Basic Disk Vs Dynamic Disk
Basic Disk Vs Dynamic Disk
DYNAMIC DISK
What is a basic disk?
Basic disks are the most common type of partition used in Windows operating systems. This disk uses
primary partitions and logical drives that are formatted with a file system, typically NTFS.
Basic disks support two styles of partitions — master boot record (MBR) and GUID partition table (GPT).
MBR
MBR partition style uses a partition table that contains the location where partitions are stored on the
disk. This is the only partition style available on x86-based computers prior to Windows Server 2003, so
it is used automatically.
In MBR, you can create up to four partitions — three primary and one extended or all four primary. The
extended partition, in turn, can contain four logical drives within it.
GPT
Computers running Windows Server 2003 or later versions can choose from MBR and GPT partition
styles. A GPT partition supports up to 128 primary partitions, so there is no need for you to create a
logical drive at all.
Also, GPT allows partitions to be larger than 2TB and is more reliable because it supports cyclic
redundancy checks.
Dynamic volumes
Dynamic disks support five types of volumes, and they are:
Simple volumes — Functions like primary partitions on a basic disk.
Mirrored volumes — Creates a copy of the data contained in this volume, and in the process
provides fault tolerance.
Striped volumes — Distributes I/O requests across disks to improve disk input/output performance.
Spanned volumes — Combines the disk space available in two or more hard disks to create a
dynamic volume.
RAID-5 volumes — Stripes data and parity across three or more disks.
As you can see, these different volumes allow you to do so much more than a basic disk.
Operations in dynamic disk
Since dynamic disks are more flexible than basic disks, you can do a lot more operations. Here’s what
you can do with dynamic disks.
Create and delete simple, striped, spanned, RAID-5 and mirrored volumes
Remove a mirrored volume or break it into two volumes
Reactivate a missing disk
Repair RAID-5 and mirrored disks
Extend a simple or spanned partition.
Now that we have a good understanding of basic and dynamic disks, let’s take an in-depth look into
their differences.
Thus, these are the major differences that are present between the two disk types.
Next, let us see how we can convert one type to another, and the considerations that come with it.
When you understand this message and click OK, the basic disk will be converted to a dynamic one.
A note here: The system will throw an error if you don’t have enough space for this conversion.
Using diskpart.exe
Diskpart.exe is a built-in command line tool that converts dynamic disks to basic disks. The steps to use
this tool are as follows.
Open a command prompt with administrator privileges
Type diskpart.exe
At the prompt, type the name of the disk you want to revert. For example, Disk1 or Disk2
In the next prompt, type, “clean.” This command will clean the disk you want to convert
Finally, type “convert basic” to convert the disk to basic.
Though this process is easier than manual conversion, there will still be data loss. You have to back up
your data before running this tool.
FAT32 is the older Microsoft filesystem, primarily used by the Windows 9X line and Window could be
installed on a FAT32 parition up to XP. In comparision, FAT32 offers none of what was mentioned above,
and also has a maximum FILE (not folder) size of 4GB, which is kind of small these days, especially in
regards to HD video.
2) What Is VOIP.
VOIP - Short for Voice Over Internet Protocol, a category of hardware and software that enables people
to use the Internet as the transmission medium for telephone calls by sending voice data in packets
using IP rather than by traditional circuit transmissions.
Firewall:
Firewall is in other hand a program which protects your system from outsider/intruder/hacker attacks.
These attacks may not be virus type. In some cases hackers can take control of your system remotely
and steal your data or important information from system. If your system is directly connected to
internet or a large network than you can install a software firewall in your PC to protect your self from
unauthorized access. Firewall is available either in software or in hardware form. For a single PC you
may need a software firewall while a large corporate implements hardware firewall to protect all of
their systems from such attacks.
6) Differentiate between Frond end & Back End Server.
Backend server:
A back end server is a computer resource that has not been exposed to the internet. In this regard the
computing resource does not directly interact with the internet user. It can also be described as a server
whose main function is to store and retrieve email messages.
Frontend server:
A frontend server is a computer resources that has exposed to the internet.
7) What is APIPA.
Stands for Automatic Private IP Addressing
APIPA is a DHCP fail over mechanism for local networks. With APIPA, DHCP clients can obtain IP
addresses when DHCP servers are non-functional.
APIPA exists in all modern versions of Windows except Windows NT.
When a DHCP server fails, APIPA allocates IP addresses in the private range 169.254.0.1 to
169.254.255.254.
8) How Release and renew IP address from Command prompt.
Ipconfig / release
ipconfig / renew
9) What is wins server.
Windows Internet Name Service (WINS) servers dynamically map IP addresses to computer names
(NetBIOS names). This allows users to access resources by computer name instead of by IP address. If
you want this computer to keep track of the names and IP addresses of other computers in your
network, configure this computer as a WINS server.
If you do not use WINS in such a network, you cannot connect to a remote network resource by using its
NetBIOS name.
10)What is the Windows Registry.
