins and 80 conductors.
8. D. The additional 40 conductors are used for grounding to prevent the
ing and what type they areSCSI or IDE. Once she knows what type of
drive shes dealing with, she can ascertain their SCSI IDs or the master/
slave relationship. She should also ascertain the speed of the drives, if
SCSI. Most drive and schematic information is usually available on the
manufacturers Web site.
10. D. Because of the cable width, it can block airflow from the fan, caus-
www.sybex.com
86
Chapter 2
IDE Devices
four devices.
www.sybex.com
Chapter
Verify N 1 stepping.
www.sybex.com
n the last chapter, we spent a lot of time talking about how to link
physical hard disks together to give you more disk space and a sense of
redundancy in case of a failure. Now we are going to move from the disk
subsystem to the brains of the operationthe CPU and the ways that we can
maximize effectiveness.
As you look over the objectives, you will see a lot of attention paid to grouping CPUs together, either as part of the same physical computer with multiprocessing or by taking advantage of groups of servers by clustering. Clustering is
one of those buzzwords that just wont go away. It takes the concepts of RAID,
mirroring, and duplexing to a new height. Basically, we are moving the single
point of failure back from the disk subsystem, back even beyond the server. With
cluster servers, instead of having our data and applications protected by having
an additional disk subsystem, we are providing high availability of data and
applications by having additional servers.
For complete coverage of objective 3.2, please also see Chapters 6, 8, and 9.
Clustering
lthough clustering and cluster servers are the current buzzwords, the
concepts have been around for years. Actually, the implementations have been
around for years. The mainframe, big iron people had clustering almost since
day one, and on the LAN side, Novell had System Fault Tolerance systems
back in the days of NetWare 3. So, we are not talking about new technology.
When you start talking about clustering, you are actually opening up the
discussion of disaster recovery. Now, if you have ever participated in a disaster recovery exercise, you know that it can get to be pretty intense. When you
www.sybex.com
Clustering
89
are planning for disaster recovery, the first thing you have to do is determine
how valuable your companys data is, and how long you can live without it.
Most members of senior management will tell you that the data is invaluable
and you cannot live without it even for a second. Then you start showing the
person how you can, in fact, ensure that data is always available with a
99.9999999% uptime, 24 hours a day, 7 days a week, 365 days a year. It is
an impressive display, until you get to the cost. That is when the rubber hits
the road.
So, what is clustering anyway, how does it work, and why is there the
potential for costs to skyrocket?
Clustering Basics
Clustering is basically having redundant, mirrored servers. In other words, if
one of the servers in your network were to fail over to its mirror, the other
server would immediately pick up the slack, and make all of the up-to-theminute data available to your users as well as all the applications that were
running on the failed server. In addition, for this to work really well, the
changeover should be transparent to the end user. In other words, Ursula
User would have no idea whether her requests for data and applications were
coming from Server A or Server B. Nor would she care.
So, now it comes time to determine what a disaster is and how can we protect against it using clustering, because after all, there are several different
kinds of disaster. Well, the first and most obvious example of a disaster is to
have something happen to the file server; lets say that someone was walking
through the computer room with a can of soda and tripped, spilling the soda
into the file server.
Now, okay, so this scenario may not be one that immediately jumps to mind.
But I have seen a file server that handled all services for a small law firm that
was physically located in the break room, in a small enclosure directly under
the coffee pot. Now, of all the places that I have seen servers placed, this was
the second most bizarre. The most bizarre was at a company that wanted to
prove to their customers how technologically advanced they were. To make
sure their customers could see the server screensaver when they walked into
the waiting room, that is where the server was placed. Now, if that were not
bad enough, the keyboard was attached and was active, as was the mouse.
So, anyone who came into the reception area that was really bored could
amuse herself by starting and stopping services or just rebooting the server.
We are not even going to mention the data that was available.
www.sybex.com
90
Chapter 3
Once the soda hits the file server, the smell of burnt silicon starts to permeate the building and that server is officially designated as toast. If this
were the disaster we were protecting against, our clustered server could be
mere feet away and still provide protection. In this case, just having a clustered server in the next room would be all the protection you would need.
Lets say there was a more serious problem. Suppose there was a fire in the
building that housed the file server. Now you can see that the only way clustering would work would be if the machine were physically located in a
different building, but the building could still be close by. If we moved the
disaster up in scale from impacting a single building to something like a flood,
tornado, or earthquake, now the clustered servers need to be several (or many)
miles apart to be safe. We can even take this a step further: Suppose you live
in a part of the world where political unrest is a way of life, or war is comm
onplace. In that case, you may want to have one of your clustered machines
located on the other side of the globe.
Clustering is just making sure that the mission critical business applications
and data that your enterprise requires to operate have high availability, meaning
that they are available 24 hours a day, 7 days a week, 52 weeks a year, year in
and year out. This high availability is usually necessary simply because of the
cost of operations. Lets say that you are talking about the application that runs
reservations for a major international airline. If that application is unavailable
for any reason, for any time, anywhere in the world, the loss of revenues to the
company could be in the millions-of-dollars-an-hour range.
Lets look at another example. Recently I read an article about the IS
department at the National Aeronautics and Space Administration (NASA).
It is responsible, among other things, for the computer network that tracks
the space shuttles when they are in orbit. This involves things like communication, tracking, navigation, life support, small things like that. Can you
imagine what the availability of that system must be every time a shuttle
takes off? I would imagine that having the space shuttle just take another
orbit while we reboot the server is not necessarily an option.
Clustering Technologies
Clustering offers differing challenges as you face each of the scenarios faced
above. Clustering, obviously, is a combination hardware and software solutions to the high availability challenge. This challenge may be something like
making sure that a database application is available no matter what the circumstances, or just making sure that a vital network service like e-mail is not
affected if one of the servers on the network should fail. Basically, a clustered
environment would look something like Figure 3.1.
www.sybex.com
Clustering
FIGURE 3.1
91
Networked workstations
connected to the
database server
With cluster server, you have at least two servers, working together in tandem. If something were to happen to either of the servers, the other server
would be able to take over immediately. This means that if any of the server
applications were to fail, the cluster server software would restart any configured applications on any of the remaining servers. This seems to imply
that each of the cluster servers has to be configured exactly the same way,
and that is not necessarily the case. In some implementations you may have
two different applications running on the two servers, and if one server were
to fail, the other server would start the failed application and make it available. Look at Figure 3.2, which uses a database application and an e-mail
application as an example. This is the way the cluster would look before the
fail over.
FIGURE 3.2
Networked workstations
connected to cluster
www.sybex.com
92
Chapter 3
Figure 3.3 shows the way the cluster would respond after a system failure.
FIGURE 3.3
Access to database
and e-mail maintained
But providing access to applications is only half the problem. What about
providing access to the data that can be changed and updated on a minuteby-minute basis? Going back to our example of the reservation system for an
international airline, the application is not much use if the database for flight
and passenger information is not available. Therefore each server node in the
cluster must have access to the same information so that the application and
the data can be moved from one location to another without any downtime.
One of the ways this can be done is with shared external storage. Take a
look at Figure 3.4.
FIGURE 3.4
Shared
SCSI bus
SCSI disks
www.sybex.com
Clustering
93
In this case, both servers are accessing the same storage location, linked
together with a SCSI bus or a Fibre Channel configuration. It is up to the
cluster server software to decide which node has access to which pieces of
data at any given time. In this configuration, only one node can access any
information at any time. This is one way of making sure that the data on the
external storage is not corrupted.
The disadvantage of this configuration is that due to the limitations of
SCSI, the machines must be located close together. As you can see in Figure
3.5, shared SCSI technology has a distance limitation of just 82 feet.
FIGURE 3.5
Cluster
nodes
Shared
SCSI bus
SCSI disks
www.sybex.com
94
Chapter 3
There are solutions available that, for example, can use an IP network to
bypass the limitations of Fibre Channel or shared SCSI. When it comes time
to manage the data, it is handled like this. When there are changes to the data
on the primary node, these changes are captured and are sent via TCP/IP to
the backup node. That way, there is an exact copy of the data stored on the
second disk. If for any reason the primary data storage area should become
unavailable, the data is still accessible. In some cases, the solution can actually create multiple copies of the data, so even the backup is being backed up.
In this way, if there were a problem with the home site in Minneapolis, users
in different areas of the world would not suffer. Configured applications
would be back online within minutes and the data would be up-to-theminute. This would save tons of time over solutions like tape backups, where
the data is, at best, hours old, and at worst, days or weeks old.
Clustering Scalability
When it comes to scaling the clustering solution, you get what you pay for.
In some cases, you may only cluster on a one-to-one basis, so there is little
flexibility. With other solutions, you can configure the cluster to provide a
variety of solutions. Take a look at Figure 3.6.
FIGURE 3.6
TCP/IP network
In this case, we have the most basic clustering solution where one server
is acting as the primary and the other is acting as the backup. This is the
prime definition of clustering. Any data that is written to the primary is written to the backup. If something were to happen to the primary, the fail over
would bring the backup on line and life would go on with up-to-the-minute
data. In this case, there is one primary server and one backup server.
(I know the term Fibre Channel is new and we have not talked about it yet, but
we will, later in this chapter. Right now it is just important to realize that it can be
used to link servers with storage subsystems and it has a longer distance limitation
than SCSI. We will cover the rest of the stuff later!)
www.sybex.com
Clustering
95
That is not necessarily the way it has to work. Using some software implementations, you can configure clustering so there are two primary servers and the data
replication is two-way, as shown in Figure 3.7. Now this configuration does have
a gotcha. In this case, the data has to be independent. Any data that originates on
one server can only be changed on that server. If it is changed on the backup server,
the changes will not be replicated back to the original server.
FIGURE 3.7
Now, there are other, more creative ways that you can use clustering solutions. For example, you can do what is called daisychaining clustered servers. In this case, lets say that we had some critical data in the office in the
Florida Keys. If the primary server went down, we wanted a rapid fail over,
so users could quickly pick up where they left off. That solution would
require a backup server on site, so we would not have to fight wide area network bottlenecks.
Because this data is critical and because we also understand that the Keys
are subject to hurricanes and other natural disasters, that could render the
two-servers-in-the-same-location solution worthless; we need to make
another backup copy off-site, somewhere far away. In this case, we can daisychain the servers, so there are two servers in the Keys, and another off-site,
away from potential storms and other disasters.
www.sybex.com
96
Chapter 3
Clustering Summary
Clustering is a viable solution, but the level of protection that you get
depends on the level of expenditure that you make. Some clustering solutions
that are right out of the box can handle only a one-to-one server relationship,
and even then, the servers have to be in close proximity. If you want true
disaster recovery capability where the servers are located hundreds of miles
apart, you are probably going to have to go with a specialty solution.
www.sybex.com
Fibre Channel
97
Fibre Channel
Now, one of the suggested ways that things be linked together is with
Fibre Channel. Lets take a look and see how that works, and what kinds of
things you can hook together.
www.sybex.com
98
Chapter 3
www.sybex.com
Fibre Channel
99
www.sybex.com
100
Chapter 3
Point-to-Point
You remember point-to-point from back in the Network+ class, dont you?
This is the simplest of all topologies. With a point-to-point connection, there
is a bidirectional link that connects the N_ports on two nodes. A point-topoint topology will usually underutilize the bandwidth of the communications link.
Arbitrated Loop
With arbitrated loop, we start looking at a form of Fabric topology.
If any link in the loop should fail, the communication between all the
L_ports is terminated.
www.sybex.com
Fibre Channel
101
If stations are added to the Fabric, it does not reduce the point-topoint Channel bandwidth.
www.sybex.com
102
Chapter 3
Diagram of a SAN
Server
Server
Server
Switch or hub
Fibre Channel RAID
SCSI bridge
SCSI RAID
www.sybex.com
103
Now the interesting thing about SANs is that both SCSI and IP protocols
are used to access the storage subsystems. The servers and the workstations
all use the Fibre Channel network to get access to the same sets of storage
devices or system. If there are older SCSI devices on the network, they can be
integrated into the Fibre Channel network through the use of the SCSI
bridge. What kind of performance are we talking about? Well, using a gigabit link, bandwidth is reported to be in the neighborhood of 97 MBytes/second for large file transfers.
Support for network resolution protocols like ARP, RARP, and others
he CPU is the brains of the server. It is responsible for the control and
direction of all the activities that the server participates in, using both the
internal and external buses. The CPU is just a processor chip that consists of
millions of transistors. That is what a CPU is and does. But like most things
in computing, there are dozens of processors.
When it comes to CPUs, there are only a few well-known manufacturers.
The best known, and the two manufacturers that are constantly battling it
out for the title of fastest, are Intel and Advanced Micro Devices (AMD). Of
the two, Intel is probably the more widely recognized, although AMD is
making inroads every day in the desktop and mobile computing market.
Copyright 2001 SYBEX, Inc., Alameda, CA
www.sybex.com
104
Chapter 3
Back in 1965, one of the co-founders of Intel, Gordon Moore, was preparing
for a speech when he made a remarkable discovery. He discovered that the
number of transistors per square inch on integrated circuits had doubled
every 12 to 18 months since the processor was first invented. Moore speculated that the trend would continue, and that became Moores Law. If you
examine the prediction, you will find that it has been remarkably accurate. In
recent years the trend has slowed, and Moore has revamped the law to state
that the density of data will double every 18 months. Why are we mentioning
Moores law? Simpleeverything you are about to read about processors is
outdated. Most of it was probably outdated in the time it took this chapter to
go from my desk, through the editorial process, to the printer. So, if you are
reading this and thinking, What the heck is he talking aboutgigahertz is not
the state of the art, remember that when this was being written, the gigahertz
barrier had just been broken.
Intel Processors
At the time of this writing, the primary Intel processors on the server market
were the Pentium III and the Xeon Pentium III. Intel was also about to release the
first foray into the IA-64 architecture called the Itanium processor. Since the Itanium was scheduled to be the latest, greatest, bestest, fastest server processor on
the block, it was billed as the perfect solution for the large server market, even
before it was released. That left the Xeon and the Pentium III to hold down the
fort on the mid-range and low-end server market.
Intel also has the Celeron processor on shelves, but it was designed for the
lower end, desktop market. Because it is designed for the desktop, we wont
look at it here.
www.sybex.com
105
The Xeon can use 1MB or 2MB unified non-blocking, level-two cache.
For a more in-depth look at cache and at memory in general, read Chapter 4,
Memory.
www.sybex.com
106
Chapter 3
Figure 3.9 shows a picture of the Xeon Pentium III processor; the photo
was taken from Intels pressroom at http://www.intel.com/pressroom/
archive/photo/processors.htm.
FIGURE 3.9
www.sybex.com
FIGURE 3.10
107
The Pentium III is not as expensive as the Xeon processor, and the supporting
cast of mainboard and memory will bring down the cost also.
RISC Processors
You want power, we got power. Of course, like most things in computing,
the more performance you receive, the more you pay for it.
RISC chip servers are at the high end of the server platform, usually
reserved for the high availability, highly accessed Web servers. RISC based
servers can scale from a single processor up to 64 processors in the same
machine. Of course, the cost is going to be considerably higher than the usual
$10,000 to $15,000 price range for a starting server. In the case of a RISC
server, taking the cost well over $100,000 is not unheard of.
RISC is usually associated with Unix implementations, although Windows NT also ran on the RISC platforms.
Advantages of RISC
The RISC processor does offer several advantages over its Complex Instruction
Set Computing (CISC) counterparts:
Speed The name says it all. With RISC, you are dealing with a reduced
instruction set. That means that RISC processors often show two to four
times the performance of CISC processors in comparable technology and
using the same clock rates.
Simpler Hardware Because the instruction set is simpler, it uses up less
chip space. That means that extra functions like memory management or
floating-point arithmetic units can be installed on the same chip. Also,
since the chips are smaller, there can be more parts on a single silicon
wafer, and that reduces the cost per chip dramatically.
www.sybex.com
108
Chapter 3
Shorter design cycle Since the chips are simpler, it doesnt take as long to
design as the CISC brethren. This means that RISC chips can respond to
changes in the hardware marketplace sooner than the CISC designs. This
means there will be greater leaps in performance between the generations.
RISC Summary
While RISC is exceptionally scalable and works tremendously well in servers
that going to be heavily utilized, the monetary costs can be considerable.
www.sybex.com
Multiprocessing Support
109
Multiprocessing Support
or those of you who are fans of the American comedian Tim Allen,
perhaps we should just re-title this section More Power! See, unlike Allen, I
dont think it is just a guy thing. I want to make this more politically correct,
because everyone at one time or another wants more power. Certainly the
people on your network do, every time they complain about how slow the
network is running today. One of the ways that you can give them more
power is with Symmetrical Multiprocessing (SMP).
Copyright 2001 SYBEX, Inc., Alameda, CA
www.sybex.com
110
Chapter 3
You may be asking yourself, why all this fuss about multiple processors in
a single computer? After all, with the speed of processors getting faster all the
time, wont that take care of the issue?
Multiprocessing Basics
This will be like the discussion of RAID, complete with a whole new set of
acronyms and strange terms. Bear with me and it will make sense. First of all,
why might you need SMP?
When you take a look at the world of the uniprocessor (UP), you realize that
the processor is actually doing a lot of work at the same time. For example, the
processor may have a fixed-point arithmetic unit and a floating-point arithmetic
unit all on the same CPU. That means that the processor can run multiple
instructions within the same CPU. The thing to keep in mind is that while several
instructions can be run in parallel, only one task can be processed at a time.
Look at Figure 3.11.
FIGURE 3.11
Uniprocessing
Task
Task
Task
Task
Processor
In this case, you have multiple tasks backed up behind a single processor.
Now, you are probably saying to yourself, Wait a minute, he just said that
processors can perform multiple instructions at the same timewhat is the
difference? Think of it this way. Imagine yourself drying dishes after a big
meal. Each dish is a task. You may be able to dry multiple parts of the dish
at the same time, but you cannot dry multiple dishes at the same time. Adding another processor to the mix, like bringing in another person to help, will
cut the number of tasks down by half, and speed up the process of drying the
dishes. Figure 3.12 shows what I mean.
FIGURE 3.12
Multiprocessing
Task
Processor 3
Task
Task
Task
Task
Processor 2
Task
Processor 1
www.sybex.com
Multiprocessing Support
111
Now, you would think that, like bringing in another person to help dry the
dishes, adding another processor would increase the overall performance of a
system in a directly proportional fashion. In other words, if you added a second processor to the system, the system would be twice as fast. It would be
wonderful if it worked that way, but it doesnt. You see, there a lot of other
factors that have to be taken into consideration. The problem is not just buying a motherboard that is compatible with two CPUs. All of the chipsets on the
motherboard have to be able to work with more than one CPU. The CPUs
themselves have to have hard-coded programming to work in parallel and,
once all the hardware is in place, the operating system has got to be able to
handle multiple processors. Now, all that has to happen to make sure these
two processors can work in tandem. Can you imagine how much behind-thescenes stuff has to go on to work with up to 64 processors? Not only that, but
there is still one more piece to the puzzle and that is the application.
www.sybex.com
112
Chapter 3
SMP Hardware
Obviously, when you are talking SMP, the hardware is important. With
some of the earlier Intel CPUs, you could mix and match older CPUs of close
clock speed, so you could do things like put a Pentium 166 in with a Pentium
200. You would just have to set both CPUs to run at either 200MHz or
166MHz, which of course could affect system stability.
Things are a little different with the more recent CPUs. With the more
recent systems, a multiplier is used. This multiplier is put into play to multiply the CPU bus clock rate, called the Front Side Bus (FSB) rate, by the multiplier. So, with a Pentium III 500, the FSB would be 100MHz and the
multiplier is 5, giving you the 500MHz. Intel now sets locks on the multipliers used in the CPU to control the final clock speed. Because of this, if you
are running multiple CPUs with Intel, you have to make sure the clock speed
and the multiplier are the same.
The CPU also has to have the onboard circuitry to work with other CPUs in
the same system. If that circuitry is not there, the CPU will simply not take
advantage of the other CPUs. This should not be a worry, because all of the Intel
CPUs that have been developed since the early Pentiums have had the ability to
work and play well in an SMP environment.
Intel does make the distinction between the dual processing (DP) environment and the multiprocessing environment (MP) for chips that are marked
with a VSU. If your Pentium chip has the VSU marking, it means the chip
has been validated to work in a uniprocessing and multiprocessing environment, but not in a dual processing environment. The difference is that DP is a
special mode of operation for two Pentium processors where there are four
dedicated private pins and there is the specific DP on-chip circuitry. This circuitry allows the processors to handle the negotiation of how to use the
resources and the data buses. Since there is no operating system intervention
required, this is referred to in Intel literature as a glueless solution. An MP
setup requires the glue like the operating system to negotiate between the
processors.
There are limitations to the number of processors that can be used. For
example, some Pentium IIIs can only be used in pairs, while the Pentium III
Xeon can be used in eight-CPU configurations.
Operating Systems
Having the hardware able to recognize the multiple CPUs is one half of the
battle, but the other half of the battle is the operating system. The operating
Copyright 2001 SYBEX, Inc., Alameda, CA
www.sybex.com
Multiprocessing Support
113
system has to be able to figure out that there is more than one CPU present
and also load the proper kernel. The kernel must then be multithreaded to
take advantage of the multiple CPUs inside the OS. This is really a bigger
issue than it may sound, because many of the system calls are static and cannot be reconfigured to work in a multithreaded environment. In that case,
some locks have to be put in place to make the system calls static.
The operating system is also responsible for system stability. It has to
manage the caches of the different CPUs. That management can get tricky,
because it has to make sure that the contents of the cache match each other,
as well as the original data, whether it is stored in RAM or on a disk. This
is one of the major hurdles for running multiple CPUs.
The OS must also support all of the processors that are available in the
hardware. An example would be that Windows 2000 Professional only supports 2 CPUs, so if you ran it on a system where there were four, two
wouldnt be used. Windows 2000 DataCenter Server supports 32 CPUs out
of the box. If you are using Linux, some of the Linux kernels natively support
16 CPUs, although the kernel code can be rewritten so more than 64 processors will be recognized.
You may also see the term processor or CPU affinity. This is the process of
selecting specific applications or processes to run on a specific processor. For
example, you may have a quad processor machine and want a database
indexing function to run specifically on the fourth processor. This would be a
function of affinity.
www.sybex.com
114
Chapter 3
www.sybex.com
Adding Processors
115
Adding Processors
Adding processors can be a much less scary prospect if you do some basic
research on the server youre upgrading prior to attempting the addition.
There are several key things to keep in mind as you toy with the idea of
upgrading or adding new processors.
Verify N 1 Stepping
In the world of CPU manufacturing, the word stepping is akin to a version
number. When a new microprocessor is released, the product version is set at
step A-0. Later on, as engineering updates are made to the chip, new steppings
are assigned. If the change is minute, the number of the stepping will be
changed (i.e., A-0 to A-1). If the change is major, the letter of the stepping will
change (i.e., A-0 to B-0).
When considering a CPU upgrade, especially if youre adding a CPU in
order to turn the system into a multiprocessor computer, youll want to verify
the current CPUs stepping and match accordingly, or replace if the stepping
levels are too far from one another. Check with the computer manufacturer or
vendor for more detailed compatibility information.
In a single CPU upgrade, the same caveats apply (matching the stepping
to the range supported by the manufacturer).
www.sybex.com
116
Chapter 3
Note that some processors require a DC power supply and have an associated
slot on the motherboard for the power supply unit. Note for sure whether your
processor implementation has this and order accordingly. If in doubt, ask the
manufacturer or consult documentation.
Summary
You know the problem with writing a chapter like this? As you write
about all the exceptional technology, you just want to go out and set up a
cluster of servers with four Xeon processors, a couple of gigs of RAM, and
a storage system hooked to the main box by Fibre Channel with a few
terabytes of disk space, just to see me if you can get it to work! Hmm, maybe
I could build it and sell it to my wifes company. Do you think that might be
a little overkill for a home-based business with 10 employees?
Anyway, enough of all this dreaming stuff. On to Chapter 4, where we
look at what kinds of memory to put into that big ol badboy.
You know, I could probably get all those servers to fit.
We talked about adding processors to a system. Its important to verify
your systems capabilities, either by checking with the manufacturer or consulting system documentation. Systems are typically rated for a given range
of microprocessors so you may not be able to run out and buy the latest and
greatest processor, slap it in your system, and hope that it works. Its important to understand your systems limitations.
www.sybex.com
Summary
117
Exam Essentials
Know what it means to cluster servers Servers are clustered for a variety
of reasons, usually to make sure that the single point of failure is moved
back beyond the server. You can think of cluster servers as mirrored servers, though in reality, clustering can provide a broader range of services
than just fault tolerance.
Know what high availability means High availability is one of those
buzzwords that means exactly what it implies. You want your network to
be available always, 24 hours a day, 7 days a week. You take all the steps
necessary to make sure your server is up and running to provide the
appropriate services and applications to your users. It is highly available.
Know the basics of Fibre Channel Fibre Channel can be used to link
storage subsystems (or other devices) to the network. It provides faster
throughput. Fibre Channel makes use of ports connecting using the Fibre
Channel fabric. Fibre Channel is used in storage area networks, to provide
the bandwidth for remote access to large databases, and to provide bandwidth for remote backups.
Know about the different types of CPUS, including RISC, Pentium II,
Pentium III, and Xeon Xeon supports two-way processing and multiprocessing. Xeon supports four-way multiprocessing without specialized
chipsets. They are more expensive than the Pentium III processors.
Know which CPU you would use in a high availability super server
The RISC processor and the Xeon are designed for high availability and
high utilization servers.
Know the advantages and disadvantages of multiprocessing support
Before adding multiple processors, it is best to do a cost analysis. In some
cases, it may be cheaper to add another server with fewer processors than
it is to add a mainboard that can support more processors. For example,
it may be cheaper to provide a cluster of four servers with two processors
each than a single server with eight processors.
www.sybex.com
118
Chapter 3
Make a checklist Know and understand the things to check for when
upgrading a system processor or adding processors to a multiprocessor
system.
Key Terms
Before you take the exam, be certain you are familiar with the following terms:
American National Standards Institute (ANSI)
arbitrated loop
channel
cluster servers
Complex Instruction Set Computing (CISC)
Cross-point
dual processing (DP)
F_port
FL_port
Fabric
Fabric Switched
Fibre Channel
Front Side Bus (FSB)
gigabit
kernel thread
Link Control Facility (LCF)
N_port
NL_port
point-to-point
Reduced Instruction Set Code (RISC)
stepping
Storage Area Network (SAN)
Streaming Single-Instruction, Multiple-Data Extensions
www.sybex.com
Summary
www.sybex.com
119
120
Chapter 3
Review Questions
1. When servers are clustered, you are providing redundancy of which
devices?
A. Network cards
B. Mainboards
C. RAID systems
D. Servers
E. Video cards
2. What are the key items that must match when youre attempting to
thats had better days. You need to verify the CPU stepping. How do
you go about gathering this information?
A. Read the serial number on the CPU and call the manufacturer.
B. Read the stepping number on the CPU.
C. See if the NOS reports the stepping number.
D. Obtain the stepping number from the Web.
E. Read the system documentation.
www.sybex.com
Review Questions
121
server. When the server boots, only one CPU reports online and the
NOS error logs report something about an L2 problem. What does
Louis need to check?
A. Secondary cache is mismatched between the two processors.
B. BIOS version is different between the two processors.
C. CPU speed is different between the two processors.
D. DC power converter missing.
6. The Linux 2.2 kernel can use up to 64 processors if what is done?
A. The kernel is rewritten and tweaked.
B. Nothing.
C. The processors are set to operate in parallel mode.
D. The processors have VPU on them.
7. What is the minimum number of servers in a cluster?
A. 4
B. 3
C. 2
D. 1
www.sybex.com
122
Chapter 3
www.sybex.com
Review Questions
123
13. Alejandro is trying to add a second processor to his server but the
old one.
C. Buy a new processor, because the mainboard will burn out the
old one.
D. Flash the BIOS to provide for the extra instruction sets of the
Pentium III.
www.sybex.com
124
Chapter 3
16. When the Pentium III first came out, there was some controversy
species list.
B. The floating-point decimal was not always accurate.
C. It had ID tracking.
D. It was thought to gather an inventory of hardware and software on
ing two more processors to a server that already has two, thus turning
it into a four-way computer?
A. Stepping of all four processors must match.
B. L2 cache of all four processors must match.
C. Speed of all four processors must match.
D. Must have ports available on motherboard for additional processors.
18. What is the minimum number of nodes in an arbitrated loop?
A. 4
B. 3
C. 2
D. 1
19. What agency certificated the specifications for Fibre Channel?
A. ASCII
B. SCSI
C. ANSI
D. EPSIDIC
E. IEEE
www.sybex.com
Review Questions
www.sybex.com
125
126
Chapter 3
rewritten.
7. C. You must have at least two servers in a cluster.
8. B. You can have two primary servers. It is important to note that the
www.sybex.com
127
invasion of privacy.
17. B, C, D. The stepping number isnt nearly as important as the speed
www.sybex.com
Chapter
Memory
SERVER+ EXAM OBJECTIVES COVERED IN
THIS CHAPTER:
3.4 Increase memory.
www.sybex.com
Memory Types
ou have to remember where I am coming from. The very first computer that I ever bought came standard with 512K (thats right, K) of Random Access Memory (RAM). Now, I will never forget the look on the
salesmans face when I told him that I wanted to upgrade my system to 1
megabyte (MB) of RAM. He thought I was nuts. He actually told me that
I was throwing away my money, because there would never be a use for that
much memory. Now, some operating systems have minimum suggested
requirements of 128MB for installation. Guess my friendly computer salesperson was wrong!
www.sybex.com
Memory Types
131
So, why is memory so important? If you want to speed up the performance of any PC or server, one of the first things you can do to it is add more
memory. As a matter of fact, that is a pretty common solution to server problems. It is always easier for a Central Processing Unit (CPU) to grab information out of memory than it is for the CPU to have to go look for it on a
hard disk, or in its instruction set. So, the more of the commonly referenced
information we can store in memory, the quicker the CPU can find it. The
faster the CPU does its job, the faster the server (or even a workstation)
appears. It is as simple as that. How does the CPU know what is commonly
referenced information and what isnt? It doesnt. So it just stores as much of
the stuff that people have asked for as it can. When people (or the system)
ask for stuff that it does not have in memory, it will usually rid itself of old
stuff that no one has asked for in a while and replace it with the new stuff
people (or the system) have recently asked for.
DIPs
Memory comes in various shapes and sizes, so lets start by taking a look at
some of the physical types of memory. I mentioned above that I had to
upgrade my first computer from 512K to 1MB of RAM. This involved a
technician adding some integrated circuits called dual inline packages
(DIPs) to the mainboard. These types of DIPs are shown in Figure 4.1. DIPs
have come in a variety of sizes, but now they are usually at least 256K per
DIP. To be honest, I have no idea what they were when I bought my first
computer, because for the first year I owned it, I was afraid to take the top
off for fear all the electrons would escape.
FIGURE 4.1
www.sybex.com
132
Chapter 4
Memory
DIPs are still used for a variety of memory. For example, VGA cards or network
cards that have onboard cache will normally use DIPs.
SIMMs
The SIMM was just a different configuration of the DIP. Two types of SIMM
are shown in Figure 4.2.
FIGURE 4.2
SIMM memory
www.sybex.com
Memory Types
133
SIMM installation was actually a little more difficult than it sounds. Many of
the mainboards had plastic connectors, and if you were not careful, you could
break off the plastic. When that happened, the SIMM was not held securely in
its slot and it did not work well. This was usually time for a new mainboard,
and those were always expensive. For a while, I worked as a telephone technical support person, and my job was to talk people through the installation
of memory SIMMs. As a technician, I always warned the installer to be really
careful, and I just hated it when I heard something like, Oh darn, look what I
did coming out of the phone.
Getting back to Figure 4.2, you can see that the SIMM, depending on age,
comes in two different configurations. There was the 30-pin configuration
and the 72-pin configuration. When the 30-pin SIMMs first came out, computers were working with 32 data bits. Unfortunately, each SIMM only handled 8 data bits, so you needed to provide one bank of four SIMMs. A
memory bank was simply a set of four slots. Most computers had two banks
of four SIMMs available, Bank 0 and Bank 1. The CPU would then address,
or work with, one memory bank at a time.
72-pin SIMMS took care of part of the problem, because each 72-pin
SIMM supported 32 data bits. If you were using a 486 CPU from Intel or a
68040 from Motorola, you only needed one 72-pin SIMM per bank to give
the CPU the 32 data bits it was looking for.
Working with the early computers was always fun, because they never ceased
to provide unique opportunities. One of the opportunities was something
called chip creep. If you remember all the way back to high school science,
when things heat up, they expand; when they cool down, they contract. The
same is true with chips. After a computer had been turned on and off several
dozen times, the chips, which had expanded and contracted several dozen
times, may have worked themselves just ever-so-slightly out of their slots.
That meant the chip was not making proper contact and the thing didnt work
as advertised. As a user, you became adept at taking the top off your computer and gently pushing down on all the chips to reseat them.
www.sybex.com
134
Chapter 4
Memory
DIMMs
After the SIMM came the Dual Inline Memory Module (DIMM). Look at
Figure 4.3.
FIGURE 4.3
SO DIMM
168-pin DIMM
As you can see, there are two types of DIMM, but most of them installed
vertically into the mainboard, just like the SIMM. The difference between
SIMMs and DIMMs is in the pin configuration. On a SIMM, the opposing
pins on either side of the board are tied together to form a single electrical
contact. With a DIMM, the opposing pins remain separate and isolated to
form two contacts. DIMMs therefore usually have memory chips on both
sides of the module. DIMMs are used in 64-bit computer configurations.
This relates to the Intel Pentium or the IBM RISC processor.
At the top of Figure 4.3 is the Small Outline DIMM or the SO DIMM.
This DIMM is like a 72-pin SIMM in a reduced size. It is designed primarily
for laptop computers.
Next is the 168-pin DIMM. If you look carefully at it, you will notice the
notches in each side of the module. Instead of having to install this module
by inserting it at a 45-degree angle and rocking it back, this module slides
into its slot with rocker arms on each side. You start the installation by opening the rocker arms, and when you push the DIMM into the slot, the rocker
www.sybex.com
Cache Memory
135
arms close and lock the module down. The rocker arm will then hold the
module firmly in place, eliminating any chip creep.
Now that we know what memory physically looks like, lets see how it
is used.
Cache Memory
For your basic server, there are two types of memory: cache memory and
main memory. Main memory is referred to by a variety of names, including
Dynamic Random Access Memory (DRAM) or just plain ol RAM. DRAM is
the part of memory that is responsible for holding instructions and for holding
data that will be used by the applications running on your server. It is also used
by the server operating system itself. When the servers CPU executes an instruction from an application, it goes out to RAM to see if there is information stored
in memory that it can use. DRAM is kind of the holding area for information
that may be accessed in the near future. Depending on the server, the amount of
DRAM can measure in the gigabytes.
There is another type of RAM, called Static Random Access Memory
(SRAM). Your first question is probably, Wait a minute. How can it be
static and random at the same time? Good question! SRAM is called static
because the information doesnt need to be updated very often. With memory, this update process is called a refresh. SRAM is usually physically bulky
and limited in its capacity. SRAM usually comes in a DIP. SRAM can be used
for cache. Lets start looking at cache and then we will explore the different
types of main memory.
Cache comes in much smaller amounts and it is much faster than main
memory. It is usually measured in the kilobyte range. The express purpose of
cache is to make it easier for the component to respond to request for services. Cache memory is used for the processor, it is used for RAID controllers, and it is even used for some types of network cards. In this section, we
are going to look at how a processor uses cache, how RAID uses cache, and
the differences between write-back and write-through cache. (You
might have noticed these quoted terms can also be spelled write-back and
write-thru. Either way, they mean the same things.)
Processor Cache
When a processor wants to access information, it wants that information as
quickly as it can get it, by using the fewest number of clock cycles. When you see
listings for the cache memory that will be used expressly for the processor, note
Copyright 2001 SYBEX, Inc., Alameda, CA
www.sybex.com
136
Chapter 4
Memory
that it comes in either Level 1 cache (L1), or Level 2 cache (L2). Level 1 cache
is physically in the actual processor itself. Level 2 cache is usually part of the
mainboard and is dedicated strictly to providing memory for the processor.
Cache memory is always SRAM. SRAM can be on a DIP, a SIMM, or a
DIMM. The cache memory controller is the brains of the cache memory system. When the cache memory controller goes out to get an instruction from
the main memory, it will bring back the next several instructions and keep
them in cache, also. This happens because it is very likely that these instructions will also be needed. Because the instructions are already loaded in
memory, when the CPU makes the call for them, the instruction will be read
from cache, making the computer run faster. When the computer runs faster,
the user is happier and the network administrators life is easier.
So whenever you see the term cache, remember that this is just another
way to speed things up. Any time something can be read from memory,
rather than having to go to the hard disk or to the BIOS to find the information, it is going to take less time. Cache is just a segment of memory that has
been reserved by the component involved to temporarily store information
or instructions for faster retrieval.
Now, another place where cache memory is used is in RAID systems.
RAID Cache
RAID cache is a perfect server implementation for cache to come into play.
Think about it. You have several hundred people trying to access information from a RAID system or write information to the subsystem, almost
simultaneously. Now, I dont know about the users you have dealt with, but
the users on my network never understood the word patience. The biggest
complaint, it seemed, that people had was the speed of the network. Certainly, those few extra seconds were going to materially affect the standard
of living of some of these people!
Anyway, assume that we are looking at a busy server, or a server that is
dealing with lots of small I/O reads and writes. In this case, if the RAID controller were to become overwhelmed with work, it might have to put some
of the requests on hold while catching up. This is usually not a good thing.
So, the RAID controller uses cache as sort of a waiting room for requests. If
it cannot answer the request immediately, it may place the request in cache
until it can get to it.
As you imagine the differences between L1, L2, and RAID cache, notice
that one of the biggest differences is in size. L1 and L2 are measured in kilobytes while RAID cache is measured in megabytes. As a matter of fact, several
RAID controllers have minimum sizes before the cacheing will kick into effect.
www.sybex.com
Cache Memory
137
Write-back memory, on the other hand, has the CPU updating the
cache during the write, but the actual updating of the main memory is
postponed until the line that was changed in memory is discarded
from cache. At that point, the data that has been changed is written
back to main memory.
www.sybex.com
138
Chapter 4
Memory
Main Memory
Now we have to look at how all the other memory within the system
works.
So, what do you know about main memory so far? Just that the CPU uses
memory to store information and instructions that it may need later. The
more memory you have, obviously, the more instructions or information can
be stored there. But how is it stored there? We have already looked at one
memory technique when we looked at cache. Lets take a look at a couple of
other ways that memory is used. We are going to look at paged memory,
interleaved memory, and shadow memory before we get into error correction, parity, and all that fun stuff. Some of this stuff may not be part of the
objectives, but, for example, you have to understand how paged memory
works before you can understand why interleaved memory is better.
Paged Memory
A year ago, I bought a file server to use in my lab. When I bought the server,
one of the things that the base server was short on was memory. When I
checked the vital statistics on the server, the marketing information said that
it takes just plain old standard memory, so I figured memory is pretty cheap.
I can slap a few DIMMs in there and bring it up to where I want it to be.
Since it is a lab server, it is older and I bought it for a very good price, so I
figured I could add memory without a problem. When I received the server
and also received the technical specifications, it called for fast paged mode
(FPM), error correction code (ECC) memory. That stuff is pricey. Now,
instead of looking at $150 for a 128MB SIMM, I was looking at $500 for a
pair of SIMMs that equal 128 MB. So I did some research and this is what
I found.
Typical memory access by the memory controller is handled in a way that
is similar to reading a book. Just like reading this book, if you want information on paged memory, you access this page. With memory, if it wants
access to certain information, it just accesses the memory page. Once the
page has been accessed, then the information can be gathered in. This process works just great when you are talking about workstations that dont
necessarily have to access information out of memory a lot. When you start
talking about a server, this is a different story. See, with straight paged mode
memory, every time the system wants a bit of information it has to go and
access the appropriate page. With fast page mode memory, this delay is overcome by letting the CPU access multiple pieces of data on the same page,
www.sybex.com
Main Memory
139
without having to relocate the page each and every time. This works as long
as the read and the write cycles are on the loaded page.
Fast page mode has certain benefits. For example, there is less power consumption because the pages will not have to be located or sensed each time.
I am pretty sure that the implementation of FPM will not amount to a massive reduction in our electric bill. FPM also has some drawbacks, not the
least of which is price. So, if you can, avoid my mistake, and avoid FPM.
Paged mode memory, on the other hand, simply divides up the RAM in
your system into small addressable groups or pages. The pages can be from
512 bytes to several kilobytes long. The improved memory management on
mainboards has now advanced to the point that it is very similar to fast page
mode, where subsequent memory access from the same page is accomplished
without the CPU having to wait for the memory to catch up. This is referred
to as zero wait state. If the access does take place off the current page, there
may be one or more wait states added while the new page is located.
Now dont confuse paged mode memory with the way Microsoft
Windows 2000 and Novells Netware 5.1 use page files to increase memory.
Before we get into interleaved memory, lets look at that.
www.sybex.com
140
Chapter 4
Memory
Page files work like this. When your server comes up, the network operating system (NOS) takes a look at the amount of free space that you have
on your disk subsystem and the NOS then takes part of that free space and
creates what is called a page file. The page file is only for the use of the operating system. This isnt a high-level secret place for network administrators
to store stuff. Now, as we have seen, as the server gets busy, it takes information that it needs, and moves that information into memory. Because it is
a busy server, the length of time instructions can stay in memory may be
exceptionally limited. When it comes time for the information to be flushed
from memory, the system has two choices: It can flush the information from
memory, so the next time it needs that information it can go back to the
application to locate it, or it can move the information to the page file, where
it will be more readily available.
Page files and virtual memory have a language all their own. For example, a
page fault occurs when your system is looking for information in RAM and
cannot find it, so it has to refer to the page file. This is referred to as a page
fault. Page faults then come in two varieties; soft page faults and hard page
faults. Information in memory is stored in frames. When the information is
moved to page files, there has to be a place to temporarily keep that data, and
these are called free frames. The plan is that these frames will be moved into
buffers and then written to disk before replacement data comes along. If a
page fault occurs, and the data is in one of the free frames that has not actually
been written to disk, this is called a soft page fault. If the data has already been
written to disk, it is a hard page fault. Soft page faults are handled more
quickly than hard page faults.
Page files are just near-line storage for information that otherwise would
be stored in memory. So, take a look at Figure 4.4 and you will see how the
CPU uses its memory.
www.sybex.com
Main Memory
FIGURE 4.4
141
CPU
Cache
Main memory
Disk
Page files, or disk swapping, are part of a concept called virtual memory.
The virtual memory concept works like this: In a 32-bit computer, the maximum amount of memory that can be conceived is 4GB. The page file system
or the disk swap space is just an area on the hard disk that can be used as an
add-on to the main or physical memory. The page file then is all the memory
that can be used, and the physical memory is the memory that physically
exists. Look at Figure 4.5 and see if that makes it any clearer.
www.sybex.com
142
Chapter 4
Memory
FIGURE 4.5
Virtual memory
Disk swap
space
Main
memory
So, with virtual memory space, you are dealing with an address that can
be conceived of but doesnt really correspond to any real memory. If something tries to access it, that attempt generates an error. With page file or swap
file space, if the address is read, the information is on the disk, so it has to be
moved to main memory. This is faster than searching an entire disk because
the memory table has the actual disk location mapped.
Finally, there is the main memory. When the processor wants something
from main memory, it is available immediately.
So, page file memory isnt really memory, kind of. It is virtual memory.
Lets get back to the real stuff and look at interleaved memory.
Interleaved Memory
In the eternal quest to make things faster, the next step up the memory food
chain is interleaved memory. The whole reason for using interleaved memory is
that provides faster response time than paged memory. Check out Figure 4.6.
This is the way paged mode memory accesses information, one step at a time.
www.sybex.com
Main Memory
FIGURE 4.6
143
Non-interleaved memory
CPU
Bus
Cache
Bus
Memory
Compare that to Figure 4.7, which shows the way interleaved memory
accesses four memory chips.
www.sybex.com
144
Chapter 4
Memory
FIGURE 4.7
Interleaved memory
CPU
Bus
Cache
Bus
Memory Bank 3
Bus
Memory Bank 2
Bus
Memory Bank 1
Bus
Memory Bank 0
Interleaved memory combines two banks of memory into one. The first
section of memory is even and the second is odd, so memory contents are
alternated between these two sections. When the CPU begins to access memory, it has two areas that it can go to. With faster processors, they dont have
to wait for one memory read to finish before another one can begin. This
means, for example, that memory access of the odd portion can begin before
memory access to the even portion has completed.
The good news is that interleaving can double your memorys performance. The bad news is that you have to provide twice the amount of memory in matched pairs. Just because your PC says it uses interleaving and
allows you to add memory one bank at a time, do not be confused. The computer is simply disabling interleaving and you may notice a degradation of
system performance.
www.sybex.com
Main Memory
145
Shadow Memory
Besides the various types of RAM being used on your server, there is also
memory that is read only. Not surprisingly, it is referred to as Read Only
Memory (ROM).
Testing Tip: If you are like me, once you walk into a testing room, you start to
freeze up and question everything, thereby confusing yourself! And, I tend to
forget what it is that certain things dofor example, Read Only Memory. One
of the things that I have found helpful is to pay close attention to what the
words mean, because unlike marketing or management speak, computerese
tends to be very descriptive. I mean, when you see ROM, if you know the acronym stands for Read Only Memory, you have a really good clue what that stuff
is used for. If it had been named by someone in marketing or management, it
would have been called something like silicon-enhanced, integrated longterm memory paradigm used only for perusal and not for continuous reconfiguration in this regard unless we have at least three meetings. You get my
point!
ROM devices are things like the Basic Input/Output System (BIOS) on
your mainboard. These devices tend to be very slow, with access times in the
several hundreds of nanoseconds. Because your CPU is much faster than
that, ROM access requires your CPU to go through a large number of wait
states before returning instructions, and that just slows down the whole systems performance. How big of a deal is that? Well, think of the things that
have their own BIOS:
Mainboards
Video cards
SCSI controllers
These are things that will be accessed very frequently, so you can see where
it could become an issue. Some computers use a memory management technique called shadowing. When shadowing is employed, the contents of
ROM are loaded in to an area of the faster RAM during system initialization. Then the computer maps the fast RAM into memory locations used by
the ROM devices. After that is done, whenever the ROM routines have to be
accessed, the information is taken from the shadowed ROM rather than
accessing the actual IC. In this way, the performance of the ROM can be
increased by more than 300%.
www.sybex.com
146
Chapter 4
Memory
If you pause a minute and take a look at the big picture, you are going
to see that we are talking about some pretty serious stuff. We are talking
about information sets on how the computer will operate, as well as program
information, and data is being moved into and out of memory at a rapid rate.
If that information is not moved correctly, nothing works properly, and your
life is not very much fun. So, it is vitally important that all of the instructions
and all of the data remain error-free. Think about all the things that can
result in corrupt instructions:
Electrical noise
Component failure
Video problems
www.sybex.com
147
Parity in the memory subsystem works like this: When a byte is written to
memory, it is checked, and a ninth bit is added to the byte as a checking or
parity bit. When the CPU needs to access the information from memory, the
CPU runs the numbers and calculates the expected parity bit. At that point,
the parity bits are compared and, if they match, the information is deemed
correct. If the parity bits do not match, the system comes up with an error
and, depending on the sophistication of the system, it may actually halt.
Every byte is given a parity bit. If you are working with a 32-bit PC, there are
4 parity bits for every address. If the PC is a 64-bit model, the number of parity bits increases to 8.
There are two types of parity: even parity and odd parity. With even parity, the parity bit is set to 0 when the number of 1s in the byte is even. That
will keep the number of 1s in the calculation even. If the number of 1s in the
byte is not even, then the parity bit will be set to 1, thus making the number
of 1s even.
The reverse is true with odd parity. In this case, the system wants to make
sure there is always an odd number of 1s in the byte. So, if the number of 1s
in the byte is odd, the parity bit is set to 0. If the number of 1s in the byte
is even, the parity bit restores order by being a 1.
If you look at this, you are going to notice that even and odd parity are
exactly opposite, and that is OK. It does not matter in the greater scheme of
things.
Like most things that are simple and are free, parity has some shortcomings.
First of all, when it discovers a problem, it cannot fix the problem. It only
knows that one of the bits in the byte has changed, but it doesnt know which
bit and it doesnt know if it changed from 0 to 1 or from a 1 to a 0. Also, what
happens if 2 bits are corrupted? If a 0 gets changed to 1 and another 0 gets
changed to a 1, as far as parity is concerned everything is wonderful.
Given this scenario, like most things in computing, someone decided there had
to be a better way, and that better way was called Error Correction Code (ECC).
ECC Memory
Like everything else, memory schemes evolve, and people whose priorities
are high availability and high reliability understand that higher cost usually
follows. ECC memory works in conjunction with the mainboard memory
controller to add a number of ECC bits to the data bits. Now, when data is
read back from memory, the ECC memory controller can check the ECC
data read back as well.
www.sybex.com
148
Chapter 4
Memory
This means that ECC memory is superior over memory with just parity
for two reasons. First, ECC memory can actually correct single-bit errors
without bringing the system to a halt. It can also detect when there have been
2-bit, 3-bit, or even 4-bit errors, which makes it a very powerful detection
tool. If there is a multi-bit error detected, the ECC memory will report the
error and the system will be halted.
There is some additional overhead with ECC. It takes an additional 7 or
8 bits to implement ECC.
Have you ever wondered if there was a way to determine whether your system has parity or ECC memory? There is. All you have to do is count the number of memory chips on each module. Parity and ECC memory modules have
a chip count that is divisible by 3. Any chip count not divisible by 3 indicates
that the memory module is non-parity.
www.sybex.com
149
Unbuffered memory
Unbuffered memory talks directly to the chipset controller. There is nothing
standing between the memory module and the controller. Therefore, information is written quickly to memory, with very little overhead.
Buffered
Buffered memory is a DIMM that has a buffer chip on it. If you are using a
DIMM with lots of chips on it, it requires a lot of effort on the part of the system
to write information into memory. Some manufacturers will use a re-drive
buffer on the DIMM to just boost the signal and reduce the load on system. The
buffers are overhead and therefore they introduce a small delay in the electrical
signal.
Registered
With registered memory, the DIMM contains registers that will re-drive or
enhance the signal as it goes through the memory chip. Because the signal is
being enhanced, there can be a greater number of memory chips on the
DIMM. Registered memory and unbuffered memory cannot be mixed.
Just like buffered memory, registers slow things down. Registers delay
things for one clock cycle to make sure that all communications from the
chipset have been collected. This makes for a controlled delay on heavily
used memory.
www.sybex.com
150
Chapter 4
Memory
answer she liked, but she did it, and lo and behold, the number of calls
decreased and her skill level increased. She began to see the humor in the
whole thing, and that is why she gave me a shirt monogrammed with RTFM,
and the note that said I should wear that during difficult classes.
Now this really is a do-as-I-say-and-not-as-I-do situation, because I have
been there, done that, got the T-shirt, and therefore should not have to read
the manual. Every time I take that attitude, I am immediately shot down by
doing something incredibly stupid (and usually costly) to prove the point.
So, let me put it to you this way. Whether you have just gotten a new copy
of the SuperWhizBang 6000 Operating System, or you need to put a card in
a computer, it never hurts to check the hardware compatibility list to see if
that card will actually work in the system. Or, if you really want to be daring,
you can read the compatibility list before buying the card, thus saving yourself time and frustration. These things are written for a reason, and they are
usually on the Internet or come with the program. Check to make sure your
system meets minimum requirements and you will save yourself tons of
headaches later.
www.sybex.com
New Stuff
151
Now, when I am buying for my lab, the worst thing that is going to happen is that
I will have a stack of components on my bakers rack that will probably never see
the inside of a server. If I were doing this at a client site, I would have wasted the
clients money and time, not to mention shooting my credibility! When I make a
purchase for a client, I am very careful to make sure that the component appears
on the HCL. If the proposed solution does not appear on the HCL, I then check the
manufacturers web site to see if there is support available. If there is alleged support available, I then download the drivers and test the component in a lab
machine before trying to install it in a production environment. Remember, we
want our servers to be high availability, and if we take a server down, we have to
make sure that the time out of service is used to the best advantage.
New Stuff
here are some other memory technologies whose names you may run
into that we havent covered here: Rambus (RDRAM) memory, Double Data
Rate SDRAM (DDR SDRAM), and IBM Memory Expansion Technology
(MXT). Since two of these types of memory require special mainboards, it is
important that you know what the specifications mean before you fill out a
purchase order for new memory for your server.
RDRAM
RDRAM is an Intel invention that got off to a rocky start. And its life hasnt
been too great either. Rambus was originally supposed to be the next great
memory advance, but then it got bogged down in life. Delivery was late,
there were squabbles between Intel and memory manufacturers that led to
lawsuits, and then when Rambus finally did hit the market, performance was
nowhere near expectations. In published reports, Intels own benchmarks
showed that less-expensive SDRAM technology running at 133MHz outperformed RDRAM running at 800MHz.
When Intel brought RDRAM to market, they wanted the manufacturers
to pay a licensing fee to Intel for the technology. Well, since the margin in
memory is nonexistent and the traditional memory shopper is looking for
price as well as performance, this strategy did not go over well.
www.sybex.com
152
Chapter 4
Memory
DDR SDRAM
DDR SDRAM is like normal SDRAM in many ways. For example, it works
with the front-side bus clock in the system. The memory and the bus run
instructions simultaneously. This means that, as bus speeds have increased,
so has system performance.
The big difference between the two is the way that DDR reads the data.
It has found a way to effectively double the speed of the SDRAM. This means
that if the data rate is usually 133MHz, DDR will transfer data at a rate of
266MHz.
DDRs also come in DIMMs, but they will not fit in the standard SDRAM
slot so you have to use a specially designed mainboard. The same problem
with configuration carries over to the laptop market. The SO DIMMs will
need a specially designed mainboard also. The DIMMs will have different
notchings and a different number of pins.
DDRs come in ECC for servers, and non-ECC for workstations.
DDR vs Rambus
In a study done by InQuest Market Research in November 1999 (http://
www.inqst.com/ddrvrmbs.htm), it was reported that the performance differences were negligible between Rambus and SDRAM.
Yeah, but that is SDRAM. What are the performance statistics for Rambus and DDR? InQuest used a benchmark called the SteamD that has been
released by the University of Virginia. This benchmark is designed to evaluate the bandwidth of memory to the processor. The margin of error for this
benchmark is less than 1%. In this study, DDR beat out Rambus by a significant margin in all tests, exceeding 30% in some cases and averaging 24.4
% performance advantage for this benchmark.
There is another version of the testing suite, this one to show the memory
types that work with Windows. This benchmark is WSTREAM.EXE.
According to the developers, the compound precision error rate is in the
range of 30%, and the developer has said that the program is inaccurate
under Windows NT 4. In tests using Windows 98, InQuest showed that the
DDR performance advantage had decreased to just 2.7%.
www.sybex.com
Increase Memory
153
Keep in mind, this study was done in the fall of 1999, and the way memory
technology has changed, all bets could be off by the time you read this. As a
matter of fact, at the time this study came out, neither Rambus or DDR had
been released to the general public yet. Do your research before filling out the
purchase order for any new technology.
Increase Memory
www.sybex.com
154
Chapter 4
Memory
www.sybex.com
Increase Memory
155
you cant go putting 70ns DIMMs in the computer and hope that things work
correctly. As a general rule of thumb, youll want to closely match whats
already in the computer. There are several things to consider:
Capacity What is the capacity of the RAM thats currently in the computer? What is the maximum RAM capacity that the computer is capable
of handling? If your computer can handle a maximum of 128MB of RAM
and youve already got 64MB in the computer you can only add 64 more
megabytes to the computer before its satiated.
Brand If your manufacturer documentation doesnt have any particular
brand in mind for RAM upgrades, be sure that you pick a known reputable
vendor for your RAM. Dont try to short sheet your server by purchasing
from an unknown vendor so you can save a buck or two. Youll likely find
that the RAM doesnt work correctly and that youll have lots of problems
with it.
Speed What is the speed of the RAM, in nanoseconds, thats currently in
the computer? You cannot mix and match RAM speeds. Its vital that you
match the RAM speed currently in the computer with the speed youre
planning on adding.
EDO Extended Data Output (EDO) RAM has the capability of retrieving
the next block of data at the same time as its sending the previous data
block to the CPU. Do not mix and match EDO and non-EDO RAM. You
might experience difficult-to-diagnose erratic activity with the computer
after upgrade.
ECC/Non-ECC Error Correcting Code (ECC) memory has the ability
to check the validity of the data as its passing into and out of the chip. Its
not as vital to make sure you dont mix up ECC with non-ECC memory.
You may want to consider purchasing all ECC memory for your server
and throwing away any non-ECC chips you might encounter.
SDRAM/RDRAM Synchronous Dynamic RAM (SDRAM) has the
capability of running substantially higher clock speeds than older RAM
chips. Newer SDRAM chips can run at a systems 100MHz bus speed,
thus producing significantly faster throughput. But they bog down when
running much faster than 100MHz. Rambus Dynamic RAM
(RDRAM), a RAM chip invented by Rambus, Inc. (www.rambus.com)
can run at phenomenally higher clock speedsa maximum of 600MHz
as of this writing. Thus, as newer system buses come out that are capable
of running at higher clock speeds, RDRAM can keep up with the activity. Another kind of RAM, a competitor to RDRAM being designed by
www.sybex.com
156
Chapter 4
Memory
Oftentimes a computer manufacturers Web site will list the kind of memory
that originally shipped with the computer, thus giving you some documentation that you can utilize when purchasing compatible additions.
www.sybex.com
Summary
157
This isnt any big deal. Just go into the BIOS, verify that the new memory
size has registered, and then exit, saving changes (being careful not to change
any other BIOS options!). The server will restart and this time youll see it
successfully count and pass through power-on without generating any more
errors.
Once the OS has loaded, verify that it sees the correct amount of memory
as well. If you encounter any problems, note any errors that are reports in the
logs. Ive never had a problem with an OS not recognizing the proper
amount of RAM if the BIOS has successfully noticed and registered it.
Summary
www.sybex.com
158
Chapter 4
Memory
Exam Essentials
Know the differences between L1 and L2 processor cache. L1 cache is
actually on the processor. L2 cache is usually part of the mainboard and
is used exclusively for the processor, but it is not part of the processor. L1
and L2 cache are measured in kilobytes.
Know why Raid uses cache. RAID systems use cache to improve
throughput and speed up disk reads and writes. RAID cache is measured
in megabytes.
Know the difference between write-back memory and write-through
memory. Write-through memory writes information to cache and to
main memory at the same time. Write-back memory has the CPU updating the cache during the write, but the actual updating of the main memory is postponed until the line that was changed in memory is discarded
from cache.
Know how memory interleaving works; know how paged memory
works. When your server comes up, the network operating system
(NOS) takes a look at the amount of free space that you have on your disk
subsystem and the NOS then takes part of that free space and creates what
is called a page file. The page file is only for the use of the operating system. The page file is then used to hold information from memory that may
be used again in the near future.
Know the difference between page faults, soft page faults and hard page
faults. A page fault occurs when your system is looking for information
in RAM and cannot find it, so it has to refer to the page file. This is
referred to as a page fault. Page faults then come in two varieties; soft page
faults and hard page faults. Information in memory is stored in frames.
When the information is moved to page files, there has to be a place to
temporarily keep that data, and these are called free frames. The plan is
that these frames will be moved into buffers and then written to disk
before replacement data comes along. If a page fault occurs, and the data
is in one of the free frames that has not actually been written to disk, this
Copyright 2001 SYBEX, Inc., Alameda, CA
www.sybex.com
Summary
159
is called a soft page fault. If the data has already been written to disk, it
is a hard page fault. Soft page faults are handled more quickly than hard
page faults.
Know the difference between ECC memory and EDO memory. ECC is
error-correcting memory. EDO memory just lengthens the amount of
time information can be stored in memory before it is sent to a page file,
or discarded.
Know the difference between unbuffered, buffered and registered memory.
Unbuffered memory writes information directly to the chipset controller.
Buffered memory uses buffered chip to boost the signal and ease the strain
on the system. With registered memory the DIMM contains registers that
will re-drive or enhance the signal as it goes through the memory chip.
Know when to use a hardware compatibility list. Whenever you add
hardware to a server, check the NOS hardware compatibility list. If the
component does not appear on the HCL, check the components manufacturers web site to make sure the appropriate drivers are available.
When in doubt, dont install the device.
RAM upgrade. Know and understand how to upgrade system RAM
and what components to check for when shopping for upgrade RAM.
Key Terms
Before you take the exam, be certain you are familiar with the following terms:
Basic Input/Output System (BIOS)
buffered memory
cache memory
Double Data Rate SDRAM (DDR SDRAM)
Dual Inline Memory Module (DIMM)
dual inline package (DIP)
Dynamic Random Access Memory (DRAM)
error correction code (ECC)
even parity
www.sybex.com
160
Chapter 4
Memory
www.sybex.com
Summary
unbuffered memory
write-back memory
write-through memory
zero wait state
www.sybex.com
161
162
Chapter 4
Memory
Review Questions
1. What does DIP stand for?
A. Dual internal processors
B. Dynamic Induction Processing
C. Dual Inline Package
D. Dynamic Inline Package
2. SIMMs came in which pin configurations?
A. 28-pin
B. 30-pin
C. 64-pin
D. 72-pin
3. With how many data bits were computers working when the 30-pin
www.sybex.com
Review Questions
163
www.sybex.com
164
Chapter 4
Memory
www.sybex.com
Review Questions
165
Two of the slots have 64MB DIMMS in them already. Suzanne wants
to add a 128MB DIMM, giving the system a total of 256MB of total
system memory. When she adds the DIMMS, the power-on self-test
memory count shows the full 256MB but she now gets an error telling
her to adjust the BIOS. What could be the problem?
A. Nothings wrong.
B. Cant pair DIMMS of different capacities.
C. First two DIMMS are ECC DIMMS, new ones not.
D. First two DIMMS are silver-tipped, new ones not.
16. You are going to install interleaved memory. What is the minimum
www.sybex.com
166
Chapter 4
Memory
ECC cannot.
B. ECC is cheaper because the code is actually embedded into a code
detect when there have been 2-bit, 3-bit, or even 4-bit errors.
D. There is no difference.
19. You have a memory module with nine chips on it. What kind of
memory is it?
A. Either parity or non-parity
B. Non-parity only
C. ECC only
D. ECC or parity
20. You have a server that is RAM-starved. You purchase a DIMM from
manufacturer.
B. System requires DIMMs to be installed in pairs.
C. Youve exceeded the systems memory capacity with the DIMM
youre adding.
D. System BIOS needs to be adjusted.
www.sybex.com
167
groups of 4.
5. A. Each 72-pin SIMM supported 32 data bits.
6. A. With 72-pin SIMMs, just one module would provide the necessary
32 data bits.
7. B. The two banks were referred to as Bank 0 and Bank 1.
8. D. DIMM stands for Dual Inline Memory Module.
9. C. With a DIMM, the opposing pins remain separate and isolated to
www.sybex.com
168
Chapter 4
Memory
has 70ns DIMMs currently installed, she could run into trouble.
Also, if the server shes trying to upgrade has proprietary memory in
it, she could create some problems by not buying manufacturerrecommended DIMMs for the system. Additionally, its not a wise
idea to match ECC with non-ECC memory and so forth. Generally
its a good idea to ascertain whats currently in the system and match
accordingly. The kind of contacts each DIMM has shouldnt affect
the systems operation.
15. A. In almost all cases, after you add memory to a system, you have to
go into the system BIOS and acknowledge that the current memory
count is correct.
16. B. Interleaved memory combines two banks of memory into one, and
the system to a halt. It can also detect when there have been 2-bit, 3-bit,
or even 4-bit errors, which makes it a very powerful detection tool.
19. D. Where the number of chips is divisible by 3, it can be either ECC or
parity memory.
20. A, B. First of all, you should always consult the manufacturers guide-
www.sybex.com
Chapter
System Bus
Architecture
SERVER+ EXAM OBJECTIVES COVERED IN
THIS CHAPTER:
3.7 Upgrade peripheral devices, internal and external
www.sybex.com
h, yeah, now we are a getting into it. If you take the case
off a server, one of the first things you are going to notice is that big green
board that everything else plugs into. Call it a mainboard, call it a motherboard, call it whatever you want, that is where all the information must
pass to go anywhere. Everything else we have been talking about wont
work at all if there is something wrong with the motherboard. In this chapter we are going to look at what sets this component apart and how all the
various parts come together to communicate.
If you have taken the A+ exam, some of the information we are going to
cover will probably be review, but that is not a bad thing. Review can usually
help us all! We are going to start this section by talking about bus basics and
then move into the way the Peripheral Component Interconnect (PCI) local
bus works. At that point, we will cover most of those objectives listed above.
All of these topics relate to information flow and the speed with which it
moves through the server and out to the network.
Bus Basics
You may have noticed that in Chapter 4, Memory, there were several references to the bus speed that went without explanation. My reasoning was
that I would use that as a promo for the good stuff in Chapter 5. So, what is
a bus? A bus is a set of signal pathways that allow information to travel
between the components that make up your computer. These components can
www.sybex.com
171
This discussion is going to make use of some terms that were defined and discussed in earlier chapters: DMA and Bus Mastering. Because these are important
concepts, we will take a couple of sentences to review them here. A Direct Memory Access channel is a channel that a peripheral device can use to write specifically to a set memory address. DMA channels cannot be shared, and the device
does not use the CPU to access memory. Bus Mastering is similar. It is the ability
of a device to perform its function without needing to access the CPU. It writes
information to memory without accessing the CPU.
Interrupts
Interrupts are amazing things. When you have installed a component properly,
it is up to the interrupt to get the attention of the CPU when the component has
information or data to send. If the card is not installed properly, and you have
chosen an interrupt that is already being used, the card will either not function
or the system will completely lock up. Fortunately, with the PCI Bus, each
expansion slot (rather than the card) is assigned an interrupt, so the problem
of misconfigured components has been minimized.
When a card or peripheral has some data to send, it uses something called
an interrupt requestor (IRQ) line. The IRQ is kind of like a student in class
holding up her hand to get the attention of the instructor. In this case,
though, the peripheral is trying to get the attention of the CPU.
Each type of bus has several different types of IRQs, and some of these
IRQs are reserved. For example, IRQ 0 and IRQ 1 are used by the processor
for special processor stuff. The other IRQs can be allocated depending on the
peripherals that are installed.
www.sybex.com
172
Chapter 5
IRQs are finite, meaning there are only a few that can be used. If your server
has several different peripherals that are not PCI, you could conceivably run
out of IRQs.
Expansion Slots
If you were to look closely at an expansion slot, you would see that it is made up
of several tiny copper finger slots. Each finger slot has a row of very small channels that make contact with the fingers on the expansion circuit board. These
finger slots are then connected to the pathways on the motherboard, and each of
the pathways has a specific function. One of the pathways provides the power
necessary to run the expansion card. Another set of pathways is the data bus,
which, as the name implies, transmits data to and from the processor. Another
set of pathways makes up the address bus. The address bus, you will remember,
allows the device to be addressed, or contacted, by the CPU, using a set of Input/
Output (I/O) addresses. There are also pathways for things like interrupts, direct
memory access (DMA) channels, and clock signals.
It is really pretty easy to tell what type of expansion bus you are using, just
by looking at the motherboard. As you have probably figured out by now,
I am big time into the history of computing, and it is never a bad thing to
know where the industry has come from. Some of these you may never see,
unless you go through a hardware museum, but it never hurts.
ISA 8-Bit Bus
Back in the early days, the expansion bus was only 8 bits wide and had a
blazing speed of 4.77 MHz. There were just eight interrupts (we will talk
about those in just a few pages) and just four DMA channels. By todays
www.sybex.com
173
standards, this is slower than horse and buggy, but for the day it was blazing
fast. Since this was the very first PC Bus, and since it was designed by IBM,
the original makers of the IBM PC, they referred to this architecture as
Industry Standard Architecture (ISA). The 8-bit bus connectors are shown
in Figure 5.1, and an 8-bit bus expansion card is shown in Figure 5.2.
FIGURE 5.1
If you look carefully at the picture above, notice how wide those finger slots
were. We will be able to compare those with newer technology in just a second. Here is the type of card that took advantage of that slot (see Figure 5.2).
FIGURE 5.2
www.sybex.com
174
Chapter 5
Motherboard
So, what you have here is the old 8-bit slot with an add-on. The ISA Bus
also helped expansion by adding eight more interrupts and four more DMA
channels. It was quite easy to spot the kind of board that fit these new ISA
slotsthey looked like Figure 5.4.
www.sybex.com
FIGURE 5.4
175
16-bit
connector
8-bit connector
If you look closely at the card, you will see that toward the front of the card
there is an 8-bit connector, separated from the read connector by a slot. This
architecture was really interesting because of compatibility. For example, if the
expansion card was an 8-bit card, it would run in either an 8-bit or a 16-bit
slot. It you had a 16-bit card, it would naturally run in the 16-bit slot for which
it was designed, but it would also run (albeit a lot slower) in an 8-bit slot. So,
pretty much everything was compatible with everything else.
Micro Channel Architecture (MCA)
About this time in the history of computing, the company that invented the
PC, IBM, was beginning to think the world was passing them by. Their share
of the market was steadily declining and they figured that they had to do
something to get it back. That something was the Personal System/2 (PS/2).
Along with the PS/2, IBM was introducing a new type of data bus called
Micro Channel Architecture (MCA). This bus was supposed to put the ISA
Bus out of business by utilizing a smaller connector with thinner fingers.
MCA was revolutionary because it was available in either 16-bit or 32-bit
versions. Secondly, it could have several Bus Mastering devices installed, and
the bus clock speed was about 25% faster than the old 8 MHz systems,
screaming along at 10 MHz. The really revolutionary part of the puzzle was
the way that you configured the expansion cards. In all the other bus technologies, the cards were configured by jumper settings, or by DIP switches.
With MCA, device configuration was done with software. These were the
first software-configurable expansion cards.
www.sybex.com
176
Chapter 5
This was an interesting concept, but it had some problems. First of all, all
device configurations were done from a single boot diskette that contained all
the information files for all the devices. When you made a change, the change
was not only written to the card, it was also written to this diskette. That diskette was the only diskette that knew what was in the system and how each
device was configured. At the time, I was working doing onsite hardware support. Whenever I ran into a PS/2 device (and some of them were servers) I
knew there was going to be trouble. I would ask for the configuration diskette,
and usually receive a blank look from the customer. It was then up to me to
find a PS/2 diskette and configure the entire system from scratch. Great idea,
but they forgot to take it that one extra step of either saving the configuration
files to a disk or making the devices able to provide configuration information
if asked by a setup program.
You could always tell an MCA card: They dont call IBM Big Blue for
nothing! Look at Figure 5.5.
FIGURE 5.5
As with most things that came out of IBM at the time, the MCA architecture was very proprietary. At a time when the buzzword was compatible,
IBM wasnt. In addition, IBM charged vendors who developed their own
expansion cards 5% of their gross receipts. Even way back then, margins
were slim on computer hardware, and this put the cost of MCA peripherals
out of sight.
www.sybex.com
177
EISA
Back in the late 80s to early 90s it was still a computer war out there. IBM was
selling PCs because they were IBM. The catch phrase at the time was, You
can never get fired for buying IBM. But there was competition, led by the
Gang of Nine. The Gang of Nine was made up of nine computer manufacturers that thought there had to be a better way than MCA to get faster speeds.
The Gang of Nine consisted of some of the top names in the industry at the
time: AST, Compaq, Epson, Hewlett-Packard, NEC, Olivetti, Tandy, Wyse,
and Zenith. They began to offer an alternative to MCA called Extended Industry Standard Architecture (EISA). For a while, EISA was popular in both 386
and 486 computers until about 1993 when PCI came along.
EISA had many of the same things going for it that MCA had, but it also
had compatibility with the older ISA board. Take a look at Figure 5.6 and
Figure 5.7.
FIGURE 5.6
Now, one of the things you do not see in that picture is how deep the connector slots really were. They were about twice as deep as the old ISA slots
and 8-bits slots. Compatibility was done by staggering the finger slots. Look
closely at Figure 5.7 and you will see that some of the grooves are longer than
others.
www.sybex.com
178
Chapter 5
FIGURE 5.7
With this type of setup, if you were installing an 8-bit card, it would only
go so deep into the expansion slot. A 16-bit card would go as deep, but use
the back connector. An EISA card on the other hand, would slip all the way
to the bottom of the connector, making a 32-bit data path.
EISA Configuration
Are you familiar with Plug-and-Play hardware? Well, EISA was a precursor
to Plug and Play, and at the time, it was certainly a lot easier than other forms
of hardware installation.
Lets say that you were installing a new network card in an ISA-based
machine. Before you installed the network card, you had to check the computer to find out (at the very least) what interrupts were being used by other
devices. Then you configured the network card to use an interrupt that was
not being used by any other device, installed it, turned the computer on, and
ran the appropriate driver for the card. If you did your job right, the driver
would load and you had network connectivity. What usually happened, on
the other hand, was that you (okay, read that I) had guessed wrong and the
IRQ was already in use. This necessitated starting all over. Things changed
with EISA.
With an EISA Bus, on the other hand, you would take the top off the computer and install the EISA card in an EISA slot. The toughest part of the process was remembering what slot you installed it into. Anyway, after the card
www.sybex.com
179
was seated, you turned the computer on, and as part of the Power On Self
Test (POST) the computer would figure out that there was something new,
different, and interesting going on inside. The computer would ask you to
configure the device, and you would use a program called EISA Configuration (EISA Config for short) to set the IRQ, DMA, and anything else you
needed to set. All this was done via the slot number, and the information was
then saved on the card. This made a technicians life remarkably easy,
because the EISA Config utility would even go out and check to find out
what settings were already being used. That way, you almost couldnt mess
it up.
The difference between configuring a machine with MCA and EISA was
that with MCA, you needed the diskette with the configuration utility for
that specific computer. Without the specific configuration disk, you reconfigured the whole machine. With EISA, you needed an EISA configuration
utility for that brand of computer. Sometimes, EISA configuration utilities
would even work across brands. So, if you carried around a diskette with the
Compaq EISA Config on it, you could configure all Compaq EISA machines.
There were other enhancements of EISA over ISA:
The CPU, DMA, and Bus Mastering devices could make use of a 32bit memory-addressing scheme.
The data transfer protocol that was used for high-speed burst transfers
was synchronous.
EISA had better ways of handling DMA arbitration and transfer rates.
EISA finally gave way to PCI. That is what the majority of systems on
the market are using today. Lets take a closer look at the new industry
standard bus.
www.sybex.com
180
Chapter 5
ow that we have had a pleasant walk through memory lane, lets get
us closer to the present. When Intel released the Pentium processor, all of the
existing buses became instantly obsolete. Every bus up until this moment had
been of the 16-bit or 32-bit variety, and then along came the Pentium, which
was a 64-bit processor. Using a Pentium processor with a 16-bit or 32-bit
bus would be like pulling the engine out of a Ferrari and replacing it with
something from a Yugo. It just shouldnt be done and performance would
suffer greatly.
Peripheral Component Interconnect (PCI) works well with the current iteration of the processor. It can handle both a 64-bit and a 32-bit data path. It is
also processor independent, which means that it uses a form of Bus Mastering.
www.sybex.com
181
Back in the early days of PCs it was up to the microprocessor in the computer to manage every byte that was moved along the data bus. It was up to
the microprocessor to read the byte from one device or from memory, decide
where that byte belonged, and then write the byte to the proper location. Soon
it became obvious that this was a whole lot of work that could be farmed out
to other devices. The microprocessor, for example, did not need to be handling
everything that went into and out of the expansion bus. After all, the microprocessor is supposed to be the manager of the operation, and all really good
managers know how to delegate responsibilities. Bus mastering is the result of
that delegation.
With Bus Mastering, the microprocessor does not have to be involved in
every transaction. It can delegate control to special circuits called bus controllers, and these bus controllers will direct traffic between different circuits. The
actual device that takes full control of the expansion bus is called a Bus Master.
The device that will end up receiving the data from the Bus Master is called the
bus slave. Some of the more politically correct systems may call the master and
the slave the initiator and the target.
So, the bus controller can manage multiple Bus Masters, and Bus Masters
take control of the actual expansion bus through a process called bus arbitration. Each type of bus has a protocol that is used for managing this arbitration
process. That protocol can be based in hardware or software, though it is usually
hardware-based.
PCI Bridges
Bus Mastering makes it sound like there is just one bus, and that is not even
close to the truth. The average PC has several buses and these are usually
operating at different widths and at different speeds. It is kind of a system
board designers hell. Somehow there has got to be a way to hook up all
those different types of buses together and get them to work in a cohesive
way. This really took the forefront when PCI was introduced, because
remember, PCI was designed to be processor independent.
The problem was solved with something called the PCI Bridge. Think
about what a bridge does in your world. It moves things from one location
to another over some kind of obstacle. That is just what a PCI Bridge does,
but it does it with data. The PCI Bridge moves that data from one system bus
to another system bus, and it is up to the bridge to handle all the gory details
of the transfer. This can include things like changing the data format and
protocols without making use of any outside hardware and software products. The bridge can be some form of standalone hardware, or it may just be
part of the chipset that makes up the PCs mainboard.
www.sybex.com
182
Chapter 5
PCI Bridges are really busy. In a typical system, for example, the bridge
can take moving information from the microprocessor bus to the high-speed
PC Bus and even to an old, outdated ISA compatibility Bus. PCI Bridges can
even link to other PCI Bridges to form a PCI-to-PCI Bridge, or a PPB.
How far can this go? PCI Bridges can be connected to other PCI Bridges up to
a maximum of 256 PCI Buses in a single PC. We will cover more on this when
we talk about Hierarchical Buses and Peer Buses.
www.sybex.com
183
Processors
Host-to-PCI
Bridge
133MB/sec
FIGURE 5.8
PCI Bus
Memory
Slots
PCI-to-PCI
Bridge
www.sybex.com
Slots
184
Chapter 5
You will notice that there is only one data path to get to the host bus.
Everything has to go through the PCI-to-PCI Bridge to reach the primary bus
and then through the Host-to-PCI Bridge. While this method does provide
for a great number of devices, there is no load balancing capability.
Lets see what it is like with the Peer PCI Bus.
Host Bus
540MB/sec
Processors
Slots
Bridge
Hostto-PCI
Bridge
133MB/sec
Memory
133MB/sec
Slots
PCI-to-EISA
Bridge
33MB/sec
Slots
EISA Bus
You will notice that, in this case, the two PCI Buses are linked independently to the processor bus using two Host-to-PCI Bridges. Since there are
two independent buses, there can be two Bus Masters transferring data at the
same time, giving more overall throughput and a higher bandwidth. This is
especially useful if you have a server with two or more peripherals that are
bandwidth intensive. If you split the peripherals between the two buses, you
are in effect creating load balancing.
www.sybex.com
185
If you are using a server that makes use of the Peer PCI Bus, there has to
be configuration of the Input/Output (I/O) subsystems. The load balancing
configuration should be taken into account even before the initial system
setup and configuration takes place.
This bus balancing is accomplished by actually balancing the I/O bandwidth for each bus. This should produce the optimal performance on a system. This will work great with Peer PCI Buses, but it may not work as well
with a bridged PCI system. Here are some recommendations on when to do
load balancing.
If you are using a bridged architecture, load balancing is not recommended. With a bridged architecture make sure the primary bus is the
first one that is populated.
If your Dual Peer architecture also makes use of PCI Hot Plug slots,
there is going to be some tradeoff between high availability and high
throughput.
Bus Balancing
Here are some guidelines on how to balance a PCI load:
If you have several network or array controllers, make sure they are
split between the buses.
Avoid putting two network cards on the same bus, unless both buses
already have a network card installed. It is better to have a system that
has a dual-port network card on each bus, rather than to have two
individual network cards on each bus.
So, how does the processor bus know when the network cards need attention? PCI Buses do use interruptsthey just use them a little differently.
www.sybex.com
186
Chapter 5
PCI Interrupts
PCI is a self-contained expansion bus. The interrupts that would normally be
set at the card level are managed at the expansion-slot level by the software
that drives the peripheral devices. With PCI, there are four level-sensitive
interrupts that have interrupt sharing enabled, and these can amount to up
to 16 separate interrupts when examined as a binary value. The PCI specification does not define what the actual interrupts are for each slot or even
how they are to be shared. All of that design relationship is left up to the person who is designing the expansion device. That means that these details are
usually not handled at the hardware level, as was the case in the earlier architectures. With PCI devices, the software device driver for the board handles
the interrupt configuration. These interrupts are really independent in a way,
because they are not synchronized with any of the other bus signals and so
they can be activated at any time.
www.sybex.com
187
As you can see, the finger slots in the bus are very small, and packed very
closely together. These expansion slots are usually white, and they are
divided into two sections.
There are two different kinds of PCI expansion slots and the voltage the
slots use differentiates the versions. One of the types uses +5 volts DC to
power the expansion card, while the lower-voltage model uses 3.3 volts.
When you look at the connector for the buses, the only differences are the
positioning of the blocker in each connector. This blocker, or key, keeps the
3.3-volt card from being plugged into a 5-volt slot.
Now, you have been wondering why I spent all that time covering some
of that other stuff on PCI Bridges and what have you. Well, when we talk
about expansion slots, one of the first questions that comes to mind is how
many can you have. The answer to that is, It depends. As you start stuffing
more and more stuff in a smaller and smaller space, something has to give,
and it is usually the electrical effects inside any given system. Because PCI
operates at a high bus speed, it is especially susceptible to high frequencies,
radiation, and other forms of electrical interference. The current standards
for a local bus limits to three the number of high-speed devices that can be
connected to a single bus.
If you paid close attention there, you notice that the standard calls for just
three devices, not three slots. Most local bus systems now have their video
display built into the motherboard. That circuit counts as a local bus device,
so, if your PC has video on the motherboard, you can use two local bus
expansion slots.
The limit of three devices comes from speed considerations. The bigger or
larger the bus, the more connectors there are. More connectors means that
any signal placed on a circuit will degrade more quickly, and the only way
to beat the degradation is to start with more signals. Somewhere, someone
had to draw the line, and the line was drawn at three devices.
While it seems that three devices may be limiting, it is not. Remember our
discussion of PCI Bridges? Well, since the three-device limit is per expansion
bus, the PCI Bridge allows multiple expansion buses to be linked together.
Each of these will use its own bus control circuitry. While this may sound
complicated, it is one of those things that doesnt really make any difference.
After all, as long as it works, that is all that counts, and the design is all in
the chipset.
Is there a way you can use this technology not only to increase the performance, but also to increase the availability?
www.sybex.com
188
Chapter 5
www.sybex.com
189
When you are talking about hot swapping PCI devices, there are two sets of
specifications, the Hot Swap PCI Specifications and the CompactPCI Hot Swap
Specifications that are managed by the PCI Industrial Computer Manufacturers Group (PICMG). The two standards are very similar and they differ in only
a couple of areas. For example, with the PICMG Specifications, the backplane
that the device plugs into is passive, and all the logic is contained on the
adapter card. This same logic is used to power up the adapter card.
Making it easier for the developers is the fact that the devices are controlled
by software. It is up to the system software to provide the smarts for this whole
process to work.
www.sybex.com
190
Chapter 5
FIGURE 5.11
Application
Hot plug
service
OS Calls Service
OS
PCI hardware
Within the general use and the specific use categories are three levels that
define how the live-insertion capability is carried out. These levels are Basic
Hot Swap, Full Hot Swap, and high availability.
Basic Hot Swap The end user must tell the operating system that a card
is going to be inserted or removed. This is usually done from the system
console.
Full Hot Swap This category adds to the functionality of Basic Hot
Swap. In this case, there is a microswitch added to the cards injector/ejector mechanism. This way, the technician does not have to tell the operating system that the change is about to occur. When the card is installed or
removed, the switch changes the electrical configuration and gives the OS
a warning that the process is about to occur.
High availability This level provides the greatest functionality for reconfiguring software while the system is running. This allows for on-the-fly
reconfiguration of both the hardware device and the software components.
In this case, the operating system itself can sense when a card has failed, and
the OS will bring a previously installed replacement card online to assume
the duties of the failed device.
Copyright 2001 SYBEX, Inc., Alameda, CA
www.sybex.com
191
The ability to choose to isolate a card from the logic on the system
board.
With Hot Plug PCI, the user cannot remove or install a PCI card without
first telling the software. Once the software has been notified, it performs the
steps necessary to shut down the card connector so the card can be removed
or installed. It is up to the operating system to visually let the end user know
when it is all right to install or remove the card.
The advantage of Hot Plug is that you can use any PCI card in the system.
Changes are needed to the chipset, the system board, the operating system,
and the drivers.
www.sybex.com
192
Chapter 5
It improves the throughput of the server, because the I/O of the peripheral
is removed from the CPU.
Can increase fault isolation and recovery, which works to provide for
higher availability.
AGP
In each of the previous sections we have been talking about throughput,
especially when it comes to network interface cards and disk controllers. In
each of these sections we stressed how important it was to off-load the mundane tasks from the processor, in effect, giving it more time for the serious
processor tasks.
This section is going to take a somewhat different tack, concentrating on
video. Now, this is not necessarily a topic I normally associate with servers,
because usually servers are servers and high-definition graphics is not all that
important.
AGP is short for Accelerated Graphics Port. It is an interface based on
PCI and designed for the throughput demands of high demand video like
3-D graphics. Rather than using PCI for graphics data, AGP has a dedicated point-to-point channel to directly access main memory. AGP runs at
66 MHz over a data channel that is 32 bits wide, providing bandwidth of
266 MBytes/second. This compares to the PCI bandwidth of 133 MBytes/
second. In addition, there are two optional, faster video modes, providing
throughputs of 533 MBytes/second and 1.07 GBytes/second. AGP can support this kind of throughput by storing some of the 3-D textures in main
memory rather than in video memory.
Why would you install AGP on a server? Well, if there are 3-D applications that you have to run on the server, AGP will help off-load some of the
work that is placed on the CPU. If there is a 3-D application running, the
CPU (without an AGP graphics controller) is responsible for performing all
www.sybex.com
193
those intensive 3-D calculations. The graphics controller can process the texture data and the bitmaps. At this point, the controller has to read information from several different textures and then average the information into a
single pixel on the screen. While this calculation is being performed, the pixel
is stored in the memory buffer. Since the textures are very large, there isnt
room in the video cards buffer. AGP overcomes this shortcoming by storing
the image in main system memory.
When AGP wants to access the texture data, it uses a process called Direct
Memory Execute (DIME). DIME connects the systems main memory to the
AGP/PCI chipset.
So, should you be looking for an AGP controller in your server? If your
server is going to be physically running some 3-D applications, it may be
something you want to look at. However, you should know that several published studies question whether there really is a performance increase over
using just a PCI video card. If your system is going to be making use of AGP,
you should definitely add more memory to the server to provide the extra
memory that the video subsystem needs.
www.sybex.com
194
Chapter 5
All the network administrators that I know really hate it when they
hear the complaint, Gosh, the network is slow today!
In this chapter, I have laid out several different technologies that can help
you provide both performance and high-availability solutions. As you saw at
the beginning, the early motherboards bus technology was speed limiting,
not only in processing power but also in moving the information from the
processor back to the user who requested it. PCI helped to change that.
Each of the technologies that we have talked about has stressed the same
philosophy: Take the mundane calculations away from the processor and let
something else handle it. That way, the processor is freed up to do other
things. This, in turn, speeds up performance.
When you design your server, pay close attention to the types of subsystems
that are present, and be sure to take full advantage of them. Also understand
that for each of the performance enhancing technologies that you opt to have
in your server, there are going to be trade-offs. Usually that trade-off will come
in the form of how large a check you will have to write to pay for the server.
www.sybex.com
195
Realize too that you can often get a few extra miles out of an older peripheral by simply upgrading its system BIOS. This may not be possible with all
devices, but many of them have the ability to have their firmware updated to
make them compatible with newer operating systems.
www.sybex.com
196
Chapter 5
can use for your device. In situations where youre not sure about the IRQs,
figure out what IRQs are in use first, then youll know whats available for
the new device.
Direct Memory Access Direct Memory Access (DMA) provides a way
that data can be transferred from a device to system memory or vice-versa
without having to go through the CPU, thus freeing up CPU cycles. You
set up a DMA channel for the data to go through. DMA isnt heavily used,
but it should be used more than it is. When purchasing new peripheral
gear, check the products documentation to see if it can use DMA, then
decide which DMA channel youd like to set up for the device.
Cabling Cabling is a huge issue for external SCSI devices. Youll have to
look at the back of the computer to determine what type of connection the
internal SCSI adapters external port has. Next you determine what kind
of SCSI connection the new device is expecting. Finally you purchase a
cable that matches the configuration. For example, suppose that youre
going to purchase an Ultra-SCSI device but plug it into a SCSI II external
port on the computers SCSI adapter. Youll need a SCSI II-to-Ultra-SCSI
cable. Youll want to make sure which side is male and which is female as
well, before you go looking for the cable. You can buy adapters that fit
onto a SCSI cable to make the cable work with different SCSI versions. I
think youre setting yourself up for data transfer problems if you purchase
an adapter because it could work loose and cause you some problems that
may be hard to diagnose.
Note that you might want to go into the SCSI adapters BIOS to tweak it so
it works with the new device. Check your SCSI adapters documentation
for more information on adjusting BIOS settings.
Power Some peripherals require a power socket and are separately powered from the computer. Be aware of this before you buy so that if youre
lacking enough power sockets where you want to place this peripheral, you
can get the electrical work done before the peripheral comes in. For example, some backup tape devices require a substantial power supply and youll
have to address the power needs before the gear can be put into production.
When your new gear comes in, read its documentation thoroughly and be
sure you understand how to install and configure the device. Lots of times
its easy to get in a hurry and think that you dont need to bother with reading the documentationbut its always worth your while to be sure you read
and understand how the device is supposed to interplay with your system.
www.sybex.com
Summary
197
Summary
Exam Essentials
Know the basics of PCI bus mastering PCI Bus Mastering is a way for
the motherboard bus to improve performance by directing signals directly
to the components. This is one way of making sure the CPU is involved in
only those transactions that it really has to act on. If the workload of the
CPU is eased, your server should experience better performance.
Know the basics of PCI hot swap or PCI hot plug PCI Hot Swap
means that you can remove a bad component and replace it without shutting off the server. PCI Hot Plug means that you can add a component
without taking the server out of service.
www.sybex.com
198
Chapter 5
Know the basics of a hierarchical and peer PCI bus With a hierarchical
PCI Bus, the buses in the hierarchy operate concurrently. That means that
a PCI Master and a PCI target on the same PCI Bus can communicate even
if the other PCI is busy. With a peer to peer PCI Bus there are two independent buses. This means that there can be two Bus Masters transferring
data at the same time, giving more overall throughput and a higher bandwidth. This is especially useful if you have a server with two or more
peripherals that are bandwidth intensive. If you split the peripherals
between the two buses, you are in effect creating Load Balancing.
Know what interrupts are and how the system uses them Interrupts
(IRQs) are the way components get the attention of the CPU.
Know that EISA is a form of system bus; know how the architecture of the
system bus can affect server performance The architecture of the system
bus will determine how much information can flow to various components
at any given time. The faster the bus, with the appropriate components, the
better the performance should be.
Be able to upgrade a variety of devices Know and understand the
complexities and nuances of installing upgraded peripheral devices.
Key Terms
Before you take the exam, be certain you are familiar with the following terms:
Accelerated Graphics Port
address bus
Basic Hot Swap
blocker
bus
bus arbitration
bus controllers
Bus Master
Bus Mastering
bus slave
clock signals
www.sybex.com
Summary
data bus
direct memory access (DMA
Direct Memory Execute (DIME)
EISA Configuration
expansion slot
Extended Industry Standard Architecture (EISA)
external bus
Full Hot Swap
Grant (GNT#)
Hardware Device Module (HDM)
Hierarchical PCI Bus
Host-to-PCI Bridge
Hot Plug PCI
Hot Swap
I2O Messaging Layer
Industry Standard Architecture (ISA)
Input/Output (I/O)
Intelligent Input/Output (I2O)
interrupt requestor (IRQ)
interrupts
load balancing
Micro Channel Architecture (MCA)
OS Services Module (OSM)
PCI Bridge
PCI Hot Plug
PCI-to-PCI Bridge
Peer PCI Bus
www.sybex.com
199
200
Chapter 5
www.sybex.com
Review Questions
201
Review Questions
1. What was the first computer bus referred to as?
A. EISA
B. MCA
C. ISA
D. I2O
2. EISA was referred to as which of the following?
A. An 8-bit bus
B. A 12-bit bus
C. A 16-bit bus
D. A 24-bit bus
E. A 32-bit bus
3. If you want to do PCI load balancing, what will you need to have?
A. A Peer Bus
B. A Hierarchical Bus
C. Hot Swap devices
D. Hot Plug devices
4. Which version of Hot Swap PCI requires users to notify the operating
system that they are about to take a device out of the system?
A. Basic Hot Swap
B. Full Hot Swap
C. High availability
D. All of the above
www.sybex.com
202
Chapter 5
interface cards and a single drive array controller, how would you plan
to install them in a Dual Peer Bus configuration?
A. Put both of the NICs on one bus and put the drive array controller
on the other.
B. Put both NICs on the master PCI Bus and the drive array controller
to either one.
D. There cannot be more than one NIC in any server.
7. What is Bus Mastering?
A. All transactions are sent directly to the processor.
B. All transactions are sent directly to memory.
C. All transactions directed to the disk array controller are directed to
www.sybex.com
Review Questions
203
DLT tape changer. Both devices are SCSI. Now the computer wont
boot to the NOS and Johann is getting a SCSI IRQ conflict error even
though he verified that hes using the same IRQ as the old backup
device. What could be the problem?
A. New device isnt terminated.
B. Device is trying to use six IRQs.
C. PCI bus is autodetecting the wrong IRQ.
D. New devices BIOS hasnt been enabled.
www.sybex.com
204
Chapter 5
www.sybex.com
Review Questions
205
17. What are the three special circuits that make use of Bus Mastering?
A. Bus driver
B. Bus controller
C. Bus tool kit
D. Bus master
E. Bus slave
18. MCA architecture is designed for what types of computers?
A. ISA
B. EISA
C. 386 and 486
D. PS/2
E. AT
19. What made EISA obsolete?
A. PCI
B. MCA
C. ISA
D. AT
20. If AGP wants to access texture data from memory, what is the name
www.sybex.com
206
Chapter 5
devices.
12. B. While answer A is somewhat likely, its probably not going to be an
issue with todays SCSI devices. Most of the current batch of devices
autoterminate so you dont run into the old SCSI termination issues of
yore. On the other hand, if youre trying to plug in a tape changer that
thinks each tape device needs its own IRQ, then youre subbing out a
tape backup device that used only one IRQ with a device that needs six
(one for itself and five for the other drives).
13. A. The advantage of Hot Plug is that you can use any PCI card in the
system.
www.sybex.com
207
14. A, B. Most likely the card has defaulted to IRQ 5 and the other NIC
in the box is also set for IRQ 5. It could be too that both NICs are
using the same I/O address. You could have a server boot up and seem
to work OK with a scenario such as this and find it very difficult to
troubleshoot. Typically the server NOS errors logs will pinpoint the
problem.
15. B, C. The two types of PCI Bridges are PCI-to-PCI Bridge and Host-
to-PCI Bridge.
16. B. PCI Bridges can be connected to other PCI Bridges up to a maxi-
bus controllers, and these bus controllers will direct traffic between
different circuits. The actual device that takes full control of the
expansion bus is called a Bus Master. The device that will end up
receiving the data from the Bus Master is called the bus slave.
18. D. MCA was designed for PS/2 computers.
19. A. The PCI Bus made the EISA Bus obsolete.
20. B. If AGP wants to access the texture data, it uses a process called
www.sybex.com
Chapter
Server Functions
SERVER+ EXAM OBJECTIVES COVERED IN
THIS CHAPTER:
1.1 Conduct pre-installation planning activities.
Install UPS.
Verify N 1 stepping.
www.sybex.com
www.sybex.com
For complete coverage of objective 1.1, please also see Chapter 9. For complete coverage of objective 1.2, please also see Chapters 1, 7, and 8. For
complete coverage of objectives 2.1, 3.5, and 4.4, please also see Chapter 8.
For complete coverage of objective 3.2, please also see Chapters 3, 8, and 9.
Management Protocols
Now, if you are managing a real live computer network, I dont have
to tell you that there are two things you want. You want more information
www.sybex.com
212
Chapter 6
Server Functions
about what is happening on the network infrastructure and you also want to
be able to figure out what the heck is going on at the desktop level. That is
why it is important to understand both SNMP and DMI.
Lets get the big picture first and then drill down to the individual desktop.
For the official version of SNMP, you can see Request For Comments (RFC) 1157.
SNMP Agent
Think of a secret agent, gathering in all the information that can be gathered,
never knowing what will be useful and what wont. This is an agent who
never makes decisions on the quality of the data; the agent only gathers the
information in and gets it ready to pass on to the person who is the next in
line. That is what an SNMP Agent can do.
An SNMP Agent can be a hardware device, like a router or a switch or it
can be a software process, like a DNS Server process or an Internet e-mail
connector. No matter what it is, it shares certain characteristics with other
SNMP Agents. First of all, it is providing some kind of service. Secondly, it
is a service that is important to the health of the networkotherwise you
wouldnt want to know about what was going on.
www.sybex.com
Management Protocols
213
SNMP Managers
Like all good managers everywhere, an SNMP Manager is interested in
information. The information that it is interested in can be user configurable
on hardware devices. This information is called a trap. The SNMP Agent
sends the trap to the Management Agent to let the network administrator
know when one or more conditions have been met. Now, some people think
that SNMP only alerts the network administrator when bad things are happening, or when bad things are about to happen. As a matter of fact, these
traps are basically neutral. A trap does not make a judgment; it just notifies
the Manager when something it is supposed to track actually happens. This
includes the following events:
Cold start or warm start During a cold start or warm start of a device,
the Agent will reinitialize its configuration tables.
Linkup or Linkdown This trap is generated by a network interface card
(NIC) when the Agent fails or has to reinitialize to reestablish a connection.
Authentication fails An authentication failure occurring when an
SNMP Agent receives a request for information from an unrecognized
SNMP Manager.
www.sybex.com
214
Chapter 6
Server Functions
An object ID.
www.sybex.com
Management Protocols
215
The packet is sent to the SNMP Trap Manager through UDP port 162.
Architecture of DMI
DMI is made up of four pieces: the Service Layer, a Management Information
Format (MIF) Database, a Management Interface (MI), and a Component
Interface (CI). The Service Layer is the piece that acts like the information broker between all the manageable products and the management applications.
The MIF database would be like the MIB database in SNMP; it defines the
standard manageable attributes of the devices installed in the server or in a PC.
The Management Interface allows the DMI applications to actually
gather the information and manage the computers, their components, and all
the peripherals. The Component Interface is what allows the components to
be acknowledged by all the applications that make use of the DMI Service
Layer. It is the CI that gets the calls for the real-time dynamic instrumentation information from the products that can be managed by the DMI. The CI
gives the hardware vendors a known set of values to address in their applications. This allows the vendors to provide more management features and
advanced functionality in their products.
How It Works
At its simplest level, all DMI does is provide two services: It stores information
about various components and then it gives the ability to query the component
and change the information.
The component information is stored in the MIF file. Each DMI-compatible component has its own MIF file, and that file contains information
such as where the equipment is located, the name of the manufacturer, and
when the component was installed. This information is added to the database by the Service Layer when the equipment is installed.
This magical Service Layer is software installed on the desktop computer
that uses DMI. It can be part of the computers operating system, or it can
www.sybex.com
216
Chapter 6
Server Functions
be an add-on. The DMI management application will use the Service Layer
to get information from the desktop component. This information can be
queries as simple as, Who is the manufacturer? or Change the I/O
address to 300 and the interrupt to 3. The DMI management piece can also
accept messages from components, like the message from a printer that notifies the administrator that it is out of paper.
So there are several ways of gathering information about what is happening
inside of a server. Now lets take a look at the face the server gives to the world.
In this case, we are looking at what role the servers play in the network.
www.sybex.com
Server Types
217
Server Types
As part of this objective, we are going to take a look at the way your
server can be used. Gone are the days of the generic, multi-role server: It
seems that every server you bring online has a specific task that it is designed
to do. In this section, we are going to take a look at a bunch of them.
Servers as Gateways
If you were to ask the average end user how the network works, he would kind
of give you a blank look, and if he answered at all, the answer would probably
revolve around smoke and mirrors and Pure Computer Magic (PCM). Well, if
ever there is PCM, it is in the role of a server as a gateway. Most of us have
heard the term gateway at one or another time during our careers, but for
many, what a gateway does remains somewhat mysterious.
Think of a gateway as a translator of sorts. Let me put it to you this way.
Through my life as an instructor, I have met many fascinating and brilliant
people, but people who speak multiple languages still amaze me. You see,
there is an old joke that goes something like this:
What do you call someone who speaks three languages? Trilingual.
What do you call someone who speaks two languages? Bilingual.
What do you call someone who speaks one language? American.
Thats me. I really tried, but French eluded me in grammar and high
school and the only thing I got out of Spanish in college was a crush on the
teacher. I really can only speak English.
Recently my wife and I were invited over to meet the parents of a friend
of ours. Enzo and Colleen are truly multilingual. Enzo speaks Italian (his
native language), English, Spanish, and several others. His wife matches him
language for language with some Thai or Vietnamese thrown in for good
measure. When we went to Enzos house, we met his parents, who only
spoke Italian, Spanish, and something else that didnt make a mark on my
radar screen. Colleen was inside getting dinner, and Enzos dad and I were
on the deck trying to communicate. It wasnt going well until five-year-old
Mateo joined us. You see, Mateo could speak English and Italian, so he
translated. Mateo was my gateway!
Network servers used as gateways come in a variety of forms. For example, earlier, I mentioned a GroupWise Internet Agent. That is a gateway,
because it translates outbound messages from GroupWise to Simple Mail
Transfer Protocol (SMTP). On the e-mail system, there may also be an
Exchange or Notes gateway, which translates messages from Exchange or
Notes to GroupWise.
Copyright 2001 SYBEX, Inc., Alameda, CA
www.sybex.com
218
Chapter 6
Server Functions
Keep in mind that whenever you talk about the OSI model, nothing is ever
carved in stone. So if you are thinking to yourself that you know of a gateway
that goes to the Transport layer and below, you are probably right!
Server as a Router
What does a router do? It routes. It routes packets from one network segment
to another network segment. That other network segment could be on the
other side of the room, the other side of the enterprise, or the other side of the
world. Back before I became an instructor, I had a real job as a network administrator. It was really a scary time in my life, because I actually had to work for
a living! Anyway, I managed and administered two servers that provided file and
print services for about 500 users.
One of the servers had enough slots to put five network cards in it. There
were three Ethernet cards, a Token Ring card, and even an ArcNet card. Yes,
we have already established that I am an old guy and have worked with some
really ancient forms of technology. Drop it and lets move on. The point here
is that this single server acted as a router, providing users on the ArcNet segment print services from a printer located on either the Token Ring segment
or any one of the Ethernet segments.
For a server to act as a router, it usually needs at least two network cards
in it. For example, take a look at Figure 6.1.
FIGURE 6.1
Server as a router
Internet
Internal network
www.sybex.com
Server Types
219
In this case, you have a server that is acting as a portal between the corporate internal network and the Internet. Any packet exiting the internal network on its way to the outside world has to go through the server, and vice
versa. It is up to the server to direct those packets to the appropriate locations.
It is acting as a router.
A router is an intelligent device. That means that when the router acts on a
packet, it provides that packet with directions. Think of it this way. Assume
that you are at home and need directions to the local shopping center. When
you stop to ask for directions, the woman who provides the directions takes all
sorts of factors into consideration. These can include things like weather, traffic, roads that are closed, and detours; with an intimate knowledge of the area,
she may even provide you with a shortcut. In a similar way, the server acting
as a router can make intelligent decisions about how to get from point A to
point B.
Routing occurs at the Network layer of the OSI model. Another form of
packet management is the server acting as a bridge.
Server as a Bridge
While routing acts at the Network layer of the OSI model, bridging occurs
at the Data Link layer. That means that when a server acts as a bridge and
works on a packet, it is using the media access control (MAC) hard coded
address from the network card. While a router is used to intelligently route
packets from one network to another, a bridge is designed to join network
segments and manage the packet traffic between the segments. Lets look at
it this way.
Assume that you are working for a company that is growing really quickly.