The Windows Registry, usually referred to as "the registry," is a collection of databases of configuration
settings in Microsoft Windows operating systems.
11) System Volume Information (SVI) Folder.
Windows XP includes a folder named System Volume Information on the root of each drive that remains
hidden from view even when you choose to show system files. It remains hidden because it is not a
normally hidden folder you can say it is a Super Hidden Folder. Windows does not shows Super Hidden
Folders even when you select "Show Hidden Files."
12 ) What is MBR.
Short form Master Boot Record, a small program that is executed when a computer boots up. Typically,
the MBR resides on the first sector of the hard disk. The program begins the boot process by looking up
the partition table to determine which partition to use for booting
13) What is Bit Locker.
BitLocker is an encryption feature available in Ultimate and Enterprise versions of Windows 7 and Vista,
To encrypt an entire drive, simply right-click on the drive and select Turn on BitLocker from the context
menu.
14) Difference b/w sata and IDE.
IDE and SATA are different types of interfaces to connect storage devices (like hard drives) to a
computer's system bus. SATA stands for Serial Advanced Technology Attachment (or Serial ATA) and IDE
is also called Parallel ATA or PATA. SATA is the newer standard and SATA drives are faster than PATA
(IDE) drives. For many years ATA provided the most common and the least expensive interface for this
application. But by the beginning of 2007, SATA had largely replaced IDE in all new systems.
15)Main Difference Between Windows server 2012R2 and 2012
1) New Server Manager: Create, Manage Server Groups
2) Hyper-V Replication : The Hyper-V Replica feature allows you to replicate a virtual machine from one
location to another with Hyper-V and a network connection—and without any shared storage required.
This is a big deal in the Microsoft world for disaster recovery, high availability and more. VMware does
this, too, but the vendor charges new licensees extra for the capability.
3) Expanded PowerShell Capabilities
4) IIS 8.0 and IIS 7 in 2012R2
5) Hyper-V 4.0
6) PowerShell 4.0
16) How Long My Computer Has Been Running? Get to Know My Computer’s Uptime.
Start Task manager, and select Performance tab.
In performance tab we can see system up time
Method 2: By typing systeminfo in command prompt we can find out up time of your server
In system boot time.
17)Event viewer in Windows server
Control panel - Administrative tools - Computer Management - event Viewer
Three types events
Error.
Warning.
Information.
18) Manage Multiple, Remote Servers with Server Manager.
Server Manager is a management console in Windows Server® 2012 R2 Preview and Windows Server®
2012 that helps IT professionals provision and manage both local and remote Windows-based servers
from their desktops, without requiring either physical access to servers, or the need to enable Remote
Desktop protocol (RDP) connections to each server. Although Server Manager is available in Windows
Server 2012R2 R2 and Windows Server 2012R2, Server Manager was updated in Windows Server 2012,
to support remote, multi-server management, and help increase the number of servers an administrator
can manage.
19) What happens when we type URL in browser.
First the computer looks up the destination host. If it exists in local DNS cache, it uses that information.
Otherwise, DNS querying is performed until the IP address is found.
Then, your browser opens a TCP connection to the destination host and sends the request according to
HTTP 1.1 (or might use HTTP 1.0, but normal browsers don't do it any more).
The server looks up the required resource (if it exists) and responds using HTTP protocol, sends the data
to the client (=your browser)
The browser then uses HTML parser to re-create document structure which is later presented to you on
screen. If it finds references to external resources, such as pictures, css files, javascript files, these are is
delivered the same way as the HTML document itself.
DHCP:
1) How DHCP work?
DHCP Stands for Dynamic host configuration protocol.
DHCP is a protocol used for automatic configuration IP address in client computers connected to IP
networks. DHCP operates on a client server model in four phases.
Discover: A client broadcasts DHCP Discover message when it comes alive on the network.
Offer: When a DHCP server receives the DHCP Discover message from the client, it reserves an I P
address for the client and sends a DHCP Offer message to the client offering the reserved IP address.
Request: The client receives the DHCP offer message and broadcasts a DHCP request message to show
its consent to accept the offered IP address.
Acknowledge: When the DHCP server receives the DHCP Request message from the client, it sends a
DHCP Ack packet to the client. At this point the IP configuration process is complete.
2) What is DHCP Scope?
A range of IP address that the DHCP server can assign to clients that are on one subnet.
3) What protocol and port does DHCP use?
UDP protocol and 67 port in client and 68 port in server.
4) What is a DHCP lease?
A DHCP lease is the amount of time that the DHCP server grants to the DHCP
client permission to use a particular IP address. A typical server allows its
administrator to set the lease time.
5) Can DHCP support statically defined addresses?
Yes.
6) Define Dora Process & why it is used.
Discover, Offer, request and acknowledgement. it is used to assign ip address automatically to client
systems.
7) What is Authorizing DHCP Servers in Active Directory?
If a DHCP server is to operate within an Active Directory domain (and is not running on a domain
controller) it must first be authorized to Active directory.