You have a network segment that has about 40 hosts configured to use an Ethernet connection through a hub. You are called into your bosss office and told
that next week the company will be adding another 40 employees, so you are
responsible for connecting these new computers to the network. You know that
having 40 computers on an Ethernet segment will provide acceptable performance, but 80 hosts on the same segment will cause the performance to degrade
to the point of being unacceptable. Somehow there has to be a way to manage
the internal network traffic to ease the load. Enter the bridge.
www.sybex.com
220
Chapter 6
Server Functions
FIGURE 6.2
Workstation B-1
Workstation A-1
Workstation B-2
Workstation A-2
Segment B
Segment A
Bridge
Workstation B-3
Workstation A-3
Workstation B-4
Workstation A-4
Workstation B-5
Workstation A-5
Take at look at Figure 6.2. Now, I will be the first to admit that this is an
oversimplified explanation, but sometimes those are the best kinds. You will
notice that all the workstations on the left side of the graphic (Segment B) are
numbered B-1 to B-5, and all the workstations on the right side of the
graphic (Segment A) are labeled A-1 to A-5. The goal is to implement a
device that segregates the segments to reduce traffic. So, here is how it works
in an Ethernet implementation.
Suppose that machine A-1 wants to talk with machine B-1. In an Ethernet
implementation, a packet is put on the network segment and all the workstations and the server will receive that packet. Lets assume the server has
just come online and hasnt learned anything about the network. It will just
be hanging out listening and learning. So, the server receives the packet from
Workstation A-1 and makes a note of the workstations MAC address and
the fact that it resides on Segment A. Meanwhile, Workstation B-1 replies to
Workstation A-1. Until B-1 replied, the bridge had no idea where it resided,
but now it gathers in the packet, makes note of B-1s MAC address, and sets
it up for Segment B.
www.sybex.com
Server Types
221
Now lets assume that Workstation B-5 wants to send a packet to B-1.
When the packet gets to the server, the server does several things. First it makes
note of the MAC address to B-5 and the fact that B-5 resides on Segment B.
Then it looks at the destination address, and sees that the packet is going to
another workstation on the B segment, B-1. At this point, the bridge kills the
packet from crossing over to Segment A. The bridge knows that B-1 is on Segment B, and therefore the workstations on Segment A have no reason to
bother with a message for a workstation on Segment B. By killing the packet,
the bridge is, in effect, lowering the network traffic on Segment A.
Look at Table 6.1. At this point, this is all the bridge knows about.
TABLE 6.1
Segment A
B-1
A-1
B-5
Now, lets say that Workstation A-3 sends a packet to Workstation A-5.
Since the bridge doesnt know about either of these workstations, it makes
a note of the MAC address for A-3, and figures out that it is on Segment A.
Since the bridge doesnt know where A-5 is, it lets the packet go to both Segment A and Segment B. When Workstation A-5 answers, the bridge then
knows that A-5 is on Segment A. Table 6.2 shows what the bridge knows at
this point.
TABLE 6.2
Segment A
B-1
A-1
B-5
A-3
A-5
www.sybex.com
222
Chapter 6
Server Functions
As you can see, the missing pieces are becoming filled in. To finish the process, lets say that Workstation A-2 sends a packet to B-3 and A-4 sends a packet
to B-2. The bridge notes where A-2 and A-4 are located, and keeps track of the
MAC address for both workstations. The packets are then sent through to both
segments. Workstations B-3 and B-2 answer their counterparts, and when the
communication is done, the bridge now has the information shown in Table 6.3.
TABLE 6.3
Segment A
B-1
A-1
B-2
A-2
B-3
A-3
B-5
A-4
A-5
The bridge is missing B-4, but it will pick that one up along the way. Now,
lets assume that Workstation A-4 wants to talk with A-1. The bridge knows
that both workstations are on the same segment, so it will not let the packet
get through to the B segment. Therefore, it is limiting and managing traffic.
As I mentioned, bridges operate at the Data Link level and routers operate at the
Network layer. You can use a rule of thumb that says the higher up the OSI model
you go, usually there is more expense involved. The higher up the OSI model you
go, there is usually more done to the packet, so the communication is usually
slower.
With a router, the server was connecting the network to other network
segments and re-addressing packets and directing them to their destination.
With a bridge, the decision is made to let the packet through to another segment or to block it. There is no re-addressing or redirection involved.
Now, lets move a little higher up the server ladder to look at a server that
provides protection to the network.
www.sybex.com
Server Types
223
Firewall Server
Just like a lot of the other things we have been talking about in this book,
firewalls come in a variety of shapes and sizes. You can buy firewalls to protect entire networks, or you can even buy firewalls to protect workstations
while they are dialed into the Internet. Depending on the amount of money
you want to spend, firewalls can range from free to hundreds of thousands
of dollars. While firewalls vary in their complexity, they do have a lot of
things in common: First and foremost, they are designed for security.
The firewalls we will look at are designed as protection for networks or
for network segments. Take a look at Figure 6.3. This is what is called a
Demilitarized Zone (DMZ) or a screened subnet.
Firewalls can also be used to segregate two segments of private networks. For
example, the research and development department may have a firewall segregating it from the rest of the network.
FIGURE 6.3
IBM-compatible
Web Server
Mail Server
IBM-compatible
Internet
Firewall
Firewall
IBM-compatible
IBM-compatible
IBM-compatible
www.sybex.com
224
Chapter 6
Server Functions
You will notice that there are two firewalls in this diagram. These two
firewalls create kind of a no-mans-land where servers that need to be publicly accessible can be placed. In this example, there is a Web server and there
is also a mail server in the DMZ. The actual private network is located
behind the second firewall.
How do firewalls work? There are several different kinds but they all
work on the same principle of allow or deny. Here is an example. Using the
graphic shown in Figure 6.3, assume you were located somewhere on the
Internet and wanted to get to that Web server. You knew the URL was
www.server_behind_the-firewall.com, so you entered that in from your
browser and pressed Enter. Your computer would resolve the name
www.server_behind_the-firewall.com to an IP address, and then fire off
a packet directed to that IP address at the port of 80.
Port 80 is what is what is referred to as a well known port for HTTP. Think of
a port this way. Suppose I wanted information about your network and called
the phone number for your company listed in the phone book. As soon as
someone answered, I started asking questions about your network. What kind
of answers would I get? Not good, probably. If I asked for your extension and
started asking questions, I would get the right answers. Ports are like extensions. If I address something to the right port, I will get the information I need.
Well known ports are listed in a file called SERVICES. The location of the file
will vary by operating system.
In order to get to that server, your packet has to go through the firewall.
When the packet arrives at the firewall, the firewall examines it and makes a
decision whether the packet should be allowed or denied. The decision can be
based on a variety of things, including the port address, the protocol, the source
address of the packet, the destination address of the packet, the time of day, the
day of week, or whether you are authenticated into the network or not. In this
example, the packet is handled and the firewall determines that your packet can
be granted access to the URL (or actually, the IP address associated with the
URL) www.server_behind_the-firewall.com at port 80. Your communication goes through and you successfully reach the Web page.
www.sybex.com
Server Types
225
If, on the other hand, the port for HyperText Transfer Protocol (HTTP)
had been blocked, your packet would have been discarded. No error messages would have been returned. As far as you were concerned, you would
have received the ever-popular 404 error, Page Not Found.
Why are there two firewalls in the diagram? This is a case of added protection. Earlier in the book, we mentioned things like fail over and redundancy. This is just another case. Assume that some intruder had been
attempting to hack his way into your network. If the hacker made it past the
first wall and gained complete access to the DMZ, he would also have to
defeat the second firewall (or maybe even a third firewall) to get access to the
private network. Is this to say that having two firewalls is the be-all, end-all
in stopping hackers? Not at all. Depending on the sensitivity of your data
and the persistence of the hacker, almost anything can be compromised
eventually. However, you want to make it so difficult for the hacker to get
in that either you will notice the attack and make changes to counteract it,
or the hacker will determine that it is more fun to go play in someone elses
backyard and will leave you alone!
As I mentioned, there are several ways for the firewalls to make these decisions. The first is by the port that is being addressed. Firewalls can also use
an access control list (ACL) where, if you are authenticated into the network,
you can pass through the firewall, and if not authenticated, you do not have
access. There are also firewalls that protect the network by changing protocols. For example, you may have a firewall that switches from IP to IPX.
Another type of firewall is the dynamic state list server. This list resides on
the firewall and is changed as new communications are opened and other
sessions are deleted. When a communication session is opened between two
machines, the communication session is logged and only the initiating computer is allowed to communicate with the recipient. If a hacker were to
attempt to slip a packet into the communication stream, the packet would be
discarded.
Firewalls not only serve to manage inbound packets, they also can track
packets going to the Internet. This is useful in a variety of ways, not the least
of which is to track Internet usage by your users. Several studies have shown
that the largest area of corporate theft revolves around the time lost by
people inappropriately using the Internet. With a firewall, you can specify
what sites or IP addresses people can access or you can deny people access to
specific sites.
www.sybex.com
226
Chapter 6
Server Functions
Proxy Server
Time to go look at another figure. Look at Figure 6.4. This is a network diagram with a Proxy Server inserted into the mix. In this case the Proxy Server
is located behind the second firewall, but it doesnt have to be that wayit
can actually be located in the DMZ, or even in the open. It can be located
anywhere a host on the private network can get access to it.
FIGURE 6.4
IBM-compatible
Proxy Server
Web Server
Mail Server
IBM-compatible
Internet
Firewall
Firewall
IBM-compatible
IBM-compatible
IBM-compatible
A Proxy Server really has two business reasons for being in existence.
The first goal is to provide faster response to frequently accessed Web
pages. The second goal is to minimize the amount of network traffic generated between the private network and the Web.
It works like this. The user Brandice, on the private network, wants to
access the Web page at www.myperfectwebpage.com. Brandices browser
has been configured so that it points, not directly to the Internet, but to the
Proxy Server instead. In this case the browser asks the Proxy Server if it has
the Web page, www.myperfectwebpage.com. The Proxy Server doesnt have
www.sybex.com
Server Types
227
it at present, so the Proxy Server goes out and gets the Web page, caches it,
and returns the results back to Brandices computer. A short time later both
CJ and Courtney send requests to get www.myperfectwebpage.com, and
just like before, their computers go to the Proxy Server and ask for the Web
page. In this instance, the Proxy Server already has the Web page stored in
cache, so it is immediately returned to their computers, without anyone having to cross the network and download it.
A proxy server can perform many firewall-like functions. For example, it
can be configured to allow or deny access to certain Web sites. Many Proxy
Servers also have the ability to provide network address translation (NAT)
to the internal network. NAT is a function where the Proxy Server or firewall
can have a public IP address, while everything on the private side of the network can have an IP address from a different, private range. This helps conserve registered IP addresses and makes it more difficult for hackers to access
systems behind the Proxy Server.
Another business use for the Proxy Server is to configure it to be a Reverse
Proxy Server. In Figure 6.5, you can see that the Proxy Servers sit between
the corporate Web server and the Internet. These servers are configured to
cache the information from the Web server, and provide the content when
queried from the Internet.
FIGURE 6.5
Proxy Server
Internet
Web Server
Proxy Server
Proxy Server
www.sybex.com
228
Chapter 6
Server Functions
By using a Reverse Proxy Server, people accessing the Web site can be
directed to several different addresses, providing for quicker response. Look at
it this way. Suppose that you were getting ready to start a world-class e-business. You were going to use the Amazon.com business model of selling tons of
stuff over the Internet. You want to make sure that people have rapid access
to your Web site, no matter where they are located. So, you configure your
infrastructure so that you have your primary corporate Web server in your
home office located in Minneapolis. You then have Proxy Servers set up in
New York, London, Paris, Moscow, Delhi, Jakarta, Sydney, Hilo, and Los
Angeles. This way, the Proxy Servers point back to the main Web server, and
any change you make to the corporate Web server in Minneapolis will be replicated out to the Proxy Servers almost immediately, saving on the cost of
maintaining all those additional Web servers. Reverse proxy also provides
some redundancy. If you have only one Web server, and it goes down, your
Internet presence is now hosed. If, however, you are using Proxy Servers and
one of those go down, the others can pick up the slack.
The next two types of servers usually come in one package because it
makes it much easier, and usually more secure, to access a database using a
client/server connection. Lets start by looking at the database server.
Database Server
Here is another one of those catch phrases of the new millennium, data warehousing. The term information age is another one of those terms that has been
beaten to death but, even though it is trite, it is still true. Businesses succeed or
fail based on decisions that the management team makes, and the management
team can only make good decisions based on the information they have to
work with. That information is stored on one of the companys servers, and
when someone has a question, the numbers need to be crunched to come up
with the appropriate answer. Lets take a look at an example.
Usually when you start talking about a database server, you are talking a
medium to large organization. But the company we are going to look at is a
small company with less than 10 employees. My wife, Bobbi, started the
company back in the mid-90s and has successfully steered the company
through good times and bad. Her company, For Your Instructors, is a brokerage service for independent computer trainers just like me.
www.sybex.com
Server Types
229
Now, most trainers I know are really good geeks. Some people I know have
gotten offended when I called them a geek, but my friends understand that the
term is a term of endearment. My best friends are geeks. I have stopped listing
certifications on my business cardsnow it will just say geek. Being a geek
means more than just having a clean pocket protector. Most geeks are very
comfortable with computers and very happy to spend the better part of their
day relating to either computers or the people who relate to computers. We
usually have a somewhat difficult time relating to real people, because they
dont understand the mysteries of what we deal with every day.
Enter the trainer. These people are usually high-level geeks. Especially the
ones who go out on their own and try to make a living all by themselves.
They have the geek part down to a science, but now they have to sell themselves. Selling requires people skills, and many of us are great with computersit is people we have trouble with. My wife, on the other hand, is lousy
with computers but great with people. It is okay that I say that, because she
will never read this far into the book. She would have been bored to tears and
asleep by the time she hit the chapter on RAID.
She is so good with people, as a matter of fact, that she can even operate
in the geek world and have people relate to her. This is a match made in
heaven. Bobbi offers an invaluable service to many of the finest trainers in
the world. She relieves them of the responsibility of dealing with people, and
gives them the opportunity to work their trade to the best of their ability.
She, and her very efficient staff, match trainers with training centers and
classes, and take a commission for doing all the work.
Now, that means she has to have some way to keep track of tons of data.
We are talking a mess of information. For example, the database that her
company uses has information on thousands of trainers and thousands of
training centers. She has information on what classes the trainers can teach;
where they fly out of; and what their favorite airline, rental car company,
and hotels are. On the training center side, she tracks who is the contact person, what they have used in the past, what they have need of in the future,
what they have been billed, and what they still owe. All that information is
contained on a database server that is the lifeblood of that company. We
make darn sure that the database is backed up regularly and taken care of
like a newborn baby.
By accessing that database, she can do a search to determine which of her
trainers are certified to teach what class. She can determine if they are open
the week of the class and can also find out all the other information she needs
to know. She has a server that is dedicated to nothing other than running and
caring for her database applications.
www.sybex.com
230
Chapter 6
Server Functions
Client/Server
A friend of mine called recently and asked me to try to explain to his wife what
client/server computing was all about. The thing that made this conversation
interesting was the fact that he has a masters degree in Information Technology.
He knew what client/server computing did, and why it was good, but he really
wasnt 100% sure how it worked.
When you think of client/server computing, think of going to a very fine
restaurant. When you walk through the front door and give them your name
and time of reservation, you become the client, and the staff becomes the
servers. When you order, you ask the server for a meal, and the server takes
the information back into the kitchen, and a short time later, you are basking
in the glow of a gourmet meal. Meanwhile, the server is available for your
every want and need. Take a sip of water, and they are there to fill your glass.
Finish your wine, and they are there to offer you more. For the entire time
you are in the restaurant, you are being waited on hand and foot.
Is the waiter or the chef or the maitre d doing anything that you couldnt
do for yourself? Absolutely not! You can cook, pour your own water, and
open your own wine, but it is special when it is done for you. Besides, I dont
know about you, but no matter what I order in a restaurant, it always seems
to taste better than it would if I ended up cooking it myself. So, how does this
relate to computing?
www.sybex.com
Server Types
231
Client/server computing
E-mail client
Database server
Server process
www.sybex.com
232
Chapter 6
Server Functions
Application Server
Just like its name suggests, the purpose of an application server is to serve up
applications. This can best be described as the economy of scale.
One of the most daunting tasks that a network administrator has to handle is the management of applications. They have to be installed, updated,
patched, tweaked, prodded, and poked to get the best possible performance
from them. As soon as you have an application optimized for your environment, another patch comes along, and you have to start over.
The problem with application management becomes apparent when you
think about the two ways there are to handle the applications that your users
access every day. The first way is to have the application reside on the workstation. This means that someone has to go around to gosh knows how many
workstations and install and configure the application. Even if you use a program that will push the application installation out to the hard drive of your
users, there is still the work of testing and retesting the rollout, and then troubleshooting the whole thing when someone deletes the wrong directory or a
user corrupts a file.
With an application server, there is one installation. The users are then
granted access to the server and to the application though a series of rights or
permissions. There is only one place that has to be maintained. If there are files
that need to be accessed locally, there are ways of pushing those files down to the
local workstation from the server without end-user intervention. In some cases,
there are ways of having the application check to make sure none of the files on
the local workstation have been corrupted. If corruption or deletion has
occurred, the application basically reinstalls itself on the local workstation.
www.sybex.com
Server Types
233
Mail Server
When I teach messaging classes, which I do quite often, I tell my students that
electronic messaging in any form can be broken down into three pieces: process,
item, and location.
Process is always an executable. It can be an exe file, a com file, a dll file,
an NLM, or whatever Unix uses, it doesnt matter. A process is always an
executable that has to run on some form of a server.
Item is the message that is being moved. This message can be an e-mail,
a voice mail, a pager messageit doesnt matter, but it is always some
form of message.
www.sybex.com
234
Chapter 6
Server Functions
Location is where the message is currently being stored and the location
where it will be stored when it reaches its next destination.
As you can well imagine, a mail server seems to serve two-thirds of the
equation very well. The mail server will usually be running the process that
will either deliver the mail or manage the mail system, or both.
Given the visibility of e-mail in todays business marketplace, this is
another of those high visibility type servers. People tend to get really cranky
when they cant get their e-mail, or when their e-mail does not arrive in a
timely manner. The e-mail server is one of those boxes that should get special
treatment!
If you are lucky enough to be charged with preparing a list of specifications
for an e-mail server, think about what it does before rushing out to buy one. First
of all, there is going to be a lot of ongoing communications with the server, so
the network communications should be top-of-the-line, especially if this server
is going to need to contact the Internet, or another mail server somewhere else
on the WAN.
Secondly, there is going to be a high number of very small disk reads and
writes as all these small entries get made into the database. Remember, in the
world of e-mail, it is not only the large mail message that is written to the
database, it is also the smaller piece that says the message has been opened
or delivered. This is called the status message. Since most of these are rapid,
small read/writes, you should make sure that your disk subsystem is as fast
as you can afford. Finally, most mail server processes will use some form of
cacheing, whether it is at the server side of the equation or the mail process
end. That means providing as large amounts of memory as possible.
One of the other questions that I constantly get asked is, How much disk
space, per user, should I allocate? There is no right or wrong answer to that
question. The only thing I can tell you is that no matter how much you allocate, it will not be enough. It is a physical law that nature abhors a vacuum
and there is no stronger vacuum than empty disk space. If your e-mail system
is not hooked to the Internet, you may get by with 25MB or 30MB of storage
per person. Once you make that Internet connection, however, all bets are
off. For grins and giggles, I just checked how much disk space my remote
mailbox took up on my laptop, and it is up to about 125MBand my mailbox is not full. I routinely go out and empty my trash and clean out the sent
items folder. I will bet there are not a lot of your users that will do that. So,
you can always use more disk space.
www.sybex.com
Server Types
235
Another thing to keep in mind about e-mail systems is that they are somewhat fragile. Because they are databases with the potential for access by so
many people, they can be corrupted easily. Anything you can do to protect
the mail server would help you later.
E-mail servers that are connected to the Internet will use the Simple Mail
Transfer Protocol (SMTP)/Multi-Purpose Internet Mail Extensions
(MIME).
I would hazard a guess that most e-mail systems in place today have some
sort of inbound and outbound access to the Internet. As you design your email system and the placement of your mail server, be sure that it is secure.
You may want to place it behind the firewall and open up the appropriate
port addresses. If you have people who are going to download files from
your company, you will have to do the same type of thing with the File
Transfer Protocol (FTP) server.
FTP Server
Depending on the type of company you work for, you may have to provide
access to information in a file format. This information may be data, it could
be a patch, or even the delivery of an application. Somehow, you have to create a way for users to attach to a server and either copy the file down to their
workstation or take information and transfer it up to the storage server.
This book is a prime example of how this process works. What you are
holding in your hands is the result of months of work by a very large team of
people. I am just a very small cog in a very large wheel. Everything, though,
does start with me. Once I have finished writing a chapter, I have to transfer
that chapter and all the art to my developmental editor, Elizabeth Hurley, or
to my production editor, Judith Hibbard, or to the editor who really writes the
book, Linda Stephenson. In addition, there are also the art people and the technical editor, who all need to access the raw chapter and begin to do whatever
it is that they do. There must be a central repository for the information, and
that is an FTP server that Sybex hosts. When I get done with a chapter, I zip
all the parts together and then send it off to Judith. She looks it over, and posts
it on the FTP server, so everyone can download what they need and tweak,
twist, torment, and do whatever to it before putting it back.
FTP is a standard part of the TCP/IP protocol suite. If you are configuring
an FTP server, make sure to have plenty of disk space for storage and plenty
of bandwidth for data transmission.
www.sybex.com
236
Chapter 6
Server Functions
FTP normally is not considered the most secure of protocols. You can create an FTP server that can limit access to a certain set of people that can log
in using an e-mail address and password. Other FTP servers may allow for
anonymous access, where anyone can attach to the server and download or
upload information.
SNA Server
When you see the term System Network Architecture (SNA), think IBM and
think mainframe. When you see the term SNA Server, think of a server
designed to bridge the gap between your PC-based, server-based network
and your mainframe. The SNA server product allows users attached to the
PC/server-based network to access the mainframe in a familiar way. Does
this sound somewhat familiar from what we were talking about when we
discussed servers as a gateway? It should, because that is similar to what is
going on here, but in this case, it is doing it with an attitude.
The latest SNA Server product from Microsoft is called Host Integration
Server 2000. It replaces the SNA Server that was part of the Microsoft Back
Office suite of products. This product is designed to provide a portal to the
mainframe that can handle up to 30,000 simultaneous host sessions per
server. Figure 6.7 may give you an idea of how the SNA Server is positioned.
FIGURE 6.7
SNA Server
IBM AS/400
Server-based network
IBM 37XX
SNA Server
IBM 3174
IBM AS/400
www.sybex.com
Server Types
237
As you can see from Figure 6.7, the SNA Server acts as a front end for the
mainframes. There are clients available that are Microsoft ActiveX-enabled,
or they can be accessed from the Web. These clients can provide access to
3270 or 5250 systems, as well as the AS/400.
One of the issues that always seemed to be around whenever there were
host connectivity issues was the problem of passwords. A user would need a
password to log on to the server-based network, and then as soon as the user
attempted to access information or resources off of the mainframe, they were
prompted for another password. The new SNA server products can map user
IDs and passwords from the server-based networks to the mainframes to
eliminate this issue.
SNA Servers can also provide virtual private networking services directly
from a client through to the mainframe. This solution allows for users that
are roaming the country using their laptops to access the mainframe securely
wherever they happen to be. Remote communications is always an issue,
which is why your network may include a Remote Access Services (RAS)
Server.
RAS Server
When I think of a RAS Server, I think of a modem farm. The whole point of
a RAS Server is to provide remote access into the network via a Plain Old
Telephone System (POTS).
When Microsofts RAS was first introduced, dialup networking was not
only ugly, it was really ugly. There were a few good solutions, but none that
really worked first time every time. In some cases the dialup solution would
allow the user to connect to various parts of the network, like to a mail
server, but would not allow them to connect directly to the network. There
were products that would allow you to dial in to a system that was connected
to the network, and then take over control of that system to log on to the network. But that was kind of a clunky solution that added yet another level of
hardware between the remote user and the network.
RAS changed all that. With RAS, you can have a server with multiple
modems and incoming lines. Your remote users can dial in to the RAS server
and be logged directly onto the network, as if they were sitting at their desks.
Now, the access speed is not as fast as it would be at the end of the 100MB
Ethernet connection, but that is to be expected.
If you are configuring a RAS server, there are several things to keep in mind.
It is going to be the portal for multiple connections, so it should offer the fastest
response time possible. That means fast, dependable modems in the modem
pool, high-speed dependable network connectivity, and lots of memory.
www.sybex.com
238
Chapter 6
Server Functions
If ever you were going to need remote management software, this is it.
You will need it to remotely monitor the server to see who is using what, and
you will also need it when someone forgets how to log off properly. Many
times a modem may hang, and need to be reset. This is a simple procedure,
and it is even simpler if you can remotely manage the server.
Fax Server
Are there any accountants reading this book? If you are, you will probably
have to excuse me here for a few minutes while I pick on you! Bean counters
everywhere hate the inappropriate use of a corporate resource. What is the
most valuable of corporate resources? That would be the employees time.
www.sybex.com
Server Types
239
Think about what happens when you send a fax from a conventional fax
machine. First of all, you have to print the document out, and walk over to
the printer to get it. You get up from your desk and pass the cube of your best
friend, so you shoot the breeze for a minute. Then you get to the printer, and
there is the new person from Legal, so you spend a minute building a rapport
and welcoming them to the company. When it comes time to grab your print
job, you grab a large stack of paper, and begin rifling through looking for
your particular print job. On the way through the stack you see the agenda
for the next Managers meeting, a memo going out on how to keep down the
high cost of executive lunches, and several sheets printed out with the latest
joke of the day. Then you finally find your document, and it is off to the fax
machine.
When you get there, there is someone already faxing something, so you
spend some time finding out about her sons latest soccer game, and she finds
out about your daughters latest basketball game. Now that we have the
kids update out of the way, your partner leaves and you are left to your
devices. You start the fax, and while you are standing there watching the 10
pieces of paper, with a cover sheet, go through the fax machine, you pick up
the stack of paper in the tray just to see if there is anything there for you. So
you rifle through the stack, and you find out that someone in accounting is
making a bid on a new house, that someone in the IT department is leasing
a new computer, and can you imagine the price the company is getting on the
250 new laptops they are ordering? Once the fax is finished, it is back to your
desk, with a stop at the coffee machine and some conversation with someone
else from payroll. Total time to send the fax: 30 minutes. Total time actually
faxing: 10 minutes. Total time wasted: 20 minutes.
The average user may cost your company $50 per hour after benefits and
vacations, so that fax just wasted about $16 of the companys money. That
is not all that much, but when you multiply it by 50 times a day, 5 days a
week, 52 weeks a year, it adds up.
A fax server alleviates that problem. It provides a central point for faxing
services. In other words, if I am sitting at my desk, and I have a 40-page proposal to fax to a client, all I have to do is print that proposal to the fax server.
The fax server then takes the document, renders it (prepares it for faxing),
dials the appropriate number, and when the phone is answered, it transmits
the fax. Meanwhile, on the other side, when someone faxes something
inbound, the fax server answers, accepts the fax, and routes it to the e-mail
box of the recipient. Everything is handled directly from the users desk, and
the user never has to leave the comfort of her chair.
www.sybex.com
240
Chapter 6
Server Functions
If you are configuring a fax server and you will be using a standard phone
line, the inbound and outbound line should be dedicated to the fax server.
The server will be doing large amounts of graphics rendering, which will
require lots of memory and lots of disk space, as well as lots of processing
power. Depending on the number of faxes that you expect the server to handle, you may want to use something like a PCI plug-in card that contains
multiple modems on the same card. Some expansion cards can manage 32 or
more modems. In this case you can have several outbound lines and several
incoming lines to alleviate the expected wait for the fax to be sent. As always,
before purchasing the server, be sure to read the fine manual (RTFM) to find
out minimum hardware and software requirements.
So far, we have been talking about servers that provide a rather visible service to your users, one that they can recognize and understand. Next, we are
going to look at the unsung heroes of the network, those types of servers that
just sit there and do lots of work, although no one may even know they are
around. Lets start by looking at a Domain Name Service (DNS) Server.
DNS Server
By this time in your career, you should have the DNS basics down to a tee.
You should know that it is a hierarchical distributed naming convention that
is used to resolve user-friendly names to IP addresses. The top level of the
DNS tree is the root, which is designated with a . (period). After that, there
are zones that represent the usual divisions that you are familiar with, things
like .com, .edu, .org, and .gov.
Now, you may be wondering how a DNS Server can help in your network.
Well, if you are even thinking about using Windows 2000, be sure to learn
everything there is to learn about DNS, because it is one of the foundations of
a Windows 2000 network. Even if you are not considering Windows 2000,
having a DNS Server on-site can prove to be a benefit to your network, now
and in the future.
DNS, as we have just discussed, is used to resolve user-friendly host
names, like www.myperfectwebsite.com, to an IP address, like
192.168.10.5. You can set up a DNS Server to manage your own DNS
namespace, or you can set up a DNS Server or servers to provide quicker
response to name queries.
When a business is small and first starting out, it connects to the Internet
through an Internet Service Provider (ISP), and utilizes the services the ISP
provides. This can include things like DNS lookup services. Figure 6.8 will
give you an idea of the layout at this stage.
www.sybex.com
Server Types
FIGURE 6.8
241
Internet
Requestor
DNS Server
In this diagram, the host on the local network puts a request in for
www.myperfectwebsite.com. The local host tries to resolve that name to an
IP address by checking memory, looking at several local text files, and finally
coming to the realization that it has absolutely no idea where that Web site
resides. So it better ask for help. It checks its TCP/IP configuration and finds
that the DNS Server is located at 214.177.158.16. The host then has to
determine if that address is on the local subnet or remote. It is remote, so the
packet gets sent to a router. The router than directs the packet across the
Internet until it finally locates the appropriate IP address. At that point, the
DNS Server checks its information to see if it really knows about the Web
site. Lets assume it does. If it does, it will return the IP address back to the
host. There was a lot of communication going on there that required time.
Look at Figure 6.9.
FIGURE 6.9
Internet
Requestor
DNS Server
In this case the DNS Server is moved to the local network. Now, when the
requestor is looking for the name, it will send a packet to the local DNS
Server, removing the router and removing the Internet connection from the
equation. The DNS Server can then resolve the IP address if it knows it. The
response time should be noticeably quicker, meaning you wont get as many
complaints!
www.sybex.com
242
Chapter 6
Server Functions
www.sybex.com
Server Types
243
WINS Server
As I am sure you remember from your Network+ class, versions of the Windows network operating system prior to Windows 2000 depended heavily
on a protocol called NetBIOS. As a matter of fact, whenever you installed a
version of Windows, you had to provide the computer with a name that was
unique to the network. This was referred to as the NetBIOS name, and this
is the name that other Windows workstations used to find your computer. In
order to locate that name, though, the workstations all had to register their
name with the WINS Server and also request information from the WINS
Server.
NetBIOS names could only be 16 characters in length, and they had to be
unique on the network. When the computer boots, it looks to its configuration
and finds the IP address of the WINS Server, and then it sends a packet that
will dynamically register the computer with the WINS Server. Many of the
commands used in Windows versions prior to Windows 2000 use these NetBIOS names in order to find and access services.
These unique names can have only one IP address associated with them.
NetBIOS is the protocol that has to establish the computer names, and establish and maintain sessions between two computers.
www.sybex.com
244
Chapter 6
Server Functions
NetBIOS is, by design, a small protocol designed primarily for a workgroup environment. One of its biggest drawbacks is its inability to be routed
between network segments. This property is referred to as a non-routable
protocol. By establishing a WINS Service, the workstations that come on line
will not have to use a broadcast method of determining the location of their
neighbors.
WINS is used on Windows NT networks that utilize TCP/IP as the transport protocol.
Another of the protocols and services found on a TCP/IP server is a
Dynamic Host Configuration Protocol (DHCP) Server. This one can really
save you a lot of work!
DHCP Server
Back when the Internet was young, and back when there were very few hosts
attached to it, configuring a static TCP/IP address was not a big thing.
Because there werent many computers hooked to the Internet, every computer had its own unique IP address, and that computer was configured once
with an address and it pretty much stayed the same. Then the Internet
became really popular, and suddenly hundreds of machines needed to be
configured with the TCP/IP protocol suite and receive IP addresses, the
address of the gateway, the location of the DNS Servers, the address of
WINS Servers, and bunches of other information. To make matters worse,
many of these computers were not stable, dependable, stay-in-one-place
desktops. They were laptops (called, affectionately I might add, luggables at
the time) that kept moving around from place to place and still wanted an IP
configuration. To solve this problem, administrators looked to DHCP.
A DHCP Server is in charge of passing out IP configuration information
to any host that asks for an IP address. Once the IP address is given out, it
is up to the DHCP Server to manage that address and make sure that it is
really being used. If the address is not being used, then it is reclaimed by the
DHCP Server and passed out to some other host on the network.
In order to make use of a DHCP Server, you start by configuring the
service. The first thing you have to come up with is some minimal information, like a scope or list of IP addresses the server can assign, the
address of the default gateway or router, the address of a couple of DNS
Servers, and the address of a WINS Server if necessary. Now, the IP
addresses all have to be from the same subnet, and the default gateway is
the gateway that serves that subnet. You will see why that is important in
a minute.
www.sybex.com
Server Types
245
The services that a DHCP Server provides are pretty much operating system independent. That means if you have a Unix system that is configured to
be a DHCP Server, it can provide addresses to Windows NT machines, Windows 2000 machines, Windows ME machines, Linux boxesanything that
asks can get an IP address with all the other information it needs.
Now you will notice that in that last paragraph I said DHCP Servers were
pretty much operating system independent. I put that phrase in there for
two reasons. The first was to drive my editors nuts because they hate things
like that, and the second reason was to make a point. Remember up above
where we talked about Dynamic DNS and I said that it was up to the DHCP
Server to return the proper information back to the DNS Server for registration? Well, if the version of DHCP Server cant work and play well with the
version of the DNS Server, this whole process will fail. If you are using
Dynamic DNS (like in a Windows 2000 network), it is best if the platform
matches. That doesnt mean that DHCP cannot pass out IP addresses to a
variety of different operating systems, because it can. It just means that DNS
and DHCP have to be compatible.
DHCP Servers have to have a static IP address. A DHCP Server cannot also be
a DHCP Client.
You will note I also said that the IP addresses have to be valid for the same
subnet. That is because of the way the hosts request the services of a DHCP
service. That whole process starts when the host boots up and starts to come
online. The host looks around for configuration information. It looks to the
way it is supposed to be configured and finds that it is supposed to receive all
the information it needs to communicate using IP from a DHCP Server. At
that point, the host sends out a broadcast message looking for an IP address.
A broadcast message means that every host on the subnet will handle the
message. Most of the hosts will ignore the message. The hosts that dont will
be the DHCP Servers. The DHCP Server looks at the request and sends back
a packet to the requesting host with a DHCP Offer. This offer is just that; it
is a packet that says, in effect, Hey, I can give you the information if you
want it. Here is my address, just let me know if you want to take me up on
this deal. The host will respond positively to the first DHCP Offer it
receives, and it will send a message back to the DHCP Server asking for the
information. The DHCP Server responds with all of the information that it
has been configured to give.
www.sybex.com
246
Chapter 6
Server Functions
The actual DHCP server does not have to be on the same subnet as the requesting host. If it is on a different subnet, there has to be some advanced configuration done before things will work. Either the router or another computer on
the subnet without the DHCP Server has to be configured as something called
a DHCP Relay Agent. The DHCP Relay Agent is simply a host on the subnet that
is configured to listen for DHCP requests. If it gets one, it sends a directed packet
to the DHCP Server, the Server responds to the Relay Agent, and the Relay
Agent responds to the requesting host. It is just like a middleman.
Web Server
The workhorse of the Internet, intranet, or extranet is the Web server. The
Web server is a server that runs software that lets it respond to and manage
HyperText Transfer Protocol (HTTP) requests. These servers have got to be
able to handle hundreds of simultaneous requests for information, coming
from all over the world. They have to be able to return Web pages of various
sizes, using various kinds of protocols, quickly, accurately, and securely.
www.sybex.com
Server Types
247
The term Web server can refer to the actual hardware box, or to the software that carries out the service. If you are referring to the software, Web
servers are varied. There is the Internet Information Service (IIS) that comes
with Microsoft products, there is the Netscape Enterprise Web Server,
Apache Web Server, and even Macintoshes can run a Web server. Some are
available for download and some are available for purchase. Each will run
on a specific network operating system: IIS for instance runs on Windows
server products.
When you enter www.myperfectwebsite.com, and something comes
back, it is the Web server that provides all the pages you want to view.
If you are in charge of configuring a Web server, there are several things to
keep in mind from the aspect of hardware. First of all, you will have to look at
how busy your Web server will be. For example, the Web server that I have running in my office to provide me and only me with access to my e-mail account
will not be anywhere near as busy as, say, Amazon.com or Microsoft.com.
Therefore, my Web server does not have to have a high-speed connection to the
Internet, really fast network cards, a T1 connection to the Internet, or any of
those things.
If, however, I was configuring a Web server for an e-business site, then all
those things and more would be important. I would need to look at how
many hits my Web site was going to take and plan accordingly. If you are
planning an e-business site, it is always better to be very optimistic than cautious. All you need is to be cautious in your purchase of a Web server, put it
online, and load your Web page, only to find out you have the hottest product on the Internet and your site cannot handle the load. When you are trying
to make money is not a good time to find out your hardware cannot handle
the load.
When you are planning for an e-business site, the thing you should take into
consideration is security. There are many people out there who would love to hack
your site for grins and giggles, or just to get access to your customer list. Losing a
list of customers can be devastating to a company. Losing a list of customers and
their associated credit card numbers can be financial ruin.
www.sybex.com
248
Chapter 6
Server Functions
Conducting Pre-Installation
Planning Activities
Before setting up a new network or adding equipment to an existing network, its important to go through some pre-installation decision-making and
planning. This section talks about the things to consider in the pre-installation
phase of a deployment.
www.sybex.com
249
trying to sell you value-add equipment that wont bring you to successful
conclusion of your goal.
Get out a piece of paper and write down what your end-goal is. Then
write down where youre at now and what itll take to get you where you
need to go. In the case of server and network planning, the answer may not
always be so clear-cut. There might be many vendors vying your attention,
for example. Who manufactures the best equipment? Is there a best choice?
Be sure to account for little incidentals in your equipment planning
efforts. For example, one often overlooked item is adequate network cabling
for your new gear. With fiber optic NICs or network gear, your fiber optic
cabling expert will give you a choice of two different types of connectors:
Type SA and Type SC. Youll need to know what youre connecting to, at
both ends, in order to satisfy this request. Power is another consideration.
Some bigger servers utilize 208 voltage instead of the regular 120 volts that
most equipment requires. Its up to you to make sure that the correct lines are
run in order to satisfy the voltage requirements of the new equipment.
Planning involves two things: considering every nuance of a projects installation or upgrade requirements from start to finish, and communication with
the people who can help you figure out the answers to your questions. Vendor
salespeople often bring along a person called a "System Engineer," or SE for
short, to help analyze your particular scenario. The SE is there to answer the
technical questions that you may have that the salesperson isnt capable of
answering. Be sure to thoroughly drill this person with questions you might
have. If youre not satisfied with an answer, tell your vendor so.
Your plan will, when finished, include a project plan with milestones, timelines, dates, and key project elements. Itll also include a spreadsheet that contains the pricing information and itll include information given to you from
your vendor of choice. Management should sign off on the plan or at least
review it for thoroughness. Youll be surprised at some of the intelligent questions a manager might ask about a deploymenteven though the manager
isnt technically inclined. Often a manager looking at a project from a 30,000foot view will see things you might not have thought about while in the midst
of the sea of details.
If youre outsourcing some of the work, youll likely be given a Statement
of Work (SOW). Make sure you review the SOW and are in complete agreement with it before anyone signs it. Contractors are only obligated to live up
to the SOW you sign and may be reluctant to go beyond the letter of whats
in the SOW to help you with problems.
www.sybex.com
250
Chapter 6
Server Functions
www.sybex.com
251
Never carry cards across a carpeted room without first putting them
in a static bag for protection.
Its a good idea to get yourself into the posture of always transporting
cards, DIMMS, or other electronic gear in a static bag whenever
theyre out of the computer.
Use statically protected tools (those whose handles have been treated
with rubber).
Dont leave the cover off of servers when theyre in normal operation.
When working on servers, unplug the box before beginning work. Working with servers that have a power source available is stupid, because you
might get electrocuted or you might introduce a static discharge that
could easily toast the innards (the servers innards, that isyours were
toasted when you got electrocuted).
This all seems like pretty sensible stuff. But youd be shocked at how often
these rules are overlooked, usually in the interest of time. Why bother with
a wrist-strap when the last ninety-nine times out of a hundred, youve had
virtually no problems? Well, because theres always that one time when
something might go wrong. Better safe than sorry!
Adopt a factory sort of standard in your cable making. Always make the
cables exactly the same way each time, being sure to adopt a strict cablemanufacturing regimen. This will help you avoid mis-crossed pairs.
www.sybex.com
252
Chapter 6
Server Functions
Buy good quality ends and cable. Dont shortchange yourself with
cheap stuff.
www.sybex.com
Add Processors
253
One of the most perplexing things a new server admin might get into is a
system that boots without video. The reason the problem is perplexing has to
do with the fact that it takes a few minutes for it to dawn on you that the video
is hosed up. The computer is actually going through a wonderful power-on
sequence, but you cant see it because youre plugged into the wrong video
port, or the video card has a problem or some such issue. Listening for the various system beeps will help you understand that the computer is going through
its normal operations but you just cant see them. Its important, of course, to
rectify video issues right away.
Speaking of computer beeps, various motherboards have different ways of
alerting you of normal bootups and of problems. The most common "uh-oh
there is something seriously wrong with the computer" warning is a series of
three or four long tones from the computer. Typically this happens when
youve got mismatched memory in the computer, but Ive heard long tones
with other situations as well. Get to know your servers motherboard!
Add Processors
www.sybex.com
254
Chapter 6
Server Functions
You can download BIOS upgrades from the manufacturers Web site or
obtain them from the installation CDs that came with the server. Generally
the installation CDs are one or two versions behind current, so its wise to
check the Web.
www.sybex.com
255
Hardware verification amounts to two separate concepts: that of maintaining a hardware asset inventory, and also of keeping track of the various
firmware and BIOS version numbers for a system.
With most network operating systems, theres usually a recommended supported list of hardware that can be utilized within a given complete system. Its
vitally important that you pay close attention to this "blessed hardware" list
predominantly because if you dont, theres only so far that a manufacturers
support person will go with you should you experience problems. In a Windows-based system, Microsoft calls this list the Hardware Compatibility List
(HCL). Other manufacturers have comparable lists. Do not try to install an
NOS on a computer whose combined parts dont fit within a supported configurationnot unless youre fond of troubleshooting on your own, that is.
Take down complete system information. Include the brand name and
BIOS/firmware version numbers of the cards in the system. Keep a good
record of each computer in the server farm. Consider routinely updating a
computers BIOS.
ith many different server manufacturers you have the option of purchasing a separate add-on card that allows you to connect a phone line to the
computer and then be able to dial in to the computer when you want to check
its status. The computer can also phone out with alerts that revolve around
something physically going wrong with the computer. For example, suppose
that there is a piece of paper plastered against the fan and the computer is heating up. It would be nice if you could be paged or somehow notified that this
event occurred. With these separate add-on cards, you can arrange this kind of
notification, independent of the NOS.
There are alerting software packages that are available for a server NOS
that can allow you to configure advanced notification options. For example,
suppose that youre interested in monitoring a given daemon, service, or
NLM to assure that its consistently up and operational. You can apply software solutions to such a need and obtain alerting in this way. You can set up
a system to send a message to your pager, to email you or, in some cases, to
call you.
www.sybex.com
256
Chapter 6
Server Functions
Note that the above two paragraphs describe two very different methods
of handling remote notification. The first describes the very base functions of
the system, independent of the NOS installed on it. The second describes
software that isnt necessarily interested in whether the NOS is running, but
is concerned with given applications and events.
You can combine the two monitoring and alerting processes using
software called Enterprise Management software. Companies such as
Computer Associates with their Unicenter TNG, or IBM with its Tivoli
offering, provide very robust and granular management tools that can
continually observe and alert on virtually every facet of a servers operationfrom hardware failure to service management.
Summary
hew! That was one extensive list, wasnt it? We have looked at
about every way imaginable that a server can be used. I understand that we
did not do an in-depth look at any of the server types, but entire books can
be written on topics like DNS, DHCP, and Web servers.
This is one of those chapters that are target-rich for test writers. There is
a lot here to choose from in the way of questions. To make it worse, so many
of these servers do close to the same thing or look and sound so much alike.
For example, if I asked you what type of server resolves NetBIOS names to
IP addresses, it would be WINS. Change one word and the answer would be
DNS. Hey, those are two great questions for the assessment test or for the
review questions.
We also talked in this chapter about pre-installation planning considerations. Especially with larger server rollouts, you should prepare a project plan
that details how youre going to accomplish your goal and communicate it
with others.
We mentioned that you should follow good ESD practices when working
with servers.
We also talked about remote notification cards and software for servers
and mentioned that good housekeeping when racking and cabling servers is
highly important. In the cabling realm, we noted that cables that you manufacture yourself have a greater propensity for failure than those you obtain
commercially. Especially important if youre "home-growing" your cables is
to make sure that the crossed pairs are the correct pairs. But overall, its to
www.sybex.com
Summary
257
Exam Essentials
Know what SNMP does SNMP tracks events on the network. This can
include things like servers coming online or going offline. It can also track
other events like logons or logoffs.
Know why DMI is used DMI is used to remotely manage a users desktop.
Know when to use a gateway A gateway is used to allow communication between dissimilar systems. For example, an SMTP gateway will
translate information from the e-mail system you are using to the protocol
used by the Internet.
Know when to use a router A router is used to efficiently manage communication between computer networks.
Know when to use a bridge A bridge is used to manage communication
between systems on a network segment.
Know when to use a firewall A firewall is used to protect a network (or
even a network segment) from intruders.
Know when to use a proxy server A proxy server is used to enhance
performance of accessing Web pages from the Internet or from an
intranet. It can also be used as a rudimentary type of firewall.
Know when to use a database server A database server is used to manage
large amounts of data stored in a database format.
Know when to use client/server Client/server communication allows a
particular application to fulfill a clients request, rather than having the
client going out and searching through databases. This usually enhances
the security of the database from unwanted corruption.
www.sybex.com
258
Chapter 6
Server Functions
www.sybex.com
Summary
259
Key Terms
Before you take the exam, be certain you are familiar with the following terms:
application server
bridge
client/server computing
cold start
community
Component Interface (CI)
data warehousing
database server
Desktop Management Task Force (DTMF)
Domain Name Service (DNS) Server
Dynamic DNS (DDNS)
Dynamic Host Configuration Protocol (DHCP) Server
Exterior Gateway Protocol (EGP)
fax server
file and print server
File Transfer Protocol (FTP)
firewalls
full zone transfer
gateway
HyperText Transfer Protocol (HTTP)
incremental zone transfer
item
local area network (LAN)
location
mail server
Management Information Base (MIB)
www.sybex.com
260
Chapter 6
Server Functions
www.sybex.com
Review Questions
261
Review Questions
1. Which server type would you generally associate with things like
POP3 or SMTP?
A. DNS
B. DHCP
C. E-mail
D. Application
E. Web
2. Which protocol would you associate with server and network
management?
A. DMI
B. DNS
C. ESPN
D. SMTP
E. SNMP
3. Which of the following are components in an SNMP implementation?
A. Manager
B. Hosts
C. DMI
D. Agents
E. IP
4. From the list below, select some pre-planning activities.
A. Preparing a project plan
B. Speaking with various entities involved with the project
C. Updating the computers BIOS
D. Checking hardware compatibility lists
www.sybex.com
262
Chapter 6
Server Functions
allowing her to directly dial the server, independent of the motherboard, or she can have the server send out alerts using the phone line
in the card. Now Elizabeth is configuring the card so that it pages her
when theres an issue at the hardware level. What feature is Elizabeth
implementing with this card?
A. Remote control
B. Remote notification
C. Remote diagnostics
D. Remote authentication
8. Francois has been hired as the new server administrator for a small
www.sybex.com
Review Questions
263
computer. She has validated that the speed, stepping, and L2 cache size
are correct. She has the correct parts, but when she installs the processor
the computer wont recognize it. Whats the likely problem?
A. She has to enable the second processor port in the system BIOS.
B. She has to upgrade the system BIOS.
C. She has to upgrade the first CPUs BIOS.
D. She must first reboot the server.
12. Whats one of the best ways to tell if the addition of system memory
www.sybex.com
264
Chapter 6
Server Functions
13. John is preparing a server that will be used as the companys new
equipment?
A. Power up and test new equipment before putting it into production.
B. Validate the order against what was shipped.
C. Jot down all serial numbers.
D. Read the manuals.
15. Youve written out a plan for a brand new server installation. This
www.sybex.com
Review Questions
265
17. Name some server devices that have a BIOS that you must consider
external device?
A. You cantheres nothing wrong with it.
B. Violates good ESD practices.
C. Cables arent made for that.
D. External devices cant take an internal connection.
20. Stan has done some work on his server and now it appears to have no
power at all. How can Stan verify that the servers getting power?
A. Check the cooling fan.
B. Test it with a circuit tester.
C. Plug the computer into a different power socket.
D. Check the panel display.
www.sybex.com
266
Chapter 6
Server Functions
happens much later on after youve received the gear and youre prepping it. Its very wise to ascertain ahead of time that youre purchasing
the correct complement of components for the server. You should also
develop a project plan that details how youre going to obtain, build,
and deploy the server and you should be sure you communicate with
other stakeholders involved with the new system.
5. A, C, D. While its great to work in an ESD-ready room, you wont
always have that luxury. Use static bags when transporting cards.
Wear ESD wrist-straps when working on a servers internals and
always unplug the server before working on it.
6. B, C. Its not likely that youd be able to buy a second processor for a
Note that some NOS software can be configured to send alerts out to
administrators when certain key events occur. Setting up alerts on
servers is something administrators should be responsible and diligent
about doing.
www.sybex.com
267
tell you the kind of device youre replacing in a situation where a device
has failed. You could also use the information to help you make decisions about an upgrade and you could certainly key the information
into a spreadsheet to provide inventory information to others. However, as new hardware products come out, they often overshadow the
old in terms of lower pricing and higher output or efficiency.
9. A, B, D. You have no control over the way cables are run inside walls
so you dont know if you may have a cable running parallel to a phone
line (thus generating crosstalk) or not. But by keeping the cable runs
neat, you can ensure that people dont step on the cables and that the
cables dont become unplugged from devices. It also creates a nice,
neat, professional appearance.
10. B. SNMP Agents can be gathered into communities for security
purposes.
11. B. You might run into a circumstance where an older BIOS doesnt
Hey, computer vendors make mistakes just like everybody else! Why
find the problem at 2:00 A.M. when youre ready to install the server?
15. A. You should have someone else who understands the nuances of
www.sybex.com
268
Chapter 6
Server Functions
The most common problem hell run into will be cables that dont
work because he got the crossed wire pairs wrong. This is work thats
better being outsourced or purchased over the counter.
17. A, B, C, E. SCSI adapters, the BIOS on the motherboard (the system
BIOS), RAID cards, and video cards all have BIOS firmware that
might need to be upgraded. Serial/parallel cards generally do not.
18. A, B, C. A good installation plan will help you think about things you
might not have considered had you not taken the time to sit down and
think out what youre going to do. For example, making sure you have
adequate power in the server room is an installation must. Also making
sure you have network connectivity is important and seeing to it that
you use the correct IRQs for all devices might also be a good thing to
check during installation. The warranty doesnt have anything to do
with the installation.
19. B. Items C and D are correct, but Ive seen admins do some creative
www.sybex.com
Chapter
Server Etiquette
SERVER+ EXAM OBJECTIVES COVERED IN
THIS CHAPTER:
1.2 Install hardware using ESD best practices (boards, drives,
processors, memory, internal cable, etc.).
Install UPS.
Verify backup.
www.sybex.com
Use the technique of hot swap, warm swap, and hot spare to
ensure availability.
www.sybex.com
For complete coverage of objective1.2, please also see Chapters 1, 6, and 8. For
complete coverage of objectives 3.1 and 4.1, please also see Chapter 12. For complete coverage of objective 6.2, please also see Chapter 13. For complete coverage of objective 7.1, please also see Chapters 1 and 12.
Application Servers
www.sybex.com
272
Chapter 7
Server Etiquette
Database server
The first part of the application is usually a Web browser user interface
that can be accessed from a remote workstation. The middle section is an
application or applications housed on a local area network or on an intranet
server. Finally, the last part is the database and transaction server. This can
be housed on a larger server, up to and including a mainframe.
As was mentioned in the last chapter, Server Functions, the entire purpose of an application server is to deliver applications to the network users.
Take a look at Figure 7.1 to see how this all lays out.
FIGURE 7.1
Internet
Web-based user
Web Server
Application Server
Database Server
You can see how the end user accesses the information using a Web
browser or a thin client. The first place the signal hits is the Web server, which
passes the information along to the application server. The application server
uses the database server to either retrieve information that the client needs or
to store information from the clients.
A thin client is a specially designed client that allows you to access information
from a system like Microsofts Terminal Server or Citrix Metaframe. It sends
and receives keystrokes, mouse movements, and video updates. All processing
is done at the server.
There are several ways the application servers can be configured. Lets
look at some of them.
www.sybex.com
Application Servers
273
Local site
LAN
Application Server
Application Client
Server
Client
Client
Application
Server
Remote site
LAN
Application Client
Server
Client
www.sybex.com
Client
274
Chapter 7
Server Etiquette
Disaster Recovery
While the test objective lists disaster recovery after backup, I think it is
important to reverse the discussion here. You see, some of the decisions that you
www.sybex.com
Value of Services
275
make while you are deciding on disaster recovery will have a definite impact on
your backup strategies, so lets get this discussion out of the way first!
Disaster recovery has evolved into almost an art form. The premise is really
simple. If something were to happen to a computer or group of computers,
how long would it take before the services offered by those computers would
be available? What steps have to be taken to bring the restoration of services
into play? That is all there is to itsort of.
Lets take a more in-depth look at what some of those criteria mean to the
average business. First of all, the question starts out, If something were to
happen to a computer or a group of computers.... Your immediate reaction
should be, What could possibly happen to them?
If you start by identifying disasters, then you start to determine what you
can do to prevent the disaster or recover from it. For example, lets say you live
in Jacksonville, Florida. You have a generic computer. Now, what disaster can
befall that device? First of all, it might be something common like a failed disk
drive. Or, the disaster may be something more serious, like a communication
link between two key hubs is down or the computer failed because the building
that housed it was hit by a hurricane and the building is now underwater.
In a good disaster recovery plan, all of these things have to be taken into
consideration.
So, if I were to come in and start the disaster planning process, I would
start by making a list of the common disasters that can befall a computer
room: The power goes out, lightning strikes, a disk drive fails, the building
burns down, the entire block burns down, the entire town floods, or there is
a war. Once I have a list of potential disasters, I can move on to the next step.
Value of Services
www.sybex.com
276
Chapter 7
Server Etiquette
Chances are, you cant decide. You probably dont have enough information
at your fingertips to make those kinds of decisions. This is going to have to be
the decision of a committee and that committee should have representatives
from all aspects of the business. When you put your disaster recovery team
together, be sure to include all facets of the business, from the management folks
on down. Make sure also that everyone has the freedom to say what is on his
mind. Too often, people think they know how something is used, and may have
no clue about its real value to the company. I am sure there is no one like that
where you work, but there have been several people in my past that were in the
position of authority who were completely in the dark about the way things
really worked.
Now that you have the committee together, it is time to meet and look at
what would happen if a resource suddenly disappeared. What would be the
impact on the company? Here is an example. Earlier in the book, we talked
about different types of servers. Lets assume that the company you are
working for printed out mailing labels for customers. If your main database
server went down, with thousands and thousands of names on it, it may put
your company in difficult straits, depending on how long it took you to
restore the information. If it was completely and totally out of commission
and you suddenly found there were no copies of the data and no backups,
your company would effectively be out of business.
Contrast that to what would happen if the file and print server went down
in the word processing area. Depending on the information typed on a daily
basis, your level of pain may range from mildly inconvenienced to seriously in
a world of hurt. Start the committee meeting by objectively looking at your
resources. Once you have listed the resources, then it is time to figure out how
long the company can live without the resource and what the company would
be willing to do to protect the resource. Finally, you and the committee have
to determine if this tack is financially and technically feasible.
If your company is like most of the ones I have dealt with, there is no such
thing as disposable, noncritical data, even if the data consists of agendas
from meetings that were held five years ago. It obviously is important to
someone; otherwise it never would have been saved to the network. Since it
is important, it has to be protected. Now, the real world steps in. How much
would the company lose per hour (or in some cases, per minute) if the service
or information were not available? Once that has been determined, how
much is the company willing to spend to protect it?
www.sybex.com
Value of Services
277
Lets look at a stock brokerage firm. How much would the company lose
per minute if its electronic link to the stock exchanges went down? First,
there would be the tangible losses. For example, I wanted to buy 100 shares
of ACE Company at $25 a share. When the link went down, the stock had
just hit the trigger point, but by the time the link was back up, the stock was
trading at $25.50 and the buy order went unfilled. That may have cost the
company $75. Then there is the loss of trust from the client. I call, wondering
why my order wasnt filled, and you tell me it was due to a computer glitch.
I am going to be looking for a brokerage company with a better computer
department. Multiply that story by several thousand customers and you can
see we are talking some big numbers. Some brokerage companies will handle
millions of dollars an hour. If the computer services are not available, that
can add up to real money really quickly.
Once you have made your list of critical services and decided how
much those services are worth, it is time to figure out what it will take to
provide those services in a manner that meets the corporate needs. It is
not uncommon for companies to reevaluate the value of services based on
the cost of providing the mission critical disaster recovery services. Lets
take a look at an example. In any company, it is not uncommon for
fiefdoms to spring up. During this process, you will see people become
very protective of their data. You may also see some amazing transformations. Take the person who is in charge of the database that manages
the parking permits. She may come up with a very convincing argument
as to why that information cannot be down for even 1/10th of a second.
The argument may be so good that you may want to suggest that person
move into the companys marketing department. Anyway, once the information has been given a high priority, it is up to you to protect it 24 hours
a day, 7 days a week. This is where you suggest that there be a mirrored
server placed off-site to accomplish the task. Cost of the server, $7,500.
Cost of the facility to hold the server, $10,000 a year. Cost of a leased
line, $1,000 a month. Cost of technology to mirror servers, $10,000.
Suddenly someone takes a close look at the costs and determines that the
company can put up with a lot of parking lot chaos for that amount of
money. Can you see how this is an ever evolving document?
Once the committee has completed the list, it is time to take the list to the
next level. The next level is where you determine how you are going to identify
that a risk has occurred, and what are you going to do to recover. Once again,
some of this is exceptionally easy. Having a dozen firefighters outside the corporate headquarters sending streams of water into the building is a pretty good
indication that there is a fire. But how do you tell that someone from outside
www.sybex.com
278
Chapter 7
Server Etiquette
the company is currently accessing your customer database? That is not nearly
so simple. What could be even more difficult to detect would be if someone
from inside the company who was not supposed to have access were currently
accessing your customer database. Each of these occurrences can be a disaster
just waiting to happen. Protecting against it can appear easy, but determining
the fact that you have had a disaster can be difficult.
To make this even more of a challenge, you are going to have to enlist the
help of people who are not normally known as IT professionals, including
management. Think about it. The data that is probably the most vulnerable
to attack is the data that the upper echelons of managers will be seeing. In a
normal organization, whatever your definition of normal is, the higher up
the corporate ladder an individual goes, the less she knows about the nuts
and bolts of the network. So there will be some training involved. The training will include things like being aware of things around you. If something
in a document does not look right, how can you check to see if it has been
compromised?
Once you have determined how much you can do to protect the information, it is time to examine what you can do to recover from a disaster
when equipment fails or is destroyed and/or data is lost. In previous chapters
we have covered some of the steps you can take to ensure against data loss
through equipment failure, but what if your equipment is destroyed?
What would you do if your pager went off in the middle of the night and
you were told to get to the office as quickly as possible? Youd go. Imagine
the look on your face when you rounded the last corner and pulled into the
parking lot only to find dozens of fire trucks fighting a massive blaze. Could
your company survive this type of disaster? How long would it take them to
be back online and ready to work? For some companies, the time period
would be months. For other companies, the time period might be days. Some
companies may have switched their computer operations to a different site
and be online before the first fire truck arrived on the scene. It all depends on
how deep your pockets are, and what the cost of failure would be.
Lets take a look at this from the server room point of view. This probably
isnt the first time I have used dirty words in this book, but it may be, so prepare
yourself. You are going to make your life much easier if you have documented
your current network. Now, you and I both know that the term documentation
is usually at the top of your list of things to do. And it stays there and never gets
crossed off, mainly because you are too busy with life to do what you have to do.
Copyright 2001 SYBEX, Inc., Alameda, CA
www.sybex.com
279
If you are serious about disaster recovery, there are four terms that should
be your mantra:
Document everything.
Back up everything.
Store it off-site.
www.sybex.com
280
Chapter 7
Server Etiquette
It is amazing how many people just dont understand how important this
task really is. Of all the things that you do, this is one of the most important.
When I teach, I like to tell my students some of the rules of network computing.
You know the ones:
The higher you ascend the corporate ladder, the less you know about
computingbut you get better grades of equipment.
You can tell the skill level of a network administrator by his level of
paranoia.
The last one is really my favorite. It points out one of the all time truisms
of server administration: Murphy was an optimist. So, in order to make sure
that Murphys Law doesnt come back and bite you when you least expect
it, you have to make sure that your data is protected.
Earlier in the book, we talked about things like mirrored and duplexed
drives, as well as RAID technology, but there isnt much that can beat a good
old-fashioned full backup, checked and tested and stored off-site to ease the
pangs of stress in a network administrators heart.
There are several different kinds of backups, from the old COPY/XCOPY
command, to full, incremental, and differential. In this section, we will take
a look at the types of backups and some of the occasions to use each. We will
also look at some of the inherent dangers in the process.
Types of Backups
When you start to lay out your backup strategy, there are several things to
keep in mind. Look closely at the server you are going to design a backup strategy for. How often does the information on that server change? That can
impact the strategy. How mission critical is the server, really? That will have
an impact on the backup strategy. Perhaps the most important consideration
is, How fast is the backup device you are using to make your backups and
how much data do you have to back up?
www.sybex.com
281
Types of Backups
Generally, there are four types of backups:
Copy Backup
Full Backup
Differential Backup
Incremental Backup
www.sybex.com
282
Chapter 7
Server Etiquette
Copy Backups
This is usually the quickest type of backup, the kind of down and dirty
backup that protects a small amount of data for a short period of time.
Suppose that I am going to be making some changes to someones computer
that will affect her POP3 e-mail client, like Outlook Express. I know that no
matter how careful I am, something I do may trigger an unexpected process
that will delete all the address book entries or messages. I know this, because
it has happened to me before. Usually when this happens, the end user loses
most, if not all, of her sense of humor. An easy way to protect against this is
to make copies of the affected files before starting to do any work with them.
It is quick, it is down and dirty, but it at least gives you the opportunity of rolling the procedure back to the time when everything worked. When in doubt,
back it up.
Full Backup
A full backup does just what the name implies. It backs up all the information on the disk to an offline device. This device can be a tape, an optical
drive, or a CD if you have a small amount of information. All information
from one medium is copied to another medium, regardless of when the data
was last accessed. When a full backup or normal backup is done, it will reset
the archive attribute on each file. The attribute will be changed back to
archive if the file is changed in any manner. The full backup and verification
will take the longest to perform.
Incremental Backup
An incremental backup will back up only those files that have been changed
since the last backup. This means that if I do a full backup Sunday night, and
an incremental backup Monday, the incremental will back up all the files that
have been changed on Monday and reset the archive attribute, indicating the
file has been backed up. If you run the incremental backup again on Tuesday,
all those files that have been modified on Tuesday will be backed up, the
archive attribute will be reset, and so on. The incremental backup will take the
least amount of time to run each and every night.
Differential Backup
A differential backup is a backup of only those files that have been modified
since the last full backup was performed. To put this in perspective, lets say
you do a full backup every Sunday night. Using a differential backup on
Monday night will back up all files modified on Monday. Using a differential
backup on Tuesday will back up all files modified on Monday or Tuesday.
Using a differential backup on Wednesday will back up all files modified on
www.sybex.com
283
Backup Strategy
Once you have determined what types of backups you are going to do, you
then have to figure out how long you are going to keep the tapes. The most
widely recognized tape retention method is referred to as the Grandfather,
Father, Son method. This system works by using a tape rotation method of full
and partial backups for each day of the week or month.
Once a month, a full backup of the system is done, and the backup is
stored offsite. This tape is never recycled, and it is the tape that is brought out
if all else fails. This is referred to as the Grandfather tape.
The Father tape is the most recent full backup, usually done at the start of
the week. The Sons are the daily backups that contain only the information
that has changed that day. These tapes do not have to be kept forever and
they can be recycled every time a new Father is created and tested. You
should have several weeks worth of Father tapes stored away from the office
in a secure, fireproof, and anti-magnetic environment.
Restoring Data
What is the old saying, The proof is in the pudding? Well, when it comes
down to disaster recovery, the proof is in the restore. Every commercial
backup program gives you the opportunity to verify your data as you are
backing it up. But although every commercial backup program has that
functionality, you still need to check it!
As part of your backup strategy, make sure there is a time when you create
a dummy file, back up the dummy file, delete the dummy file, and restore the
dummy file. If you cannot do all those things, your backup program is not
working.
The differences in the types of backups will also come into play when you
start thinking about restoring data. For example, when I talked about full backups, I said that the full backups take longer than any other kind of backup. That
is true. What is also true is that if the data all has to be replaced, restoring completely from a full backup is the quickest method of getting the server back
online. You only have one tape to mess with, and there is only one pass through
the file system.
www.sybex.com
284
Chapter 7
Server Etiquette
If you do not have time to do a full backup every night, you can choose
the method with the next-fastest restoration, which is to do a full backup
with a differential. In this case, you would restore the full backup first, and
then do a restore on the last differential backup. That way, all the files will
be restored to the date and time of the last backup. Although not as fast as
restoring from a full backup, it is faster than the next method, which is the
full backup and the incremental.
With a full backup and incremental, you have to restore the full backup
first, and then restore each of the incremental backups in the proper order.
If you should happen to get things out of order, you may have corrupted the
data. Here is an example. Lets say you suffer a meltdown on Thursday. So
you restore the full backup from Sunday night, the incremental from Monday, and then grab the wrong tape. You restore Wednesday, and then you
restore Tuesday. There are some files that are going to be commonly used
daily, such as the accounting package. These files will be a day old, and
unless the accounting department catches the error, Wednesdays work may
never get added back in. Also, restoring from the combined full and incremental backups takes the most time.
Now that we have covered backups and restores, lets take a look at physical
file server security.
www.sybex.com
285
Back before I was an instructor, I had a real job as a network technician for a systems integrator in Minneapolis/St. Paul. One of the people I
worked with had a weekend upgrade where he almost completely rebuilt the
server: adding memory, hard disk space, and a new tape drive; upgrading the
backup software; patching the system; and more. When he got ready to
leave, he slapped a tape in the internal tape drive and kicked off a full backup
of the new, fully functional system.
Monday morning rolled around, and when he got in, he had several voicemails
from the customer, all complaining that the clients were getting messages that indicated the server was not available. He rushed over to the client site, all the while
thinking, What could I have fouled up? When he arrived, he rushed to the computer room, opened the door, and found out why the server couldnt be located.
Somebody had stolen it. The whole thing! Talk about implementing a disaster
recovery plan.
There are dozens of similar horror stories, but we are here, not to swap tales,
but to talk about how to protect a server by providing physical security. The
whole goal is to make sure that you can provide as much uptime as possible. If
you look at what causes hardware failures, the two primary causes are power
spikes and heat. So, you can go along way toward eliminating hardware failure
by eliminating problems with power spikes and heat. That means, make sure
your server is kept in a room that is air conditioned, or otherwise cooled, 12
months a year. To eliminate static, make sure the room has a humidifier. Finally,
your Uninterruptible Power Supply should also have power conditioning to
even out those highs and lows that come from the power company.
Okay, one more tale from the hardware side. I was doing hardware support
for the local power utility and I got a call from one of the power generating stations that one of their servers had stopped working. I drove to the power station,
and started walking toward the server room. As I was walking toward the server
room, I called my office and told them to send out the full hot spare server by a
delivery service, immediately. They should also dispatch another engineer,
because we were going to have our work cut out for us. The person who was
taking me to the server room asked if I wasnt being a little premature, but I
pointed out that the smell of burned silicon that permeated the building made
any other troubleshooting superfluous. We had them back on line in about two
hours.
What else can you do to protect your server? Put it behind a locked door,
and limit who has access to the server room. Too many companies put the
server behind a locked combination door and then allow everyone in the
company to have access to the combination. Every time the building gets
Copyright 2001 SYBEX, Inc., Alameda, CA
www.sybex.com
286
Chapter 7
Server Etiquette
warm, people head to the computer room because it is cool. The computer
room begins to look like the annual company meeting!
Locking up the server room also prevents people from getting physical
access to the servers. Hacking into a system or breaking passwords is very
easy if you have physical access to the system. Keeping unauthorized people
away from the system also prevents many of the oops accidents. These are
the accidents where people hit the wrong switch and turn a computer off by
mistake. Protect the server by putting guards over the on/off switch. If there
is a big power switch in the back, make sure it is secured so cables cannot
wrap around it and turn it off by mistake.
Protection begins with the hardware. Make sure that whatever equipment
you are using for servers is secured away from people, behind a locked door,
in an environmentally controlled, power conditioned room. If you work for
a small office, dont give in to the temptation to save $1,000 by using your
Windows 2000 Server as a workstation also. That $1,000 will be used up
quickly by downtime caused by human error.
www.sybex.com
287
The next advance came from HP and Sony when they entered the market
using digital data storage (DDS) Technology. DDS used a 4mm metal particle tape similar to tapes used for digital audio recording, known as DAT
tapes. These tapes had a capacity of 1.3 GB on a 60 meter tape. Eventually, DDS tapes grew in size to 125 meters, which allowed for the backup
of 12 GB. This was referred to as DDS-3 and was released in 1995.
In 1996, Exabyte introduced a new technology called Mammoth. Mammoth tapes had a 20 GB capacity with a transfer rate of 3 MB per second.
Mammoth-2 tapes were introduced in 1999. Mammoth-2 adds a new technology called Smart Clean. When the drive is dirty (a very common problem in tape backups) the drive will clean itself without any user
intervention.
www.sybex.com
288
Chapter 7
Server Etiquette
www.sybex.com
Shut It Down
289
Having a lock on the server room door means they cant get in to bother
you. You can shut your phones and pagers off and really get some work
done!
Seriously, besides the lock, having an alarm system that will notify someone of excessive heat, water, or fire is also an excellent addition to the
server room. If your fire alarm also triggers a fire suppression system,
make sure the entire staff is trained to know what will happen if fire breaks
out. Some of the fire suppression systems do an excellent job of putting
out the fire by removing oxygen from the room, but this is not usually
healthy for your average human being.
Shut It Down
epending on the server operating system that you are familiar with,
you know that in most cases, bringing a server down is not a complicated
procedure. If you are using Windows NT/2000, pressing Control-Alt-Delete
and choosing Shut Down will accomplish the task. In NetWare, it can be as
simple as typing the word Down. But what are the ramifications of downing
a server and how should you prepare?
Downtime
Call it routine maintenance, call it an upgrade, or call it an outage. It doesnt
matter what you call it, the server will be unavailable. Now, this may seem
overly simplistic, but there are two kinds of outages: a planned outage and an
unplanned outage. The planned outage is something that can be scheduled in
advance. The unscheduled outage happens when a server goes down suddenly,
without any warning. In either case, there are users without services. Users
without services tend to be unhappy users.
Unplanned Outage
This is the worst kind. In Windows NT/2000 it can be called the Blue Screen
of Death. NetWare has an even more mystical term, the abend (for abnormal
end). No matter the operating system and no matter the term, it means something has gone wrong.
www.sybex.com
290
Chapter 7
Server Etiquette
Planned Outages
Things are usually much calmer surrounding a planned outage. You know it is
going to happen, so you can notify the users on your network that the affected
server will be taken down. You can make sure that they know the applications
or services offered by that system will be unavailable, and for approximately
how long. You can also notify your users that they need to exit from the server
or disconnect from the server before you take it down.
You can also make some decisions on the impact the outage will have, and
how you can minimize that impact. For example, taking down a server that
is a member server in a Windows NT 4 domain will have less of an impact
on the overall network than taking down the Primary Domain Controller.
What if the server you are taking down is the Primary Domain Name Service
server for a Windows 2000 Active Directory implementation? How can you
make those services available on another system to minimize the interruption
of service? All of these things are implications that need to be addressed
before you shut the server down.
One of the key questions here is, How long will the server be down?
Now, there are two ways of answering that question. The first way is the
answer you give to your users and to your boss. The second answer is the one
that you really feel. Here is how it works in my world. Say that I am going to
be bringing a server down for an upgrade, and I am going to add more memory
to the system. I know that it may take anywhere up to 15 or 20 minutes to
www.sybex.com
Shut It Down
291
politely stop all the services and turn the server off. At that point I can take the
top off, add the memory, put the top back on, turn the server on, make sure
the memory is recognized, and the server will come up on its own volition.
Total timeperhaps an hour. That is what I really think it will take. Now,
what do I tell my users? Four hours at a minimum. Because I know that nothing ever works as smoothly as I think it should. Something will always go
wrong to foul things up a little bitjust enough to throw you off your time
estimate. Now, I know from experience that if I think a job is going to take an
hour, and I tell my users that the job is going to take an hour, and it takes 90
minutes, people think I am an idiot. I may have done everything exactly right
and in record time, but it doesnt matter, I said 60 minutes, it took 90, and
therefore I am an idiot. If, on the other hand, I announced the four-hour minimum, everyone was mentally prepared to be without service for four hours.
Same job, same result, 90 minutes. Now, instead of being 30 minutes late, I am
two and a half hours early. I am a genius. I like being considered a genius much
more than an idiot, so I set expectations where they can be reasonably met.
Before any planned outage, you should make a list of what services the
server provides and see if there is an easy way to duplicate those servers
somewhere else. For example, suppose the server is a DHCP server for a network segment. If you run a traditional 8 to 5 shop, taking the DHCP server
down at 7 P.M. for a couple of hours may not cause undue hardship for your
users. If you are working in a 7-day-a-week, 24-hour-a-day shop, taking a
DHCP server offline could have more severe consequences. That would have
to enter into your plans.
If the server is a Primary Domain Controller or contains the Novell Master
NDS replica, you may want to temporarily transfer those responsibilities to
another server. That way, the network authentication can continue as always,
without an interruption in service.
When you have a planned outage, always plan for the worst. If you try to
cover every contingency and something does go wrong, you will at least have
a plan to solve the problem. In addition, that plan probably will include covering your bases before you downed the server. This can be as simple as making sure you have backed up the server before downing it, or making sure
that you have the proper tools or software on hand if something should go
wrong and you need to get into the box.
There is a polite way to shut down each of the popular network operating
systems. In each case, simply turning off the power is not the preferred way.
All these systems will have files open and working in the background. If you
just dump the power, you can corrupt the file system.
www.sybex.com
292
Chapter 7
Server Etiquette
Down
When you issue the Down command, the server will stop all the services that
are running and unload all NetWare Loadable Modules (NLMs) that are in
memory. When the services have been stopped and the NLMs unloaded, the
administrator is prompted to enter the Exit command to return the server to
a DOS prompt.
Restart Server
The Restart Server command performs all the tasks that bring the server down,
and then will simply restart it again. If there are no command line switches
employed, Server.EXE will be reloaded using all the appropriate NetWare
Control Files (NCF). This is useful if you are working on the configuration of
the server and you need to reload the operating system. In addition, Restart
Server can be run with several parameters to enhance its functionality. These
include:
-NS. If you use this parameter, Server.EXE will load but it will not
use the Startup.NCF file.
-NA. If you use this parameter, Server.EXE will load but it will not
use the Autoexec.NCF file
-d. If you use this parameter, you will break into the internal debugger.
Reset Server
The Reset Server command, also issued at the command line, brings the
server down by stopping all the services that are running, unloads all the
NLMs, and causes the server to perform a warm boot. If Server.EXE is in
the autoexec.bat file, it will execute and the NetWare server will come
back online.
www.sybex.com
Shut It Down
293
Minutes will specify the number of minutes the system will wait before
performing the shutdown. Warning is an optional message that will be displayed for any users that are logged in. Some versions will allow you to use
the word now as part of the shutdown command. In addition, you can add
-r to the command to force the system to reboot.
If you want to shut the system down immediately, you can also use the
Halt command, or perform Ctrl-Alt-Delete. In either case, the system will be
stopped immediately and the power can be shut off. The three-finger
salute (Ctrl-Alt-Delete) is not universally recognized across all versions of
Unix and Linux.
www.sybex.com
294
Chapter 7
Server Etiquette
www.sybex.com
Summary
295
Summary
Exam Essentials
Know what a dedicated application server can provide Dedicated
application servers provide application services in a client/server environment. This can be something like a dedicated Web server or a mail server.
Know when to use a distributed application server A distributed
application server would be something like a database server where
some of the data is stored at a remote site.
Know how a peer to peer application server is used An example of a
peer to peer application server would be in a gaming environment, where
several users are playing the same game over the Internet.
Know the different types of backup strategies Know what each backup
type accomplishes. Be sure to review the Grandfather, Father, Son method
of tape rotation.
Know how to physically secure a server and server room Server rooms
should be secured with a locking mechanism on the door, at the very least.
This can be a key lock, a combination lock, a pass-card type system, or
even a biometric system. Access to the server room should be limited, and
frequent security audits of the room should be completed.
Know how to shut down a Windows NT/2000 Server The keystrokes
necessary to shut down a Windows NT/2000 Server are Alt-Ctrl-Delete
and choose Shut Down, or choose Shut Down from the Start menu.
know how to shut down a NetWare Server To shut down a NetWare
Server, you type down and press Enter at the server prompt.
www.sybex.com
296
Chapter 7
Server Etiquette
Key Terms
Before you take the exam, be certain you are familiar with the following terms:
abend
Copy backup
Ctrl-Alt-Delete
dedicated application server
Differential backup
Disaster recovery
distributed application server
Down command
Full backup
Incremental backup
level of risk
multistation access unit (MSAU)
peer to peer application server
planned outage
Reset Server
Restart Server
Shut Down
Uninterruptible Power Supply (UPS)
unplanned outage
www.sybex.com
Review Questions
297
Review Questions
1. Why is it important to perform a graceful shutdown whenever possible?
A. To avoid file corruption
B. To prevent electric charge to electronic equipment
C. To gracefully spin down hard drives
D. To gracefully disconnect users from NOS
2. Ming has a server that has been acting very peculiar latelynot at all
like its old self. What steps can Ming take to diagnose the problem?
A. Perform hardware diagnostics.
B. Reboot the server.
C. Read the event logs.
D. Replace the hard drives.
3. Moshebi has a network with many wake-on-LAN adapters in it. One
of the adapters fails to wake up and find its boot server and the computer wont come up. How can Moshebi troubleshoot the problem?
A. Read the servers event logs.
B. Read the workstations event logs.
C. Ping the adapter.
D. Check the adapters BIOS and configuration parameters.
4. Name some field replaceable units (FRUs) that you could easily
replace on a server.
A. Power supply
B. Cooling fan
C. Case
D. Drive cage
www.sybex.com
298
Chapter 7
Server Etiquette
miles from her company headquarters location. The alert is telling her
that she has a battery that has failed in the servers UPS. What are
some things that she can do from her location?
A. Telnet into the UPS to reboot it.
B. Issue a shutdown r command on the server.
C. Ask someone in the remote office to get a repairperson to replace
the battery.
D. Review the error logs.
6. Which backup strategy will take the longest amount of time to back
www.sybex.com
Review Questions
299
youre having.
A. Newsgroups
B. Intranet
C. Internet
D. Knowledgebase CDs
11. Mary Beth is a new server admin in a large corporate environment.
She knows how to restart servers, read logs, add and remove users,
and change passwords. What are some tasks that she should seek
senior administrator assistance with?
A. Logging on to the server
B. Stopping and starting a daemon/service
C. Windows 2000
D. Working on a cluster server
E. Resetting a fax board
12. When do you need to terminate an externally connected SCSI device?
A. When its on the end of the chain
B. Always
C. Only on devices that arent self-terminating
D. Never
www.sybex.com
300
Chapter 7
Server Etiquette
considerations?
A. Provide proper grounding of rack.
B. Never use the electrical strip that comes with racks.
C. Make sure voltage and amperage requirements are met.
D. Always use the electrical strip that comes with racks.
14. Select the external devices that you could replace, while the server was
she boots the computer everything looks OK, but when she begins to
install the NOS software she notices that the floppy disk drive no
longer works. What signs could she look for at POST?
A. BIOS error reporting floppy failure
B. Beeping from motherboard
C. LEDs operating on floppy
D. Floppy firmware reporting an error
www.sybex.com
Review Questions
301
small UPS?
A. Total amperage rating
B. Number of available sockets
C. Upgrade abilityWhether a serial cable can be used to connect to a
server
D. Whether a serial cable can be used to connect to a server
18. Lucy is purchasing some servers that can connect to the switch on the
network with fiber optic cables. What options are available to Lucy
when considering supplying the fiber optic cables that run from the
servers to the switch?
A. Purchase already terminated cable on spools.
B. Purchase terminated cables manufactured to designated length.
C. Retain a cabling specialist to create exact-length cables.
D. Create the cables herself.
19. What is not a type of backup strategy?
A. Full
B. Detrimental
C. Differential
D. Incremental
E. Copy
20. Why is it not a good idea to leave a servers cover unscrewed and
the chassis.
B. Dust and moisture can get to internal parts.
C. Someone might trip over open sides.
D. Power supply wont work until cover is screwed on.
www.sybex.com
302
Chapter 7
Server Etiquette
and, if youre like me, youll be lucky enough to have some of the files
that are corrupted be files that are critical to the operating systems
functionality! Powering down the computer before first downing the
NOS wont introduce a surge to the computer, but you do need a surge
protector. In either case, as soon as you power down the computer, the
drives spin down. By performing a graceful shutdown you may be able
to provide time to your users to log off before you shut down. Some
NOS packages automatically inform the user the servers going down,
and others require that you manually intervene, but this is a hugely
important feature of a graceful shutdown.
2. A, B, C. Replacing the hard drives without first garnering more
information is jumping the gun. You can and should perform some
hardware diagnostics. You should try rebooting the server. Some
servers seem to "feel" better (forgive the anthropomorphism) if
theyre regularly booted. (Thats because some applications arent
written very well and dont recapture memory thats no longer in
use. Booting frees up memory thats being held but shouldnt be and
sets the system right again.) Reading the event logs might provide
key diagnostic information.
3. A, C, D. Reading the servers event logs might provide some clues as
to why the NIC isnt connecting. You can also ping the adapter. The
OS on the workstation isnt booted yet, so you cant check the event
logs to see if you can find out whats wrong there. The adapters BIOS
and config parameters might reveal a misconfiguration of some kind.
4. A, B, D. An FRU is something thats designed to be easily and quickly
replaced. The power supply, cooling fans, and drive cages are typically
designed in such a way. If you have to replace the case, youre talking
about a fairly extensive operation entailing pulling the motherboard,
disconnecting all cables, etc. Though its field replaceable, its certainly
not a quick and dirty chore.
www.sybex.com
303
because she cant do anything about the problem. Perhaps cycling the
UPS or server might clear up the problembut its doubtful that it will
do so. Reviewing the error logs would reveal the same information as
the alert. Shes stuck with asking someone in the remote office to have
a repairperson come in and check it out.
6. A. A full backup will take the most amount of time to back up the
tered server, Mary Beth should first obtain some training from senior
administrators or even a class or two on the subject, then attempt
to administer it.
12. A. The first and last devices on the chain need to be terminated. The
SCSI card is always at ID 6 and, in todays modern architectures, selfterminates. The other end of the chain, whether thats ID 0, 1, 2, or
whatever, needs to be terminated. If the external device represents the
opposite end of the chain, then youll need to terminate it.
13. A, C. Some racks come with electrical strips mounted and ready to plug
in. If you intend to use them, its important to make sure that the socket
youre using has a circuit with a high enough amperage to handle all of
the devices you might plug into the strip and that its properly grounded.
You should also consider grounding the rack itself. Whether you use the
power strips that come with the racks is up to you.
www.sybex.com
304
Chapter 7
Server Etiquette
14. B, C, E. As a very general rule of thumb, youll find that backup tape
the way that the failure is reported varies from BIOS to BIOS. Youll
usually not hear beeping from the motherboard on floppy disk drive
failures. You can also watch to see if the LEDs operate on the floppy
drive. Thats a sure sign that its getting power and that the power
cable isnt reversed (quite commonthe LED will be solid on if thats
the case). While floppy drives have firmware, its not smart enough to
report that it has somehow failed.
17. A, B, D. As a general rule of thumb, theres very little to upgrade in
a UPS. You can replace batteries and upgrade the server software that
monitors them, but thats about all. The amperage rating (in volt
amperes) will be important because during a blackout the device has
to carry the load of the devices plugged into it. Also you may want to
connect a serial cable from the UPS to the server and monitor it with
software provided by the manufacturer.
18. A, B, C. Unless Lucy is certified to manufacture her own fiber optic
cables, this is one job best left to the pros. She could purchase spools of
fiber optic cabling that have been terminated on both ends. These are
Plug and Play, but buying the excess length could be expensive. You can
also buy predefined fiber optic cable lengths (such as 10 meter) that are
already terminated; his is a more cost-effective method. And, if you have
a lot of cable to get, you may want to consider a cabling expert to make
them to-length for you. Dont forget multimode versus single mode
cabling and Type SC versus Type ST terminations.
19. B. Detrimental is not a type of backup strategy.
www.sybex.com
305
www.sybex.com
Chapter
Install UPS.
Verify N 1 stepping.
www.sybex.com
www.sybex.com
n the last chapter we covered some of the things you should know
about designing a server room, but in this section we are going to probe a little deeper. We are going to look at things like how to manage all those
needed servers without building a separate building. We are also going to
look at when you will have to apply BIOS and Firmware upgrades, and cover
the topic that everyone knows about, but very few do anything about: documentation. The first part of this chapter is going to be kind of fun, because
I always love spending other peoples money!
For complete coverage of objective 1.2, please also see Chapters 1, 6, and
7. For complete coverage of objectives 2.1, 3.5, and 4.4, please also see
Chapter 6. For complete coverage of objective 3.2, please also see Chapters 3, 6, and 9. For complete coverage of objective 5.1, please also see
Chapter 12.
Rack-Mounted Servers
In the last chapter, we did spend a little time taking a look at the way
the server room should be configured. Lets revisit some of those issues, and
also take a look at why we buy servers instead of just computers. After all,
servers are just PCs with an attitude, right?
Actually most server products are optimized to make sure they have fast
data transfer rates and fast hard drives, as well as more processors and memory than what is usually available in PCs. In addition, one of the considerations you have with a server that you may not have with a workstation PC
is scalability. You may not need to have five drive bays in a workstation, but
it may come in handy in a server.
www.sybex.com
310
Chapter 8
Now, the problem with these monster machines is their footprint. Footprint is another of those terms you hear thrown around a lot, and everyone
just expects you to know what it means. Basically, it is just how much room
this thing takes up in your server room. As you may have noticed over the
last several chapters, networks have evolved. It used to be that a department
or company had a couple of file and print servers stuck away in a room
somewhere, but now companies commonly have dozens of servers in a single
location.
Having that many servers can lead to multiple problems, not the least of
which is where do you put them. The footprint taken up by 12 servers, with
monitors, keyboards, and mice, can be considerable. That footprint can also
be expensive. Lets say for the sake of argument that the average server takes
up 3 square feet of floor space. Now, if we are putting multiple servers in the
same room, you want to make sure they are well ventilated, so you are going
to leave at least a couple of feet between servers. If you add in the room that
the monitors, keyboards, and mice are going to take up, as well as the bakers
racks, or tables, or shelves, or whatever you have that you are going to store
these on, it is going to take up some serious amounts of real estate. Now, I
have no idea what office space rental is in your area, but if you multiply the
number of square feet all these servers are going to take up, as well as all the
number of square feet for desk space, wiring cabinets, hubs/concentrators/
MSAUs, uninterruptible power supplies, air conditioning units, etc., and
multiply that times the average cost of a square foot of office space, you are
going to find the cost staggering.
Computer server manufacturers decided many years ago to use the same
philosophy used by people who design buildings for downtown areas. It is
better to go up than out. Now, computer manufacturers will have the traditional tower-based or modular server unit, as well as the units that get
mounted in racks.
Going Up
To start this discussion, lets take a look at what the servers are going to be
mounted into, the actual racks. Features, as well as prices, may vary, and I
am not here to recommend any particular manufacturer. As a matter of fact,
one criterion for the graphic in Figure 8.1 was that it was in line art format
rather than a photograph.
Take a look at Figure 8.1. This is a picture of your ordinary, everyday,
empty rack, which I found on US Logics Web site (http://
www.uslogic.com/rack/code/rack7500.html). At least that is the way it
looks at first blush.
www.sybex.com
Rack-Mounted Servers
FIGURE 8.1
311
6
2
5
3
So, other than a footprint, why use racks? First of all, by combining all
your servers in one location, you are providing ease of access. If I want
to check out your server environment, I can go to the rack, open the
door, and have access to all the servers in one relatively small, easy to
manage location. Because these racks can be hooked together (see the
removable side doors above), they offer an almost infinite range of
www.sybex.com
312
Chapter 8
expansion. With the ventilation at the top and bottom, an open rear
panel, and the optional fan package, a rack can improve the movement of air to dissipate the massive amounts of heat some of these
computers will generate. Finally, depending on the way you configure
your keyboard and mouse, you may be able to secure the entire rack
of servers by locking the front of the cabinet.
Racks will normally have an interior dimension of 19 inches. The company will
specify the height and width of the rack, but what the IT person is mainly concerned with is the usable space, measured in Us. For example, this rack
comes in the Mini-Cabinet of 23U, the Medium Cabinet of 31U, and the Tall
Cabinet of 40U. The U is simply the cutout on the side of the rack-mounted
appliance where the screw fits in to hold the appliance to the rack. Appliances
are then measured by the number of holes they cover up. For example, servers will be listed at 1U, 2U, or 3U. A component that holds 5.25-inch hard
drives may be listed at 4U, which means when you install it into a rack, you
will be covering 4 holes. A little piece of trivia for you: a U measures 1.75
inches.
You should take care when placing the rack in your server room. Once the
rack is in place, and all the equipment has been installed, it may not be easy to
relocate. In our sample rack, there were removable casters with wheel locks. If
you were using that type of rack, you could simply unplug everything, unlock
the wheels, and roll the rack carefully to its new location. If your rack came
without wheels, relocation would involve removing everything from the rack,
repositioning the rack, and then putting everything back.
Speaking of placement, there are no real guidelines on what goes where in
the rack. Common sense dictates that the heavy items, like the UPS, should
be placed at the bottom of the rack. The keyboard and monitor placement
will depend on the average height of the operator. Most of the racks I have
seen are designed to use while standing in front of the server console. There
is nothing to prohibit you from configuring the rack so you can sit instead of
standing.
What about the server? How much functionality can a server offer that
fits in a space so small? In this case, look at Figure 8.2.
www.sybex.com
Rack-Mounted Servers
FIGURE 8.2
313
6
5
4
www.sybex.com
314
Chapter 8
tape units and there are disk storage subsystems. If you dont want the integrated keyboard/LCD solutions, there are plug-in cabinets that will hold a
standard monitor. If you need it, it has been built for rack mounting.
All this equipment tightly backed into one compact efficient package is still
going to generate lots of heat. Make sure your computer room has adequate
cooling and ventilation to maintain the room temperature around 70 degrees.
Heat is really a killer on hardware, and sometimes a temperature rated safe
really isnt.
Rack Security
One of the disadvantages to using rack-mounted devices in your computer
room is also one of the advantages. It is very nice to have complete access to
every server in the room from one area, but from a security point of view,
this can be less than desirable. If you have opted to put your servers in racks,
be sure to take every step necessary to protect the rack. Later in this section,
we will talk about protecting the devices from threats like electrical spikes or
outages, but also protect the rack against physical threats. Be sure to lock the
computer room. The security of the computer room will depend on how
deep your pockets are, but if you can have the computer room accessed only
with a key card, that will help. With key cards, traditionally, when the card
is swiped to gain access, an entry is made in a log that the room was accessed
at that time by that individual.
Racks will usually have doors available. These glass doors are lockable,
and it is a great idea to make use of them. You may think they are a pain
when you are trying to get to the server and you have forgotten your key, but
they can be a deterrent from unauthorized access of the servers. This is an
especially good idea if you share your server room with the phone people or
the Wide Area Network people. Sometimes people get curious and just want
to lookyou know the type.
The more security that you can provide between the keyboard and the
user, the better.
www.sybex.com
Cable Management
315
Cable Management
www.sybex.com
316
Chapter 8
Cable management means different things, depending on the circumstance. It can mean having the proper cable to do a particular job, such as
hook a rack-mounted server up to a Fibre Channel Storage Area Network.
Cable management can mean threading the power cable, the mouse cable,
and the video cable through the holes in the back of the bosss desk when setting up her computer. This way it reduces the clutter in her office and makes
it neater, making her happier.
www.sybex.com
Cable Management
317
For the network as a whole, cable management starts even before the wiring begins: It starts in the design phase of the project.
When you are designing a computer room, or a large network cable run, too
often management figures that we will just let the IT team handle the cabling.
About the time they start talking that way, you should probably mention that all
cabling has to be done in accordance with local and state codes. Some of these
codes may match national standards, and some may be unique to the local
municipality. This is a very good time to look at hiring a professional cabling
firm. They will know the requirements and how to meet or exceed them.
Backbone Cables
The object of the exercise is to move data from the local workstation into the
wiring closet and on into the server room. There are some different classifications of cable runs that make this possible. These are referred to as horizontal cable, backbone (vertical) cable, and patch cables.
Now, you may think that horizontal cable and vertical cable refer to their
reference to the horizon, but that is not the case. Cabling people have their
own language too! The cable that runs between the panel in the wiring closet
and the wall jack is referred to as the horizontal cable. The backbone or vertical cable is the cable that runs between the wiring closets and the main connecting point of the building. This could be called the equipment room, or in
terms of networking, it may be called the server room.
In terms of types of cable, if you are using Ethernet or Token Ring, the
horizontal cables are probably 100-ohm, four-pair unshielded twisted
pair (UTP). You may commonly hear this referred to as Cat 5 cabling, for
Category 5. There are some other types of cabling that can be used for
horizontal runs. For example, you can use shielded twisted pair (STP),
multimode optical fiber.
The same types of cables can be used as the backbone. While you can use
UTP or STP, the attenuation properties of these make long runs between
floors or between areas impractical. That is why many backbones use fiber
optic cables as the preferred media. Besides providing the ability to successfully traverse longer runs, fiber optics is not subject to Electromagnetic Interference (EMI), which means it will provide a cleaner signal.
www.sybex.com
318
Chapter 8
For a much more thorough coverage of cabling, see Cabling: The Complete
Guide to Network Wiring, by David Groth and Jim McBee, Sybex, 2000.
Cable Paths
Since we have to get these cables from the work area to the server room,
someone is going to be playing around inside the ceilings and inside the
walls. Any time you start running wires in the walls and ceilings, you have
to pay attention to code. So, lets look at some of the cabling components
that the Telecommunications Industry Association (TIA)/Electronics Industry Association (EIA) 569-A Commercial Building Telecommunications
Pathways and Spaces Standard lays out. I will be taking a look at some of the
pieces that are used in work areas and wiring closets, as well as horizontal
and backbone cable runs.
Conduit
Conduit can be either metallic or nonmetallic. It can be rigid or it can be flexible
piping, depending on your local code. Conduit will run from the work area to
the wiring closet or server room.
Conduit has several advantages. The major advantage is that it may be
already present in the building. If (and this can be a big if) there is space left
in the conduit, it should be easy to pull cables through it. The problem with
conduit is that it offers a limited amount of space and once that space is filled
you are stuck with coming up with another alternative.
According to specifications, conduit can be used to route either horizontal
or backbone cables. If you are working in a multistoried building, you can
use fire-stopped conduit to link floors.
Check your building codes; some localities require conduit for all cable,
either network or electrical.
Cable Trays
Take a look at Figure 8.3. This is an example of how cable trays can be used
successfully. You will notice that this implementation is using two different
styles of cable management: the J-hook approach and the ladder rack.
www.sybex.com
Cable Management
FIGURE 8.3
319
J-hooks
19" rack
These can both be considered types of cable trays. They are designed to
hold the weight of all the cables, and provide an ideal way for handling a
large number of horizontal runs. You simply lay the cables inside the tray.
That way, the cables are easily accessible for either maintenance or for troubleshooting.
If you look at Figure 8.3 carefully, you can see why each type got its name.
The J-hooks are just hooks that are anchored to walls, and the cable bundles
are laid in the crook. The ladder rack resembles the extension ladder you
may have in your garage. It can be mounted either in the space between the
ceiling and the ceiling tiles (this is called the plenum) or it can be exposed in
the equipment room. The vertical ladder can also have D-brackets installed
on the rungs to keep the cables from getting unruly.
There are other advantages of the cable tray system. They keep cables
from being draped over the ever-present fluorescent light fixtures or the
heating and air-conditioning equipment. When this system is used in the wiring closet or server room, it keeps the cables off the floor or can direct them
to the patch panel or equipment racks.
www.sybex.com
320
Chapter 8
Raceways
A raceway is another one of those things that I knew existed, and I knew
what it did, but I was never sure of the name. I always associate raceway with
my friends in Indianapolis!
Raceway is the name given to the conduit that is used for surface mounting cables on walls or in cubes. Take a look at Figure 8.4 to see an example
of a surface-mounted raceway system.
FIGURE 8.4
Surface-mounted raceway
All of these systems are designed to keep the cable runs out of sight, off the
floor, and away from things that can cause problems. The things that can
cause problems range from the seen, like fluorescent lights, to the unseen,
like unclean power.
Electrical Protection
Sometimes we forget that all these cables that we are managing carry electrical
current. Besides providing physical protection against accidents, such as people pulling out plugs or running over a fiber cable with heavy equipment, you
should also provide for electrical protection. Variations in power can cause all
sorts of problems, ranging from having to reboot a computer after a short outage to sustaining component damage.
www.sybex.com
Cable Management
321
I once attended a discussion of clean spike-free power. Someone once commented that it seemed odd that a component that could make it through a
severe thunderstorm would suddenly fail for no apparent reason. The person
giving the lecture said that the component is like a heavyweight fighter who
gets knocked out. Usually, the knockout punch is not the first punch thrown,
and in many cases, is not as powerful a punch as the fighter had absorbed
before. It was the cumulative effect of all the punches that caused the fighter to
go down. The same is true of computer components. They may take dozens of
hits in their lifetimes, and each causes small amounts of damage. When the end
comes, it is the cumulative effect that causes the failure.
SBS
The SBS contains a battery, a switchover circuit, and a device that changes
the DC voltage from the battery into the AC power that your servers will
demand. This device is called an inverter.
The outlets on the SBS are all connected to the switching circuit. The
switching circuit is connected to the buildings AC power. The switching circuit keeps an eye on the incoming AC power line voltage, and if it drops
below a preset limit, the SBS switches to battery power. When the voltage
comes back in range, the SBS will switch back to AC. Some SBS units not
only can control the lower-than-expected power, but can also be on the lookout for power spikes. If the voltage goes too high, the SBS will kick in before
the spike reaches dangerous levels. This is referred to as power conditioning.
UPS
As the name implies, an uninterruptible power supply is another type of battery
backup. It is different from the SBS in that the equipment is always running off
the inverter and the battery. The UPS is constantly charging and monitoring the
circuit and the AC line voltage. If a power failure occurs, the charger stops charging the battery, but the equipment does not notice the difference. The monitoring part of the system will start emitting beeps to let the administrator know
there is a loss of power.
Some UPS systems work with operating systems to perform shutdown
procedures for different types of servers.
www.sybex.com
322
Chapter 8
UPSs can be quite sophisticated. Most will attach to the server using a
serial cable and have some software that will allow for the shutdown. Some
will be sophisticated enough to use a modem in the server to send out a page
to a designated pager. Some UPSs come with plugins that will allow them to
work as SNMP devices or so they can be managed over the Web. Make sure
you look at what is important to your installation before buying a UPS, and
then tailor the UPS to your system.
KVM setup
PC1
PC2
PC3
PC4
Keemux-P4
www.sybex.com
Cable Management
323
In this case, one KVM switch is controlling four servers. The administrator
can switch between computers by punching a button and switching from one
system to another.
These switches range from the simplistic A/B switch with two sets of video
cables, two sets of keyboard cables, and two sets of mouse cables coming in,
and one set going out, to KVM switches that can handle hundreds or even
thousands of servers from a single location. In the latter instance, the switch
itself is a network appliance, plugging directly into the network with a Cat 5
cable and communicating directly with each server.
If you have limited space, and you need to have more room, eliminate the
multitude of monitors with a KVM switch.
www.sybex.com
324
Chapter 8
Updating Firmware
You are all familiar with hardware and software. If you have ever had
to update a Basic Input/Output System (BIOS), you have had to update
some Firmware.
If you are not familiar with the BIOS, it is the program that the microprocessor uses to figure out how to start up the computer. It is also responsible
for things like the way data flows between the operating system and all the
peripherals (such as video card, hard disk, keyboard, and mouse). The BIOS
is stored on an erasable programmable read-only memory (EPROM) chip,
and if something changes with the way the motherboard should be addressing a peripheral, the BIOS may need to get upgraded and the EPROM reprogrammed.
It is the Firmware that is the programming that is placed on the EPROM.
When you update an EPROM, like the BIOS, you are making a permanent
change to the computer. It is important to realize that the BIOS program is
not the only Firmware in your computer. There can be Firmware on your
modem, your printer, your video card, and even your disk controller. Each
of these may, at one point or another, need to be updated.
By the way, if you work in an IBM shop and you hear the term microcode, think
Firmware. IBM has its own way of discussing just about everything!
www.sybex.com
Updating Firmware
325
This is not an easy decision. Some people believe firmly in the old adage,
If it aint broke, dont fix it. Others tend to be much more proactive, thinking that chances are manufacturers are not sitting around waiting for the
opportunity to tell their customers that something they sold doesnt work. If
the manufacturer does admit to a problem, it must be serious, and if they are
giving out a free fix to the problem, you might as well take advantage of it.
I have been over this argument dozens of times with proponents from
both sides of the question. As a matter of fact, I can do both sides, playing
devils advocate for or against. I call this flexibility. My wife and children call
it being argumentative. Whateverboth sides are very valid.
Because Firmware issues tend to be subtle, checking out the readme
before applying the upgrade would be beneficial. At that point, you can
decide if your system is suffering from any type of symptoms, and if it is, you
can apply the update and be done with it. If not, you may want to keep the
update handy, just in case something does decide to go south and you need
it in a hurry.
www.sybex.com
326
Chapter 8
Compare that with the set of instructions in the sidebar, which came with
information for upgrading the Firmware on a Digital Equipment Corporation (DEC) Alpha workstation from a CD. I mean, for an old DOS prompt
kind of guy like I am, it does my heart good to see there are still times where
you have to enter commands!
3. Boot the Firmware Update Utility CD-ROM using the device ID display in
Step 2.
>>>b -fl 0,a0 dka400
Bootfile: [x]y.exe
(where x is the appropriate directory and y is the appropriate filename.) You
should see a display similar to the following while the update utility is loading and executing:
bootstrap code read in
base = 11e000, image_start = 0, image_bytes = ea800
initializing HWRPB at 2000
initializing page table at 110000
initializing machine state
setting affinity to the primary CPU
jumping to bootstrap code
ff.fe.fd.fc.fb.fa.f9.f8.f7.f6.f5.
ef.df.ee.ed.ec.f4.eb.....ea.e9.e8.e7.e5
X3.7-10895, built on Sep 13 1994 at 11:29:42
www.sybex.com
Updating Firmware
www.sybex.com
327
328
Chapter 8
4. Use the verify command to verify the integrity of the SRM Firmware.
First enable verbose mode by typing verbose; then type verify and SRM.
Apu-> verbose
Apu-> verify SRM
5. To exit the update utility, cycle the power. Leave the power off for at least
45 seconds.
The bottom line of Firmware upgrades is to make sure that you have read
the readme for any installation tips before you start the upgrade!
Read the readme to find out what is involved with the upgrade.
Make sure that you have all the software and hardware components
necessary to perform the upgrade.
Make sure that you know how to either reverse the procedure or go
back to your starting point. This may mean downloading not only the
latest upgrade, but also the previously applied upgrade, just in case.
www.sybex.com
Updating Firmware
329
Even though you know it will take only a few minutes, leave yourself
plenty of time. Remember Murphys Law: Anything that can go wrong,
will go wrong at the worst possible moment. Remember also the corollary to Murphys Law that states, Murphy was an optimist.