8)How to Backup and Restore DHCP in Windows Server 2012R2
In Windows Server 2012R2, backup of DHCP database and settings has gotten simpler. You may want to
back up your DHCP server from time to time to prepare for disaster recovery scenarios or when
migrating DHCP server role to a new hardware.
Backup DHCP Server
1. Open Server Manager > DHCP role
2. Right click server name, choose Backup..
3. Choose a location for backup, click OK
Restore DHCP Server
1. Open Server Manager > DHCP role
2. Right Click server name, choose Restore
3. Choose the location of the backup, click OK
4. Restart the DHCP Service
DNS
1) Define DNS .
Domain Name System, DNS is an Internet service that translates domain names into IP addresses.
Because domain names are alphabetic, they're easier to remember.
Two types of lookup in DNS.
Forward lookup : it converts Domain name to ip address.
Reverse lookup: it converts ip address to Domain name.
Three types of zone.
Primary zone
secandary zone and stub zone.
To manually boot in Directory Services Restore Mode, press the F8 key repeatedly. Do this immediately
after BIOS POST screen, before the Windows logo appears. (Timing can be tricky; if the Windows logo
appears you waited too long.) A text menu menu will appear. Use the up/down arrow keys to select
Directory Services Restore Mode or DS Restore Mode. Then press the Enter key.
13) Where is the AD database held? What other folders are related to AD?
The AD data base is stored in c:\windows\ntds\NTDS.DIT.
Ensure that you log on to the computer with an administrator account to perform installation.
Click electing Start > Administration Tools > Server manager > Configure your Server.
On the Domain Controller Type panel, select Domain controller for a new domain and click Next.
On the Create New Domain panel, select Domain in a new forest and click Next.
On the New Domain Name panel, enter the DNS suffix for your new Active Directory. This name will be
used during Tivoli Provisioning Manager installation, so make a note of it. Click Next.
On the NetBIOS Domain Name panel, enter the NetBIOS name of the domain. The first part of the DNS
name is usually sufficient. Click Next.
On the Database and Logs panel, select the desired folders for the Database and
Logs.C:\Windows\NTDS is the default. Click Next.
On the Shared System Volume panel, enter a valid directory for the system volume.C:\Windows\Sysvol
is the default. Click Next to continue.
If you configured DNS successfully, the Permissions setting panel is displayed. Select Permissions
compatible only with Windows 2000 or Windows Server 2003. Click Next.
On the Directory Services Restore Mode Administrator Password panel, enter a valid password to be
used when running the Directory Services in Restore Mode. Click Next
Verify the settings and Click Next to begin the Active Directory configuration. The server will be
rebooted as part of the process.
17) What is the difference between local, global and universal groups
Domain local groups assign access permissions to global domain groups for local domain resources.
Global groups provide access to resources in other trusted domains. Universal groups grant access to
resoures in all trusted domains.
18) What is group nesting.
Adding one group as a member of another group is called 'group nesting'. This will help for easy
administration and reduced replication traffic
21) What is Forest?
A collection of one or more Active Directory domains that share a common schema, configuration, and
global catalog.
23) What is tree.
An Active Directory tree is a collection of Active Directory domains that begins at a single root and
branches out into peripheral, child domains. Domains in an Active Directory tree share the same
namespace. An Active Directory forest is a collection of Active Directory trees, similar to a real world
forest. Catalog Server.
24) What is site.
A Site object in Active Directory represents a geographic location that hosts networks.
26) Command to Add client to Domain
NETDOM /Domain:MYDOMAIN /user:adminuser /password:apassword MEMBER MYCOMPUTER
/JOINDOMAIN
27) Setting File Permissions on a Folder Using Group Policy
The setting is located under Computer Configuration, Windows Settings, Security Settings, File System.
Here's the procedure:
Go to the location in the Group Policy listed above.
Right-click File System.
Click Add File.
In the "Add a file or folder" window, select the folder (or file) for which you want the permissions to be
set, and click OK.
In the security box that pops up, you can add a user or a group that needs permission to the folder.
Vertualization
1)Define virtualization.
Hyper-V virtualization will provide an environment in which we can run multiple operating systems at
the same time on one physical computer, by running each operating system in its own virtual machine.
2) What are the benefits of virtualization ?
Reduce the number of physical servers
Reduce the infrastructure needed for your data center
3) What is a Hypervisor.
You can think of a Hypervisor as the kernel or the core of a virtualization platform. The Hypervisor is
also called the Virtual Machine Monitor. The Hypervisor has access to the physical host hardware.
4) What are a host, guest, and virtual machine.
A host system (host operating system) would be the primary & first installed operating system. If you
are using a bare metal Virtualization platform like Hyper-V or ESX, there really isn’t a host operating
system besides the Hypervisor. If you are using a Type-2 Hypervisor like VMware Server or Virtual
Server, the host operating system is whatever operating system those applications are installed into.
A guest system (guest operating system) is a virtual guest or virtual machine (VM) that is installed under
the host operating system. The guests are the VMs that you run in your virtualization platform.
Some admins also call the host & guest the parent and child.