Just because the upgrade took only a few minutes, dont rush off when
you are done. Stick around and make sure the server is operating
within specifications and nothing unexpected is occurring. This may
be a good time to break out your baseline of operations for that server
from the documentation.
www.sybex.com
330
Chapter 8
Documentation
When I was first starting out in this business, I did a stint as a telephone tech support representative for a major computer manufacturer. At
least they were a major computer manufacturer at the timethey have since
gone out of business. If you have never held that job, you probably dont
realize that it is a tremendous learning experience in troubleshooting and
communications. Whenever I would begin to troubleshoot an issue, the first
thing I needed to know was, What changed?
What to Document
What kinds of things should be documented in a well documented network
environment? The question should probably be, what kinds of things
shouldnt be documented in a well documented network? It would be a lot
easier to compile that list. Lets take a look at some of the things you may
want to have on record.
www.sybex.com
Documentation
331
Network Map
Call it a map of the network, a wiring diagram, whatever you want to call it,
you should have an overall map of the network. Depending on the size and
complexity of your network, this document may be several layers deep. For
example, look at Figure 8.6.
In this map we have a very-high-level overview that shows the cities that
our network connects. We can see there are T1 connections in the United
States, Asynchronous Transfer Mode (ATM) connections outside of the
United States, and an X.25 cloud connecting the rest. The X.25 cloud is handled by a WAN provider.
FIGURE 8.6
Minneapolis
Hong Kong
X.25 Cloud
Orlando
Melbourne
Legend
Cloud
New York
Beijing
In U.S.: T-1
Outside U.S.: ATM
X.25 Services
provided by
XYZ Supplier
In the next level of the map, you would get more specific. For example,
look at Figure 8.7.
In this case we are showing the diagram of how each city connects to the
wide area network. We have specified the make and model of the router,
along with any pertinent IP information.
www.sybex.com
332
Chapter 8
The next level of map may be location specific. So inside the city of Minneapolis we have three locations. For each location I would list how they
interconnect, the number of users they serve, appropriate subnet information, appropriate router information, etc. My final level of the map may be
subnet specific. This is where you can get really granular.
FIGURE 8.7
Minneapolis
CDE Router
111.222.44.33
255.255.255.240
ZYX Router
222.111.33.43 Public
255.255.255.0
10.1.0.2 Private
255.255.255.0
Cloud
XYZ Router
222.111.33.44 Public
10.1.0.1 Private
255.255.255.0
Orlando
EFG Router
123.234.44.33
255.255.255.240
Lets assume that your network is laid out over three floors in a building.
Each floor has a wiring closet/server room providing services. Each floor has
at least a file server that can route traffic associated with it, and each floor
is its own subnet. In this case, you may have a blueprint of the floor, with all
the cubes laid out. You can spec out the network connections wired in each
cube, the phone connections in each cube, and how they are labeled in the
wiring closet. You can show where computers are located, where servers are
located, where printers are located, and where services like Dynamic Host
Configuration Protocol (DHCP) and Domain Name Service (DNS) are provided. For the DHCP server, you can specify which range of addresses this
www.sybex.com
Documentation
333
DHCP server will provide, the DNS and Gateway information it provides,
the address of any Windows Internet Name Service (WINS) servers it provides, and anything else of interest. This document would be the first place
that someone could turn to if one of those servers went down. If the DHCP
server went down, if I could find the map, I could find the IP address that I
would have to assign to the new DHCP server as well as how it was configured. One-stop shopping, without hearing, I dont know! from a semiconfused IT person.
Be sure to explore the Web site of the server operating system you are using
for tools that will make gathering this information easier. Any time you can
get the system to do the grunt work for you, the better.
I have several servers in my office. Because I routinely do work with both NetWare and Windows 2000 (and sometimes with Linux), I have a NetWare 5.1
server in my office that I use for a mail server and a couple of Windows 2000
Servers that I use for firewalls and other stuff. Novell has a nifty little
Config.NLM that can be loaded on just about any NetWare server and it gives
you your server configuration information stored in a text file format. Time to
complete the task, from download to printing, about 5 minutes. It was a 100K
file, so even with my slow ISDN link, it still took no time at all. While this is
decidedly NetWare specific, these are the kinds of things you really want to see
in your documentation. This file is 31 pages long in its native format, and while
I am sure you paid big bucks for this book so you could look at the config.sys
file of my server, I will spare you the agony. Here at least is the abbreviated version with just some of the stuff that was gathered.
Novell File Server Configuration Report For Server: PSC_MAIL
Novell File Server Configuration Report Created: Sun, Oct
15, 2000 8:18 am
Novell File Server Configuration Report. [Produced by
CONFIG.NLM v2.02]
www.sybex.com
334
Chapter 8
www.sybex.com
Documentation
335
HardwareDriverMLID
1.14
00A0CC3613BF
1
1
ETHERNET_802.2
1.19
3
6800h -> 689Fh
None
10
None
LNE100TX_1_E82
Signature.....:
CFG Version...:
Node Address..:
Board Number..:
Board Instance:
Media Type....:
MLID Version..:
Slot..........:
I/O...........:
Memory........:
IRQ...........:
DMA...........:
HardwareDriverMLID
1.14
00A0CC3613BF
2
1
ETHERNET_II
1.19
3
6800h -> 689Fh
None
10
None
www.sybex.com
336
Chapter 8
www.sybex.com
Documentation
NetWare Partition
Media Manager object ID......:
Activated....................:
Registered...................:
Functional...................:
Reserved.....................:
Logical partition............:
Beginning sector of partition:
Size, in sectors.............:
337
0x0006
Yes
Yes
Yes
No
No
5976180
13558860
Hotfixed Partition
Media Manager object ID...........:
Activated.........................:
Registered........................:
Functional........................:
Reserved..........................:
Logical partition.................:
Hot Fix offset....................:
Hot Fix identifier................:
Total Hot Fix blocks available....:
Used Hot Fix blocks...............:
Number of available Hot Fix blocks:
System Hot Fix blocks.............:
0x0009
Yes
Yes
Yes
No
No
67832
0x274CAB97
8479
1
8422
56
.
.
.
------------------------------------------------------------------End of Storage Device Configuration Information
**********************************************************
***********
***********************************************
*
Volume Statistics for SYS
*
***********************************************
Volume Size................: 1909 MBytes
Block Size.................: 64 KB
Total Blocks...............: 30558
www.sybex.com
338
Chapter 8
Free Blocks................:
Purgable Blocks............:
Not Yet Purgable Blocks....:
Total Directory Entries....:
Available Directory Entries:
Sectors per Block..........:
Free Disk Space............:
Purgable Disk Space........:
Suballocation..............:
Compression................:
Migration..................:
11299
4125
1
152576
66087
128
706 MBytes
257 MBytes
ON
ON
OFF
***********************************************
*
Volume Statistics for DATA
*
***********************************************
Volume Size................: 6587 MBytes
Block Size.................: 64 KB
Total Blocks...............: 105397
Free Blocks................: 82698
Purgable Blocks............: 2815
Not Yet Purgable Blocks....: 0
Total Directory Entries....: 277504
Available Directory Entries: 238139
Sectors per Block..........: 128
Free Disk Space............: 5168 MBytes
Purgable Disk Space........: 175 MBytes
Suballocation..............: ON
Compression................: ON
Migration..................: OFF
***************************************************
Volume Name
Name Spaces Loaded
----------------- -------------------------------SYS
DOS
SYS
LONG_NAMES
DATA
DOS
DATA
LONG_NAMES
www.sybex.com
Documentation
339
**********************************************************
***********
Top of file. [SYS:SYSTEM\ABEND.LOG]
-------------------------------------------------------------------File size is 0 bytes.
-------------------------------------------------------------------End of file. [SYS:SYSTEM\ABEND.LOG]
**********************************************************
***********
**********************************************************
***********
Top of file. [SYS:SYSTEM\TIMESYNC.CFG]
-------------------------------------------------------------------# TimeSync.Cfg is now updated automatically,
# when changes are made on the System Console
# TIMESYNC Configuration Parameters
Configured Sources =ON
Directory Tree Mode =ON
Hardware Clock =ON
Polling Count =3
Polling Interval =600
Service Advertising =ON
Synchronization Radius =2000
Type =SINGLE
# TIMESYNC Configured time source list
TIME SOURCE = 129.7.1.66:123
-------------------------------------------------------------------End of file. [SYS:SYSTEM\TIMESYNC.CFG]
**********************************************************
***********
www.sybex.com
340
Chapter 8
**********************************************************
***********
Top of file. [SYS:ETC\NETINFO.CFG]
-------------------------------------------------------------------.
.
.
-------------------------------------------------------------------End of file. [SYS:ETC\NETINFO.CFG]
**********************************************************
***********
**********************************************************
***********
Top of file. [SYS:ETC\JAVA.CFG]
-------------------------------------------------------------------JAVA_HOME=SYS:\JAVA
OSA_HOME=SYS:\JAVA
MGMT_HOME=SYS:\PUBLIC\MGMT
CLASSPATH=sys:\java\lib\classes.zip
.
.
.
-------------------------------------------------------------------End of file. [SYS:ETC\JAVA.CFG]
**********************************************************
***********
**********************************************************
***********
Top of file. [SYS:ETC\HOSTS]
-------------------------------------------------------------------#
# SYS:ETC\HOSTS
#
www.sybex.com
Documentation
341
www.sybex.com
342
Chapter 8
www.sybex.com
Documentation
343
-------------------------------------------------------------------UNLOAD NWINSEP
.
.
.
UNLOAD NWAIF103
-------------------------------------------------------------------End of file. [SYS:SYSTEM\BSTOP.NCF]
**********************************************************
***********
**********************************************************
***********
Top of file. [SYS:SYSTEM\C1ENV.NCF]
-------------------------------------------------------------------search add sys:\ni\bin
search add sys:\ni\update\bin
.
.
.
ENVSET JAVA_COMPILER=SYMCJIT
-------------------------------------------------------------------End of file. [SYS:SYSTEM\C1ENV.NCF]
**********************************************************
***********
**********************************************************
***********
Top of file. [SYS:SYSTEM\C1START.NCF]
-------------------------------------------------------------------load java
startx
SYS:\public\Mgmt\ConsoleOne\1.2\ConsoleOne.ncf
www.sybex.com
344
Chapter 8
www.sybex.com
Documentation
345
#
unload dgncmdrv
load dgncmdrv
unload whsmcapi
reinitialize system
-------------------------------------------------------------------End of file. [SYS:SYSTEM\DGNCMRL.NCF]
**********************************************************
***********
**********************************************************
***********
Top of file. [SYS:SYSTEM\DGNCMVER.NCF]
-------------------------------------------------------------------#
# NCF file to display NCM Driver component versions.
# Copyright (C) 1995-97, Digi International, Inc.
#
load verdump sys:system/dgncm*.nlm sys:system/adp.bin
-------------------------------------------------------------------End of file. [SYS:SYSTEM\DGNCMVER.NCF]
**********************************************************
***********
**********************************************************
***********
Top of file. [SYS:SYSTEM\ENVNISI.NCF]
-------------------------------------------------------------------###
### Java Environment setup for the Server Install
###
ENVSET
NICLASSPATH0=SYS:\NI\UPDATE\LIB;SYS:\NI\LIB;SYS:\NI\UPDATE
\DATA;SYS:\NI\DATA;
.
.
www.sybex.com
346
Chapter 8
.
ENVSET JAVA_COMPILER=SYMCJIT
-------------------------------------------------------------------End of file. [SYS:SYSTEM\ENVNISI.NCF]
**********************************************************
***********
**********************************************************
***********
Top of file. [SYS:SYSTEM\GATHERER.NCF]
-------------------------------------------------------------------LOAD ZENINV.NLM STR_DIR=DATA:\ZENWORKS\STRDIR
-------------------------------------------------------------------End of file. [SYS:SYSTEM\GATHERER.NCF]
**********************************************************
***********
**********************************************************
***********
Top of file. [SYS:SYSTEM\GRPWISE.NCF]
-------------------------------------------------------------------LOAD GWMTA @PSCDOM.MTA
LOAD GWPOA @CORP.POA
-------------------------------------------------------------------End of file. [SYS:SYSTEM\GRPWISE.NCF]
**********************************************************
***********
**********************************************************
***********
Top of file. [SYS:SYSTEM\GWIA.NCF]
-------------------------------------------------------------------search add SYS:\system
www.sybex.com
Documentation
347
www.sybex.com
348
Chapter 8
www.sybex.com
Documentation
349
www.sybex.com
350
Chapter 8
LOAD IDEHD.CDM
LOAD IDECD.CDM
LOAD IDEATA.HAM PORT=1F0 INT=E
-------------------------------------------------------------------End of file. [C:STARTUP.NCF]
**********************************************************
***********
**********************************************************
***********
Top of file. [C:\CONFIG.SYS]
-------------------------------------------------------------------Files=30
Buffers=30
Lastdrive=Z
-------------------------------------------------------------------End of file. [C:\CONFIG.SYS]
**********************************************************
***********
**********************************************************
***********
Top of file. [C:\AUTOEXEC.BAT]
-------------------------------------------------------------------C:
CD \NWSERVER
SERVER
-------------------------------------------------------------------End of file. [C:\AUTOEXEC.BAT]
**********************************************************
***********
www.sybex.com
Documentation
351
There is lots of information about the way the server is configured and the
way that all of the control files manage the server. Keep in mind that this file
has been severely pared down!
On the Windows 2000 side, there are also applications that you can use
like the System Information Files from the Computer Management
Microsoft Management Console. By going to Start Program Files
Administrative Tools Computer Management, you can open the System
Tools and then open System Information. Once system information is highlighted, you can click Action Save As System Information File and you will
have documentation of your server hardware and some of the software. If
you are not using Windows 2000, dont overlook the advantage of screenshot programs. Any time you write a book for Sybex, you are licensed to use
a program called FullShot 99, by inbit, inc. (www.inbit.com). With FullShot
you can do amazing things. Take a look at Figure 8.8.
FIGURE 8.8
In this case, I just went into Device Manager on my laptop, opened the
area that might be important, and took a snapshot. I could then print that
out, and install it into my documentation.
www.sybex.com
352
Chapter 8
www.sybex.com
Documentation
353
at the message and decided that there was something wrong with memory,
so we were going to replace all the memory in the computer just to be safe.
As I walked back into the computer room to shut the lights off, I noticed that
there was a notepad lying next to the computer. The person who had discovered the original abend each of the three days had to be an administrative
assistant. She had made extensive notes on what the screen said so that,
when she went back to her desk to call us, she would have all the information
we might want. We had looked at the screens when we came in, but we had
never compared what each of the screens had said until we saw the notepad.
Suddenly, the fact that the server had abended three days in a row, at the
exact same time each day (well, within 15 seconds), changed our troubleshooting outlook immediately. It went from server hardware to environment. Sure enough, someone had installed a device in the room next door
that kicked off each day at the same time, and that device was on the wrong
circuit. When it kicked in, it pulled enough power to down our server.
If you make a change, add it to the maintenance logs. Then you can check
and see what was done recently. If there are problems, you will have the
information you need at your fingertips to make an informed decision about
the problems. You will also be able to rule out different troubleshooting
techniques because they have already been used.
Maintenance logs and service logs are important to the staff IT team, but
they are essential if you bring in a consultant. Often several people are dispatched over the course of a few days to troubleshoot a problem. Without
maintenance logs or service logs, each consultant goes back to square one
and spends time (and billable hours) relearning your system. It can be a very
expensive proposition.
The moral of the story is, if you make a change, log it! Keep the log where
it is instantly accessible. If you call in a consultant, make sure the consultant
logs her work.
When the bill comes for the consultant or service engineer, you may want to
go back and check it against the service log. As a former service engineer,
senior network hardware engineer, or whatever the heck my title was, I can
tell you that as a group, these people are not the most paperwork-proficient.
Sometimes they forget to do it, or lose it altogether. This is an inconvenience
to the engineer and the engineers boss when it comes time to submit utilization reports. However, if I have to re-create work orders, I may get the start
and the end time of the time on site wrong, and you, the customer will be hit
with a larger than expected bill. Having documentation can save you money.
www.sybex.com
354
Chapter 8
Properly ground out equipment (which typically means that you have
grounded wiring that you can plug equipment into and that the room
youre running the computers in is properly grounded).
www.sybex.com
355
You can also wear antistatic vests when working on equipment. These
vests usually come with a coil cord that snaps into a snap on a rubber mat
at your workbench.
When working inside a server, remember to perform an orderly shutdown
of the system, unplug the computer, and wear, at a minimum, a wrist strap
when working inside the guts of the computer. Its preferable that you do not
work on a carpeted floor. If youre working with cards, drives, and other
equipment, make sure youre grounded and that the computer is grounded
before you remove the device from its static bag and install it in the computer.
Installing a UPS
Installing a UPS is fairly straightforward. Your first challenge is to find a
place for a heavy cumbersome piece of hardware close to the server youre
going to protect. Youll make sure that ample power is available for the
UPSthat you wont blow a circuit as soon as you power it up.
Ascertain that you have an available serial port thats open and eligible
for use by the UPS. Youll need it for the UPS software. Verify that the UPS
software can be used with your servers NOS.
Next you perform an orderly shutdown of the server and unplug it. You
plug all associated server power cords into the back of the UPS. Its typically
not wise to include extension cords or power strips in UPS devices, but Ive
seen it done with no problems.
Next you run a serial cable from the UPS to one of the servers serial ports.
If you dont have an open serial port, you wont be able to utilize the UPS
software and obtain alerts from the UPS.
Power up the UPS, then power up the server. When the server comes back
up, go in and install the UPS software and configure it.
www.sybex.com
356
Chapter 8
Most other external devices will require you to perform an orderly shutdown on the system, add the device, then power back up and configure. Be
prepared to perform several restarts in the event that you run into an IRQ or
memory conflict. Ive had occasions where installing a piece of hardware
seemed really straightforward, only to spend several hours fighting a system
whereas other times a piece of hardware I thought would be a real challenge
went right in and was operational within moments. You just never know. Its
all about the "personality" of the server, how good the driver software is, if
youve got any memory, DMA, or IRQ conflicts, and so forth.
As a general rule of thumb, you should plan on performing device additions during routine maintenance windows. This is not something youll
typically do during working hours unless youre working on a new server
that no one is going to connect to.
Universal Serial Bus (USB) is a godsend but it wont work natively with
Windows NT Server without additional software. USB will work with Windows 2000 Server and provides you an easy way to add hardware via a USB
port and configure real-time during working hours without having to reboot
the server. Unfortunately, youre not going to be able to buy too many
server-class external devices that use USB.
Remember that, with external SCSI peripherals, you may or may not have
to terminate the device. It depends on the ID number its using and where it
falls in the chain. Remember that the first and last SCSI IDs are the ones that
must be terminated.
www.sybex.com
Upgrading a UPS
357
modem in a server. You may have to go in and configure some DSL settings
on the modem so it can properly communicate over your DSL line.
Youll most likely run into problems with external peripherals if youve
run out of IRQs and your device is trying to use an IRQ thats already in use,
if you have memory conflicts with something thats already using the memory address your device would like to use, or if youre using more SCSI IDs
than are supported for the version of SCSI youre using. All of these issues are
solvable, but may create long configuration times while you figure out the
issue and then correct it.
Upgrading a UPS
www.sybex.com
358
Chapter 8
www.sybex.com
359
Ensure that your servers are behind good solid locked doors and that only
server administrators and their managers have access to the room. For this
reason, oftentimes telephone equipment is kept in a different room from the
servers.
www.sybex.com
360
Chapter 8
www.sybex.com
361
Halon, on the other hand, is bad news for humans. You cant be in a server
room when halon goes off or youll wake up dead. You only have a few seconds to find the door and exit when a halon fire-suppression system goes
off. So halon is no longer vogue for computer rooms.
Several companies that specialize in fire-suppression equipment are going
with an alternative to halon called FM200 (heptafluoropropanealso
known in the industry as HFC-27ea). You can find lots of fire-suppression
companies on the Web simply by doing a search on FM200.
Flood concerns Lastly we think of flood concerns. Server rooms generally
should not be located in basements or on the first floor of buildings that are
close to rivers, lakes, streams, or other bodies of water that could potentially
flood into your building. In most cases, professionals typically recommend
that you put server rooms on a second or third floor so theyre away from
flood danger. If youre in an earthquake zone and close to an area capable of
flooding, then putting a server room on the second floor may be a bit more
sketchy of a consideration. In either case, you have to ask yourself the
question about flooding and how to guard against it.
eeping your server room neat and clean is highly important. For starters
theres the safety issue that you have to be concerned with. If youve got the
covers to servers and racksthings like thatlying around, youve got the
potential for knocking something over on yourself, or cutting yourself.
Cabling should be neatly bundled, labeled, and tucked away in chases,
innerduct, or other method of keeping cabling in a straight line and away
from feet.
Servers should be screwed into their racks. I had a friend who never
screwed a server fast to its rack. It was very easy for someone to come up and
pull a server out and potentially disrupt some of its cabling.
Workbenches should be kept neat and orderlytools should be put back
in a storage box when youre done with them. Nuts, washers, and other
attachment devices need to be kept in storage containers.
Keeping a nice tidy server room will provide you with much faster reaction
times during trouble, will keep people from pulling cords out of machines and
walls, and will make for a more professional-looking implementation.
www.sybex.com
362
Chapter 8
Summary
www.sybex.com
Summary
363
Exam Essentials
Know what a KVM switch is and how to use it A KVM switch allows
you to hook multiple computers up to a single monitor, mouse, and
keyboard.
Know how to get cables up off the floor Keep cables away from normal,
everyday office hazards like chair wheels and cleaning crews.
Know the proper layout of rack mounted devices Place heavy stuff at
the bottom to give the rack an anchor and make sure it does not fall over.
Know how the size of rack mounted devices is determined Rack
mount devices are measured in Us. Each U is 4.445 centimeters, or 1.75
inches.
Know how to secure a rack Be sure the rack has a door and make sure
the door locks.
Know when BIOS or Firmware upgrades should be performed When
there are problems, check the vendors Web site to see if there are new
upgrades, patches or fixes. If there is no problem, check the vendors Web
site anyway, because upgrading the BIOS or the Firmware is a form of
proactive maintenance.
Know where to get BIOS or Firmware upgrades The vendors Web site
should be your friend! Visit often and get to know it well.
Know what types of information should be put into maintenance and
service logs If it has changed, has been added, or is acting up, it should
be logged.
Employ ESD Know and understand how to install hardware using ESD
best practices.
Know how to install a UPS Know the steps involved in installing or
upgrading a UPS.
Be able to configure external devices Know whats involved in configuring external devices such as keyboards, monitors, subsystems, and
other equipment.
Recognize physical security issues Recognize physical security issues
such as physical locks on doors and providing anti-theft equipment for
racks and other devices.
www.sybex.com
364
Chapter 8
Key Terms
Before you take the exam, be certain you are familiar with the following terms:
Asynchronous Transfer Mode (ATM)
backbone
Basic Input/Output System (BIOS)
cable management
cable tray
conduit
Electromagnetic Interference (EMI)
Electronics Industry Association (EIA)
erasable programmable read-only memory (EPROM)
Ethernet
fiber optic cables
Firmware
footprint
horizontal cable
keyboard, video, mouse (KVM)
maintenance log
microcode
Network Interface Card (NIC)
plenum
raceway
rack
service log
standby power supply (SBS)
www.sybex.com
Summary
www.sybex.com
365
366
Chapter 8
Review Questions
1. Essie has been charged with installing a Jaz drive in one of the servers
for the purpose of sharing out 100MB disks that have drawings on
them that are created by engineers and need to be viewed by quite a
few people across the net. The goal is to install the Jaz drive, then share
the files so that they can be viewed by a certain group of users. What
external connections does Essie have at her disposal?
A. SCSI
B. Serial
C. Parallel
D. PCI
E. USB
F. Firewire
2. The company you work for has a large Internet presence. The company
has a staff of Web developers. One day youre told by the developers
supervisor that they will need to get into the server room from time to
time to check on the status of a server, perhaps to reboot it or reconfigure ODBCat a very minimum they will need to have the screen
logged in at all times. What are some answers you might give this
supervisor?
A. Developers will have to be accompanied by an admin at all times.
B. Developers are free to come and go as necessaryheres the code
to the door.
C. Developers can e-mail any configuration changes to the admins
make changes.
www.sybex.com
Review Questions
367
UPS. The UPS hasnt give him a bit of trouble over the years, but hes
beginning to suspect that it is reaching the end of its product life
cycle and may need to be upgraded or replaced. What are some
things that Ananth could consider upgrading in his UPS to boost its
life a little more?
A. Batteries
B. Add a serial card
C. UPS software in the NOS
D. UPS BIOS
4. What are some server room environmental concerns that a diligent
www.sybex.com
368
Chapter 8
ration that has 75 NT and 25 UNIX servers in its server room. She has
been charged with the physical aspects of the server room. The UPS is
a big room-sized unit that can service the entire server room. The UPS
is at maximum load right now, but when Nell checks into the problem
she finds out from the vendor that the UPS can be upgraded. When
preparing her upgrade checklist, what are some items that she needs to
jot down so shes sure to remember the detail items?
A. What is the cost of the upgrade?
B. Are there BIOS upgrades?
C. Ask the question, "Should the UPS be replaced?"
D. What are the steps I should take as I go through the upgrade?
7. Which of the following can be hooked up to a KVM switch?
A. Server
B. Monitor
C. Keyboard
D. Mouse
E. Modem
8. Where is Firmware stored? (choose the best answer)
A. BIOS chips
B. EPROMs
C. ROM
D. RAM
E. RAD
9. For Firmware to be upgraded, the server should be temporarily
www.sybex.com
Review Questions
369
upgrade?
A. An entire weekend
B. An entire day
C. Hours
D. Minutes
E. Weeks
12. What is a good source of information about the tasks the Firmware
are problems.
B. Clean out the dust bunnies from inside the server.
C. Oil the fan in the server.
D. Add more disk space to the server.
E. Add more memory to the server.
www.sybex.com
370
Chapter 8
14. What is the difference between a maintenance log and a service log?
A. Maintenance is usually done by an outside vendor, but service is
done internally.
B. Maintenance is hardware related, but service is software related.
C. Maintenance is usually done the local staff, but service may be
www.sybex.com
Review Questions
371
www.sybex.com
372
Chapter 8
valid. Of the above list the best choice is probably USB because its
fast, easy to install, and instantly recognized by systems that support
USB. Typically it doesnt require a reboot of the system, though you
may have to check the documentation for your system.
2. A, D. This is a real-life scenario that actually happened at one place
where I worked. The developers were given door codes and could come
and go as they pleased. Within six months time the servers were so
goofed up it took months to get them back to solid operations. You
should insist that an admin is with the developers at all times, watching
them like a hawk, or that theyre allowed to remote into certain boxes.
But you should never allow open access to non-admin types.
3. A, D. Depending on the interface on the UPS, Ananth may be able
something you can control; neither is the rooms noise. Youll find lots
of servers in a room to be extremely noisy. However, ensuring that
servers are delivered precise voltage (power conditioning) and that the
rooms temperature and humidity levels remain static are important
environmental concerns.
5. A, C. Physical housekeeping simply means that you keep your server
room in order, neat, picked up, and uniform looking. You definitely
want to keep cables and power cords out of the way because, even if you
dont have big feet, the lummox who unplugs your e-mail server from
the wall may definitely have them! Rack placement, the bolting together
of racks, and keeping rack doors shut provide for a less cluttered, more
professional looking environment. Setting up a dehumidifier solves an
environmental concern, but isnt considered housekeeping.
www.sybex.com
373
ware changed, and the server to be restarted. It is best to take the server
out of service temporarily to perform the upgrade.
10. A. Applying a service pack is not a Firmware upgrade.
11. D. The actual Firmware upgrade will usually take minutes.
12. E. Consulting readme files can save you hours of frustration spent trying
www.sybex.com
374
Chapter 8
www.sybex.com
Chapter
Network Operating
Systems
SERVER+ EXAM OBJECTIVES COVERED IN
THIS CHAPTER:
1.1 Conduct pre-installation planning activities.
Verify N 1 stepping.
www.sybex.com
www.sybex.com
For complete coverage of objective 1.1, please also see Chapter 6. For complete coverage of objective 2.3, please also see Chapter 10. For complete coverage of objective 3.2, please also see Chapters 3, 6, and 8. For complete
coverage of objective 3.4, please also see Chapter 4. For complete coverage of
objective 3.9, please also see Chapter 5.
www.sybex.com
378
Chapter 9
Novell NetWare
Novell NetWare is the venerable file and print server that has been
around for as long as there has been a local area network (LAN). In recent
years, Novell has been going through a redesign phase, attempting to discover
what its place is in the new era of networking.
This change has taken place across several fronts. Starting with NetWare 4,
Novell introduced NetWare Directory Services (NDS) to help network administrators manage enterprise networks. As NDS continued to mature, it was given
a new moniker for the e-business age; it is now called the NDS eDirectory.
Novell is trying to position itself in the business-to-business e-commerce
market with NetWare 5.1. It has bundled NetWare 5.1 with IBMs WebSphere Application Server 3 for NetWare. WebSphere provides extensive
Java support, which is now deeply integrated into NetWare.
NDS eDirectory is truly the lynchpin of the new Novell. It is what makes
NetWare suitable for use in a large organization. NDS has been around for
years, so as a directory service, it is proven and has a track record. More
importantly, as a mature product, it has been broken and has been fixed, and
has a well trained and experienced workforce to run the network.
Administration of a NetWare network is getting easier. ConsoleOne is a
Java-based administration tool that can be used to remotely administer your
network. It can also be used with the NetWare Management Portal.
Lets take a look at some of the features of NetWare.
www.sybex.com
Novell NetWare
379
The Application Server has full client/server capabilities, so that an information request that is made up of a series of complex requests can be offloaded
from the servlet directly to the Application Server. Once the Application Server
has processed the request, it will return the information through the Web
server to the Web browser. Since the Web server is taken out of the loop and
does not have to search through other applications databases, it can handle
the more mundane queries quicker. This will improve the overall performance
of the network.
This means that network administrators can manage servers and perform
other management tasks from any computer that has a Web browser. While
this is a NetWare 5.1 tool, partial functionality is provided for NetWare 4.x
servers and above within the same directory tree.
The Management Portal will allow an administrator to perform the
following tasks:
www.sybex.com
380
Chapter 9
NLMs are Novells way of customizing the server to run just the services you
want. You can load or unload NLMs to provide or remove different types of
services, like DHCP, DNS, FTP, or many others.
Set parameters for network interface card (NIC) drivers and disk drivers.
Manage the file system, including changing the file system rights.
In addition to being able to manage your file server, you can also check on
the health status of the server. Take a look at Figure 9.2.
FIGURE 9.2
www.sybex.com
Novell NetWare
381
Packet Receive Buffers are the area of memory that Novell uses to temporarily
hold incoming packets until the processor can process the information.
One of the big marketing points of all the NOS contenders is the use of IP.
www.sybex.com
382
Chapter 9
Just because the folks at Novell keep harping on the pure IP bandwagon,
it does not mean that NetWare 5.1 is not backwardly compatible to IPX
environments. It is backwardly compatible, and the network administrator
can control when each of the other protocols comes off the network.
NDS eDirectory
When Novell introduced NDS, they harped on the fact that the directory service could be used to provide access and security to not only your network,
but to your partners and even your customers. Novell wanted third-party
vendors to jump on the NDS bandwagon, and that happened, but not to the
degree the people in Provo, Utah would have hoped.
The way Novell would like to see the eDirectory work is by allowing the
use of directory-enabled applications. With these applications, you could
customize the application so your customers can populate a customer-driven
directory. Your business partners can communicate directly with each other
and make use of each others directory.
An eDirectory can contain millions of objects in a single directory tree. It
offers Lightweight Directory Access Protocol (LDAP) v3 support, which is an
industry standard directory access protocol. You can administer eDirectory
using the Java-based administrative utility, ConsoleOne.
TCP/IP
LDAP
HTTP
www.sybex.com
Novell NetWare
383
Workstation Management
For the last several years, Novell has provided a management piece for desktop management. With NetWare 5.1, the ZENworks Starter Pack is included
with the operating system. ZENworks includes the Novell Application
Launcher for publishing applications to the desktop as well as Workstation
Manager for desktop management. The ZENworks Starter Pack includes
applications that will allow the administrator to perform these tasks:
ConsoleOne
With NetWare 5, Novell introduced a new Java-based administration utility
called ConsoleOne. ConsoleOne allows an administrator to do these things:
www.sybex.com
384
Chapter 9
FIGURE 9.4
ConsoleOne interface
www.sybex.com
Novell NetWare
385
www.sybex.com
386
Chapter 9
Hardware Requirements
RAM
Oracle8i with WebDB: 128MB (256MB recommended) in addition to Standard NetWare Products
www.sybex.com
Novell NetWare
387
Software Requirements
DOS 3.3 or later, but not the versions of DOS included with Windows
95/98/ME/NT or 2000
DOS CD Drivers
Novell Client for DOS and Windows 3.1 (Network Installation only)
IP address
Provided?
Yes
Yes
Remote administration:
browser-based
Yes
Yes
Certificate Services
Yes
Yes
Yes
Yes
www.sybex.com
388
Chapter 9
TABLE 9.1
Provided?
Yes
Yes
Directory Service
Yes
Yes
IP v6 support
No
Load balancing
Yes
Yes
SMP support
Yes
SSL 3
Yes
Supports hot-patching of OS
Yes
Yes
Yes
Virtual directories
Yes
www.sybex.com
389
Directory Services
Directory Services is the major difference between NT 4 and Windows 2000.
As a matter of fact, many of the other differences spring from the fact that
Windows can now use a directory service. A directory service is just a way
to keep track of all that stuff on your network. It is a way to manage it,
secure it, and make it available to your users.
Scalability
In Windows NT 4, object management was done at the domain level, and
Microsoft suggested that you have a maximum of 40,000 objects per domain.
With Windows 2000, you can support millions of objects per domain or partition. Since the directory indexes the data store, the retrieval of information
about any object in the directory is fast. This information can be replicated
between sites, and the system administrator can manage when and how that
replication takes place.
Windows 2000 uses a system called the Global Catalog to provide a single
view of the directory objects that may be stored in multiple domains. This
Global Catalog is updated simultaneously with other replication cycles to
make sure the lag time is kept to a minimum.
www.sybex.com
390
Chapter 9
LDAP Support
The Active Directory is based on the Lightweight Directory Access Protocol
(LDAP). By using LDAP, Windows 2000 can get access to all features of the
namespace and integrate that into DNS. This makes finding objects in the
directory faster and easier.
Security Services
With Windows NT, you had centralized control of user and group security.
Windows 2000 adds support for things like Smart Cards and Kerberos. The
Catalog can enforce object-level and attribute-level security. There are no
restrictions on the security groups that span domains or partitions.
www.sybex.com
FIGURE 9.5
391
www.sybex.com
392
Chapter 9
Quality of Service
Microsoft has implemented a Quality of Service (QoS) feature to Windows 2000
that will manage an end-to-end delivery system for all IP traffic. This includes
things that the user will never see but that can help administrators to manage the
amount of bandwidth being utilized and help to improve the quality of the connection for high-bandwidth and/or latency-sensitive applications. QoS was not
available in Windows NT.
Support for ATM and Gigabit Ethernet
As the enterprise network matures, so does the technology that moves packets between locations. Windows 2000 provides native support for both
Asynchronous Transfer Mode (ATM) and Gigabit Ethernet. Windows NT
relied on third-party vendors to make that support possible.
Virtual Private Networking (VPN) Support
One of the most talked-about technologies is the ability to create a private
network using parts of a public network like the Internet. This is referred to
as a Virtual Private Network (VPN). This technology has been growing
steadily and Microsoft worked with other vendors to create the Point-toPoint Tunneling Protocol (PPTP) to make it happen. PPTP can be used in
both Windows NT and Windows 2000 to provide VPN connections
between servers and also from a remote client to a server. Windows 2000
added support for the industry standard IPSec and Layer 2 Tunneling Protocol (L2TP) to enhance VPN security.
Remote Access Servers
Prior to Windows NT, connecting a remote desktop to a network was a challenge. Remote Access Server (RAS) simplified the process immensely. RAS
gives end users the ability to directly dial into the network. RAS provides
both direct dial and VPN support from a common user interface. RAS can
support up to 256 concurrent connections.
Windows 2000 expands the number of VPN protocols and also provides
user management through policies. The policies can be applied based on
the type of connection, the user or the group connecting, the time of day,
and the type of encryption, to mention a few. These can be applied using
a grant or deny access method.
www.sybex.com
393
www.sybex.com
394
Chapter 9
Volume Management
It was easy to extend the size of a volume on a Windows NT server. Adding
free space to a volume was not the problem; it was having to reboot the
server after you did it that caused administrators everywhere all sorts of
grief. With Windows 2000, you can add free space to a volume and not have
to reboot the computer.
Link Tracking
In Windows 2000, link tracking will keep track of shortcuts and links to files
that reside on an NTFS volume and for some reason or another have
changed location. This Distributed Link Tracking was not available in NT 4.
File Compression
File compression is available in both NT 4 and Windows 2000.
Disk Quotas
In Windows NT 4, if you wanted to make sure that every user on your network could use no more than 25MB of disk space, you had to look to thirdparty software. With Windows 2000, you can institute per-user disk quotas.
Distributed File System Support
The Distributed File System (Dfs) was an add-on service that was available
in NT 4. In Windows 2000, you can provide a single view of shares that are
actually housed on several servers. These shares can even reside on different
file systems, such as NTFS, Novell, and NFS.
Dfs shares can also be configured to provide fault tolerance and load
balancing.
Printing
Several major advances have been made in printing since the NT 4 days.
Since all the printers are published in the Active Directory, users can quickly
locate the most convenient printing resource. All the printers that are shared
in a domain are available in the directory. As far as the number of printers
that are supported, Windows 2000 has over 2,600 printer drivers on the
Installation CD.
Finally, Windows 2000 can use the Internet Printing Protocol (IPP),
which lets users print directly to a URL over an intranet or over the Internet.
www.sybex.com
395
www.sybex.com
396
Chapter 9
Windows Security
Security has certainly come into the forefront as an issue in recent years.
With Windows NT 4, security was provided through the Security Configuration Editor that came with Service Pack 4. This security editor allowed the
administrator to automate some of the global and local settings, including
things like changing some registry settings, maintaining access controls on
files and registry keys, and even the security configuration of system services.
These settings were defined as a template and then rolled out to selected
computers on the network.
With Windows 2000, the same thing is done using Group Policies. It is
much easier to manage, and it is all contained in the Active Directory. To
take advantage of that, you have to be authenticated into the directory.
Authentication
To authenticate into a Windows NT 4 network, you could provide a user
name and password or authenticate using several different Web standards. It
was great for the time, but there were problems with cross-platform support.
With Windows 2000, you not only have the same type of support for several forms of authentication but you also have built-in support for Kerberos
v5, which can be used for cross-platform authentication. There can also be
multiple authentications managed for both the client and for the server.
Because Windows 2000 is no longer using the only Domain-based
authentication, where everything had to go through a Primary Domain
Controller (PDC) or a Backup Domain Controller (BDC), there is an
increase of performance because of the reduced stress on the server.
www.sybex.com
397
Other Technologies
This is far from a comprehensive list of the services that Windows 2000 or
Windows NT has to offer. For example, we have not even looked at Terminal Server, which was a separate product with NT and is now included with
Windows 2000.
Terminal Server gives your remote users the opportunity to connect to the
network and run network applications at the server.
While the list does not cover all the features of Windows 2000, it should
be sufficient to get you through the exam.
www.sybex.com
398
Chapter 9
NDS Sizing
This information was taken from a July 2000 article in Novell App Notes by
Nancy McLain, a senior technical writer from Novells DeveloperNet University. The article was titled System Requirements for NDS eDirectory.
One of the advantages that NDS has over Active Directory is that it can
be ported to different operating systems, including UNIX and Windows NT.
As a matter of fact, NDS ran on NT long before Active Directory and
Windows 2000 were released.
In the App Notes article, McLain starts out by laying out the minimum
hardware requirements to run NetWare 5.1 and eDirectory. Unless you are
setting up a system in a lab, these requirements are meaningless. Not many
of us would set up a production server running a PC with a Pentium 200
MHz processor and 64MB of RAM. The operating system may load, but it
certainly wouldnt perform to reasonable levels.
Lets start evaluating NDS by looking at the estimated disk space.
www.sybex.com
399
5KB by the number of objects in eDirectory. For example, 100 user objects
would take up 500KB of disk space.
Number of
Objects
Minimum
Processor
Speed
Number of
Processors
Minimum
Hard Disk
Space
Minimum
Amount of
RAM
100,000
Pentium III
450
500MB
384MB
1,000,000
Pentium III
450
5GB
2GB
100,000,000
Pentium III
450
2 to 4
500GB
4GB
The suggestions in the table were based on 5MB per 1,000 users, at an
average object size of 5KB. As for memory, Novell suggests that you set aside
20% to 30% of the memory for the operating system and 70% to 80% of the
memory for the NDS database cache. If the server is running any other services, you should dedicate less memory to NDS and more memory to the services. You may need additional or more powerful processors if your server
is running additional services, including file and print, and handling a very
large number of authentications.
www.sybex.com
400
Chapter 9
Limit
Unlimited
150 partitions
50 replicas
250 replicas
Active Directory databases are larger than the Security Account Manager (SAM) file on an NT 4 domain controller with the same number
of objects.
www.sybex.com
UNIX/Linux
401
The SYSVOL should be on a different physical partition than the operating system, the Active Directory database, and the Active Directory
log files. This will prevent the contents of the staging files from consuming all the available disk space.
UNIX/Linux
Network Compatibility
Whenever you start comparing UNIX/Linux to any of the competition, the topic
of proprietary protocols comes up almost immediately. One of the things that
UNIX and Linux systems are famous for is the interoperability they offer based
on what some people have called the universal technical standards and protocols. And they have a valid point. When you compare UNIX/Linux with Windows 2000 and Windows NT and NetWare, there are some major differences in
the way that they handle protocols. I dont know that I would go so far as to say
that Microsoft or Novell does not handle protocols according to standards,
because there are so many standards! Besides, if you look closely at the way
www.sybex.com
402
Chapter 9
many of the standards are written, you will see that the standards writers made
room for definable options in many of the specifications. That means, if
Microsoft has gone in and changed the TCP/IP protocol to meet its specifications, it is certainly within its rights. If you have ever taken the TCP/IP class that
was associated with the Windows NT 4 track, you will notice that TCP/IP is usually referred to as Microsoft TCP/IP.
Lets be honest about a few other things here too. Microsoft has the marketing machine down to a science, and sometimes it appears that they will
expect the computing public to believe anything they say, just because it is
issued from Redmond. A case in point is the utilization of Kerberos v5. If you
read the Windows 2000 marketing materials, Kerberos v5 is touted as the next
best thing to sliced bread for cross-platform compatibility. Had the version
that was released with Windows 2000 been industry standard Kerberos v5, it
would have been. But it was another version of Microsofts Kerberos, and in
this case, Redmond, Washington did not even release the specifications until
after the official, on-the-shelves release of Windows 2000 Server. So, we will
stipulate here that Windows plays with standards, and UNIX tends to follow
the letter of the law more closely than other operating systems.
Following are some of the networking advantages that UNIX Servers offer.
Telnet
Administrators can Telnet into a remote host to perform routine administrative tasks. The administrator does not have to be sitting in front of the computer that requires the attention. This is also a cost savings, because a UNIX
machine can be operated headless, without a keyboard or a monitor. Telnet
is a two-edged sword. Information crossing the wire is sent in plain text format, so it can be captured. There are several alternatives to Telnet that
encrypt data across the wire.
Performance
UNIX and Linux provide faster read/write operations than other operating
systems. UNIX/Linux computers tend to operate for months or years without the need of a reboot. Crashes are rare. The number of reboots forced by
configuration changes are minimal in a UNIX/Linux environment. UNIX/
Linux are modular in nature, meaning that each can be adapted to changing
conditions without too much of a hassle. Since the boxes do tend to support
the high-end server platforms and run for years, most e-commerce sites tend
to run on UNIX boxes.
www.sybex.com
UNIX/Linux
403
Linux especially looks strong when you compare the cost of the operating
system. Since the Linux operating system can be had for the price of a download, it is tough to beat in the cost comparison. In addition, the minimum
hardware requirements for a full-blown Linux server are such that some
desktop operating systems would not run on them.
Hardware
Because the hardware has a longer life in the UNIX world, more drivers tend
to be available and the network cards and other peripherals can be used for
a longer period of time. This minimizes the investment in hardware
upgrades. As a matter of fact, many UNIX/Linux implementations have to
stay with the older, more mature drivers because there are few new drivers
written specifically for UNIX and Linux. Since there are more implementations of other operating systems, these drivers get written more rapidly. That
trend is, in fact, changing. Linux is becoming more and more of a threat to
the other network operating systems, so hardware manufacturers are paying
attention and providing support earlier.
Some hardware manufacturers have really embraced UNIX and Linux.
For example, DEC Alpha, owned by Compaq, used to be touted as a Windows NT platform. Compaq has since turned away from NT or 2000 on the
Alpha platform. Meanwhile, there is a fully functional version of Linux for
the Alpha, as well as Compaqs own True64 UNIX.
Other platforms that have this type of support include Sparc, UltraSparc,
and the PowerPC, not to mention several others. Because in each case the
operating system requires little or no architectural change, the look and feel
of the operating system is similar regardless of the hardware platform.
IBM has used UNIX and Linux on its mainframe computers. As a matter
of fact, Linux machines can operate side by side, meaning that there are
scores of Linux operating systems running simultaneously on the same
machine or as virtual machines supported by another OS.
Automating Processes
UNIX/Linux administrators are able to automate many of the processes of
the operating system and of the applications by making use of shell scripting.
A shell script is a program that the administrator can write to automate certain administrative tasks. Meanwhile, on the Microsoft side of the house,
you might be using a graphical user interface wizard to perform the same
task. And theres the rub.
www.sybex.com
404
Chapter 9
Administrating a UNIX box is not for the faint of heart. It is a combination of some GUI interfaces that run on Java or of scripting and manually
configuring script and configuration files. Yes, the scripting and configuration files will lead to less overhead and faster performance. But, and this is
a big but, it also leads to human errors and administrative overhead. A good
UNIX administrator can fly through the administrative processes, but turning a new hire with some computer experience into a UNIX administrator is
going to require a sizable investment in time, if not capital. It is easier to turn
out a trained Windows 2000 administrator in far less time.
Now, like it or not, we are moving away from the command line world.
It pains me to say this, but there are hundreds of system administrators in the
field right now who could not write a batch file to save their lives. Or even
know what one does.
Security
It is difficult for me to compare the security of a UNIX Server to that of a
Microsoft Server or NetWare Server. All of these servers are as secure as their
administrators can make them. Each of the operating systems has security
flaws. Each of the operating systems has patches or workarounds that fix
those flaws. Some determined hacker with too much power and too much
time on his hands could access all of the operating systems. How many of the
holes are user caused, rather than operating system caused? It would be my
guess that security risks resulting from poorly configured or nonexistent firewalls outnumber the risks from operating system security holes.
As far as users writing programs that take advantage of the security holes
of each of the operating systems, both UNIX and Windows are victims of
their own open nature. Microsoft products are vulnerable to attack from
Visual Basic code. UNIX systems have a long list of known vulnerabilities.
Each has been victimized several times. Microsoft products tend to get hit
more often because there are more installations and the installations tend to
follow a certain pattern. For example, if you are hacking a Microsoft network, you stand a good chance that Exchange and Outlook will be there. In
addition, because it is a GUI-based operating system, you stand a better
chance of hitting a network with a more inexperienced administrator. All in
all, if you are going to write a virus to hit the world hard, hit Microsoft products. You stand a better chance of making an inroad.
www.sybex.com
OS/2
405
Scalability
Now, here, the hands-down winner is UNIX/Linux. For years platforms like
the IBM RS6000, HPs 9000, Suns Ultra, and DEC Alphas have all tuned
the 32-bit and 64-bit UNIX operating systems to take full advantage of multiprocessor computing. Mainstream UNIX systems can take advantage of
multiple mainboards that can handle from 2 to over 100 processors. High
availability of these systems makes for almost 100% uptime.
OS/2
hile OS/2 is not a major player in the networking wars, it does have
its place. In the world of OS/2, the server operating system is referred to as
Warp Server.
Warp Server
Warp Server is designed to support large, multiserver networks that consist
of hundreds of users, as well as smaller departmental installations.
TCP/IP
The Warp Server version of TCP/IP can support up to 64K concurrent socket
connections, which means there will be greater support for larger application
servers. Warp Server has improved its buffer management, it has been optimized to HTTP connections, and FTP and TFTP utilities have been rewritten
as multithreaded applications.
Administration
Administration is handled through a Graphical User Interface.
www.sybex.com
406
Chapter 9
www.sybex.com
407
Servers can be equipped with high-availability and highly fault tolerant gear
such as RAID array adapters, data vaults, and other protective gear. An NOS
must be able to support the gear thats included with the computer for fault
tolerance purposes. Regular PC operating systems rarely utilize such fault tolerant measures.
Also, with an NOS you might be concerned about a list of users and their
associated attributes and the managing of the user database. In some NOS
instances the user database will be of a hierarchical natureNovell NetWare 4
and higher and Windows 2000 Active Directory (AD) use object-based hierarchical database trees for their user database. Typically PC operating systems
dont have a user database or, if they do, as is the case with Windows NT Workstation and Windows 2000 Professional, its seldom accessed or managed by
end users.
Installing an NOS can be as easy and carefree as a wizard-based installation
of Windows 2000 Advanced Server, or very complicated, requiring that you
know precisely what youre doing, as in the case of a UNIX computer running
HP/UX, IBMs AIX, or some other flavor of UNIX. But heres the deal:
Regardless of how easy or complicated the NOS installation is, you must not
take lightly the power of the NOS and overestimate your abilities to manage
its installation. This has been a problem for Microsoft since NTs inception.
Administrators (or, more appropriately, would-be administrators) think that
NT is so easy to install that a trained chimp could do it. And theyre right. But
the installation of the NOS isnt where the actual administration comes in.
Administration lies in the ability to professionally manage the server farm in
such a way as to provide a cohesive, intelligent work environment for your
user community. Installing the NOS is only a trivial percentage of the battle.
That being said, I would urge you to study to show yourself approved when
it comes to installing an NOS. How do you do this? You go and take a formal
class or set of classes from a reputable instructor on the installation, care, and
feeding of an NOS. In the Microsoft world (the one Im most comfortable
with) the classes are each a week long and youre required to take five or six
of them to begin to be really strong in Windows 2000 Advanced Server! Heres
an operating system thats Plug-and-Play and uses wizards to guide you
through the entire installation. What could possibly take six weeks to learn
about? Well, as Ive hinted above, there are hundreds of details that need to be
considered when working with highly advanced systems such as UNIX, NetWare, Linux, or Microsoft offerings. If youre a newbie to the industry, it is
important to take formal training in the server NOS of your choice and to
become literate in it. If youre familiar with one NOS but want to learn
another, the work isnt quite as hard because you already understand the
www.sybex.com
408
Chapter 9
Youll need to have at least one NIC in the computer and it should
already be connected to the network.
TCP/IP addressing for the NOS should already be worked out. Most
servers utilize a hardwired IP address and subsequent TCP/IP configuration information.
You should be thinking about backups for the server ahead of time. If
a special module for your backup software is required to back up this
particular NOS, then you should have already obtained that module
and become familiar with it.
These are just a few of the things to think about when beginning your
installation of the NOS.
www.sybex.com
409
www.sybex.com
410
Chapter 9
www.sybex.com
411
trap information from all of your servers into the OV product. You would
need SNMP installed on the server in order to accomplish this.
Network monitoring tools and agents are another add-on feature that is
often selected at installation time. With network monitoring agents, a network
monitoring tool (such as OV or Windows 2000 Network Monitor) can view
incoming and outgoing traffic on a given server and allow you to perform an
analysis of the traffic.
Some stuff comes automatically installed. Event logs, for example,
might be something that is installed by default and isnt an option you can
choose to install or not to install. On the other hand, perhaps you might
have to opt to install the logging service with a given NOS.
You should be aware that after the NOS has been installed, as you begin to
install application software you may find that the app installation installs specific NOS-based service tools that you had originally decided not to install. For
example, if youre installing HP OpenView Network Node Manager (NNM)
on a Windows NT 4 computer, the installation may very well detect that the
SNMP service isnt installed and will go through a process of installing it and
then allowing you to configure it. Less intelligent application software installations might simply put up a warning box telling you that a given service or
deamon isnt running and will then halt installation. Its up to you to decipher
what the error means.
server baseline is a wonderful thing to perform right after you get the
NOS installed. If its 3:00 A.M. and youve been tussling with an NOS installation since 5:00 P.M. the previous evening, Im not advocating that you turn
right around and immediately obtain a baseline as soon as you get the NOS
installed, but it would be wise to baseline the installation in fairly short order
after installation.
Whats a baseline? Basically its a snapshot of the servers operational
characteristics as its running in its pristine state. Measurements such as disk
and CPU I/O, along with incoming and outgoing network activity, can paint
for you a picture of what the server acts like when it isnt in production and
isnt heavily loaded. Then, as you put it into production, you obtain another
snapshot. And as you add applications, you obtain another, and so on.
By performing some baselining of your server, you can really get a feel for
its performance health. For example, suppose that you baseline a server at its
www.sybex.com
412
Chapter 9
inception and find that it runs wonderfully well. But then you install an
application and find that the CPU is hammered at 80100% most of the
time. Clearly you know that the application you just installed doesnt play
well in the sandbox with this server.
You can obtain third-party baselining software, but most NOS offerings
come with some form of server baselining capability, so you shouldnt have
to resort to add-on alternatives.
Adding Processors
Make sure you note IRQs that are already in use with your system, the
base address used (if any), and any DMAs that are in use.
Write down the IRQ, base address and DMA, and other information
you intend to utilize with the new peripheral.
www.sybex.com
413
Note the cables required; if they dont come with the peripheral,
obtain them.
Make sure you perform a graceful shutdown on the server before commencing with installation.
Note the screens that appear at power-on, especially looking for any
errors that might be displayed.
Installing server peripherals is easy to do, as long as you watch out for the
usual gotchas that surface. Unfortunately, these gotchas often happen at
2:00 A.M. when youre all by yourself in a server room and youre not thinking very clearly. Writing down a procedure checklist will be hugely helpful
to you in times such as this.
here are three occasions when you might need to consider upgrading
system monitoring agents or when an agent is automatically upgraded. In two
of the situations youll automatically obtain upgrades. In the third situation,
youll have to consciously apply agent upgrades.
Installation of an upgrade NOS Some network operating systems come
with built-in system monitoring tools. Both Windows NT and 2000, for
example, come with such tools. In NT the program is called Performance
Monitor, and in Windows 2000 it is called System Monitor. If you
were to upgrade a Windows NT system to Windows 2000, Performance
Monitor would become System Monitor. Its functionality would be
largely the same, but some features might be addedto monitor Windows 2000 Kerberos events, as an example.
www.sybex.com
414
Chapter 9
ervice tools fall into various categories, some of which have no standalone upgrade process that you might be able to go through, others of which
do have some sort of upgradability independent of their host NOS. Service
tools include diagnostic tools, EISA configuration utilities, system partition
diagnostics, and so forth.
Diagnostic tools such as Windows NT/2000s Network Monitor become
upgraded with OS upgrades or service packs that are applied. There is no
such thing as Network Monitorspecific upgrade. Diagnostic tools that are
part and parcel of an NOS are upgraded at NOS-upgrade time.
EISA configuration utilities are generally upgraded when you upgrade a
systems BIOS. There are some manually installable EISA configuration
www.sybex.com
415
utilities out there, but as a general rule of thumb, todays EISA comes with
the systems BIOS.
System partition diagnostic utilities such as FDISK and associated
Linux utilities are generally upgraded at NOS upgrade time, but can also
be individually upgraded or copied elsewhere. For example, you can copy
FDISK.EXE to a diskette and use it as a stand-alone partition configuration utility, independent of an OS or NOS. You probably dont want to
do that as a regular part of your operations, but Ive certainly seen it
done. You can also purchase third-party partition configuration utilities
such as Partition Magic that you can use on a take-it-with-me-to-thecomputer basis. The biggest caveat I have with this kind of technique is
that you need to be very cognizant of whether the utility will work on
your system. For example, you cant use an old copy of Partition Magic
on a Windows 2000 NTFS 5 partition. Youll irreversibly break it.
As with any other technique, its wise to prepare a checklist document
that you can use when considering an upgrade to diagnostic tools. In this
checklist youre aiming to describe what youve got now, where youre going
(or what youll have after upgrade), and how to validate that the upgrade
worked.
www.sybex.com
416
Chapter 9
current statistics with your baseline file to determine if you have a bottleneck somewhere in the system. With baselines, were primarily interested
in performance measurement. You can also save several different performance monitoring sessions, load them into a database, and query against
the results.
You can also buy performance monitoring software that will help you
create more robust views of your systems performance. Remember that a
baseline typically describes the systems performance in its pristine state.
Summary
In this chapter we have taken a look at the major network server operating systems. As always, before choosing, do your homework! Too many decisions are made by marketing hype or price. Do a study to find out what the
long term costs of running the operating systems are. My immediate suggestion to anyone who is getting ready to decide on an upgrade or a new installation would be to ignore all the marketing hype from all the vendors and do
your own homework. Go to user group meetings, read the news groups, take
a class, and listen to what the administrators have to say. In each and every
case, make up your own mind and dont be lured by the bells and whistles that
each of the operating system vendors will try and lure you with.
In this chapter I also talked about installing an NOS, pointing out that
while NOS software can be quite similar to desktop software, its usually
much more complex to install than a simple desktop OS installation. For
example, you must know networking information that goes beyond the ordinary client desktop connectivity with the network. Things such as name server
installations and correct statically entered IP configuration information are of
great importance in an NOS installation. Sizing the computer for the NOS is
important. Its highly advisable to obtain thorough formal product training
before going forward with your first production NOS installation.
I mentioned as well that software manufacturers periodically release
upgrades to their NOS software. These might come in the form of patches,
service packs, NLM and VLM updates, and so forth. Sometimes implementing a specific update requires that you update other system software
before you can go forward with the update youre interested in.
I talked about the wisdom of obtaining and applying vendor-specific
device drivers. Though some NOS software includes a plethora of prewritten
www.sybex.com
Summary
417
device drivers, its usually wise to apply the driver that the devices manufacturer supplies.
I talked about performing an OS upgrade to support multiprocessors.
Network operating systems typically come ready to talk to a certain quantity
of multiprocessors and require an upgrade to the NOS, in the form of an
Original Equipment Manufacturer (OEM)supplied update or an actual
NOS upgrade produced by the NOS manufacturer. As always, an upgrade
checklist is an optimal way of assuring your success.
I also talked about the idea of a server baseline. You run performance
monitoring software, whether the software is bundled with the NOS or purchased from a separate manufacturer, in order to produce a baseline of the
systems operational characteristics at its new pristine state. Then, upon
loading of the server with applications, users, or other traffic, you can run
additional performance monitoring and compare it with your baseline to
make intelligent decisions about system performance and bottlenecks.
I mentioned that you can upgrade system monitoring agents, typically
through an NOS upgrade or the application of a service pack. When using a
third-party system-monitoring product you may have to manually update
client agents as new releases come out. Oftentimes the upgrading of a client
component is the first recommendation that comes from trouble support
desks and so you may be forced to comply with an agent upgrade in order to
determine if the upgrade rectifies a problem youre having. As always, a concise upgrade checklist is in order when working with such detailed items.
Along the lines of system monitoring agent upgrades, I also talked about
the need to upgrade service tools such as diagnostic tools, EISA configuration utilities, partition diagnostic tools, and so forth. Most of these upgrades
happen either through an NOS/OS upgrade or through a BIOS upgrade. You
may be able to perform an upgrade to a specific partition utility if its a single
file such as FDISK.EXE, though the need to do that is highly remote. As
always, a comprehensive upgrade checklist is in order.
Exam Essentials
Know basic information about Novell NetWare The NetWare installation starts with some files, including SERVER.EXE, being copied to a plain
old DOS partition. Once the operating system is installed, it will create data
storage volumes. If the file allocation tables of these volumes become corrupt, you will have to use a utility called VREPAIR to fix them.
www.sybex.com
418
Chapter 9
www.sybex.com
Summary
419
Key Terms
Before you take the exam, be certain you are familiar with the following terms:
Access Control Lists (ACLs)
Asynchronous Transfer Mode (ATM)
Backup Domain Controller (BDC)
Bandwidth Allocation Protocol
Certificate Authority (CA)
DHCP Relay Agents
Domain Name Service (DNS)
Dynamic Host Configuration Protocol (DHCP)
Encrypting File System (EFS)
File Transfer Protocol (FTP)
Gigabit Ethernet
Group Policies
Internet Group Messaging Protocol (IGMP)
Internet Information Server (IIS)
Internet Protocol (IP)
Internetwork Packet Exchange (IPX)
IPSec
Java Virtual Machine (JVM)
Journaled File System (JFS)
www.sybex.com
420
Chapter 9
www.sybex.com
Review Questions
421
Review Questions
1. Which network operating system is referred to as a Warp Server?
A. NetWare
B. UNIX/Linux
C. Windows 2000/NT
D. OS/2
2. Of all the network operating systems that we looked at in this section,
operating systems?
A. NetWare
B. UNIX/Linux
C. Windows NT
D. OS/2
E. All of the above
4. Which network operating system natively supports the JFS file system?
A. NetWare
B. UNIX/Linux
C. Windows 2000/NT
D. OS/2
www.sybex.com
422
Chapter 9
www.sybex.com
Review Questions
423
www.sybex.com
424
Chapter 9
13. Red Hat has come out with an upgrade patch that fixes an issue with
www.sybex.com
Review Questions
425
17. Which operating system would use files with the extension NCF?
A. NetWare
B. UNIX/Linux
C. Windows 2000/NT
D. OS/2
18. According to sources quoted in this chapter, what should be the
should use, what does Microsoft recommend you do with that figure?
A. Implement it.
B. Halve it: Windows 2000 uses disk compression.
C. Double it.
D. Triple it.
20. Which of the following network operating systems use TCP/IP as their
www.sybex.com
426
Chapter 9
configuration files.
6. A, B, E. Were in a fuzzy gray area here simply because we dont
know how the vendor may decide to ship the patch. It could be that
a fix for LILO may require a complete OS/NOS upgrade. It could
also be that the upgrade simply means that we update a specific .EXE
file responsible for the maintenance of LILO. In either case, were
definitely applying a service tool patch.
7. B. As much as proponents of the other operating systems would love
to argue the point, UNIX is the operating system of choice for most
mission critical super-servers.
8. C. Novells eDirectory estimates the size of each object at 5KB.
9. C. Windows 2000 uses the Encrypting File System to provide added
www.sybex.com
427
know how the vendor may decide to ship the patch. It could be that
a fix for LILO may require a complete OS/NOS upgrade. It could
also be that the upgrade simply means that we update a specific .EXE
file responsible for the maintenance of LILO. In either case, were
definitely applying a service tool patch.
14. B. UNIX has been around for over 30 years.
15. B. UNIX/Linux is configured using shell scripting.
16. C. Visual Basic is a Microsoft product and is an integral part of the
mum of 250MB.
19. C. Microsoft suggests you leave plenty of room of growth, so you
www.sybex.com
Chapter
10
Network Interface
Technology
SERVER+ EXAM OBJECTIVES COVERED IN
THIS CHAPTER:
2.3 Install NOS
www.sybex.com
For complete coverage of objective 2.3, please also see Chapter 9. For complete
coverage of objective 3.6, please also see Chapters 1 and 2.
t is hard to imagine a world without Ethernet, isnt it? For most of us,
it has been around since we started in networking, and even though the specifications may have changed and the configurations may have changed somewhat, Ethernet is still what most networks are based on.
Between the invention of the PC and the start of the 21st century, there
have been many things that completely changed the way the world works.
One of those significant inventions came about in 1973 when Robert
Bob Metcalfe and D.R. Boggs were working at Xeroxs Palo Alto
Research Center (PARC), and they invented Ethernet.
Metcalfe started working at PARC in 1972, while he was working on
his Ph.D. from Harvard. If you are a student of computer history, you
know that PARC in the 1970s was where amazing things were developed.
www.sybex.com
431
It served as the birthplace of the PC, the graphical user interface (GUI),
and the page-description language (PDL). While all these monumental
discoveries were made in Palo Alto, Xerox somehow found a way not to
take advantage of them.
Ethernet is the Local Area Network (LAN) technology that allows us to
link PCs together into a cohesive unit. The amazing thing about this is that
the invention of Ethernet predated the invention of the personal computer,
yet this was the invention that would link more than 50 million PCs together
worldwide.
The original idea was published in 1976, when Metcalfe and Boggs
published a paper entitled, Ethernet: Distributed Packet Switching for
Local Computer Networks. Ethernet defined not only how the physical
media would connect, it defined how data could be transmitted across a
LAN at 10 megabits per second (Mbps). Figure 10.1 is a copy of one of
the figures included with the original patent for Ethernet.
FIGURE 10.1
In 1976, Metcalfe shifted gears and went to the Xerox Systems Development
Division, where he managed the microprocessor and communication developments that formed the foundation for the early Xerox Star workstation. This
was the first workstation that included a bitmapped screen, a mouse, what-yousee-is-what-you-get (wysiwyg) word processing, Ethernet, and the software
necessary to include text and graphics in the same document.
www.sybex.com
432
Chapter 10
Metcalfe stayed at Xerox until 1979, when he left and founded 3Com
Corporation in Santa Clara, California. He formed 3Com to promote
Ethernet and PC LANs. Through the years, he was able to persuade Digital
Equipment, Intel, and Xerox to use Ethernet, which made it the most
widely used LAN.
Have you ever wondered what the three coms were in 3Com? They were
computer, communication, and compatibility.
Yeah, I know, this is one of those geek Mecca things. Would you like to see the original application for the patent of Ethernet? Check out http://164.195.100.11/
netacgi/nph-Parser?Sect1=PTO1&Sect2=HITOFF&d=PALL&p=1&u=/netahtml/
srchnum.htm&r=1&f=G&l=50&s1='4,063,220'.WKU.&OS=PN/4,063,220&RS=PN/
4,063,220.
Ethernet Basics
Ethernet uses CSMA/CD as a method of accessing the physical media. This
physical media also has some cryptic names like 10Base2, 10Base5, and
10Base-T. To complicate matters even further, there are different categories
of media, so you may be told to order several spools of Cat 5 10Base-T cable.
Lets see what we can do about translating some of this.
CSMA/CD
CSMA/CD stands for Carrier Sense Multiple Access Collision Detection. This
may be an oversimplified description of how Ethernet gets a packet out on the
wire, but it should make the point. When I was growing up, we used to spend
our summers in a small town in the Upper Peninsula of Michigan, Iron River.
My grandfather had purchased three lake lots and had built cabins on them for
his children, so every year we went up there and spent several weeks. It was a
great place to be a kid.
www.sybex.com
433
The adults didnt have it so bad either: There was no stress, no television,
one radio station, and one phone in my grandparents cabin that was hooked
up to a party line. Since there were not many year-round residents on the
lake, just about every cottage that had a phone was on a party line. They
came in several styles: There was semi-private, with two homes sharing the
same line. Then there were four-party and eight-party lines. We were on a
four-party line. Every time the phone would ring, we would all hold our
breath to see who it was for. If there were two short rings and one long ring,
someone was calling the Govanuses.
When we wanted to make a call, we couldnt just pick up the phone and
start dialing. We had to pick up the phone and listen (Carrier Sense) because
there could be someone else from one of the other parties using the phone
(Multiple Access). Once we had listened, and realized it was safe to dial, we
would start to dial the number. Once in a great while, someone else would
pick up the phone and start dialing at the same time, and both calls wouldnt
be completed (Collision Detection).
That is just the way Ethernet works. If a computer wants to send a packet, it
senses the carrier to see if there is traffic. If there isnt any traffic, the computer
begins to send the packet. If for some reason there is a collision with a packet
sent by another computer, both computers stop sending and wait for a short
period of time before trying to resend again.
Baseband vs Broadband
This may fall under the category of some basic electrical engineering, but
even if you already know this stuff, stick with me for a few minutes.
Any medium that can carry a signal has a certain capacity. This capacity is
referred to as bandwidth, and electrical engineers measure it in Hertz (Hz). Bandwidth literally stands for the width of a band of frequencies. To arrive at a bandwidth, you simply subtract the lower limit of the frequency from the upper limit
of the frequency. Nyquists theorem puts it much more scientifically: It relates the
bandwidth to the data rate as the data signal with a transmission rate of 2W,
which can be carried by frequency W, that is sufficient to carry the data. The converse of the theorem is also true: If you are given the bandwidth W, the highest signal rate is 2W. This data signal, if it is encoded in binary, has a data capacity in bits
per second (bps) that is twice the bandwidth in Hertz. This capacity can be
increased with multilevel signaling by transmitting more bits per data signal unit.
www.sybex.com
434
Chapter 10
Actually, these are two different things. Bandwidth is a measure of the range
of frequencies used in an analog signal, while bits per second is a measure of
a digital data rate.
Multiple Access
So, the term band means a range of frequencies. If you decide to share a given
band, you can divide that band into smaller pieces, which are called channels.
These channels will then have just a fraction of the total available bandwidth.
As an example, lets say that you use the 9MHz wide band from 1MHz to
10MHz and you divide it into 3,000 channels, each with 3kHz of bandwidth.
This way, you could allow a great many telephone calls to be transmitted over
a single pair of wires, but you would have to manipulate the analog signal to
use just one channel.
There is another way to approach the problem. Suppose you just decided to
use the entire 9MHz as one signal carrier. This would eliminate the need to mess
with an analog signal to place a two-level digital signal on a wire pair. The tricky
part with this plan comes when you want to share the wire.
www.sybex.com
435
In RS-232 serial communications, one wire is used to send data one way,
and the second wire is used to send data the other way. The third wire is used
as a signal ground. This comes from one of the basic tenets of physics, in that
voltages have to be measured as the difference in electrical potential between
two wires. One of these wires is said to be the ground wire, while the other
wire is used to carry the signal.
Ethernet is a baseband system that places bits on a pair of wires using
Manchester encoding. Take a look at Figure 10.2 to see what a Manchester
encoding signal looks like.
FIGURE 10.2
Bit Boundary
Bit Boundary
Value Sent
Logic 0
Logic 1
www.sybex.com
436
Chapter 10
Lets break down Figure 10.2 and see what is actually happening. Figure 10.3
shows the first bit.
FIGURE 10.3
Bit Boundary
Bit Boundary
Bit Boundary
Bit Boundary
www.sybex.com
437
As you can see, the transition at the middle of the bit goes from 0 (signal
not present) to 1 (signal present). So, that means the data that was being
transmitted was a 1. So far we have 0, 0, 1.
Lets look at the last three bits in the diagram to see what we can come up
with. Figure 10.5 presents the bits.
FIGURE 10.5
Bit Boundary
Bit Boundary
Bit Boundary
Bit Boundary
Ethernet Cabling
Ethernet cabling runs the size gamut from large and unwieldy to small and
easy to install. It all started with a cabling technology called 10Base5.
www.sybex.com
438
Chapter 10
Thicknet
Ethernet cabling, like the specification itself, has come a long way. The first
type of cable that was used was called 10Base5 by the IEEE. Everyone else
called it thicknet. The IEEE Specification was more descriptive, since it
referred to its main specifications. The 10 referred to 10Mbps, Base stood
for baseband, and the 5 referred to the 5 X 100 meter segments (for a total
usable distance of 500 meters) that could be used to link computers together.
If you had ever seen some thicknet, you would not have forgotten it. The
cable itself was about as big around as a United States dime. The flexibility
of the cable rivaled the dime as well: It was not very easy to work with. To
attach a node to the thicknet backbone, you used a drop cable from the node
to the backbone. To connect the drop cable to backbone, you used a device
called a vampire tap. The vampire tap and the rest of the configuration
looked like Figure 10.6.
FIGURE 10.6
10Base5 configuration
Thicknet
Vampire Taps
Transceiver
Transceiver
Cable
www.sybex.com
439
The vampire tap had two sharp prongs, which cut through the sheathing
around the cable and made the electrical connection.
Thicknet was used in a bus topology. It could support up to 100 nodes per
backbone segment. Information was transmitted at 10Mbps and carried a
signal for 500 meters or about 1,640 feet. You could have a maximum of five
backbone segments connected using repeaters, according to the IEEE 802.3
specifications.
The maximum cable length did not include the length of the drop cables, just
the length of the backbone.
The length of thicknet cable between the drop cable connections had to be
at least 2.5 meters, or about 8 feet. Terminators had to be installed at each
end of the cable run. One end had to be grounded.
Thicknet was great at the time, but it was expensive, and because of the
weight of the cable and its lack of flexibility, it was a bear to install and
configure. Some of these issues were addressed with ThinNet.
5-4-3 Rule
As you read over the cabling specifications of Ethernet, you will notice
that the maximum number of backbone segments that can be connected
together seems to stay constant at five. There is a well known rule for
Ethernet implementations called the 5-4-3 rule. It states that, for Ethernet
to work, you can have five segments connected through four repeaters
with three of the segments being populated.
ThinNet
Next up came RG58A/U coaxial cable. When this was added to the Ethernet
specification, it was referred to as 10Base2. Like 10Base5, 10Base2 had
meaning. 10Mbps, baseband, and a single Ethernet segment could be 185
meters in length. This was also referred to as either ThinNet or, in deference
to the fiscally conservative, CheaperNet. In a ThinNet configuration, you
could have up to 30 devices linked together using British Naval Connector
(BNC) T-connectors on a single Ethernet segment. The minimum distance
between two nodes was set at 0.5 meters. You could also have up to five
10Base2 segments linked together, using four repeaters. The length of all the
segments could not exceed 925 meters.
www.sybex.com
440
Chapter 10
ThinNet network segments had to be terminated at each end, and one and
only one end should be grounded. A ThinNet network run was a Logical Bus
and Physical Bus. This means that each computer on the segment received
the electrical signal and each computer was linked to the next, as shown in
Figure 10.7.
FIGURE 10.7
Workstation
Workstation
Workstation
Terminator
and Ground
Terminator
Workstation
Workstation
Twisted Pair
Probably the most common type of cabling in Ethernet networks is twisted
pair, otherwise known as 10Base-T. 10Base-T refers to unshielded twisted
pair (UTP) cable that was designated by the standards document ANSI/TIA/
EIA-658-A. This document designated different categories of UTP, including
Category 3, Category 4, and Category 5. Category 3 cable is 100 ohm cable
rated to 16MHz, Category 4 cable is 100 ohm cable rated to 20MHz, and
Category 5 cable is rated to 100MHz operation.
While the other cabling standards we looked at were a Logical Bus and a
Physical Bus, 10Base-T makes use of a Logical Bus and a Physical Star. Take
a look at Figure 10.8 to see what I mean.
www.sybex.com
FIGURE 10.8
441
Workstation
Workstation
Workstation
Hub
Workstation
Workstation
Workstation
In a Logical Bus and Physical Star, all the computers are hooked into a hub.
When a signal is sent from one computer to another, all computers get the signal,
just as if they were hooked together in a straight line. The computers are all
wired to the hub, so that is the single point of contact for all computers.
UTP, 10Base-T, is relatively easy to install, it is inexpensive, and it makes it easy
to reconfigure networks. The cable is susceptible to EMI as well as eavesdropping.
There are some restrictions. For example, devices may be located up to 100 meters
from the hub. Typically, the more devices you have on a particular segment, the
greater the chances of collision. The more collisions, the slower the network
appears to operateand the more your phone rings. See the section later on
switches versus hubs.
10Broad36
So far, we have been spending all of our time on baseband technology. We did
mention broadband earlier, also. 10Broad36 supports a cable type broadband
system to move data at a rate of 10Mbps. The 36 in the name is the distance
limitation, which in this case is 3,600 meters between any two stations.
10Broad36 makes use of the same coaxial cable that is used in cable TV
(CATV) systems. The cable is cheap and it is readily available. The broadband
cable system can handle support for multiple transmission services by dividing
the bandwidth into different frequencies, and then assigning a frequency to a
different service. This is the same way it is done in cable TV. This capability
means that 10Broad36 can share that cable with other services like video.
www.sybex.com
442
Chapter 10
You will notice that the maximum distance here is much longer than the
specifications for baseband coaxial cable used with 10Base5 and 10Base2.
Single segments of 10Broad36 can be as long as 1,800 meters. There are
some similarities to the baseband networks, though. Each of the 10Broad36
networks must be terminated by a head end device. This head end can be at
the end of a single 10Broad36 segment or at the start of multiple segments.
Nodes are attached to a 10Broad36 segment with a transceiver that is both
physically and electrically attached to the broadband cable. The computer
then attaches to the transceiver using an Attachment Unit Interface (AUI)
cable that can be 50 meters in length.
Broadband transmissions differ from baseband in the direction of the signal
flow. With baseband, signal flow is bidirectional, meaning it flows in both directions away from the transmitting node. Ethernet uses baseband; since baseband
can carry only one signal at a time, two pairs are required one for transmit and
the other for receive. With broadband transmission, the signal flows in just one
direction along the cable. That means that if the signal is going to reach all the
devices on the network, there have to be two paths for the data flow. This is done
with either single cable or a dual cable installation. With single cable, there are
transmissions occurring over two different channels, each channel using a different frequency range. One channel is used to transmit, and the other channel is used
to receive.
A dual channel configuration is just like the name sounds. Every station
is attached to two cables, one to send and one to receive. 10Broad36 cannot
support full duplex operationssimultaneous transmissions in both directions. Today, most Ethernet cards are capable of full duplex operation.
Up until now, we have dealt with the copper wire method of transferring
data. Lets take a look at some fiber optic implementations.
Fiber Optics
No matter what type of copper cable you use, there are disadvantages.
The signal degradation over long distance is one, and it is highly susceptible to electromagnetic interference. The advantage is that it is easy to
install and cheap.
As local area networks grew into campus area networks, metropolitan area
networks, and wide area networks, the need for longer distance communications
became greater. The solution came in the form of fiber optic cabling where the
electrical impulses were transformed to light and sent over glass or plastic cables.
This eliminated the problems of signal degradation due to distance, as well as
problems with EMI. As you can imagine, there are several different types of fiber
that can be used with Ethernet.
www.sybex.com
443
10Base-F
Another fiber standard is the 10Base-F, which also transmits data at
10Mbps over fiber optics. It was released as an enhancement to FIORL.
The identifier 10Base-F refers to not one, but three, fiber optic segment
types. These are 10Base-FL, 10Base-FB, and 10Base-FP. Each of these will
be discussed later.
Each of these interfaces is incompatible with the others.
10Base-FL
10Base-FL has already been mentioned in the discussion of FOIRL. Since it is
compatible with FOIRL, you can assume that some of the same characteristics
are shared. For example, both move data at 10Mbps over two fiber optic
cables. The difference between the two standards is in the distance over which
they can be used. 10Base-FL can be used over 1,000 meters.
10Base-FL can be used to connect two computers, two repeaters, or a
computer and a repeater. All connections are point-to-point through a
transceiver. If you are connecting a computer, the Network Interface Card
(NIC) will connect through an external transceiver through an AUI cable.
The transceiver then attaches to the two fiber cables through connectors
known as ST connectors. One cable transmits data and the other is used to
receive data.
www.sybex.com
444
Chapter 10
Fast Ethernet
www.sybex.com
Fast Ethernet
445
Fast Ethernet uses the same frame structure, addressing scheme and
CSMA/CD access method as Ethernet. The difference is in the timing, which
must be scaled by a factor of 10 when configuring a Fast Ethernet network.
So, what does 100Mbps Ethernet buy you? Well, it depends on the types
of applications you are running and the size of file transfer you are doing. If
you are using some bandwidth hungry applications like video or audio transmission, you will notice a difference. If, on the other hand, you are using
small reads and writes, most of that data will be placed in small Ethernet
frames. The speed of this network is more likely to be impacted by things
other than the speed or bandwidth of the wire.
One of the ways that 100Mbps Ethernet shines over its slow predecessors is in
collision recovery. When there is a collision on 10Mbps Ethernet, the two systems
will back off for a set period of time before trying to resend their packets. This
backoff time is now 1/10th of what it would be with 10Mbps Ethernet. If you have
a crowded network, 100Mbs Ethernet may show dramatic improvements over
the 10Mbps Ethernet.
www.sybex.com
446
Chapter 10
100Base-TX
The 100Base-X specifications refer to both the copper wire based
100Base-TX and the fiber based 100Base-FX standard. Both of these
standards share a signaling specification called the 4B/5B specification,
which had its roots in the Fiber Distributed Data Interface (FDDI).
With this type of signaling specification, each 4 bits of user data are
then converted to a 5-bit code prior to being placed on the media. This,
obviously, adds overhead to the process and means that there has to be
a signal transmission rate of 125 megabaud to transfer data at the
advertised 100Mbps. This extra bit allows the 5-bit symbols to be laid
out so that there will be periodic transitions of signals to allow the
receiver to maintain the synchronization with the incoming data.
100Base-TX uses two pairs of twisted pair cabling. It uses one pair of
the wires for transmitting data and the other pair for receiving data.
Each end of the cable has an RJ-45 connector on it. If you work with
Ethernet networks, this is the standard Category 5 (Cat 5) cable that
you know and love. This cable is rated to transmit at frequencies up to
100MHz. The 125 megabaud transmission rate that we mentioned in
the last paragraph comes out to a maximum frequency of 62.5MHz, so
there is room left over. This media will also allow for full duplex mode,
if supported. To make use of full duplex mode, the NIC and the hub
must support it and be configured to use it.
All connections on a 100Base-TX network are point to point, with a
transceiver at each end of the cable. Most of these connections simply
link a computers NIC to a hub. If necessary for testing, two computers
can be hooked directly together with a cross over cable. In a cross over
cable, the transmit pair of cables from one system is set to be the receive
pair for the other computer and vice versa. Cross over cables are only
needed when connecting two computers directly together. If you are
connecting the computer with a hub, a straight through cable is fine.
If noise is a problem, or if you are taking over a building that is wired to support
Token Ring, 100Base-TX can also support 150 ohm shielded twisted pair (STP)
cabling. When you are using STP, the RJ-45 connector is replaced with a 9-pin
connector that looks similar to a connector on a serial cable.
100Base-FX
100Base-FX supports 100Mbps rates over two fiber optic cables, instead of
two pairs of copper cable. The maximum segment length for half duplex
links is 412 meters, and if you are using fullduplex links, the range is 2,000
meters. Basically, this is just the fiber counterpart to 100Base-TX. The cable
and connector may be different, but everything else stays the same.
Copyright 2001 SYBEX, Inc., Alameda, CA
www.sybex.com
Gigabit Ethernet
447
100Base-T4
There is one other type of 100Base-T specification cable. That is 100Base-T4.
This cabling specification can use the older Category 3 UTP cable.
100Base-T4 makes use of all four pairs of cables. One pair transmits
data, another pair receives data, and there are two bidirectional pairs that
can either transmit or receive. Because this form of cabling cannot support
simultaneous transmit and receive functions, it cannot support full duplex.
Gigabit Ethernet
ave you ever heard a network administrator who said he had too much
bandwidth? Me, either. Most administrators are in a serious bandwidth crunch,
and one way of handling that issue is by looking at Gigabit Ethernet. Gigabit
Ethernet is the IEEE 802.3z technology that provides throughput of one billion
bits per second. It is normally used as an enterprise backbone, and it has several
things going for it:
www.sybex.com
448
Chapter 10
Switches vs Hubs
Lower speed Ethernet devices can be connected to Gigabit Ethernet devices
using LAN switches or routers. These switches or routers will adjust one line
speed to the other. When we talked about the lower speed Ethernet networks,
we mentioned that computers could be hooked together by running the cables
through a hub.
When you generally think of a hub, you think of a part of a wheel where all
the spokes join together. The same is true with a network. With a LAN, a hub
is where all the cabling comes together and where all the data will pass through
on its journey from source to destination. The design of the hub usually means
that this data will be delivered to every computer that is attached to the hub.
With slower Ethernet technologies, this usually is not a problem. With Gigabit
Ethernet, it would be a serious bottleneck.
A switch does not look much different than a hub. As a matter of fact, at
first glance, the only way to tell which is a switch and which is a hub is to
read the device name or the price tag. They are both collection points for
cables. The difference is that an Ethernet switch is an intelligent device,
meaning that it learns about its environment. Look at Figure 10.9.
FIGURE 10.9
Switching technology
Switch
Host 1
Host 2
Host 3
Host 4
Host 5
Host 6
www.sybex.com
Gigabit Ethernet
449
network are not bothered with dealing with messages that are not intended for
them. When you consider the virtual circuits that are created every time a packet
is delivered, think of the importance in a technology where collisions can be a
major bottleneck. If collisions are avoided, the bottleneck is eliminated.
Now, dont get me wrong, switches have their drawbacks. First of all, a
switch, as an intelligent device, can cost considerably more than a hub. Secondly,
the fact that the switch has to evaluate and make a decision on each and every
packet it handles creates a delay or latency in the delivery of the packets.
www.sybex.com
450
Chapter 10
1000Base-LX
Here the L stands for long. 1000Base-LX uses long wavelength lasers to
send data over fiber optic cable. These long wavelength lasers operate in
the wavelength range of 1,270 to 1,355 nanometers, and both single mode
and multimode optical fibers are supported. These long wavelength lasers
are more expensive than the short wavelength lasers, but the advantage is
that the signal can cover longer distances.
1000Base-SX
If the L stands for long, it stands to reason that the S stands for short wavelength
lasers. These operate in a wavelength of 770 to 860 nanometers, and support only
multimode optical fiber. They are less expensive than the long wavelength lasers.
1000Base-CX
Each of the previous implementations have been fiber, and with 1000Base-CX we
will start looking at the copper specification. 1000Base-CX uses a specially
shielded and balanced copper jumper cable called twinax or shorthaul copper.
Segment length is restricted to 25 meters, which means 1000Base-CS will connect
equipment in small areas like wiring closets.
1000Base-T
The other copper cable specification was released in June 1999. This standard
supports Gigabit Ethernet over 100 meters of Category 5 balanced copper cable.
It uses the full duplex of the fiber, but it is carried over four pairs of Cat 5 cable.
The rate of 1Gbps is achieved by carrying 250Mbps over each of the four pairs.
Like fiber, symbols are transmitted and received on the same wire pairs at the
same time. Parts of the 100Base-T standards have found their way into the
1000Base-T world. It uses the same type of signaling that is used in 100Base-TX.
Token Ring
hen you think of Token Ring, think of IBM, because IBM invented
Token Ring back in the 1970s, and is still its prime champion. While Ethernet uses
the CSMA/CD method of getting information out onto the wire, Token Ring
places data on the wire using a more refined method called token passing. In token
passing, a 3-bit token is passed from one network to the next in a predetermined
sequence. When each node gets the token, it examines it to find out if there is data
attached, and if the data is intended for that node. If there is no data attached, and
the node has data to send, it tacks the data on the back of the token, and puts the
Copyright 2001 SYBEX, Inc., Alameda, CA
www.sybex.com
Token Ring
451
whole package back on the ring. If there is data attached, and the data is for the
node, the node strips the data and sends the token back on its way. If the data is
not for the node, the whole package is returned to the wire.
This means that unlike CSMA/CD networks, token passing networks are
deterministic. This means that it is possible to calculate the maximum amount of
time that will elapse before any station may be able to transmit a signal. This
method has several things going for it. For example, each time a node touches the
token, it is completely regenerated and re-sent. This means that the token will not
suffer degradation over the length of the cable.
Take a look at Figure 10.10 to see an example of a Token Ring.
FIGURE 10.10
Token Ring
Workstation
Workstation
Workstation
Token Ring
Workstation
Workstation
Workstation
Workstation
Workstation
Token Ring, while a logical ring, is a Physical Star. All of the computers are
plugged into a Multistation Access Unit (MSAU) using either shielded twisted
pair (STP) or Category 5 unshielded twisted pair cable. The MSAUs can be
linked together to increase the size of the ring. Look closely at Figure 10.11
and see what I mean.
www.sybex.com
452
Chapter 10
FIGURE 10.11
Token Ring MSAUs linked together to increase the size of the ring
MSAU
Ring
IN
MSAU
6
Ring
8 Out
Ring
IN
Stations
Ring
8 Out
Ring
8 Out
Stations
Patch
cables
MSAU
Ring
IN
Ring
8 Out
MSAU
Ring
IN
Lobe
cables
Stations
Stations
IBMs Implementation
Speed
4 or 16 Mbps
4 or 16 Mbps
250
Topology
Star
Not defined
Type of media
Twisted pair
Not defined
www.sybex.com
Token Ring
TABLE 10.2
453
IBMs Implementation
Type of signaling
Baseband
Baseband
Access method
Token passing
Token passing
Encoding
Differential Manchester
Differential Manchester
Networks are formed when Token Ring nodes are directly connected to
the MSAUs and the MSAUs are connected together to form one large ring.
The MSAUs are linked with patch cables while lobe cables connect the
MSAUs to the station. If a station begins to cause problems, the MSAUs can
automatically bypass it by opening a relay.
The original specification called for only one token on any Token Ring. In
some of the newer implementations, there can be two tokens.
Workstation Priority
One of the features that Token Ring has is a sophisticated priority system
that will allow certain high-priority designated workstations to broadcast
more frequently. The Token Ring frame has two fields that work to control
priority, the priority field and the reservation field.
If a workstation gets the token and the workstation has a priority equal
to or greater than the priority value already in the token, the workstation can
reserve the token for the next pass around the network. When the next token
is generated, it will include the higher priority of the reserving workstation.
If a station raises the tokens priority, it must reinstate the previous priority
after their transmission is finished.
Fault Monitoring
One of the workstations on the network is designated the active monitor.
This workstation is the centralized source for timing information for all the
other stations on the ring. The active monitor can be any workstation on
the ring. The active monitor has to do other things besides keep the time.
It must also check to make sure that any frames that are on the ring are not
continuously circling the ring. If it comes across an errant frame, it is up to
the active monitor to discard the frame and generate a new token.
www.sybex.com
454
Chapter 10
Another way that Token Ring networks auto detect problems is a technology
called beaconing. Think of it this way. We said that a Token Ring network is
deterministic. That means that workstations know when to expect the token to
come flying past. If it doesnt, apparently there is problem. The workstation will
then send out a beacon frame that lays out all the information the workstation
knows about the failure. This would include things like the station that is reporting
the failure, its nearest active upstream neighbor (NAUN), and everything else in
between. The beacon frame starts a process called auto reconfiguration. When
auto reconfiguration kicks in, the ring is basically reestablishing itself around the
node that is no longer responding.
Some people think the only thing a NIC does is put data out on the network. Not anymore. Depending on the brand and type of network card you buy,
the NIC can put information on the wire and also be an integral part of your network management scheme. There are cards that will allow the computer to boot
without an operating system, to sleep when not being used, and to wake on signal
from a remote server somewhere on the network. In this section we are going to
take a look at some of the technology the cards you may decide to use in your
server can utilize to increase performance and even make your life easier.
All through this book, we have been stressing ways to increase
throughput and increase functionality. When it comes right down to it,
everything else depends on this component to make it look good. You
may have the fastest processor, with the fastest disk subsystem connected
to the highest bandwidth cabling system possible, but if the network card
that makes the connection doesnt meet the same type of specifications,
everything else is wasted.
www.sybex.com
455
Performance Enhancements
The early PCI Bus architecture had limited the size of data bursts to a maximum
of 64 bytes. While this was plenty of speed at one time, when we moved in the
age of videoconferencing and other CPU intensive business and mission critical
applications, the limitation became a problem. The newer PCI chipsets can let
larger bursts move across the bus to the NIC. These bursts can be up to the size
of a full packet, or up to 1,514 bytes for an Ethernet packet. This packet can be
moved in a single bus mastering operation.
As far as the latest commands go, there are three commands that can
make a difference:
www.sybex.com
456
Chapter 10
1 Gb/s
Desktop
Enterprise Switch
Switch
100 Mb/s
400 Mb/s
Aggregated Link
Desktop
Layer 3 Switch
1 Gb/s
Server with Four
Load-Balancing
NICs
Desktop
1 Gb/s
Desktop
Enterprise Switch
In this case, there are four server NICs that are configured as a NIC group.
Each NIC helps to eliminate some of the traffic coming from the service link.
These NICs provide a scalable performance increase without major investments
in new technologies. The load balancing works on two fronts: transmission and
reception.
Depending on the implementation, each NIC group can have between
two and eight network cards. Each NIC in the group will obviously have its
own Media Access Control (MAC) address, but the entire group is given just
one IP address, forming a virtual NIC that can become part of a virtual local
area network.
www.sybex.com
457
www.sybex.com
458
Chapter 10
Self-Healing Drivers
The software NIC driver is the piece of the communication puzzle that
allows the Ethernet NIC to encode the data that comes in from the operating
system and put it in a form that can be sent over the network. It is also used
to decode the information that comes in from the NIC to prepare it for the
upper layer protocols. Driver development tended to center around adapting
the driver to work with various operating systems, not to check the drivers
health or to see how it was performing on a day to day basis.
Some manufacturers have come up with the Self-Healing Driver, which is
designed to recognize problems with the NIC or with the software driver. These
problems, hopefully, can be recognized and solved before the problem results in
outage. In many cases, these problems can be corrected automatically.
This has been a brief overview of the new technologies for NICs. For more
information, be sure to read Chapter 11, More on NICs, where we will be
looking at these technologies in more depth.
www.sybex.com
459
www.sybex.com
460
Chapter 10
What logon scripts (if any) should the client be running at logon time?
Some client components come with the NOS, others need to be downloaded from a manufacturer Web site. For example, if youre running in a joint
Windows 2000Novell NetWare network and you want to use the NetWare
client, youll likely have to download it from the Novell Web site (or obtain it
from your NetWare installation CDs). The Microsoft client comes with the
various flavors of Microsoft personal operating system software.
Upgrading Adapters
pgrading adapters such as NICs, SCSI cards, and RAID array controller cards is a fairly easy process. Essentially you have two choices. You
can either choose to upgrade the adapters firmware (also called its microcode) or replace the adapter. Depending on what youre expecting out of the
adapter, your decision could go either way.
For example, perhaps youve got a NIC thats acting up, and the manufacturers technical support department has advised you that simply upgrading the
NICs microcode solves the problem youre seeing. Youd go to their Web site,
download the upgrade, and apply it. You may have to apply it to hundreds or
www.sybex.com
Summary
461
even thousands of NICs but, hey, its better than replacing thousands of NICs,
isnt it?
On the other hand, if youve got a SCSI adapter thats hanging back in the
SCSI I days and you want to hook up an Ultra-SCSI device to your server,
then youre looking at a hardware upgrade rather than a firmware upgrade.
With an exotic device such as a RAID array controller card or a multiport
serial adapter, you may be able to add certain components to the adapter,
making it more feature-rich. For example, with a RAID card, you may buy
a battery backup module that you need to install on the card or you may
desire to upgrade its RAM module so that it can hold more data in memory
before flushing to disk. With a multiport serial adapter, you may be able to
buy add-on modules that add more serial ports to the adapter.
All methodologies are common as wood ticks in summer, so be prepared
for any eventuality.
Summary
www.sybex.com
462
Chapter 10
for RAID cards. You might have to do a wholesale changeout of a card from
older technology to very new technology in order to support a peripheral
youre planning on adding.
In the next chapter, we are going to look at fail over technology for
Network Interface Cards and how these adapters can effectively be teamed
up, and examine load balancing in more detail.
Exam Essentials
Know the basics of Ethernet Ethernet operates at 10Mbps.
Know the basics of Fast Ethernet Fast Ethernet operates at 100Mbps.
Know the basics of gigabit Ethernet Gigabit Ethernet operates at
1,000Mbps.
Know the basics of Token Ring Token Ring operates at either 4Mbps
or 16Mbps.
Know the difference between a cross over cable and a straight through
cable, and when to use each Straight through cables are used to connect
devices to hubs or concentrators. A cross over cable is use to connect concentrators together, or to connect two PCs together without the benefit of
a concentrator.
Know how to choose the right network card for your system bus
Chose the network card that most closely matches your bus speed and
provides you with the greatest flexibility.
Understand client connectivity Know and understand that client computers (and servers) require network connectivity software to allow them to
communicate out on the network. Realize that the complexity of the client
connectivity software issue is relative to whether you have a disparate NOS
environment or not, what protocols are in use, and what servers the client
will connect to. Some NOS products have built-in client components you
can use, while others require a separate download or client installation.
Be able to upgrade adapters Be familiar with the reasons for upgrading
adapters. You might need to upgrade an adapters firmware to make it
more functional. Or you might need to add an add-on component to the
adapter. Or you might simply need to change the adapter out for a newer
model.
www.sybex.com
Summary
463
Key Terms
Before you take the exam, be certain you are familiar with the following terms:
100Base-TX
1000Base-CX
1000Base-LX
1000Base-SX
1000Base-T
100Base-FX
100Base-FX
100Base-T4
100Base-TX
100Base-X
10Base Fiber Backbone (10Base-FB)
10Base Fiber Link (10Base-FL)
10Base Fiber Passive (10Base-FP)
10Base2
10Base5
10Base-F
10Base-FL
10Base-T
10Broad36
active monitor
Attachment Unit Interface (AUI)
auto reconfiguration
auto-negotiation
bandwidth
bidirectional
bits per second (bps)
www.sybex.com
464
Chapter 10
www.sybex.com
Summary
reservation field
resilient server links
routers
Self-Healing Driver
shielded twisted pair (STP)
signal ground
software NIC driver
synchronous clock encoding technique
Token Ring
unshielded twisted pair (UTP)
what-you-see-is-what-you-get (wysiwyg)
www.sybex.com
465
466
Chapter 10
Review Questions
1. Lucinda is a network administrator for a company that has both Novell
NetWare and Windows 2000 servers. Which network clients could she
install to obtain connectivity for a given client?
A. Microsoft client
B. Novell client
C. NetBIOS client
D. NFS client
E. TCP/IP client
2. Youre working with a two-year-old server that has an on-board SCSI
www.sybex.com
Review Questions
which company?
A. 3COM
B. Honeywell
C. Conrad Thomas
D. IBM
6. Ethernet uses what form of cable access?
A. Token running
B. Token passing
C. CSMA/CA
D. CSMA/CD
E. CSCD/MA
7. How big is a token?
A. 3 bits
B. 3 bytes
C. 3 nibbles
8. How does Token Ring access a network?
A. Token running
B. Token passing
C. CSMA/CA
D. CSMA/CD
E. CSCD/MA
www.sybex.com
467
468
Chapter 10
www.sybex.com
Review Questions
469
14. What access method does Fast Ethernet and Gigabit Ethernet use to
SCSI I adapter in it and she thinks that by replacing the adapter she
can enhance the throughput of the disks and speed up the computers
operation. What are some concerns that Wendy must keep in mind as
she considers the upgrade?
A. Updated cabling
B. IRQ issues
C. Memory I/O concerns
D. Updating new cards BIOS
E. PCI slots in server
17. Which two cable types can be associated with Token Ring?
A. UTP
B. STP
C. Cat 2
D. Cat 5
www.sybex.com
470
Chapter 10
www.sybex.com
471
upgrade it. You could add a SCSI adapter to the server, however. Chances
are that the same is true for the RAID cabinetits SCSI connection is
wired into the backplane of the cabinet. Upgrading the servers SCSI card
firmware wont help with connecting the SCSI II to the Ultra-SCSI, however. Your best and most cost-effective option is probably to buy a cable
thatll handle the two different connection types.
3. D. The IEEE standard for Ethernet is designated as 802.3.
4. B. The IEEE standard for Token Ring is designated as 802.5.
5. D. IBM invented Token Ring, and the IEEE standards mirror the IBM
implementation.
6. D. Ethernet use Carrier Sense Multiple Access Carrier Detection
(CSMA/CD).
7. A. A token is 3 bits.
8. B. Token Ring uses the token passing technology.
9. C. The NIC waits a predetermined period of time before resending
the packet.
10. A. The straight Ethernet specification is for signaling traveling at
10Mbps.
11. B, D. Token Ring network can operate at 4Mbps or 16Mbps.
12. A. In the original specification, there was one token per ring.
www.sybex.com
472
Chapter 10
IRQ and memory I/O, so there shouldnt be an issue there. She may
have to have different cabling for the new card. If you buy a new SCSI
adapter, generally you get a cable that allows one or at the most two
devices to be added onto the chain. But Wendy may have several
devices and will have to provide an additional cable. Also shell probably want to consider verifying the cards BIOS version and updating
it if its older than the current one. The most important concern she
should have will be verifying if there are available PCI slots in the
server. The Future Domain adapter is likely to be an ISA or EISA card
but most of todays cards are PCI. This could be a big concern if the
server is an older pre-PCI unit.
17. B, D. Token Ring will use either Cat 5 or shielded twisted pair.
18. C. An RJ-45 connector will usually be on an unshielded twisted pair
www.sybex.com
Chapter
More on NICs
11
www.sybex.com
Although this chapter does not directly cover the objectives listed on CompTIAs
Server+ exam blueprint, it does provide valuable information for your fieldwork.
This chapter complements some of the topics addressed in Chapters 1 and 10.
True to our word, we are concerned with your overall knowledge, not just what
you need to know to pass the exam.
www.sybex.com
475
work with existing implementations from other vendors to provide redundancy among multiple adapters. As you would imagine, before purchasing any
solution, you should make sure that it works with the make and model of network adapter that you have in place. Some vendors will say that their software
will work with any adapter. If the software solution you choose makes this
claim, it would be my suggestion that you spend extensive time in the lab
checking out their claims.
Adapter Fault Tolerance is operating systemindependent. It is supported
by Windows NT, Windows 2000, Novell Netware, and UNIX because the
technology is provided by the network card vendors. What this technology
has in common is that in each case, the solutions will use the high-speed PCI
network card that works with PCI Bus Mastering or a PCI Bridge. In turn,
each implementation will have minimum hardware requirements for the
servers CPU power and memory requirements.
So far, we have been talking about a server that uses multiple network cards as
a way to provide fail over support. There are some manufacturers that have taken
a different approach. At least one manufacturer has created a network card that
has what amounts to four network cards consolidated into one PCI device. This
device provides the server administrator with a way to maximize the number of
PCI slots in the server. While this is a way to get the most bang for your PCI slot
buck, it does not solve the single point of failure question. If the individual card
fails, instead of having one network segment out of commission, you have four.
Infrastructure Concerns
As you plan your Fault Tolerance solutions, keep in mind that the solution
extends beyond the server. For every fault tolerant network card added to the
server, there must be an equal number of concentrator or switch ports to provide
the actual connectivity to the network. You must also ensure that the speed of
the concentrator or switch matches the speed of the fault tolerant adapters.
There are differences between concentrators and switches. The largest
difference is in communication methods. Look at Figure 11.1.
www.sybex.com
476
Chapter 11
More on NICs
FIGURE 11.1
Workstation
Workstation
Workstation
Concentrator
Server
Workstation
Workstation
As you can see, all the workstations are plugged into the concentrator,
just as they would be plugged into a switch (a concentrator can also be
referred to as a hub). The concentrator concentrates the signal, so that all the
computers plugged into it will receive the same packets. This means added
processor overhead at each workstation. The processor must determine if the
packet is intended for that workstation. If it is, the workstation must act on
the packet. If not, the packet must be discarded. This also means more network traffic. Instead of sending a signal to just one host, the server is sending
a signal that will go to dozens of hosts.
A switch, on the other hand, is an intelligent device. It creates a virtual circuit
with each workstation. If the server wants to send a packet to a workstation, the
switch will create a virtual circuit so that only that workstation sees the packet.
That reduces the overhead for all the other workstations. This is a two-way
street. If the host wants to send a packet to the server, the switch will create a
virtual circuit back to the server.
www.sybex.com
477
Speed is another consideration. If your concentrator or switch will operate at 100Mbps, you may want to make sure that auto-negotiation is
turned off at the adapter. Auto-negotiation is the handshake between
the concentrator and the network card that determines the speed the
card will operate at. While auto-negotiation usually works as advertised, it can force the card to come in at a slower speed (10Mbps rather
than 100Mbps), thus slowing things down.
If you are planning on using fault tolerant adapters, you may enhance
the servers uptime by making sure the adapters and the server support
hot-swapping PCI adapters. In order to replace a card, the slot must be
powered off, the card replaced, and the slot powered back on again.
The replacement adapter should be the exact same make and model as
the failed adapter. This ensures that the drivers that are being used will
be the same, and that ensures that the server does not have to be
rebooted just to load a new NIC driver.
www.sybex.com
478
Chapter 11
More on NICs
Fault Tolerance, find out the kinds of alert mechanism employed and make
sure it fits your lifestyle. If I were doing it, I would make sure that I could
receive an e-mail or a page. Some implementations will only write an entry in
the error log, and that just wouldnt work for me, because I diligently read
error logsfor about a day. Then they are just spot-checked at best. This may
require activation of another TCP/IP protocol, Simple Network Management
Protocol (SNMP). Be sure to test the notification procedure to make sure it
works as advertised by disabling one of the adapters. You should make sure
the notification process works as designed during a controlled outage, not
find out it doesnt work during an unexpected outage.
Scalability
Having the ability to have one of your NICs fail over to a fault tolerant
backup is a great thing, but it also means that two of those precious PCI slots
have been used. Besides the physical hardware constraints, there are other
limitations on expansion that should be considered.
Limited PCI Slots Deciding on your Fault Tolerance levels is a great
thing to do before you decide on server specifications. If you opt to have
two network cards as a fault tolerant pair in the server, that may have a
direct impact on the installation of SCSI cards or RAID controllers.
Vendor or Operating System Limitations Some server operating systems
or software vendors may have limitations on the number of adapters or ports
that can be configured for Fault Tolerance. In some cases, the solution may support only 2 ports. Others may support up to 16 different ports. In addition
there are some vendors that will let you add additional adapters, as long as you
do it two at a time. Other vendors may specify that you can add only an odd
number of adapters at a time, while finally, there are some that require you to
install exactly the same brand, make, and model of adapters in the server.
Memory and CPU If you remember back to the discussion on memory,
you will remember that server memory is used to store data that is
requested by either the operating system or by users. If you add additional
active links to the server, the demands on both the memory and on the
CPU will increase. If these demands increase too greatly, the CPU and the
memory may become a bottleneck.
Cost
When I worked for a value added reseller, I would get really frustrated at times
with the purchasing department. I would do a lot of research on the products that
www.sybex.com
479
the client needed, and I would make a decision based on a business case scenario.
In other words, the client wants to accomplish this. In order to do that, the best
hardware solution is A. I would then fill out the purchase order and submit the
signed and approved purchase order, only to receive a completely different set of
parts. When I asked, invariably I would get the response that the part I received
was cheaper than the part I wanted. The descriptions were similar, and therefore
cheaper was better. Obviously, this is not always the case.
This is especially true when you start to look at Fault Tolerant Adapters. The
suggested retail price should not be the deciding factor. We mentioned earlier
that there are network cards that have four ports on them. If I have a hardware
solution that will let me set up two four-port cards in a fault tolerant configuration, this is going to be more expensive than two one-port cards. It may even be
more expensive than eight single-port cards. While the other solutions may be
cheaper, they do not solve the business problem of providing at least four fault
tolerant links to the network.
When you decide to opt for Fault Tolerance, you should do your homework
and find out what the cost per port is for various solutions. Be sure to include
both the hardware and software implementations in your chart. The chart may
look something like Table 11.1.
TABLE 11.1
Price Per
Adapter
Low
Price Per
Adapter
High
Price Per
PortLow
Price Per
PortHigh
$75
$200
$75
$200
$250
$350
$125
$175
$540
$800
$135
$200
Now, all these numbers are just guestimates of the actual cost. You
would have to fill out an actual chart using actual numbers, and then you
may be able to get a feel for the price breakdown. You can also add in
what a software solution would cost to give you a better idea of all your
alternatives.
www.sybex.com
480
Chapter 11
More on NICs
Other Costs
Various companies call this various things, but total cost of ownership
(TCO) certainly fills the bill here. The purchase price of the network cards
or software may be a small part of the actual cost of ownership. Maybe you
will need to have additional wiring run for the redundant link. There is the
time involved in researching, purchasing, installing, testing, and maintaining
the new equipment. Because this is a redundant link, there will have to be an
additional shared media hub, or a separate switch or concentrator port,
which means there are fewer ports available for workstations.
There may even be some hidden costs, like the impact on the CPU. If
the impact on the CPU is too high, you may be forced to either upgrade
or replace the server. Not paying attention to any or all of these things
may mean that you have a fault tolerant NIC solution that is bringing
down performance in other areas.
Performance will bring us to another area. If we are going to have two network cards servicing the same network segment, we should be able to get something out of it besides Fault Tolerance, shouldnt we? Maybe we can have both
the cards service the segment and balance the load between the cards.
What we are trying to do with Adapter Load Balancing is to have multiple network cards in the server that handle approximately the same amount of
network traffic. By ensuring that one card is not overworked while another sits
idle, we can improve the overall performance of the network.
This Load Balancing can be accomplished in several ways:
www.sybex.com
481
Using a NIC that is specially designed for a server and has the capability
of running in a Load Balanced mode.
When you start talking about Load Balancing, you need to be careful to define
terms. In this case, we are talking about Network Adapter Load Balancing. If
you start talking Network Load Balancing with Microsoft people, you are now
talking about clustering servers. Different goals and different solutions.
Workstation
Workstation
Workstation
Workstation
Workstation
Workstation
Server
Workstation
Workstation
Workstation
Workstation
Workstation
You, as the administrator of this network segment, have become sick and
tired of people complaining about the speed of the network, so you have decided
www.sybex.com
482
Chapter 11
More on NICs
to do something about it. You went to your bosses and proposed breaking the
network up into several segments using Fault Tolerant Load Balancing network
cards, new switches, and new concentrators. Total cost of the solution is
$10,000 (please be advised the figure quoted here has no basis in reality, and is
just a WAG). (For those of you in the audience who are unaware of the acronym
WAG, it is a highly technical term meaning wild a** guess.) When your bosses
review the solution, they applaud the effort to improve service to the network
users, but somehow just cannot find the $10,000 in the budget to make this solution work. However, they have put their heads together and decided that you
should do this, but you should do it for under $750. Bosses do this kind of stuff!
All the time. It makes you crazy.
Anyway, back to the drawing board. You decide that since this is going to
be done on the cheap, what you will do is add a second and third network
card to the server (cost: less than $150), add two concentrators (cost: $550),
and use the other $50 for a well deserved pizza and beer party for the IT staff.
Figure 11.3 is what you come up with. Just assume that there are about 33
workstations on each segment.
FIGURE 11.3
Divided network
Workstation
Workstation
Workstation
Workstation
Concentrator
Workstation
Workstation
Workstation
Workstation
Concentrator
Server with 3 Cards
IBM Compatible
Concentrator
Workstation
Workstation
Workstation
Workstation
Now, granted, this is not a very scientific solution to the problem, but it
does remove the load from one network card and spread it out over multiple
network cards. What is the downside?
www.sybex.com
483
Well, first of all, this solution is really easy to implement if the only
transport protocols you use on your network are Internet Packet Exchange
(IPX) and Sequenced Packet Exchange (SPX). In the case of IPX/SPX all
network addressing comes from the network card, and the node address is
the Media Access Control (MAC) address of the network card, so you can
reconfigure network segments on the fly with very little problem. If, however, your network, like most networks, uses TCP/IP, the solution becomes
somewhat more challenging.
With TCP/IP, you have just created two additional sub-networks. That
means your IP addressing scheme may have to be reworked or, at the very least,
you will have to set up a DHCP server to service the new network segments. This
is not an insurmountable task by any means; as a matter of fact it is really pretty
simple. The tricky part comes in when 66 (at least) of those 100 workstations
have to be restarted to acquire the new addressing information.
If you are planning on using this solution, plan carefully. Look at what is on
the network and make some informed decisions about what will and what will
not be moved between network segments. For example, if you are hosting your
companys Web page, it makes sense to keep the Web server on the same network segment and not move it. Re-addressing a Web server means changing
DNS entries and almost certainly means some time when the information is
not available. The same is true with e-mail servers, application servers, DNS
servers, FTP servers, or anything else that requires users be able to find that
server at a particular address.
The advantage of this solution is usually speed. Because there are no special
drivers, switches, or software involved, the performance does not hit a snag
while some piece of the communication puzzle decides which network card the
packet should be sent from. The disadvantage of this solution is that it is more
difficult to configure and there is no Fault Tolerance. You still have one network
card managing a network segment and this causes a single point of failure.
While this is one solution, it is certainly not the only solution or even the
best solution. One other solution is a switch that can handle Load Balancing.
www.sybex.com
484
Chapter 11
More on NICs
and usually have lots of processing power, so the switch can forward lots of
packets very quickly. This makes switches one of the solutions to consider for
high-traffic sites or intranets. In these scenarios traffic is going to be arriving
from a high-speed LAN connection, rather than coming in over a slower connection from the Internet
At this level of the hardware infrastructure, you could also install a Load
Balancing router. The difference between the switch and the router is in the
details of what each will support. Switches are pretty easy to figure out, while
routers on the other hand can be a little more difficult to get your hands
around. First of all, what is the router? In this example, it can be a softwareonly package that sells for a couple of hundred dollars or a preconfigured
hardware device that carries a pretty hefty price tag.
Load Balancing routers are generally PC-based, running on either UNIX or
Windows NT/2000. The router will have at least two network cards. One of the
cards will be used for incoming traffic and one of the cards will distribute that
traffic to the servers. The standalone router that is not PC-based doesnt usually
look like an Ethernet switch; instead of having a multitude of ports, it usually
has just two, and it runs more-sophisticated software. Running more complex
software means that a router will have more processing power and more RAM
than a switch will have. If this is the case, obviously the price will go up. Routers
are more suited to those sites where the users will need to be connected to the
server for long periods of time, like hours instead of the usual minutes. Since
these routers also come with proprietary operating systems, if you keep the
patches up-to-date, the router solution should be less vulnerable to hackers.
But what do they do? Look at Figure 11.4.
Lets assume that all the servers behind the switch or the router are Web
servers servicing your Web site. All Web sites will have just one IP address,
but multiple servers may be necessary to accommodate all the hits the
server takes. So, the Load Balancing device takes a look at the incoming
packets and then forwards the packet to any of the servers that can fulfill
the HTTP request. The way they determine which device to send the packet
to depends on a variety of factors that are plugged into an algorithm. This
may be a very simple decision, such as a round-robin, where Server 1 is
first, Server 2 is next, Server 3 comes after Server 2, and so on. It may also
be a method of determining how many active connections a particular
server has open, or even a method of determining how long it will take to
service a particular request.
www.sybex.com
FIGURE 11.4
485
Server
Internet
Server
RI
RO
Load-Balancing
Router or Switch
Server
Server
All requests are not the same. For example, if your servers are going to be
used to fill out forms or for SSL transactions, these present some special
problems. The user will need to get to the same server for the entire session
so the server can keep track of where in the process the user is.
www.sybex.com
486
Chapter 11
More on NICs
Server NICs
There are network interface cards that are designed to work in a server. These
cards bring more features to your server, although the cost is higher than the
$19.95 white box generic NIC that you can buy at your local computer retailer.
Some of these server NICs are relatively inexpensive (under $175) and come
with the technology and software drivers necessary to support Load Balancing.
In this type of technology, you simply add multiple server-optimized NICs
to your server and then configure the NICs as a group. Each NIC will handle
its share of packets, which will eliminate congestion at the server link. This
means that you should have an incremental and measurable performance
improvement, without having to redesign your entire network.
As I mentioned in the last chapter, the manufacturer defines Load Balancing at the NIC level. Load Balancing methods, for example, can use
transmit and receive Load Balancing to manage the information traffic
inbound and outbound. NICs can be added in clusters of from two to
eight NICs, depending on the slot availability. Each NIC continues to
communicate using its own MAC address, but the entire group is lumped
together using a single IP address, creating a virtual NIC that can be part
of a virtual LAN.
With transmit Load Balancing, the algorithm sends outgoing traffic
evenly across the NICs in the Load Balancing group. The destination IP
address and several other parameters are used to decide what traffic is sent
to which NIC. When a client connects, the algorithm determines which NIC
the client will communicate with and that link will last for the duration of the
connection.
If one of the NICs is not being used, the algorithm will change to make sure
that the NIC will be utilized. Because these assignments are based on the
unique client IP address, this method of Load Balancing will work when traffic
crosses routers or switches.
When traffic is received, the round-robin method of distribution can be used
to disseminate the packets. Each packet that comes in is automatically assigned
to the next available NIC on a simple rotating basis. If a single client has established several connections to the server, the inbound traffic from each connection will shift in this round-robin fashion to the next NIC in the group. Packet
dissemination is accomplished by using a variable or steering IP address that will
allow the software drivers to intercept the handshake process and rotate the
servers MAC address between all the NICs in the group.
www.sybex.com
Adapter Teaming
487
Another Load Balancing method distributes the data packets by using the
destination MAC address to select a link. The problem with this method is
there is nothing to make sure that the server traffic is balanced across all the
NICs in the group. Also, if multiple clients are connecting from a router, the
routers MAC address will be the one used for allocation. That means that
a single NIC will be assigned to handle the requests from an entire subnet.
The grouping is usually handled through the setup for a NIC or with a special driver that is supplied with the network card. The last solution we are
going to look at involves third-party software products.
Software Solutions
If NIC card manufacturers provide the software that will allow the grouping
of NICs for Load Balancing, why would you even think about paying extra
money for a third-party solution? Well, when you group NICs together,
workstation communication may still tend to communicate toward the NIC
with the lowest MAC address. That means that one of the cards gets to do
the majority of the work, while the other cards remain underutilized.
The software products work by using a specific protocol driver that runs
between the TCP/IP protocol stack and the network cards driver. The administrator can choose which network cards make up the cluster. The software
drivers vary in size and options. The actual Load Balancing process can also
vary, some products equalizing the number of connections between cards, and
other products actually monitoring the amount of traffic to equalize the
uneven workloads over a period of time.
The software solutions also have the capability of ensuring Fault Tolerance.
If one of the NICs goes down, the communications from that card are redirected
to another card in the group.
Finally, these products allow you to monitor the cards performance
with SNMP. The variety of functions that can be monitored depends on the
implementation.
Cost of the third-party products varies. It is usually priced on a
per-server basis.
Adapter Teaming
www.sybex.com
488
Chapter 11
More on NICs
section, we are going to look at ways for adapters to combine some of those
characteristics and work together to increase the amount of throughput that
you can provide back to the network. This is referred to as Adapter Teaming.
Depending on the types of adapters you are using, the technology can automatically balance the full duplex traffic among multiple adapters without
any client or network reconfiguration. Since the incoming and outgoing
server traffic is balanced, it can be scaled in increments of 200Mbps, with
totals up to 800Mbps in Fast Ethernet environments and up to 8Gbps in
Gigabit Ethernet.
Technology like this is not used on your ordinary run of the mill print
server. This technology is for the high-performance servers that are running
demanding applications such as these:
Enterprise servers
Web servers
Intranet servers
www.sybex.com
489
Unlike Load Balancing, this is done as long as there is a switch in place that
supports the technology.
Look at Figure 11.5 and see how this works.
FIGURE 11.5
Adapter Teaming
Up to Eight
Server Adapters
As you can see, by linking or Teaming the adapters together with the
switch, you can effectively create massive amounts of bandwidth, up to
800Mbps using Fast Ethernet cards. Of the combinations discussed in this
section, this is the most expensive, due to the combination of the specially
designed Ethernet cards and the switch.
www.sybex.com
490
Chapter 11
More on NICs
How alerts are handled will depend on the operating system. For example, in a Windows server environment, alerts will be written to the event
logs. For Novell NetWare, a NetWare alert will be generated. An SNMP
management agent can detect the alerts and trigger a notification via
e-mail, fax, pager, or cell phone.
www.sybex.com
Summary
491
Summary
Exam Essentials
Know how fault tolerance can be instituted in network adapters Fault
tolerant network adapters can be used so if one NIC fails, another will
take its place.
Know how load balancing can be instituted in network adapters Network
adapters for highly utilized servers can be load balanced to ease congestion.
Know how adapters can be teamed Network adapters can be teamed to
provide better throughput
Key Terms
Before you take the exam, be certain you are familiar with the following terms:
Adapter Load Balancing
Adapter Teaming
algorithm
auto-negotiation
Bootstrap Protocol (BOOTP)
Carrier Sense Multiple Access/Collision Detection (CSMA/CD)
concentrator
Dynamic Host Configuration Protocol (DHCP)
Ethernet
www.sybex.com
492
Chapter 11
More on NICs
Failure Alert
Fault Tolerance
hot-swapping
Internet Control Message Protocol (ICMP)
Internet Packet Exchange (IPX)
Load Balancing
Media Access Control (MAC)
network segmentation
Packet Internet Grouper (PING)
round-robin
Sequenced Packet Exchange (SPX)
Simple Network Management Protocol (SNMP)
steering IP address
switch ports
total cost of ownership (TCO)
Transmission Protocols
transmit and receive Load Balancing
virtual circuit
virtual LAN
virtual NIC
www.sybex.com
Review Questions
493
Review Questions
1. To institute any of the technologies in this chapter, you must have a
www.sybex.com
494
Chapter 11
More on NICs
cards. In addition, your server supports Hot Plug PCI technology. You
have configured your server to use SNMP and to page you when a network card fails. You receive the page and replace the Intel NIC with a
NIC manufactured by 3Com while the server remains available. The new
network card, however, will not send and receive packets. This procedure
was doomed from the very beginning. Why?
A. The card is not seated in the slot correctly.
B. The slot was not powered back on when the card was added.
C. The cable is not correctly installed.
D. The network card driver is not loaded.
E. All of the above.
6. What is the maximum number of network cards that can be Teamed,
www.sybex.com
Review Questions
495
8. You have a Windows 2000 Advanced Server installation with Load Bal-
Web site.
9. You have just reconfigured your server, adding three network cards to the
server. You then plug the network cards into new concentrators and
move the patch cables for some of your hosts from the concentrator serviced by the original NIC to the concentrators serviced by the new NICs.
You call users on each of the network segments and they did not see any
interruption in service. Which transport protocol are you using?
A. TCP
B. IP
C. IPX
D. RIP
E. SAP
10. You have eight Gigabit Ethernet cards in your server. These cards are
www.sybex.com
496
Chapter 11
More on NICs
Teaming?
A. True
B. False
13. In which case would Adapter Teaming be inappropriate?
A. Enterprise servers
B. Web servers
C. Intranet servers
D. High-end graphics imaging and rendering servers
E. File and print server for a network of 25 users
14. You have an implementation where the network cards at the server are
communicates with the host, the switch creates which of the following?
A. Virtual NIC
B. Virtual Network
C. Virtual Circuit
www.sybex.com
Review Questions
497
16. You have eight NICs in the server teamed together. Your network is
configured to use only TCP/IP. How many IP addresses will the eight
NICs require?
A. 8
B. 4
C. 2
D. 1
17. You have 8 NICs in the server teamed together. Your network is
configured to use only TCP/IP, and you have assigned this group of
NICs one IP address. What have you just created?
A. Virtual NIC
B. Virtual Network
C. Virtual Circuit
18. You have a network card that supports auto-negotiation, but you find
that when you plug the card into a 10/100Mbps concentrator, the card
continues to connect at 10Mbps, even though it is capable of connecting
at 100Mbps. What should you do?
A. Replace the card
B. Turn auto-negotiation off and configure the card to connect at
only 10Mbps
C. Turn auto-negotiation off and configure the card to connect at
only 100Mbps
D. Replace the server
19. A network card can send and receive data at the same time. It is
www.sybex.com
498
Chapter 11
More on NICs
www.sybex.com
499
switch.
4. D. This is an example of round-robin allocation.
5. D. If you mix manufacturers or if you mix card models, the old drivers
method of access.
12. B. A third-party software solution may be used for Load Balancing,
mentation.
14. B. The device is a switch. A router will usually have two ports.
www.sybex.com
500
Chapter 11
More on NICs
15. C. The link between a server and a host through a switch will be a virtual
circuit.
16. D. The NICs will require just one IP address.
17. A. You have just created a virtual NIC.
18. C. Turn auto-negotiation off and configure the card to connect at only
100Mbps.
19. A. It is operating in full duplex mode.
20. B. An Ethernet card operates at 10Mbps, and can only operate in half
duplex mode.
www.sybex.com
Chapter
12
Backup, Restoration,
and Disaster Recovery
SERVER+ EXAM OBJECTIVES COVERED IN
THIS CHAPTER:
3.1 Perform full backup.
Verify backup.
Use the technique of hot swap, warm swap, and hot spare to
ensure availability.
7.2 Restoring.
www.sybex.com
For complete coverage of objectives 3.1 and 4.1, please also see Chapter 7. For
complete coverage of objective 5.1, please also see Chapter 8. For complete
coverage of objective 7.1, please also see Chapters 1 and 7. For complete coverage of objective 7.2, please also see Chapter 1.
Why Do We Do Backups?
What we call the beginning is often the end. And to make an end is to make
a beginning. The end is where we start from. T. S. Eliot, Four Quarters
Truer words have not been spokenat least when we consider backups
that is. Ask yourself this question: Why would you want to back a file up in
the first place? The answer, of course, is so that if its ever needed again you
www.sybex.com
Why Do We Do Backups?
503
can whip out your copy of it and restore it. So in reality we do backups
because we may have to perform a restoration operation someday.
But neophyte administrators dont seem to get this concept. They think
that we do backups just in case things crater in and we have to utilize them.
Truth is, most backup administrators are involved in almost daily restoration
operations. Here are some real-life examples for you to consider:
Developers working on Web page Java code have accidentally overwritten several files in a network folderfiles that were working at one time
and now are not. The supervisor calls the admin team for a restoration.
Which of these scenarios can you assist with? If you answered all three,
then theres a problem! No server admin could assist with the middle bullet
problem. The person working on the spreadsheet has not hit the Save command
key yet and so her data has not been saved to disk. And, even if it were saved to
disk, the backups typically dont run till that evening, so there is probably very
little that could be restored to get her document back to where it was just prior
to the outage. But I include this example because this is how some users think of
backups. They have a tendency to think were out there constantly backing files
upjust in case.
So, how could we help out in the above situations? Well, the middle one we
know is a problem. But we could certainly help the user by checking to see if the
spreadsheet software shes using has an autobackup feature. Some office automation products allow you to turn on a feature whereby the document youre
working on is periodically written to a backup copy. If something goes wrong or
the computer goes down, when it comes back up you can simply open the application you were working in and the document will either reappear or youll see
it in the list of recently saved items. So theres hope, even for this hapless user.
www.sybex.com
504
Chapter 12
The other two scenarios imply that youve been routinely saving data off
to some sort of alternate media and that youre trained to understand how
to restore the missing data back to its former state once youre notified that
you need to do so. Thats what this chapter is about.
Backup Methodologies
So, when were planning our backup strategy, how do we begin? Intuitively,
we should realize that we need two different components to make this kind
of thing happen: hardware to give the backed-up data a place to live, and
software that can help us with the backup operations.
As you might imagine, you can really get crazy with your backup design
and spend thousands (or even tens or hundreds of thousands) of dollars. And
that may be necessary, but before you go that far, it might be beneficial to
examine some more cost-effective alternatives.
A backup is simply a copy operation, is it not? When you install a piece of
software on your computer, perhaps youve noticed that some installation
programs are smart enough to temporarily copy the files they are going to
overwrite to a temporary directory for safekeeping. That way, if something
goes wrong with the installation, or you want to uninstall it, the files are
present and ready to put back. Could we adopt this scenario for our backups?
Lets discuss.
Lacking any special hardware or software, its entirely conceivable that
you could set up a scenario in which you whipped up a little batch file that,
once a night, copied the contents of a critical folder to another folder for
redundancys sake. Figure 12.1 shows this. Lets begin to ask ourselves some
questions about this paradigm.
FIGURE 12.1
Batch file
Data
Backup
www.sybex.com
Why Do We Do Backups?
505
First of all, is there a single point of failure (SPOF)? Well, it depends on where
you place that backup copy of the data, doesnt it? If your batch file places the
backup data on the same disk as the original, then you have certainly introduced
a SPOF because, if that disk goes out, both copies go with it.
Well then, how about if you had the batch file copy the data from one disk
to another disk? Thats great unless both disks reside on the same computer,
isnt it? Because if they do, well then you still have a SPOF!
OK, you cry, how about if I have a RAID 5 array on that computer and
have two separate disk volumes and the batch file copies the data from one
place to the other? Well, youre getting warmer, much warmer. But theres
still a SPOF in the RAID array controller card, isnt there? Ditto for the idea
of copying the data from disk to, say, a Zip drivethe drive and its cable and
card are all SPOFs.
Heres the operating premise behind this whole backup methodology:
Data Redundancy Restore
The more redundancy there is to the data, the better your chances of being able
to restore it. So when we consider servers and backup scenarios, we begin to
think in terms of hardware to help us with the redundancy and software to
manage the backups. Lets segue into these two highly important topics one at
a time.
Hardware
More than likely, the media that you use to perform your backups will be
some sort of tape. Any of the tape media that you decide to use will require
a specific tape drive. There are several different choices of tape, but the most
common ones today are 4mm Digital Audio Tape (DAT), 8mm Helical
Scan, and Digital Linear Tape (DLT). Youll shop for a tape drive that meets
your needs and then purchase the blank media (tapes) that you need to use
in the drive. Youll also purchase some cleaning tapes so as to perform an
occasional cleaning of the drive. There are three basic kinds of tape drive/
media combinations that are available to admins:
4mm DAT DAT audiotape never really took off in the home entertainment system market, though it got some, ahem, play in the recording
studio environment. DATs claim to fame is that the data being written
to tape is digital and hence practically error-free. DAT really found a
home in the backup market, however. The 4mm DAT tape is in use in
backup drives all over the world and is one of the backup workhorses
www.sybex.com
506
Chapter 12
for server admins. Problem is, its really slow. So if youve got a lot of
data to back up, you either have to put a bunch of DAT backup drives
on the network to facilitate multiple backups, or look at faster equipment. The 4mm part comes from the tapes width. You can copy anywhere from 224 gigabytes (GB) to one of these tapes and expect maybe
20 megabytes (MB) per minute data transfer speeds.
Note that any of the drives you buy specifically for servers will, in all probability, be SCSI-based. Which means that youd better take a look at the back of
your server first so as to ascertain what kind of SCSI attachment youll need.
Youll also usually have the choice of purchasing internal or external drives. I
much prefer external because you dont have to hassle with them if you need
to disconnect them for repairs. Youll usually have to purchase an external
cable for external drives. External drives are typically more expensive than
internal.
8mm Helical Scan Using the same kind of technology as your VCR at
home, the 8mm Helical Scan proves to be a reliable backup drive for servers. The tape is wider and holds more data, 540GB. You can realistically
expect data transfer speeds of 2060MB per minute when using a tape
drive such as this.
DLT Digital Linear Tape is the choice to make in larger networks that have
oodles of data to back up. The tape is fast and it holds lots of data. Its very
reliable. You buy DLT drives and tapes by their capacity rating: 20GB,
40GB, 70GB, etc. Typically the model number of the DLT drive youre buying will reveal its capacity. For example, if youre buying an Acme DLT7000,
you can generally assume that the 7000 number implies that the drive is a
70GB. This may not always be the case but Ive found it to be a pretty good
rule of thumb. You can expect somewhere around 120300MB per minute
of data transfer between the server and the tape drive using DLT. However,
if youve got a DLT mounted on a server and youre trying to back up data
from another server on the network, throughput might not be as robustits
relative to the speed of your network, of course.
Mammoth A fourth type of tape drive that we havent covered is
Exabytes Mammoth drive (www.exabyte.com). Data transfer rates are
very high, relative to the other listed tape drive types, around 120MB
www.sybex.com
Why Do We Do Backups?
507
www.sybex.com
508
Chapter 12
FIGURE 12.2
FIGURE 12.3
Software
To go along with your new tape backup hardware, you need to select some
tape backup software so you can begin backing up your servers. Just as there
is quite a bit of diversity in the backup hardware arena, so it is with backup
software. In order to make a well qualified decision, you must make some
elementary determinations, as listed below:
What are your backup needs? Do you need to back up the entire server,
including the OS? If you have the OS installation CDs, then perhaps your
www.sybex.com
Why Do We Do Backups?
509
www.sybex.com
510
Chapter 12
campus in Chicago and one in Minneapolis, the two of which are connected by a moderate-speed wide area network (WAN) circuit, it may
not be prudent to install only one backup server if there is a need for
backups at both sites. As you begin to drag backup data across the
WAN link, youll see a very definite slowdown in the total throughput
of the backups and you may even find that youre not able to finish
backing up everything in a single night.
By placing backup servers at both your Chicago and Minneapolis locations, you take the WAN circuit out of the picture. We like to say that
youre performing backups locally, meaning that youre not obtaining
backups from servers on the other side of the wire.
Who will manage the backups? Tape backup systems are far from
set it and forget it. You must have at least one person whose job
includes the daily checking of the backups to make sure theyre running OK. This persons duties will involve reading the logs that were
generated as the backups ran, changing tapes, labeling and storing
tapes, and other operations pertaining to the smooth running of the
backups.
Do you have disparate systems that need to be backed up? In some
networks you have UNIX, Linux, Windows, NetWare, and other systems
all running together in some degree of harmony. Its possible, depending
on the network, that a single set of backup administrators are responsible
for maintaining backups on all the systems and, in fact, might be required
to back up all the systems onto a single set of tapes! All of this means that
the administrators must have a robust understanding of each of the Network Operating Systems (NOS) involved, and also of the connectivity
thats required to connect the system with the backup software for proper
backing up. In some cases an add-on module may need to be purchased to
go along with your regular backup software so that you can back up these
disparate systems.
Often, when setting up backups, you can start off very simply and use the
backup software that came with the NOS. My experience is predominantly
in the Windows NT and Windows 2000 (W2K) world so Ill use the W2K
software as my example. Keep in mind that other network operating systems
might have their own backup solution or might require you to purchase
third-party software.
In the W2K case, a program called NTBACKUP.EXE comes with the software.
Its not very robust, meaning that you cant purchase add-on modules for it or
do anything fancy, but if you ordered a server with a tape drive attached to it and
www.sybex.com
Why Do We Do Backups?
511
youre going to run Windows 2000, you could easily use NTBACKUP.EXE to handle the backups on that computer and youd have very few issues. You could
even back up your Microsoft Exchange installation with NTBACKUP.EXE. There
are lots of shops out there that use NTBACKUP.EXE.
But lets say that your shop is bigger than that. Youve got a dozen servers,
for example. If you ordered all 12 servers with a tape backup drive in them
and you planned on using NTBACKUP.EXE, then your backup program might
grow arbitrarily large. While its possible for NTBACKUP.EXE to back up
other servers on the network, you might have a throughput problem or a
media space issue, so you might decide that 6 out of the 12 boxes will now
do nightly backups. Thats great except youre changing 6 tapes and reading
6 sets of backup logs each morning. There has to be a better way!
If you purchase tape backup software and install it on a dedicated backup
server whose tape drives have been sized according to your networks
backup requirements, then you have a situation where youre managing
things from a single system, you have a single set of logs to read, and a single
set of tapes to manage. Sounds very easy, doesnt it? But managing backups
is an operation that will require a great bit of your or someone elses time on
your network. You cannot neglect the routine care and feeding of your
backup installation.
If youre new to server administration, perhaps not having even gotten a job
in the industry yet, please dont be surprised or discouraged to find that your
first job involves managing the networks backup system. Oftentimes this job
is so tedious, methodical, and unchallenging that its left to junior admins to
accomplish. Yet there is no more important job than that of backing up the
network.
www.sybex.com
512
Chapter 12
What kind of support will I get with this software? Can I live with 9:00
A.M.6:00 P.M. PST support, or do I need something more realistic?
Do I have to pay for support for this product? Some companies charge
money for additional levels of technical support for their products.
Trust me on this, you will be calling the support desk for help from
time to time.
Does this software product play in the sandbox with all of my NOSs?
Oftentimes its not advisable to go down a road where youre providing one
software product for one platform and a different product for another. Try
to stick with one brand of software in multiple NOS scenarios.
Are there drivers available for my NOS and my chosen backup device?
Its highly important to make sure that the software youre buying has
drivers that come with it that allow it to talk to the backup device youve
purchased. Its also wise to upgrade the drivers after youve installed the
www.sybex.com
Why Do We Do Backups?
513
software and gotten it working with the device. Upgraded drivers often
contain fixes for known problems with previous device driver versions.
Backup Security
You also have to plan on having a place to securely store your backup tapes
once youve begun a routine backup program (which well discuss in the next
section of this chapter). There are two or three different things you need to
think about when considering what youre going to do with all of the tapes
that begin to accumulate once the program has gotten going.
First of all, its not wise to keep your backup tapes all in one place. Think
about it. Whats the purpose of a backup tape anyway? To restore in case the
files need to be put back. Well, what happens if, God forbid, the building
burns down and your tapes burn down with it? You can buy another server,
but you cant buy the data thats on those tapes, can you? So its prudent
(and commonsensical) to somehow move a block of your most recent tapes
offsite for safekeeping.
There are a variety of methods for doing this. Ive seen everythingfrom
one man who put the backup tape in his backpack and drove it home (on his
bike) with him to his house each night, to companies that pay for a regular
service that comes to your door, picks up your tapes, and takes them to a
secure offsite storage location, and everything in between. This decision is up
to you and depends largely on the size of the backup operation and your need
for the security of the data thats on those tapes. But you can be sure that
when you consider backups, youd better plan on some sort of offsite storage
simply as a disaster recovery option if for no other reason.
Lets say that you come up with a solution where you rotate last weeks
backup tapes offsite and keep previous weeks tapes onsite in the server room.
Provided the data on the tape is any good, that scenario would provide a safe bet
that you could restore your servers up to last weeks business if something catastrophic happened, such as the fire I described above. You might not be able to
restore any historical data (because it was on the tapes that burned with the rest
www.sybex.com
514
Chapter 12
of the buildingthe only thing you have are last weeks tapes that are currently
offsite), but you could at least get the company up and running on last weeks
stuff. Question: Is last week OK with your CEO? My guess is that she would
probably be more satisfied with restoring the business as close to the time at
which the catastrophe occurred as is possible.
So, in addition to last weeks offsite tapes, its beneficial for you to figure
out what to do with this weeks tapes and the historical data thats on tape.
You generally want this weeks tapes to be available on quick notice in case
you need to perform a restoration, but you want them to be safe too.
You can consider a fireproof data safe for this weeks tapes. Fireproof data
safes can handle a fire for one or two hours (depending on the safes rating) at
a certain temperature. Beyond that, the data in the safe isnt guaranteed to be
protected. Nevertheless, in an enterprise that takes its data seriously, a fireproof data safe is a good thing to invest in for the security of tapes that need
to be highly available. There are some major players in the data safe realm:
Schwab, Chubb, and Fireguard are three good names in fireproof data safes.
What about the historical data? Magnetic media such as tapes have a tendency
to lose (for lack of a better word) data after theyve sat around for years. As time
wears on, Im not sure you could guarantee that a tape will be as pristine as it was
the day you took it out of the drive and put it into its permanent slot. As heat, dust,
magnetism, humidity, and who knows what else work on the tape, it becomes less
and less reliable. Thats not to say that all tapes will go bad, but it is to say that
youre playing on a wider margin as the tape gets older. So what should you do
about this situation? Consider copying the tapes to a more permanent storage
source, perhaps CDs, as they get older. You could still keep the tape around as a
backup, or simply store the CD and throw the tape away.
Backup data storage service companies are worth considering. There are
two basic iterations of these companies today: media storage companies and
Internet storage companies. With media storage companies you pay a
monthly fee for someone to come pick up your tapes and take them to a special offsite location. Then, when you need a tape, you give the company your
ID number (you wouldnt want just any old body picking up one of your
backup tapes, would you?) and they deliver the requested tape to you. Youll
pay a fee based on a sliding scale for tape requests that are required more
quickly than others. For example, if youre willing to wait 48 hours for the
tape, there will be no charge. But if you need the tape in 24 hours, youll be
charged a fee. If you need it in 4, youll be charged a higher fee, and so on.
An example of this kind of company is Iron Mountain (formerly Arcus)
(www.ironmountain.com).
www.sybex.com
Why Do We Do Backups?
515
You can also opt to use an Internet storage company to back up your data
directly to servers located on the Internet. This sounds less secure than it actually
is. There are ways of setting up server security so that only given individuals can
access an Internet server, thus providing a way for a company to contact the
server and begin backing up data. The data probably wont stay on the server,
and will be moved to an internal location, but the Internet server provides a contact point. Using an Internet company for your backup services gets you out of
the nasty business of buying, installing, and maintaining tape backup devices
and software, but its not a suitable paradigm for larger enterprises
simply because of the enormous quantity of data that needs to be backed up.
Visit Committed to Memory (www.macbackup.com) for an example of a company thats in this business (and note that this site isnt dedicated strictly to backing up Macintosh computers!).
Theres even a Web site dedicated to researching and recommending companies that act as an Internet Backup Site (IBS). Visit http://www.dantz.com/
index.php3?SCREEN=ftpproviders#criteria for a review and recommendation of some companies that are participating in the IBS arena.
www.sybex.com
516
Chapter 12
Once youve gotten a backup solution put together, you next need to sit
down and figure out what backup type youll use and what kind of backup
rotation method youll use. Lets start by discussing the various backup type
options that you have.
Backup Types
There are three basic backup types that most backup administrators are familiar
with. Microsofts NTBACKUP.EXE program considers two other backup types. In
order for us to delve further into this topic, we need to understand that files have
www.sybex.com
517
a bit in the file header called the archive bit. Usually when a file is being worked
on, the archive bit is set to false (0 or off), meaning that no backup has been performed on the file. When a backup is performed, depending on the type of
backup being performed, the archive bit may be set to true (1 or on). This bit can
act as a flag to the backup program, allowing it to avoid backing up files whose
archive bit has been set to true.
It should also be noted at this time that if a file is being held open by an application, that file probably will be skipped by the backup operation and an error
logged into the backups logs. You can purchase software that allows backups
to take place even when a file is being held open. Most backup software vendors
sell such add-on open-file modules with their product offerings.
The most common backup types are listed as follows:
Full Backup All files that have been selected for backup are backed up,
regardless of any previous backup state, i.e., whether the archive bit has
been set. It doesnt matter whether the archive bit is on or offon a full
backup, the file will be backed up anyway (unless its being held open by
a process). Note that in NTBACKUP.EXE this operation is called a normal
backup.
Incremental Backup Incremental backups (Ill call them incrementals
for short) are funny birds. Only the files that have been created or have
changed since the last full or incremental backup will be backed up. The
archive bit is set in an incremental backup, but the files date and time
stamp is checked each time the backup is run. The system says, Hmmm,
I see that the files archive bit has been cleared, but I also see that the file
has changed since last backup and it backs it up. Incrementals are a
good way to save on the time it takes to accomplish a backup.
However, theres a caveat. In order to perform a restoration on an application or system, you may have to have several tapes, up to and including the
last full backup. Think about it this way. On night one you perform a full
backup. Night two you perform an incremental. Some of the files in a given
folder dont change; others do and theyre backed up. Night three, ditto. Day
four the system goes down and you find that you have to restore the entire
folder. Night threes tape doesnt have some of the files you need for the restorationtheyre way back on night ones tape because they havent changed
since the last full. So you have to have at least two, perhaps all three tapes to
make a complete restoration work. While you save time running your nightly
backups, the tradeoff is that restorations become more complex.
www.sybex.com
518
Chapter 12
www.sybex.com
519
Some backup systems keep the catalog on the tape, while others keep the catalog
in a database on the backup server. Catalog referencing is much faster when you
dont have to read the tapes header to find out whats on it, so its to your benefit
to keep catalogs on disk instead.
Another interesting option that most backup software programs offer is the
option to verify the contents of the tape after backup. This is a handy thing to
have, but takes up a lot of time. In shops where youre barely able to complete
your backups as it is, oftentimes youre faced with the option of not verifying the
data thats on the tape. Note that with database modules there is oftentimes an
option to check and perform a consistency check on the database prior to
backup and after backup. You can select one or the other or both. Just as with
verify, a consistency check takes time, thus slowing down your backups.
Day 1
Day 2
Day 3
Day 4
Day 5
Day 6
www.sybex.com
520
Chapter 12
When the week is up, you put these tapes in a fireproof storage vault
somewhere on site and then begin working with the father set, as shown in
Figure 12.5. Be sure to label these tapes differently than the grandfather set
so you can differentiate between them!
FIGURE 12.5
Grandfather
Day 1
Day 2
Vault
Father
Day 1
Day 2
Day 3
Day 3
Day 4
Day 4
Day 5
Day 5
Day 6
Day 6
Once the father set is done, rotate the grandfather set offsite, put the
father set in the storage vault, and begin using the son set. See Figure 12.6.
FIGURE 12.6
Father
Day 1
Day 2
Vault
Grandfather
Son
Day 2
Day 3
Day 3
Day 4
Day 4
Day 5
Day 5
Day 6
Day 6
Day 1
Day 2
Day 3
Day 4
Day 5
Offsite
Day 1
Day 6
www.sybex.com
Disaster Recovery
521
At the next backup you bring the grandfather set back onsite, the father set
goes offsite, and the son set goes into the vault. Youre all set and youve got
a GFS rotation in play. If the sky falls in and you need to perform a restoration,
at the very worst you can fall back to the week before lasts tapes. If the tapes
in the vault are secure, you gain a weeks worth of data.
Other tape rotation schemes basically follow the same kind of thinking,
but might involve lots more tapes and thus days that can elapse between set
changes, and different times when you take things offsite. You might add a
couple more sets to the rotation so that, instead of three different sets, you
have five and can extend the time that the tapes are offsite in the vault. Tape
rotation schedules are relative to the amount of money you have to spend
and the time you can put into designing a well thought out rotation schedule.
Disaster Recovery
www.sybex.com
522
Chapter 12
www.sybex.com
Disaster Recovery
523
www.sybex.com
524
Chapter 12
To Network
Heartbeat
Node 1
Node 2
Data vault
Now lets consider DR. If the building had a natural gas leak and
exploded in the middle of the night, how many servers would be available for
you to begin restoration operations? The answer, of course, is zero. So clustering doesnt qualify as DR, but it does qualify as high-availability. Lets
take the cluster scenario a bit further. Suppose that you had a second identical cluster setup in a different building and the two clusters were connected
together by a high-speed cable (such as fiber optic running gigabit Ethernet
or ATM OC-3) and you had some software set up to copy the contents of the
data vault to the second data vault in the other building on a regular basis.
Figure 12.8 shows this scenario.
www.sybex.com
Disaster Recovery
FIGURE 12.8
525
To Network 1
Heartbeat 1
Node 1a
Node 2a
Data vault 1
Big fat WAN pipe
(e.g. gig-ethernet, OC-3)
Data vault 2
Heartbeat 2
Node 1b
To Network 2
Node 2b
To Network 2
A scenario such as this is, as you might imagine, incredibly expensive and
includes ongoing charges such as the monthly WAN connection fee between the
two computers, not to mention the cost of the gear. However, the question of
what to do in a disastrous situation where the companys very existence hinges
on the availability of its data is key as to whether to spend the bucks or not.
You can find contractors that specialize in assisting companies with DR plan
formulation and implementation. There are people who make a living working with this stuff and theyre very knowledgeable about the latest and greatest techniques and equipment. One of the better-known DR companies is
EMCvisit them at www.emc.com.
www.sybex.com
526
Chapter 12
The site thats the primary sitethe one doing the daily workis called
the hot site. The site that acts as the repository for the backed-up systems is
called the cold site.
Poor Persons DR
The poor persons DR involves making two fundamental decisions:
Come up with a comprehensive backup plan, rotate the tapes offsite, keep
current tapes in a fireproof place, and religiously monitor the backups for
good quality and restorability. Include a copy of installation media
(Linux server, NT, W2K, or NetWare CDs, for example) offsite.
While going through the DR exercise its a good idea to tackle the high-availability
situation with your current group of servers as well. Think redundancy. RAID 5
array controllers, backup hot-swap disks, redundant power supplies and cooling
fans, and so forth are good things to have in servers.
Testing
And now for the most important part of DRtesting. In the mainframe environment there are companies that will actually act as a DR cold site for other
companies. These companies will host a once-a-year mock disaster test to see
if everythings working as planned and the DR methodologies that have been
put in place are working.
Listen, take a cue from mainframe peopletheyve been doing things like
this a long time and theyve got the bugs worked outtest, test, and test
some more your DR plan. Set up a once- or twice-a-year DR test to make
sure its working and modify according to anything new that might impact
the plan (new servers, etc.). Provide lots of DR care and feeding.
You should test restorations from time to time as well. Its like ice-skating.
If you buy a pair of ice skates and put them on from time to time, youve
proven that you can put the skates on, but you havent proven that you can
skate. You need to get out there on the ice with your restorations, especially
database restorations, and practice doing them so that when it comes to
crunch time youre not going to look like a fool because youre having to go
www.sybex.com
Summary
527
Summary
www.sybex.com
528
Chapter 12
We talked about fireproof data safes and offsite storage, and combined those
notions with rotation schedules that keep part of the tapes onsite and part offsite
so that if anything happens to your facility, youll have some backup tapes that
werent harmed. An offsite tape backup operation formulates the beginning of
a disaster recovery model and, indeed, is the model in place in most businesses.
Disaster recovery asks the question, To what level of business should I be
able to restore my companys operations in the event of a disaster? Depending
on the money you have to spend and the seriousness that is placed on DR by
managers, you could wind up spending some healthy cash to get a DR scenario
going. You could have, for example, a mirrored set of DR servers, one at your
primary location, a second set in a geographically separate location, connected
together by a high-speed wire. We talked about clustering and how it is not DR
but high-availability, and we alluded to the fact that high-availability plays into
DR schemes but also works in non-DR server designs.
Exam Essentials
Know and understand backups. Know what verifying a backup means
and how to perform a regular backup. Understand what backup rotation
schemes are and why you use them.
Be able to identify different types of backup hardware. Understand the
difference between 4mm DAT, 8mm helical scan, and DLT (and possibly
Mammoth) drives. Understand that the time to back up varies between
these different offerings and that the storage capacity varies as well.
Understand backup security. Take tapes offsite, lock tapes in vaults
onsite, assign passwords to tapes, lock backup hardware up in secure rooms.
Confirm and use offsite storage for backups. Understand why youd use
offsite storage and the various options available to you for offsite storage.
Identify hardware replacements. Understand that there may be
replacements you have to make to your current computing gear in
order to a facilitate a backup operation (such as adding a SCSI card to
the system, for example) and to provide for high-availability.
Document and test a disaster recovery plan. Be able to understand why
and how you document disaster recovery and why you periodically test it.
Know what hot and cold sites are.
www.sybex.com
Summary
529
Key Terms
Before you take the exam, be certain you are familiar with the following terms:
backup
cluster
Digital Audio Tape (DAT)
Digital Linear Tape (DLT)
disaster recovery
failback
failover
Hierarchical Storage Management (HSM)
near line
restore
Storage Area Network (SAN)
single point of failure (SPOF)
www.sybex.com
530
Chapter 12
Review Questions
1. Which of the following are considered backup methods?
A. Copying from one disk to another
B. Copying from disk to an alternative media such as CD
C. Copying from one server to another
D. Cluster server
2. Which of the following tape drives is the fastest, in terms of data I/O?
A. 4mm DAT
B. 8mm Helical Scan
C. Digital Linear Tape (DLT)
D. Mammoth
3. Which of the following drives can hold the most data?
A. 4mm DAT
B. 8mm Helical Scan
C. Digital Linear Tape (DLT)
D. Mammoth
4. When setting up a DR plan, who are the stakeholders of the system?
A. The owners of the various systems
B. Server administration team
C. Users of the system
D. Executive management
www.sybex.com
Review Questions
531
Server 5.5 loaded on the computer. You want to back up the Exchange
Information Store (IS)the actual e-mail data. What tools can you use
to accomplish this?
A. NTBACKUP.EXE.
B. Third-party backup software that includes an Exchange module.
C. Stop Exchange and perform a cold backup.
D. Use NTs EXCHBKUP.EXE utility.
7. Ferdinand is reading the nightly backup event logs and runs across
onsite?
A. 0
B. 1
C. 2
D. 3
www.sybex.com
532
Chapter 12
backed up.
D. Check the tape drives polling accuracy.
10. Youre the administrator of a small network of 100 users. You have
two servers. Youre setting up your backup plan. What backup type
should you select if you want to ensure complete daily backups?
A. Normal (full)
B. Incremental
C. Daily
D. Differential
11. When would you use a differential backup type?
A. When the amount of data being backed up is too large.
B. When you have different operating systems youre backing up.
C. When you are backing up databases.
D. When the files dont change very often.
12. What can you do to prevent people from stealing a tape and somehow
www.sybex.com
Review Questions
533
13. Suppose that you needed to run several tape backups simultaneously.
www.sybex.com
534
Chapter 12
18. You have a group of files that are constantly being held open during
backups and your backup software simply skips them and moves on.
What can you do to solve this problem?
A. Stop whatever it is thats holding them open during backup time.
B. Purchase an open file module for your backup software.
C. Stop all services or daemons before proceeding so youre sure
back it up anyway.
19. Youre a new server administrator in a very small NT shop. You know
that you need to get backups going, but money is tight right now. One
of the servers has an internal 4mm DAT tape drive and you have some
spare tapes. What can you do?
A. Download the eval of your proposed backup software from the
are running
C. Because they consume network resources while running
D. Because all network services stop while they run
www.sybex.com
535
drive is fastest, in terms of data I/O, but is proprietary to Exabyte Corporation, which may or may not be OK with you. The DLT, the design
of which is licensed to many different corporations, is second fastest.
3. C. At the current storage capacity of 70GB, the DLT is by far the one with
the most data capacity. The 8mm can hold around 710GB, the 4mm 10
25GB, and the Mammoth 14GB. Keep in mind that theres a difference in
whether you choose to compress the data with your backup software or
not. If you dont compress, the tape will hold less than if you choose to
compress.
4. A, B, D. Anyone who has a vested interest in a system should be con-
sidered a stakeholder. Stakeholders will change from system to system. Users arent typically the stakeholders, though theyre certainly
involved when a systems down. Server admins will always qualify as
a stakeholder on each system. Executive management has a vested
interest because without the systems they wont have a company!
However, executives may or may not be involved in the DR planning. They probably will be involved in okaying the purchase of the
DR gear.
5. D. Youll not have validated your backup methodologies until you can
www.sybex.com
536
Chapter 12
not be able to back up the Exchange databases (the Directory Store [DS]
is considered another Exchange database). A later version of NTBACKUP
.EXE (one that comes with Service Pack 3 or above) includes updates to
[NTBACKUP.EXE] that can back up the IS and DS. Alternately, you
could investigate to see if the backup software youve chosen supports
Exchange backups, either natively or through the purchase of an add-on
module. You could also opt to stop the Exchange service and back up the
databases, but restoration using this method is sketchy at best. There is no
such thing as EXCHBKUP in NT.
7. B. The most likely cause of such an error message (I made it purposely
nebulous so you wouldnt be able to identify any one commercially available backup software product) is that the file is a database thats being
held open by a person or process. Files can be held open toothe most
notorious one being an Outlook users personal e-mail folder file (called
a PST). Typically these error messages are not ultra important unless
you absolutely require a complete backup of that file on a routine basis.
You wouldnt get the message with answer Aif the system doesnt see
a file to back up, it wont put up the above error message. Item C is a possibility, though not one Id check first. If you had a server down, youd get
a different error message (Server 3 cannot be contacted) than the one you
currently have.
8. C. Typically youll have one set thats this weeks current set. Youll
have a second set kept onsite for quick reference and a third set thats
kept offsite. The onsite set should be kept in a fireproof vault.
9. C. When you run a verification operation within your tape backup
www.sybex.com
537
10. A. The full backup operation is the one youd select to get a complete
backup of the system each night. With two servers you probably dont
have to worry very much about too much time being taken up backing
up the systems. A daily operation backs up all files but doesnt set the
archive bit. Incrementals back up those files that have changed and
sets the archive bit on those files. Differentials back up the files that
have changed and dont set the archive bit.
11. A. Typically, differential backup operations are used when youve got
so much data to back up that you cant possibly get it all backed up in
an evening to a single system (perhaps with multiple tapes or tape
drives).
12. A, B. You can add security to your backup program by making sure your
tapes are locked at all times (preferably in a fireproof vault) and by setting
passwords on the tapes so not just anybody can look at them.
13. B. Tape libraries are designed to hold hundreds of tapes (in some cases the
tapes can even be of different media types) and house several tape drives.
Thus you can run multiple backup jobs simultaneously and archive the
tapes within the unit itself. The Storage Tek 9710 device is an example of
such a tape library. The robotic arm is fun to watch and really impresses
visitors.
14. B. Without a doubt, answer B is backups main purpose. As an admin
youll have users requesting a restoration off of tape all the livelong
day. Taking backups does provide the things talked about in items A,
C, and D, but a backups real use is for restorations.
15. A, B, C. Hierarchical Storage Management (HSM) allows for data thats
www.sybex.com
538
Chapter 12
move in the next weeks set. Youre striving for a routine regular backup
operation.
18. B. Youll see this kind of thing happen with files that users run off and
leave open for the night or with applications that have files open but
which you need to back up. Some of these files may or may not be
important to back up. You can use an open file module for your
backup software to help you back up open files such as this.
19. C. NTBACKUP.EXE will work fine for you. It will bypass open files, so
youll need to plan for that if the files are important to back up, but for
most things it works fine. NTBACKUP.EXE wont back up databases
other than Exchanges IS and DS. Copying the data to CDs is an OK
idea as well, but is resource intensive and besides that, you already
have the tapes and backup drive available.
20. A, C. Backups are server intensive and can also be network intensive
www.sybex.com
Chapter
13
Troubleshooting and
Problem Determination
6.1 Perform problem determination.
Locate and effectively use hot tips (e.g., fixes, OS updates, Esupport, Web pages, CDs).
www.sybex.com
www.sybex.com
For complete coverage of objectives 6.1 and 6.2, please also see Chapter 7.
Problem Determination
www.sybex.com
542
Chapter 13
And you can do this all while youre on the phone with your user. It doesnt
take you more than 20 seconds to figure out that shes not accurately describing
the problem. So now you need to begin with a questioning section. What do
you mean, the networks down? you might ask. It is then that she tells you that
she just tried to print a document and its not printing. Perhaps you know this
person, and her computing environment, and you happen to know that she
prints to a printer that hangs out on the network, not on her local PC. Aha!
There may be a problem there. So you quickly ping the IP address of the
printerBoom! It comes right up. Hmmm. That means that its online and has
paper in it.
Is the time being displayed down in the bottom right corner of your computer? you ask her. Shes thinking youre crazy because youre asking about the
time and shes talking about a printer. But little does she know that youre trying
to figure out where the toolbar is at on her PCits movable and some users
move the darn thing all over the place. Yes, I see the time, its 3:13, she replies.
Do you see a little icon of a printer down there as well? you ask. Yes,
I do, she replies.
Can you double-click that icon for me? Id like to find out whats going
on with the printer. She does and you see that the print job is being held for
some reason. You walk her through deleting the current print job, and then
take some more time and work with her to figure out exactly how shes printing the document she wants to print. It turns out that she has selected A4
as the paper type to use, but youre in the United States. A4 is a European
paper type and wont work well with printers that are using paper sized for
U.S. printing. And in fact, if you were to visit the printer while her print job
was in the queue, youd see that the readout on the front of the printer was
prompting you to insert A4 paper.
You walk her through the steps of changing the paper selection to regular
U.S. 812-inch by 11-inch portrait and she prints it with no further problems.
Its very important, when dealing with users, to ask questions that are
fundamental. You need to work hard to communicate with users in nontechnical language and ask the right questions. I cant tell you how many
times Ive heard the phrase, the networks down, when it wasnt the network at all; it was a server that was down, or a printer, or even the telephone system. Users just dont understand all of the complexities of a
networkall of its piecesand are likely to lead you down a bunny trail
that you wont need to go down if you ask very pointed questions.
www.sybex.com
Problem Determination
543
Observing Problems
But what about when youre troubleshooting a server or network problem?
Theres no one to questionyoure all on your lonesome. You put your keen
powers of observation to work. If the servers down, exactly how is it down?
Sometimes servers are actually fully operational, but theyre responding to
one single request and its so large that theyre completely tied up. In a situation such as this, youll be able to log on to the server, but it will be moving
extremely slowly. Clearly you have something wrong, but youre not sure
just yet what it is.
Alternatively, the server might be at a stopped state and displaying an
error message. They call this the famous Blue Screen of Death (BSOD) in the
Windows NT world, but Ive seen the same sort of thing on NetWare and
Vines servers as well. Its up to your Sherlockian observation powers to note
the nature of the error and any stop codes that may be displayed on the
screen so you can find some resources that reference them, figure out what
went wrong, and correct it.
On the other hand, suppose that the server console comes up just fine and
everything looks peachy. Ah yes, but can you ping from the server console to
another host? And can you go to another host and ping the server? This is the
way that you can test network connectivity, to make sure the box is alive and
well on the network and able to take calls.
Perhaps theres a very basic problem, like the network cable is unplugged.
But you need to be cognizant that there is not only a network cable running
from the computer to the patch panel, theres also a cable running from the
patch panel to a port on a switch, hub, or router. So youve got several places
where connectivity may have gone bad. If you cant ping the host, you know
youve got a network issue of some kind, but you dont yet know what kind
it might be: hardware or software. Precisely where should you begin checking?
Youve got the network card and its drivers, the cabling, switch port, and
name server resolution to check before you can rule anything out.
Identifying Contacts
Hang with me a bit further down this road, if you will. Suppose that the server
pings fine, both out and in, its network cable is attached, and the network card
looks OK and comes up just fine. There are no apparent problems with this
unit. What then?
www.sybex.com
544
Chapter 13
Then its time to get another face to look at the problem. Perhaps you
need an internetworking (router) person to take a look at the network to see
if anythings happening. Or maybe you need to place a call into a support
entity to see if they have any fresh ideas for you to look at.
Its important, especially when youre new to supporting servers and
users, to establish some basic support contracts with the people that have
provided your NOS and user software solutions. You need to have a place
where you can go to ask basic questions right on through to the question that
makes the support engineer on the other end of the line scratch his head.
You can also use human networking to establish some support peers.
Dont be afraid to call a buddy who works in a different company to ask her
if shes ever run into a given problem. Youll be surprised at the kind of
knowledge that people rack up over time.
You can also resort to newsgroups for some answers. But the point is that
you need to be able to identify the places you can go for the help you need.
No person is an islanddont fall into the trap of thinking that, because
youre in the server admin shoes, you cant say, I dont know. Thats the
most foolhardy of mistakes and there are a lot of admins out there who are
that way.
www.sybex.com
545
www.sybex.com
546
Chapter 13
www.sybex.com
547
Should you consider having a laptop that has some sniffing software loaded
on it for the purpose of periodically sniffing the network? Personally, I
would leave this kind of thing to internetworking experts whose job it is to
understand the nuances of the traffic flowing over the wire. Internetworkers
will likely have a dedicated Trivial File Transfer Protocol (TFTP) box sitting
around that allows for the updating of firmware code on the routers and
switches in the network.
All that highfalutin stuff being said, here are some very reasonable hardware things that you should be looking at in your troubleshooting efforts:
NICs Most network interface cards (NICs) today come equipped for either
10 megabits per second (10Base-T) or 100 megabits per second (100Base-T).
As a consequence of that, there will be a 10 and a 100 LED on the NIC (along
with an activity LED) that you can view from the backside of the computer.
Believe it or not, these LEDs are quite useful in figuring out whats going on
with your servers participation on the network. You think the NIC is set for
100, but the 10s light is flashing.
You encounter a problem when youve got a switch, whose port the server
is connected to, which is hardwired for 100Base-T full duplex. The NIC
is at 10, the switch port is at 100things are very confused. As a general
rule of thumb, switch ports should exactly match the NICs settings and
you should never go with autodetect on either the NIC or the switch port.
Ive found that autodetect tends to select the least common denominator:
Everything seems to default to 10Base-T half duplex and your server runs
like a tortoise. You usually cannot tell from LEDs if a switch port is set for
10/100 or autodetect.
Server Interfaces Servers today are shipping with readout interfaces that
describe basic characteristics about the servers health. For example, on a
typical server boot, youll see the readout on the front of the server panel
telling you whats going on as it boots. The text wont be verboseyoull
typically see messages such as booting from CMOS, but at least youll
have a clue. When a servers got an issue, you might be able to view the
problem from the servers readout. On some servers the readout even has
an elementary menu system that you can move through to assess basic
server health. Printers have a similar readout.
www.sybex.com
548
Chapter 13
www.sybex.com
549
Server BIOS Just as you may have to adjust a RAID cards BIOS, so you
also have a server BIOS that may need adjusting. Two of the more interesting
and common problems you can encounter that show up as errors on the software side of the server but are adjusted on the BIOS side are the automatic
PCI IRQ feature and the default enabling of COM1, COM2, and LPT1. Both
of these features have to do with hogging IRQs that a different component in
the system needs. A server whose PCI slots are automatically set to grab an
IRQ number when a device is inserted in the bus can be really tricky to troubleshoot. Lets say that you have a NIC that youve hardwired for IRQ 5 and
now youve installed a PCI sound card. Its highly possible that the sound
card will use IRQ5 because all other IRQs are in use, even though youve got
a NIC sitting out there on IRQ 5. There may be a COM port problem with
a modem and a NIC, for example.
If you know for sure that your server will never have a modem or a printer
attached to it, you can save some IRQ difficulties by disabling the COM1,
COM2, and LTP1 ports within the system BIOS. This frees up IRQs for
other devices that you may need.
With the possible exception of a workstation being used as a server, servers
dont come equipped with USB ports.
TCP/IP Software Regardless of the NOS, you can use the TCP/IP software
thats installed to perform some basic diagnostic tests. Some, if not all, of the
TCP/IP commands are available for the NOS, though there are some deficiencies (nslookup, for example, isnt available on NT servers that dont have
certain service pack levels applied). On the whole though, the ping and
tracert commands are natively available on each NOS.
Shutdowns
Its important to understand how to perform a graceful (i.e., orderly) shutdown of a system. If you just arbitrarily walk up and hit the power button
on the computer, you stand a really great chance of harming some operation
that the computer may have been in the middle of. While software developers are getting better at writing code that accounts for abrupt shutdowns, it
is never a good idea to just abruptly power down a server without first going
www.sybex.com
550
Chapter 13
www.sybex.com
551
Keep in mind that RAID array controller cards often have RAM chips on them
that are able to keep a substantial amount of data in cache until theres a
chance to write the information to disk. If you perform a dirty shutdown (hitting the reset button), youll likely lose the information in this chip. Some
array controller cards have an option for a battery backup module to prevent
this sort of thing from happening.
www.sybex.com
552
Chapter 13
The point here is that your troubleshooting starts small, begins locally,
and then works outward. You can use this acronym, if you like: SLOsmall,
local, outward.
A key question to ask when troubleshooting is this: What has happened to this
computer (or on this network) recently that might have caused or contributed to
this problem? Youll be surprised, as you begin to ask this question, the kinds
of goofy things that youll discover that might interrupt a server or a network.
Coincidence reigns supreme in this arena, so dont take everything you hear at
face valuebut if a change was made and your server just augered in, chances
might be good that youve discovered the culprit.
www.sybex.com
553
with the OS and so when the video code was read into the system, the whole
thing halted. She unplugged the video from the Nvidia card, plugged it into the
regular video input built into the motherboard, and she was up and running.
When the machine came up she deleted the Nvidia driver, set the video parameters for the motherboard video slot, and she was away to the races.
What Im trying to describe here is that hardware components often
dont surface as a problemthe software driving the hardware acts up
instead. So, especially on new systems, you really have to be thinking outside the box when youre doing some troubleshooting. You might think
that youve gotten a software installation wrong when, in reality, the
installation went fine, but theres a driver conflict.
On the other hand, some hardware problems are easy to diagnose. When
video adapters go toes up, you have no difficulty at all in diagnosing the issue
the user is either completely out of video or the screen goes to some funky color
such as orange, purple, or all gray. When network cards physically go bad (a
pretty rare occurrence), the user will just not be able to connect to the network.
There are rare occasions when NICs go bad and they begin to chatter on the network. This problem can be maddeningly difficult too, oftentimes requiring
somebody with a sniffer to detect the problem. Users typically wont have too
many issues when using a chatty NIC. Motherboards that fail take the user
down to the matno work goes on at all.
www.sybex.com
554
Chapter 13
Monitors have the same sort of problem. You really cant fix a monitor,
although its possible you may be able to take it to a specialist for fixing. One
common problem in older monitors is a device called a flyback transformer.
If a monitor has one and the thing goes bad, smoke actually comes out of the
cooling vents on the monitor and you get this sickly burning-rubber smell
wafting into the room. As a general rule of thumb, fixing a monitor is going
to be almost as expensive as replacing it and youll generally simply opt to
replace it instead. But if a monitor stops working, youll instantly know
theres something wrong, wont you?
One of the hassles with FRUs is that there are so many different part numbers
and replacement items that might pertain to the specific one you have that its
difficult to pin down exactly what an FRU is. Monitors, for example, have very
different brand names, part numbers, and so forthbut they all break down
into three standard functional categories: high-resolution graphics, low radio
frequency radiation, or normal use. Of all of the different sizes, types, models,
and styles of monitors, they all were designed to meet one of the three abovelisted needs.
This concept is also true for power supplies. Your only two concerns with
a power supply are that the new one matches the old ones output and that
the new one will fit the holes the old one came out of.
The same isnt quite as true with motherboards. Theres tremendous
diversity with these components and you need to take care that, when youre
replacing a motherboard, you replace it with the same basic feature set. Size
of the board, mounting slots, options included on the board, placement of
ports, and so forth are all common features that you have to look at.
www.sybex.com
555
www.sybex.com
556
Chapter 13
would not enter into the picture. You might, for example, contact an HP
representative if you had a Hewlett-Packard UNIX (HP/UXfondly
called Hockey Pux) box sitting at a system stop state.
System errors also occur while a system is running and continues to run.
Ive seen servers that put up virtual memory errors because too many
applications or threads of applications were running at the same time.
This is indicative of a RAM-starvation issue (and/or bad code that doesnt
clean its memory pool up when done) and needs some attention.
www.sybex.com
557
www.sybex.com
558
Chapter 13
If you have no luck, hit the newsgroups and try the Web search engines for
help. Also try asking others that are in the business if they have ever run into
what youre seeing. Oftentimes someone else will have encountered this
problem before and might have a recommendation for you. On the other
hand, Ive been in situations where Ive been told: Gosh, Ive never seen that
before! Let me know what you find out!
Some admins never get to this stage, but Im not allergic to opening support
tickets with the company that manufactured the software or hardware product
in the first place. You might have to pay for the supportthats all right. Dont
let your ego get in the way of opening up a support incident with a technical support department if youre at the end of your rope. Be advisedsome companies
have extremely good support, others are terrible at it, so youre not necessarily
guaranteed an answer to your question.
Support tickets dont work well if youve got some brand-new software
on a computer that your NOS vendor wont support or youre working with
some unknown hardware that the support department knows nothing
about. In situations like this you tend to get into finger-pointing contests
where the support technicians for the NOS point to the hardware vendor and
the hardware vendor points to the NOSyoure the one left holding the bag.
www.sybex.com
559
The company finally worked with some Microsoft support specialists who had
experience in removing NDS for NT to remove it from the DCs, reinstating
them back to their original System Account Master (SAM) database. But what
a headache from the support perspective!
Moral of the story? When considering upgrades, especially third-party
upgrades to known network operating systems, check, re-check, and check
again to make sure that youre getting what you think youre getting and
that therell be no support issues down the road.
you know youre in over your head, get assistance right away.
3. If the problem cant wait, then do a quick check of the resources you
two hours for a server issue, then cut bait and call the technical support
people to open a trouble incident.
www.sybex.com
560
Chapter 13
www.sybex.com
561
www.sybex.com
562
Chapter 13
Whenever theres a computer and some software involved, you very much run
the risk of experiencing a problem, and wake-on-LAN is no different.
What are some things that could go wrong? Well, they start out at a very
elementary stage and work their way up. Lets go over some of the more
likely problem candidates and how youd go about solving them:
NIC card not waking up PCEither the PCs client isnt loaded or the
card is bad or misconfigured. No choice but to have someone power
the computer on for you, then check the problem later.
NIC card working and you can ping the host by namePerhaps the
client computer is a Windows-based preWindows-2000 computer
running NetBIOS. You cant ping the host by name, but it shows up
in Server Manager. Is the computer actually running TCP/IP or does it
only have a different protocol such as NetBEUI or IPX loaded? Note
that you wouldnt be able to contact the computer at all if you didnt
have that same protocol loaded in your stack as well.
www.sybex.com
563
modicum of fault tolerance. If the first NIC fails, then the other one will take
over. This means that youll have to have a network cable run to each NIC
and that both connections are operational.
A second workaround involves purchasing management cards for your
servers. When you purchase a management card, you burn a port on the
motherboard, but you obtain a functionality thats very cool. You can call
the card directly by phone, walk it through its configuration settings, and
even watch the machine go through its OS boot sequence. Theyre very
sophisticated. So when a wake-on-LAN NIC fails, if youve got a management card in the server you could call the card and check to see if you can
spot why the server isnt booting.
www.sybex.com
564
Chapter 13
to allow everybody who wants the use of VNC to remotely control their computer. Think about keeping this capability well within the admin bounds.
Identifying Bottlenecks
www.sybex.com
Identifying Bottlenecks
FIGURE 13.1
565
Disk Input/Output (I/O) can also introduce problems if the disk activity is
high and the capability of the disk to adequately answer requests is low. It
may be possible to utilize a NOSs performance monitoring tools or add-on
performance monitoring tools to make an educated judgment about whether
the disks are labored or not. Servers running on IDE hard drives are going to
run a much higher likelihood of being overloaded than those running on
SCSI. A SCSI disks spin speed, in Revolutions Per Minute (RPM), is critical
to know. Earlier disks ran at 7,500 RPM but new SCSI disks run at 10,000.
If youve documented a disk I/O problem, you can easily change out your
slower disks to new faster ones.
www.sybex.com
566
Chapter 13
Network I/O can be much harder to diagnose. Youll need to have a pro
who knows how to sniff the network and to provide concise information
about the nature of whats making the network bottleneck. Sometimes its
the network hardware. Networks that are still on 10Base-T hubs are in the
dark ages with todays hungry network demands and youll most definitely
have bottlenecks as users are added. You can fix lots of network problems by
adding switches, updating the wiring to Category 5, updating routers, and
taking other steps to speed up the network.
Bus transfer issues happen when youre working on older computers with
slow bus transfer speeds and utilizing the computers as servers. Lots of shops
use workstation class computers as servers. This isnt a wise choice, though
often its predicated on the amount of money available for server equipment.
Todays servers have 100133MHz bus transfer speeds and can easily handle the awesome restraints that modern networking can put on them. Thats
today, but tomorrow might be a different story. Unfortunately, watching for
bottlenecks isnt a one-time considerationits an ongoing process.
www.sybex.com
567
BIOS and turn off the COM2, COM3, and LPT1 ports. Later you find out
that an internal modem in the computer, one that used to work, was turned
off when you shut down the COM ports. Oops! The problems easy to fix,
but could be a bear to resolve if someone else is called on the problem and
isnt aware of the change you made.
The best thing you can do to cut down on these kinds of problems will be
to set up a regular communications methodology where all of the admins
communicate with one another about changes that have been made. This can
take the form of a change-management documentation sheet thats regularly
updated, weekly meetings, e-mails to one another, or whatever.
www.sybex.com
568
Chapter 13
Summary
www.sybex.com
Summary
569
Exam Essentials
Understand good problem determination and resolution techniques Be
prepared to utilize various resources at your disposal to analyze a problem
then make a determination about how to eradicate it.
Be able to power down systems Understand the difference between a
graceful and a dirty shutdown. Be able to gracefully shut down different
systems.
Understand remote connectivity issues, such as with wake-on-LAN
adapters Know what kinds of techniques you can use to rectify problems with systems that rely on remote connectivity.
Identify bottlenecks Be able to identify and eradicate system bottlenecks.
Determine if a problem is software, hardware or virus-related A first
good step in problem determination revolves around determining
whether youre dealing with software, hardware or viruses.
Maintain system documentation Good-quality system documentation,
along with a change management system, will help you perform better
trouble diagnosis and eradication.
Key Terms
Before you take the exam, be certain you are familiar with the following
terms:
paging
RAM-starved
stop codes
virtual memory
www.sybex.com
570
Chapter 13
Review Questions
1. Your servers hard drive light seems to be constantly on. What might
problem in a city 200 miles from you. The error message says, LPD
daemon halted. How can you remotely diagnose this problem and
hopefully correct it?
A. Rexec
B. Remote control software
C. Telnet
D. Ping
3. You have a computer in a remote site that is using a wake-on-LAN
www.sybex.com
Review Questions
571
ning Oracle and hit the Reset button to cycle the server. What kind of
shutdown is this?
A. Graceful
B. Dirty
C. Systemic
D. Reboot
5. You have an applications server that requires people from several dif-
ferent areas to be able to access the computer. Today the server went
down for no apparent reason and is sitting at a stop screen. What is
your first step in problem determination?
A. Write down the stop code and stop syntax (if any).
B. Talk to the people involved with the server to see if a change has
been made.
C. Reboot the server.
D. Check the manuals.
6. What are two diagnostic commands common to all computers running
TCP/IP?
A. Telnet
B. Rexec
C. Ping
D. Tracert
7. You have a server that is running very poorly. In discussing this with
other admins in your group, you find out that the NIC was replaced
last night. Where should you begin checking to determine why the
computer is running so slowly?
A. Check the NIC configuration.
B. Make sure the cable is connected.
C. Check the port speed on the switch the servers connected to.
D. Make sure the NIC driver is the latest and greatest version.
www.sybex.com
572
Chapter 13
When you try to run the FDISK utility to check the disks configuration,
youre told that the master boot record (MBR) is corrupt. What could be
the problem?
A. Bad disk.
B. Virus changed master boot record (MBR).
C. BIOS is bad.
D. OS is bad.
9. You have a server with dual power supplies in it. Lately the computer
computer you get no response back. However, when you physically visit
the machine, you find that everything seems to be operational, except that
you cannot ping anyone from the server either. What should you suspect?
A. NIC driver corrupt.
B. NIC set at wrong speed.
C. NIC cable unplugged.
D. NIC has failed.
www.sybex.com
Review Questions
573
12. What are some resources that you can use to diagnose and solve problems?
A. Friends and coworkers in the business.
B. Web-based knowledgebases.
C. System documentation.
D. Try different things in an attempt to solve the problem.
13. A server that is RAM-starved will have which of the following symptoms?
A. Very slow speed
B. Errors in event logs
C. Excessive disk activity
D. Spontaneous rebooting
14. Last night you were working on a server, changing out its NIC. Coin-
www.sybex.com
574
Chapter 13
16. Which of the following are examples of a component for which you
think youve isolated the problem to a bad power supply. Whats your
next step?
A. Replace the server.
B. Replace the power supply.
C. Check that the power supply really is bad.
D. Replace the power cord.
www.sybex.com
Review Questions
575
20. A new service patch is out for your system and the documentation on
the Web indicates that it might fix some problems youve been experiencing. What should you do first?
A. Check with others to see if theyve applied the patch.
B. Test the service patch on a comparably equipped lab server.
C. Immediately install on the server with the problem.
D. Wait for a couple of months to see how the patch works out for
others.
www.sybex.com
576
Chapter 13
forced to page some things out to disk can create the problem
described above. Use system diagnostics to determine which might be
the case.
2. A, B. A daemon is a UNIX service. LPD is a printing service. Youre
being told that the computer cant print. Use rexec or previously
installed remote control software to get into the computer and see if
you can restart the daemon. Telnet wont work unless there has been
code written for it for your system in order to perform remote control
activities. Ping merely tells you the server is accessible through TCP/IP.
3. B, D. Theres little you can do in a situation such as this. If the NIC is
not responding, you can find that by trying to ping the NIC (provided
youre running TCP/IP, that is). Telnetting into the NIC, even if that
were possible, would not reveal much information. Youre stuck having someone onsite cycle the computer, then rechecking.
4. B. Perhaps the computer was completely frozen and Ethel had no
choice. Thats certainly a reason for having to perform a hard shutdown. But in most circumstances, youll want to perform a graceful
shutdown on serversespecially a server thats running a database
such as Oracle.
5. A. Before you do anything else, write down the stop code, if there is one,
and the syntax of the stop message, if there is one. Youll need this information as you investigate the cause of the problem. Then you begin talking to others about what may have been done to the server. By the way,
in situations such as this, its a good idea to limit the people that are
allowed on the computer and to require people to enter changes into a
change management log.
6. A, C, D. Windows NT systems cant use rexec. Telnet might be some-
what useful for diagnosing whether you at least can access the computer or notprovided, that is, that the computer has the ability to
allow telnet operations. But ping and tracert are very good commands
for diagnosing whether the computer is answering requests and if
theres a network issue surrounding its availability.
www.sybex.com
577
7. A. The fact that the computer had its NIC updated last night means
that this is where you should start checking first. Chances are very
good that youll find a normal installation with the exception of the
speed at which it is set. Remember that if a NIC is set at autodetect for
its port speed and the switch port is set the same, youve very likely
defaulted down to the least common denominator10 Mb/sec, half
duplex. This setting is enough to really whack the computers I/O
capabilities. Also there may be some negotiation thrashing going on as
the NIC and the switch port continue to query each other to see what
speed the other is running at.
8. B. Some viruses can change the MBR. Were not told if this computer has
a virus scanner on it or not, but even if it did and the virus signature file
was out of date, this problem could happen anyway. The BIOS being bad
would mean the computer wouldnt be available at all. Ditto for the OS.
A bad disk would probably not allow the computer to be accessible, but
it could possibly act erratically while it was going bad.
9. C. A beep on a computer can mean a variety of thingscheck
ning will post events to the systems log files. You can glean tons of
information simply by reading the logs to see if you can find out
whats wrong. If you come up blank, begin to dig into the system
documentation, or use the documentation along with the log files to
interpret whats happening.
11. C, D. Answer A is a little sketchy because NIC drivers get loaded into
www.sybex.com
578
Chapter 13
involved with. Ask friends and coworkers who are familiar with systems, check knowledgebases, and consult system documentation, but
dont try to solve problems by trying one thing after another!
13. A, C. Servers that are RAM-starved are bottlenecking by having to page
data out to disk. The server will be very slow and youll see excessive disk
activity. There will not necessarily be any errors in the event logs. Spontaneous rebooting is a sign of a much larger problem.
14. B. First check to make sure the NICs operational by pinging it from
a workstation, then by pinging hosts from the server itself. Check the
NICs speed as well. You no doubt did all this last night, but when
youre working on servers late at night, its easy to get things mixed
up. Then, having ruled out that your installation is the problem, its
time for you to drill in on the network team. Pinging the NIC might
serve to shortcut you to the network team right away.
15. A. The Linux and UNIX shutdown commands are quite similar, but
puter connects through cords. If you think you have a power supply
problem, check the cord first before proceeding with problem resolution. Power cords can and do go bad.
www.sybex.com
579
20. B. While you should never simply haul off and install a service patch on
a production server, on the other hand youve got the potential to solve
some problems youve been having. So immediately download the patch
but test it on a lab box. Note that the lab computer will have to be comparably equipped with the hardware and apps you have on your problem
server so that you get an accurate test. Checking with others is a good
idea, but wont work if youre an early adopter. Waiting it out is also a
good idea provided you dont have an immediate need.
www.sybex.com
Server+ Glossary
www.sybex.com
582
Glossary
1000Base-SX This is one of the specifications for running Gigabit Ethernet over fiber
optic cable. The S stands for short wavelength,
which defines the optical transceivers or laser
devices. The wavelength of the SX lasers is 770
to 860 nanometers (nm), which is usually
referred to as 850 nm.
1000Base-T Standard for Gigabit Ethernet
over Category 5 copper cable.
100Base-FX This is the specification for running Fast Ethernet (100Mbps) over fiber optic
cable.
100Base-T4 This is the specification for operating Fast Ethernet (100Mbps) over four pairs
of copper wire, with a signaling system that
allows Fast Ethernet to be carried over voice
grade, Unshielded Twisted Pair Cat 3 cabling.
www.sybex.com
Glossary
10Base-FL
583
www.sybex.com
584
Glossary
www.sybex.com
Glossary
585
active-matrix screen An LCD display mechanism that uses an individual transistor to con-
www.sybex.com
586
Glossary
algorithm
problem.
allocation unit An allocation unit is a portion of the hard drive that is used by the computer when saving information to the drive.
Smaller allocation units are generally more efficient, because they result in less wasted space.
alpha Extremely early versions of computer
software are called alpha code. Alpha code is
generally incomplete and unusable, and it is
almost never released to the public.
American National Standards Institute
(ANSI) ANSI is the organization that is recognized in the United States as the body that
develops technology standards. It is a member
of the International Organization for Standardization.
analog Describes any device that represents
changing values by a continuously variable
physical property such as voltage in a circuit,
fluid pressure, liquid level, and so on. An
analog device can handle an infinite number of
values within its range.
anti-static bag A bag designed to keep static
charges from building up on the outside of a
computer component during shipping. The bag
will collect some of the charges, but does not
drain them away as ESD mats do.
anti-static wrist strap (ESD strap) A specially constructed strap worn as a preventive
measure to guard against the damages of ESD.
One end of the strap is attached to an earth
ground and the other is wrapped around the
technicians wrist.
www.sybex.com
Glossary
asynchronous Describes a type of communication that adds special signaling bits to each
end of the data. The bit at the beginning of the
information signals the start of the data and is
known as the start bit. The next few bits are the
actual data that needs to be sent. Those bits are
known as the data bits. Stop bits indicate that
the data is finished. Asynchronous communications have no timing signal.
asynchronous mode Method of communication between a SCSI controller and a SCSI
device that does not require any sort of timing
signal.
Asynchronous Transfer Mode (ATM) In
banking, an ATM is an instant cash machine.
In computing, it is a switching technology that
uses dedicated connections to manage digital
data in 53-byte cells. These cells are then transmitted over a physical medium using a digital
signal technology.
AT Attachment (ATA) ANSI group
X3T10s official name for Integrated Drive
Electronics (IDE) devices.
AT bus Another name for the ISA bus. See
also ISA.
ATA 100 IDE interface that will transfer data
at up to 100Mbps.
ATA 2
587
www.sybex.com
588
Glossary
bandwidth In communications, the difference between the highest and the lowest frequencies available for transmission in any given
range. In networking, the transmission capacity
of a computer or a communications channel
stated in megabits or megabytes per second; the
higher the number, the faster the data transmission takes place.
Bandwidth Allocation Protocol A management protocol that will control the amount of
the bandwidth that is being used by a process or
service.
See
basis weight A measurement of the heaviness of paper. The number is the weight, in
pounds, of 500 11" 17" sheets of that type of
paper.
batch file File with a .bat extension that
contains other DOS commands. By typing the
name of the batch file and pressing Enter, DOS
will process all of the batch file commands, one
at a time, without need for any additional user
input.
baud rate In communications equipment, a
measurement of the number of state changes
(from 0 to 1 or vice versa) per second on an
asynchronous communications channel.
Berg connector A type of connector most
commonly used in PC floppy drive power cables;
it has four conductors arranged in a row.
beta Beta code is software that has reached
the stage where is usable and generally stable,
but it is not completely finished. Beta code is
often released to the public for testing on an as
is basis, and user comments are then used to
finish the release version of the product.
bias voltage The high-voltage charge
applied to the developing roller inside an EP
cartridge.
bidirectional Operating in two directions at
the same time.
www.sybex.com
Glossary
589
block transfer mode Moving data in discrete groups of bytes, referred to as blocks.
Blue Screen of Death (BSOD) A typical
way of describing the blue screen error condition that occurs when Windows NT fails to
boot properly or quits unexpectedly.
boot The loading of an operating system into
memory, usually from a hard disk, although
occasionally from a floppy disk. This is an
automatic procedure begun when you first turn
on or reset your computer. A set of instructions
contained in ROM begin executing, first running a series of power on self-tests (POSTs) to
check that devices, such as hard disks, are in
working order, then locating and loading the
operating system, and finally passing control of
the computer over to that operating system.
bit-mapped font A set of characters in a specific style and size, in which each character is
defined by a pattern of dots. The computer
must keep a complete set of bitmaps for every
font you use on your system, and these bitmaps
can consume large amounts of disk space.
See BPS.
www.sybex.com
590
Glossary
bridge This type of connectivity device operates in the Data Link layer of the OSI model. It
is used to join similar topologies (Ethernet to
Ethernet, Token Ring to Token Ring) and to
divide traffic on network segments. This device
will pass information destined for one particular workstation to that segment, but it will not
pass broadcast traffic.
British Naval Connector (BNC) Barrel connector used to join two segments of coaxial
cable. Also referred to as Bayonet NeillConcelman, named for Paul Neill of Bell Labs
and Carl Concelman.
broadcasting Sending a signal to all entities
that can listen to it. In networking, it refers to
sending a signal to all entities connected to that
network.
brouter In networking, a device that combines the attributes of a bridge and a router. A
brouter can route one or more specific protocols, such as TCP/IP, and bridge all others.
brownout A short period of low voltage,
which is often caused by an unusually heavy
demand for power.
browser A piece of software used to access
the Internet. Common browsers are Netscapes
Navigator and Microsofts Internet Explorer.
bubble-jet printer A type of sprayed ink
printer, this type uses an electric signal that
energizes a heating element, causing ink to
vaporize and get pushed out of the pinhole and
onto the paper.
www.sybex.com
Glossary
bus controller
computer bus.
bus mastering A technique that allows certain advanced bus architectures to delegate
control of data transfers between the Central
Processing Unit (CPU) and associated peripheral devices to an add-in board.
bus mouse A mouse connected to the computer using an expansion board plugged into an
expansion slot, instead of simply connected to a
serial port as in the case of a serial mouse.
bus slave
master.
591
www.sybex.com
592
Glossary
See CRT.
www.sybex.com
Glossary
Certificate Authority (CA) A network service that is the authority that can issue and
manage security credentials and public keys to
be used in message encryption.
CGA Acronym for Color/Graphics Adapter.
CGA is a video adapter that provided lowresolution text and graphics. CGA provided
several different text and graphics modes,
including 40- or 80-column by 25-line, 16color text mode, and graphics modes of 640
horizontal pixels by 200 vertical pixels with
two colors, or 320 horizontal pixels by 200 vertical pixels with four colors. CGA has been
superseded by later video standards, including
EGA, VGA, SuperVGA, and XGA.
channel A path or link through which information is transmitted between connected
devices.
charge-coupled device
See CCD.
593
www.sybex.com
594
Glossary
www.sybex.com
Glossary
connectivity device Any device that facilitates connections between network devices.
Some examples include hubs, routers, switches,
and gateways.
Control Program for Microcomputer (CP/M)
A computer operating system that was an
early competitor of Microsofts DOS system.
CP/M was a command-line system developed
by Gary Kildall.
conventional memory The amount of
memory accessible by DOS in PCs using an
Intel processor operating in real mode, normally the first 640K.
cooperative multitasking A form of multitasking in which all running applications must
work together to share system resources.
copy backup A backup of data made by
simply copying the data from one location to
another. For example, you want to make sure
that you have a complete copy of this glossary
file. You would copy it to another location, like
a diskette, for safekeeping.
corona roller Type of transfer corona
assembly that uses a charged roller to apply
charge to the paper.
corona wire Type of transfer corona
assembly. Also, the wire in that assembly that is
charged by the high-voltage supply. It is narrow
in diameter and located in a special notch under
the EP print cartridge.
CPU (Central Processing Unit)
Processing Unit (CPU).
See Central
595
www.sybex.com
596
Glossary
See DSR.
See DTE.
See DTR.
www.sybex.com
Glossary
597
defragmentation The process of reorganizing and rewriting files so that they occupy
one large continuous area on your hard disk
rather than several smaller areas.
DES
www.sybex.com
598
Glossary
www.sybex.com
Glossary
599
disk duplexing In networking, a fault-tolerant technique that writes the same information simultaneously onto two different hard
disks. Disk duplexing is offered by most of the
major network operating systems and is
designed to protect the system against a single
disk failure; it is not designed to protect against
multiple disk failures and is no substitute for a
well-planned series of disk backups.
www.sybex.com
See DOS.
600
Glossary
www.sybex.com
Glossary
601
See DB connector.
www.sybex.com
602
Glossary
DSR Abbreviation for data set ready. A hardware signal defined by the RS-232-C standard
to indicate that the device is ready.
D-Sub
See DB connector.
DTE Abbreviation for data terminal equipment. In communications, any device, such as a
terminal or a computer, connected to a communications channel or public network.
DTR Abbreviation for data terminal ready. A
hardware signal defined by the RS-232-C standard to indicate that the computer is ready to
accept a transmission.
dual-booting If a single machine must be
used for many tasks, it may be necessary for it
to have multiple operating systems installed
simultaneously. To do this a boot manager presents the user with a choice of which operating
system to use at startup. To use a different OS
the user would have to shut down the system,
restart it, and select the other OS.
dual processing (DP) Having two processors working in conjunction with each other on
a motherboard.
Dual Inline Memory Module See DIMM
(Dual Inline Memory Module).
Dual Inline Package
Package).
See electricity.
www.sybex.com
Glossary
603
www.sybex.com
604
Glossary
See EGA.
www.sybex.com
Glossary
605
ergonomics Standards that define the positioning and use of the body to promote a
healthy work environment.
error correction code (ECC) A method that
allows for the detection and correction of
errors that may occur during data transmission. Error correction codes are categorized by
the numbers of errors that can be corrected.
ESD
See page
www.sybex.com
606
Glossary
See XGA.
www.sybex.com
Glossary
FAQ Acronym for Frequently Asked Question. A document that lists some of the more
commonly asked questions about a product or
component. When researching a problem, the
FAQ is usually the best place to start.
Fast-ATA Fast-ATA is a term coined by
Seagate Technologies that refers to EIDE. See
EIDE.
Fast Ethernet Ethernet specifications that
match the 100Base-X specifications.
fast paged mode (FPM) Dynamic Random
Access Memory that accesses memory in
sequential order with a reduced cycle time. This
provides for faster throughput.
Fast SCSI A SCSI-2 Interface specification
that transfers data at a rate of 10Mbps. Data is
transferred 8 bits at a time. Fast SCSI uses a 50pin adapter.
Fast-Wide SCSI A SCSI-2 interface specification that transfers data at a rate of up to
20Mbps. Data is transferred 16 bits at a time.
The Fast-Wide SCSI adapter is a 68-pin
adapter.
FAT
607
www.sybex.com
608
Glossary
file allocation table (FAT) A table maintained by DOS or OS/2 that lists all the clusters
available on a disk. The FAT includes the location of each cluster, as well as whether it is in
use, available for use, or damaged in some way
and therefore unavailable. FAT also keeps
track of which pieces belong to which file.
www.sybex.com
Glossary
See IEEE-1394.
609
www.sybex.com
610
Glossary
www.sybex.com
Glossary
free memory
rently in use.
See FAQ.
full duplex communications Communications where both entities can send and receive
simultaneously.
Full Hot Swap This term is used in PCI Hot
Swap devices. It means that the system bus is
fully Hot Swap capable, where you can remove
and reinstall a component without taking the
entire system out of service.
611
See fuser.
www.sybex.com
612
Glossary
General Protection Fault (GPF) A Windows error that typically occurs when a Windows program tries to access memory currently
in use by another program.
graphical user interface (GUI) A graphicsbased user interface that allows users to select
files, programs, or commands by pointing to pictorial representations on the screen rather than by
typing long, complex commands from a command prompt. Application programs execute in
windows, using a consistent set of pull-down
menus, dialog boxes, and other graphical elements such as scroll bars and icons.
graphics accelerator board A specialized
expansion board containing a graphics coprocessor as well as all the other circuitry found on
a video adapter.
GUI
half duplex
half duplex communications Communications that occur when only one entity can transmit
or receive at any one instant.
half-height drive A space-saving drive bay
that is half the height of the 3" drive bays used
in the original IBM PC. Most of todays drives
are half-height drives.
hand-held scanner Type of scanner that is
small enough to be held in your hand. Used to
digitize a relatively small image or artwork, it
consists of the controller, CCD, and light
source contained in a small enclosure with
wheels on it.
hard disk controller An expansion board
that contains the necessary circuitry to control
and coordinate a hard disk drive. Many hard
disk controllers are capable of managing more
than one hard disk, as well as floppy disks and
even tape drives.
www.sybex.com
Glossary
613
heat sink A device that is attached to an electronic component that removes heat from the
component by induction. It is often a plate of aluminum or metal with several vertical fingers.
hardware All the physical electronic components of a computer system, including peripherals, printed-circuit boards, displays, and
printers.
www.sybex.com
614
Glossary
high-voltage power supply (HVPS) Provides the high voltages that are used during the
EP print process. This component converts
house AC currents into higher voltages that the
two corona assemblies can use.
www.sybex.com
Glossary
615
www.sybex.com
616
Glossary
www.sybex.com
Glossary
See ISA.
INI file Text file that is created by an installation program when a new Windows application is installed. INI files contain settings for
individual Windows applications as well as for
Windows itself.
initialization commands A set of commands
sent to a modem to prepare it to function.
inoculating The process of protecting a
computer system against virus attacks by
installing antivirus software.
input/output addresses
See IDE.
617
www.sybex.com
618
Glossary
See IP.
www.sybex.com
Glossary
interrupt request (IRQ) A hardware interrupt signals that an event has taken place that
requires the processors attention, and may
come from the keyboard, the input/output
ports, or the systems disk drives. In the PC, the
main processor does not accept interrupts from
hardware devices directly; instead interrupts
are routed to an Intel 8259A Programmable
Interrupt Controller. This chip responds to
each hardware interrupt, assigns a priority, and
forwards it to the main processor.
interrupt request (IRQ) lines Hardware
lines that carry a signal from a device to the
processor.
IP Abbreviation for Internet Protocol. The
underlying communications protocol on which
the Internet is based. IP allows a data packet to
travel across many networks before reaching its
final destination.
IP address In order to communicate on a
TCP/IP network, each machine must have a
unique IP address. This address is in the form
x.x.x.x where x is a number from 0 to 255.
IPCONFIG Used on Windows 2000 to view
current IP configuration information and to
manually request updated information from a
DHCP server.
IPSec Internet Protocol Security protocols. A
developing security standard that works at the
Network layer or at the Packet Processing layer
of network communications. IPSec is usually
discussed when the subject is Virtual Private
Networks (VPNs).
IRQ
619
www.sybex.com
620
Glossary
kilobyte
bytes.
LCD
LAN
www.sybex.com
Glossary
621
(Extended Industry Standard Architecture) definitions. Local bus can achieve a maximum
data rate of 133 megabytes per second with a
33MHz bus speed, 148 megabytes per second
with a 40MHz bus, or 267 megabytes per
second with a 50MHz bus.
liquid crystal display (LCD) A display technology common in portable computers that
uses electric current to align crystals in a special
liquid. The rod-shaped crystals are contained
between two parallel transparent electrodes,
and when current is applied, they change their
orientation, creating a darker area. Many LCD
screens are also backlit or side-lit to increase
visibility and reduce the possibility of eyestrain.
Load Balancing The process where communications are spread between various networking components to manage the load and
spread out the work. This can be done at the
network card level, at the hard drive level, or
even at the application server level.
local area network (LAN) A group of computers and associated peripherals connected by
a communications channel capable of sharing
files and other resources between several users.
www.sybex.com
622
Glossary
See RAM.
www.sybex.com
Glossary
623
www.sybex.com
624
Glossary
memory map The organization and allocation of memory in a computer. A memory map
will give an indication of the amount of
memory used by the operating system and the
amount remaining for use by applications.
See
See
www.sybex.com
Glossary
625
www.sybex.com
626
Glossary
multistation access unit (MAU) The central device in a Token Ring network that provides both the physical and logical connections
to the stations.
See
www.sybex.com
Glossary
network A group of computers and associated peripherals connected by a communications channel capable of sharing files and other
resources between several users. A network can
range from a peer to peer network (which connects a small number of users in an office or
department) to a local area network (which
connects many users over permanently
installed cables and dial-up lines) or to a wide
area network (that connects users on several
different networks spread over a wide geographic area).
network adapter In order to access network
resources, a physical connection to the network
must be made. This is generally done through
the network adapter, which is expansion hardware designed to interface with the network.
Network Basic Input/Output System
NetBIOS.
See
627
See
www.sybex.com
628
Glossary
NTFS The NT File System (NTFS) was created to provide enhanced security and performance for the Windows NT operating system,
and it has been adopted and improved upon by
Windows 2000. NTFS provides Windows
2000 with local file security, file auditing, compression, and encryption options. It is not compatible with Windows 9x or DOS.
null modem A short RS-232-C cable that
connects two personal computers so that they
can communicate without the use of modems.
The cable connects the two computers serial
ports, and certain lines in the cable are crossed
over so that the wires used for sending data by
one computer are used for receiving data by the
other computer and vice versa.
numeric keypad A set of keys to the right of
the main part of the keyboard, used for
numeric data entry.
odd parity A technique that counts the
number of 1s in a binary number and, if the
number of 1s total is not an odd number, adds
a digit to make it odd. See also parity.
ohm
www.sybex.com
Glossary
See scanner.
629
www.sybex.com
See PING.
630
Glossary
www.sybex.com
Glossary
631
www.sybex.com
632
Glossary
See
Personal System/2 (PS/2) A type of personal computer and server designed and marketed by IBM.
Pentium The Pentium represents the evolution of the 80486 family of microprocessors
and adds several notable features, including 8K
instruction code and data caches, built-in
floating-point processor and memory management unit, as well as a superscalar design and
dual pipelining that allow the Pentium to execute more than one instruction per clock cycle.
photosensitive drum
physical drive
drive.
See EP drum.
www.sybex.com
Glossary
See motherboard.
633
www.sybex.com
634
Glossary
www.sybex.com
Glossary
635
priority field A field in a packet that determines what the priority of the packet is.
www.sybex.com
636
Glossary
protocol In networking and communications, the specification that defines the procedures to follow when transmitting and
receiving data. Protocols define the format,
timing, sequence, and error-checking systems
used.
protocol stack In networking and communications, the several layers of software that
define the computer-to-computer or computerto-network protocol. The protocol stack on a
Novell NetWare system will be different from
that used on a Banyan VINES network or on a
Microsoft LAN Manager system.
proxy server A type of server that acts as a
firewall component to manage Internet traffic
to and from a local area network. A proxy
server can also provide Web page and document cacheing as well as other services,
including NAT.
PS/2 mouse interface A type of mouse
interface that uses a round, DIN-6 connector
that gets its name from the first computer it was
introduced on, the IBM PS/2.
Public Key Infrastructure (PKI) The PKI lets
users of an unsecure public network like the
Internet securely and privately exchange data
and money through the use of a public and a
private cryptographic key pair that is obtained
and shared through a trusted authority. The
PKI provides for a digital certificate that can
identify an individual or an organization and
directory services that can store and, when necessary, revoke the certificates.
www.sybex.com
Glossary
637
See RAM.
www.sybex.com
638
Glossary
Remote Access Server (RAS) A server dedicated to providing remote users access to the
LAN. It could be considered a modem farm.
removable mass storage Any highcapacity storage device inserted into a drive for
reading and writing, then removed for storage
and safekeeping.
removable media Any storage media that
can be removed from the system.
repeater In networking, a simple hardware
device that moves all packets from one local
area network segment to another.
reserved memory In DOS, a term used to
describe that area of memory between 640K
and 1MB, also known as upper memory.
Reserved memory is used by DOS to store
system and video information.
Reset Server A command that can be used
on a Novell Server to stop the network operating system, exit to DOS, and perform a warm
boot.
resilient server links Links between servers
that can bounce back after an interruption.
www.sybex.com
Glossary
rheostat
639
ROM (read-only memory) A type of computer memory that retains its data permanently, even when power is removed. Once the
data is written to this type of memory, it cannot
be changed.
root directory In a hierarchical directory
structure, the directory from which all other
directories must branch. The root directory is
created by the FORMAT command and can
contain files as well as other directories. This
directory cannot be deleted.
router In networking, an intelligent connecting device that can send packets to the correct local area network segment to take them to
their destination. Routers link local area network segments at the network layer of the
International Standards Organizations Open
Systems Interconnect (ISO/OSI) model for
computer-to-computer communications.
Routing Information Protocol (RIP) RIP is
a protocol that is used to route packets within
larger networks. It is used instead of other protocols like the Open Shortest Path First (OSPF).
RIP is an older routing protocol that is installed
in many of today's corporate networks. RIP is
designated by the Internet Engineering Task
Force (IETF) as one of several Interior Gateway
Protocols.
www.sybex.com
640
Glossary
RS-422/423/449 In asynchronous transmissions, a recommended standard interface established by the Electrical Industries Association for
distances greater than 50 feet but less than 1000
feet. The standard defines the specific lines,
timing, and signal characteristics used between
the computer and the peripheral device.
RTS Abbreviation for request to send. A
hardware signal defined by the RS-232-C standard to request permission to transmit.
run-length limited (RLL) encoding An efficient method of storing information on a hard
disk that effectively doubles the storage
capacity of a disk when compared to older, less
efficient methods such as modified frequency
modulation encoding (MFM).
Safe Mode A Windows 9x operating mode
that only loads a basic set of drivers and a basic
screen resolution. It can be activated using the
F8 key at boot time.
scanner An optical device used to digitize
images such as line art or photographs, so that
they can be merged with text by a page-layout
SCSI bus Another name for the SCSI interface and communications protocol.
SCSI chain All the devices connected to a
single SCSI adapter.
SCSI Fast-20 Implementation of SCSI technology that transfers data at 20Mbps.
www.sybex.com
Glossary
641
Often used as a performance gauge of an individual drive. The major part of a hard disks
access time is actually seek time.
self-healing driver Some of the more
advanced NIC cards will constantly test the
communication chain to make sure things are
working as planned. If the NIC comes up with
driver problems, the card can attempt to repair
or replace the driver. This is referred to as a
self-healing driver.
Self-Monitoring Analysis and Report Technology (SMART) In IDE hard disk technology, the hard disk will continuously
examine its level of operation. If the disk finds
that there are problems, it will report the
problem. The reports will occur on system boot
as part of the Power On Self-Test.
semiconductors Any material that,
depending on some condition, is either a conductor or non-conductor.
Sequenced Packet Exchange (SPX) SPX is
used primarily in Novell NetWare networks as
the reliable, connection-oriented protocol.
Serial ATA At the time of this writing, Serial
ATA was the latest method of communication
between the system bus and the ATA devices.
Serial communications, as opposed to parallel
communications, provides much faster
throughput and performance.
serial cables Cables used for serial communications. See serial communications.
www.sybex.com
642
Glossary
shell scripting Writing a script to be executed by the command interpreter of the operating system. This is common in Linux and
UNIX environments.
shielded twisted-pair
twisted-pair).
www.sybex.com
Glossary
643
single-purpose server A server that is dedicated to one purpose (e.g., a file server or a
printer server).
site license A software license that is valid
for all installations at a single site.
slave
See
See SNMP.
SNMP Manager
See SNMP.
www.sybex.com
644
Glossary
ST506 interface A popular hard-disk interface standard developed by Seagate Technologies, first used in IBMs PC/XT computer and
still popular today, with disk capacities smaller
than about 40MB. ST506 has a relatively slow
data transfer rate of 5 megabits per second.
www.sybex.com
Glossary
645
www.sybex.com
646
Glossary
www.sybex.com
Glossary
647
temporary swap file A swap file that is created every time it is needed. A temporary swap
file will not consist of a single large area of contiguous hard disk space, but may consist of several discontinuous pieces of space. By its very
nature, a temporary swap file does not occupy
valuable hard disk space if the application that
created it is not running. In a permanent swap
file the hard disk space is always reserved and is
therefore unavailable to any other application
program.
terabyte A measure used for high capacity
data storage. One terabyte equals 240 bytes,
although it is usually associated with 1 trillion
bytes.
terminal A monitor and keyboard attached
to a computer (usually a mainframe), used for
data entry and display. Unlike a personal computer, a terminal does not have its own central
processing unit or hard disk.
terminal emulation mode Terminal emulation mode is a method of putting a PC into a
configuration where it acts like a computer terminal without any processing power. A terminal will just provide commands to a
mainframe and all commands will be processed
at the mainframe.
www.sybex.com
648
Glossary
www.sybex.com
Glossary
649
www.sybex.com
650
Glossary
See SCSI-2.
See USB.
See UTP.
www.sybex.com
Glossary
651
www.sybex.com
See VGA.
652
Glossary
www.sybex.com
Glossary
653
See desktop.
www.sybex.com
654
Glossary
www.sybex.com
Glossary
World Wide Web (WWW) This is the graphical extension of the Internet that features millions of pages of information accessed though
the use of the Hypertext Transfer Protocol
(HTTP).
write-back memory A type of memory
where, when changes are made to cached data,
the changes are not made to the original data at
the same time.
write-protect tab The small notch or tab in
a floppy disk that is used to write-protect it.
write-protect To prevent the addition or
deletion of files on a disk or tape. Floppy disks
have write-protect notches or small write-protect tabs that allow files to be read from the
disk, but prevent any modifications or deletions. Certain attributes can make individual
files write-protected so they can be read but not
altered or erased.
writing step The step in the EP print process
where the items being printed are written to the
EP drum. In this step, the laser is flashed on and
off as it scans across the surface of the drum.
The area where the laser shines on is discharged
to almost ground (100 volts).
write-through memory A type of cache in
which changes are made to the cached data are
simultaneously made to the original copy,
rather than being marked for later updating.
Also spelled write thru.
x86 series The general name given to the
Intel line of IBM-compatible CPUs.
655
www.sybex.com